• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

264 Incident Response courses

Cisco Understanding Cisco Cybersecurity Operations Fundamentals v1.0 (CBROPS)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for individuals seeking a role as an associate-level cybersecurity analyst and IT professionals desiring knowledge in Cybersecurity operations or those in pursuit of the Cisco Certified CyberOps Associate certification including Students pursuing a technical degree Current IT professionals Recent college graduates with a technical degree Overview After taking this course, you should be able to Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst's perspective. Explain Network Security Monitoring (NSM) tools that are available to the network security analyst. Explain the data that is available to the network security analyst. Describe the basic concepts and uses of cryptography. Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts. Understand common endpoint security technologies. Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by threat actors. Identify resources for hunting cyber threats. Explain the need for event data normalization and event correlation. Identify the common attack vectors. Identify malicious activities. Identify patterns of suspicious behaviors. Conduct security incident investigations. Explain the use of a typical playbook in the SOC. Explain the use of SOC metrics to measure the effectiveness of the SOC. Explain the use of a workflow management system and automation to improve the effectiveness of the SOC. Describe a typical incident response plan and the functions of a typical Computer Security Incident Response Team (CSIRT). Explain the use of Vocabulary for Event Recording and Incident Sharing (VERIS) to document security incidents in a standard format. The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches you security concepts, common network and application operations and attacks, and the types of data needed to investigate security incidents. This course teaches you how to monitor alerts and breaches, and how to understand and follow established procedures for response to alerts converted to incidents. Through a combination of lecture, hands-on labs, and self-study, you will learn the essential skills, concepts, and technologies to be a contributing member of a cybersecurity operations center (SOC) including understanding the IT infrastructure, operations, and vulnerabilities. This course helps you prepare for the Cisco Certified CyberOps Associate certification and the role of a Junior or Entry-level cybersecurity operations analyst in a SOC. Course Outline Defining the Security Operations Center Understanding Network Infrastructure and Network Security Monitoring Tools Exploring Data Type Categories Understanding Basic Cryptography Concepts Understanding Common TCP/IP Attacks Understanding Endpoint Security Technologies Understanding Incident Analysis in a Threat-Centric SOC Identifying Resources for Hunting Cyber Threats Understanding Event Correlation and Normalization Identifying Common Attack Vectors Identifying Malicious Activity Identifying Patterns of Suspicious Behavior Conducting Security Incident Investigations Using a Playbook Model to Organize Security Monitoring Understanding SOC Metrics Understanding SOC Workflow and Automation Describing Incident Response Understanding the Use of VERIS Understanding Windows Operating System Basics Understanding Linux Operating System Basics Additional course details: Nexus Humans Cisco Understanding Cisco Cybersecurity Operations Fundamentals v1.0 (CBROPS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Understanding Cisco Cybersecurity Operations Fundamentals v1.0 (CBROPS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Understanding Cisco Cybersecurity Operations Fundamentals v1.0 (CBROPS)
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Information Security Manager (CISM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification. Overview Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Identify and manage information security risks to achieve business objectives. Create a program to implement the information security strategy. Implement an information security program. Oversee and direct information security activities to execute the information security program. Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents. In this course, students will establish processes to ensure that information security measures align with established business needs. Prerequisites Information security governance Information risk management Information security program development Information security program management Incident management and response 1 - Information Security Governance Develop an Information Security Strategy Align Information Security Strategy with Corporate Governance Identify Legal and Regulatory Requirements Justify Investment in Information Security Identify Drivers Affecting the Organization Obtain Senior Management Commitment to Information Security Define Roles and Responsibilities for Information Security Establish Reporting and Communication Channels 2 - Information Risk Management Implement an Information Risk Assessment Process Determine Information Asset Classification and Ownership Conduct Ongoing Threat and Vulnerability Evaluations Conduct Periodic BIAs Identify and Evaluate Risk Mitigation Strategies Integrate Risk Management into Business Life Cycle Processes Report Changes in Information Risk 3 - Information Security Program Development Develop Plans to Implement an Information Security Strategy Security Technologies and Controls Specify Information Security Program Activities Coordinate Information Security Programs with Business Assurance Functions Identify Resources Needed for Information Security Program Implementation Develop Information Security Architectures Develop Information Security Policies Develop Information Security Awareness, Training, and Education Programs Develop Supporting Documentation for Information Security Policies 4 - Information Security Program Implementation Integrate Information Security Requirements into Organizational Processes Integrate Information Security Controls into Contracts Create Information Security Program Evaluation Metrics 5 - Information Security Program Management Manage Information Security Program Resources Enforce Policy and Standards Compliance Enforce Contractual Information Security Controls Enforce Information Security During Systems Development Maintain Information Security Within an Organization Provide Information Security Advice and Guidance Provide Information Security Awareness and Training Analyze the Effectiveness of Information Security Controls Resolve Noncompliance Issues 6 - Incident Management and Response Develop an Information Security Incident Response Plan Establish an Escalation Process Develop a Communication Process Integrate an IRP Develop IRTs Test an IRP Manage Responses to Information Security Incidents Perform an Information Security Incident Investigation Conduct Post-Incident Reviews

Certified Information Security Manager (CISM)
Delivered OnlineFlexible Dates
£1,995

CompTIA Advanced Security Practitioner (CASP)

4.8(9)

By Skill Up

CompTIA Advanced Security Practitioner (CASP): Learn cutting-edge security protocols, risk management, and incident response. Elevate your cybersecurity career. Suitable for IT professionals.

CompTIA Advanced Security Practitioner (CASP)
Delivered Online On Demand19 hours 5 minutes
£25

SOC - EC Council Official SOC Analyst (CSA) with exam

5.0(12)

By Nemstar Ltd

Classroom based, instructor led workshop with proctor at home exam. The lab-intensive Certified SOC Analyst (CSA) program emphasizes the holistic approach to deliver the advanced knowledge of how to identify, validate and defend against cyber-attacks.

SOC - EC Council Official SOC Analyst (CSA) with exam
Delivered OnlineFlexible Dates
£2,394

Security Engineering on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for security engineers, security architects, and information security professionals. Overview Identify security benefits and responsibilities of using the AWS Cloud Build secure application infrastructures Protect applications and data from common security threats Perform and automate security checks Configure authentication and permissions for applications and resources Monitor AWS resources and respond to incidents Capture and process logs Create and configure automated and repeatable deployments with tools such as AMIs and AWS CloudFormation This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents. Prerequisites We recommend that attendees of this course have: Working knowledge of IT security practices and infrastructure concepts Familiarity with cloud computing concepts Completed AWS Security Essentials and Architecting on AWS courses 1 - Security on AWS Security in the AWS cloud AWS Shared Responsibility Model Incident response overview DevOps with Security Engineering 2 - Identifying Entry Points on AWS Identify the different ways to access the AWS platform Understanding IAM policies IAM Permissions Boundary IAM Access Analyzer Multi-factor authentication AWS CloudTrail 3 - Security Considerations: Web Application Environments Threats in a three-tier architecture Common threats: user access Common threats: data access AWS Trusted Advisor 4 - Application Security Amazon Machine Images Amazon Inspector AWS Systems Manager 5 - Data Security Data protection strategies Encryption on AWS Protecting data at rest with Amazon S3, Amazon RDS, Amazon DynamoDB Protecting archived data with Amazon S3 Glacier Amazon S3 Access Analyzer Amazon S3 Access Points 6 - Securing Network Communications Amazon VPC security considerations Amazon VPC Traffic Mirroring Responding to compromised instances Elastic Load Balancing AWS Certificate Manager 7 - Monitoring and Collecting Logs on AWS Amazon CloudWatch and CloudWatch Logs AWS Config Amazon Macie Amazon VPC Flow Logs Amazon S3 Server Access Logs ELB Access Logs 8 - Processing Logs on AWS Amazon Kinesis Amazon Athena 9 - Security Considerations: Hybrid Environments AWS Site-to-Site and Client VPN connections AWS Direct Connect AWS Transit Gateway 10 - Out-Of-Region Protection Amazon Route 53 AWS WAF Amazon CloudFront AWS Shield AWS Firewall Manager DDoS mitigation on AWS 11 - Security Considerations: Serverless Environments Amazon Cognito Amazon API Gateway AWS Lambda 12 - Threat Detection and Investigation Amazon GuardDuty AWS Security Hub Amazon Detective 13 - Secrets Management on AWS AWS KMS AWS CloudHSM AWS Secrets Manager 14 - Automation and Security by Design AWS CloudFormation AWS Service Catalog 15 - Account Management and Provisioning on AWS AWS Organizations AWS Control Tower AWS SSO AWS Directory Service

Security Engineering on AWS
Delivered OnlineFlexible Dates
£2,025

Cyber security for engineers

5.0(3)

By Systems & Network Training

Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.

Cyber security for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Bloodborne Pathogens: Understanding and Preventing Bloodborne Diseases

4.5(3)

By Studyhub UK

In an era where health and safety remain paramount, understanding bloodborne pathogens is crucial. Dive into the intricate world of bloodborne diseases, and arm yourself with the knowledge to prevent their spread. Our course, 'Bloodborne Pathogens: Understanding and Preventing Bloodborne Diseases,' unveils the complexities of these diseases, regulatory standards, and how to manage potential risks effectively. Learn the importance of maintaining a safe working environment, timely response to exposure incidents, and the benefits of vaccination programmes. By the end, you'll be adept at ensuring safety, upholding workplace policies, and navigating potential hazards with confidence. Learning Outcomes Comprehend the nature and risk factors of bloodborne pathogens. Understand the regulatory standards and guidelines related to bloodborne diseases. Implement effective prevention and control measures. Address exposure incidents with a thorough and systematic response. Assess and manage risks in workplace settings, ensuring a robust safety culture. Why buy this Bloodborne Pathogens: Understanding and Preventing Bloodborne Diseases? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Bloodborne Pathogens: Understanding and Preventing Bloodborne Diseases there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this Bloodborne Pathogens: Understanding and Preventing Bloodborne Diseases for? Healthcare workers who are at risk of exposure to blood and bodily fluids. Laboratory technicians handling blood samples. Janitorial and cleaning staff in healthcare facilities. Safety officers and compliance managers aiming to implement effective workplace policies. Anyone keen on enhancing their knowledge in the field of health and safety. Prerequisites This Bloodborne Pathogens: Understanding and Preventing Bloodborne Diseases does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Bloodborne Pathogens: Understanding and Preventing Bloodborne Diseases was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Clinical Laboratory Technician: £25,000 - £35,000 Healthcare Safety Officer: £30,000 - £45,000 Infection Control Nurse: £27,000 - £40,000 Medical Waste Handler: £20,000 - £28,000 Bloodborne Pathogens Trainer: £32,000 - £47,000 Compliance Manager in Healthcare: £40,000 - £55,000. Course Curriculum Module 01: Introduction to Bloodborne Pathogens Introduction to Bloodborne Pathogens 00:24:00 Module 02: Regulatory Standards and Guidelines Regulatory Standards and Guidelines 00:21:00 Module 03: Prevention and Control Measures Prevention and Control Measures 00:30:00 Module 04: Exposure Incident Response Exposure Incident Response 00:20:00 Module 05: Risk Assessment and Management Risk Assessment and Management 00:24:00 Module 06: Vaccination Programs Vaccination Programs 00:19:00 Module 07: Workplace Policies and Procedures Workplace Policies and Procedures 00:29:00

Bloodborne Pathogens: Understanding and Preventing Bloodborne Diseases
Delivered Online On Demand2 hours 47 minutes
£10.99

The Complete Cyber Security Course: Securing Network - CPD Certified

4.7(47)

By Academy for Health and Fitness

***24 Hour Limited Time Flash Sale*** The Complete Cyber Security Course: Securing Network Admission Gifts FREE PDF & Hard Copy Certificate| PDF Transcripts| FREE Student ID| Assessment| Lifetime Access| Enrolment Letter Do you know that in the UK, one in three businesses experience a cyber attack each year? There were over 390,000 cyber security breaches reported in 2022 in UK. Are you concerned about protecting yourself and your data online? If so, this comprehensive The Complete Cyber Security Course: Securing Network Bundle is designed for you. Designed to cater to the needs of both seasoned professionals and aspiring newcomers, our Complete Cyber Security Course: Securing Network! bundle is a comprehensive program that will equip you with the essential skills and knowledge you need to succeed. Whether you're looking to advance in your current role or embark on a new career journey, this bundle has everything you need to take your professional life to the next level. But that's not all. When you enrol in The Complete Cyber Security Course: Securing Network Online Training, you'll receive 30 CPD-Accredited PDF Certificates, Hard Copy Certificates, and our exclusive student ID card, all absolutely free. Courses Are Included In this Career Bundle: Course 01: Cyber Security Course 02: Cyber Security Incident Handling and Incident Response Course 03: Digital Forensics for Cyber Professionals Course 04: Computer Networks Security Course 05: Linux Shell Scripting Course 06: Quick Data Science Approach from Scratch Course 07: Coding with Scratch Course 08: Build WebXR, VR, and AR, experiences using Three.JS Course 09: C# Programming - Beginner to Advanced Course 10: Master JavaScript with Data Visualization Course 11: Recovering from a Job Loss in Technology Course 12: Basic Google Data Studio Course 13: AutoCAD Programming using C# with Windows Forms Course 14: CSS Coding Course 15: Complete AutoLISP Programming Course 16: IT Support Technician Course 17: SQL Programming Masterclass Course 18: jQuery: JavaScript and AJAX Coding Bible Course 19: Secure Programming of Web Applications Course 20: CompTIA Healthcare IT Technician Course 21: Sensors Course 22: Functional Skills IT Course 23: Python Programming for Everybody Course 24: Data Analytics with Tableau Course 25: AutoCAD Programming using VB.NET with Windows Forms Course 26: Bash Scripting, Linux, and Shell Programming Course 27: Diploma in Computer Programming Course 28: Remote Sensing in ArcGIS Course 29: Kotlin Programming: Android Coding Course 30: Javascript Programming for Beginners With The Complete Cyber Security Course: Securing Network, you'll embark on an immersive learning experience that combines interactive lessons with voice-over audio, ensuring that you can learn from anywhere in the world, at your own pace. Learning Outcomes of this Course Identify and assess cyber threats and vulnerabilities. Implement effective security controls and incident response plans. Conduct digital forensic investigations and collect evidence. Secure computer networks and systems. Utilise Linux Shell Scripting and Data Science for security analysis. Visualise and analyse data to identify security risks. Don't let this opportunity pass you by. Enrol in The Complete Cyber Security Course: Securing Network today and take the first step towards achieving your goals and dreams. Why buy this The Complete Cyber Security Course: Securing Network? Get a Free CPD Accredited Certificate upon completion of the course Get a free student ID card with this training program The course is affordable and simple to understand This course is entirely online, interactive lesson with voiceover audio Lifetime access to the course materials The training program comes with 24/7 tutor support Start your learning journey straightaway with our Complete Cyber Security Course: Securing Network! Training! The Complete Cyber Security Course: Securing Network premium bundle consists of 30 precisely chosen courses on a wide range of topics essential for anyone looking to excel in this field. Each segment of The Complete Cyber Security Course: Securing Network is meticulously designed to maximise learning and engagement, blending interactive content and audio-visual modules for a truly immersive experience. Certification You have to complete the assignment given at the end of The Complete Cyber Security Course: Securing Network course. After passing The Complete Cyber Security Course: Securing Network exam You will be entitled to claim a PDF & Hardcopy certificate accredited by CPD Quality standards completely free. CPD 300 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This is The Complete Cyber Security Course: Securing Network the course is ideal for: Students seeking mastery in The Complete Cyber Security Course: Securing Network Professionals seeking to enhance The Complete Cyber Security Course: Securing Network skills Individuals looking for a Complete Cyber Security Course: Securing Network!-related career. Anyone passionate about The Complete Cyber Security Course: Securing Network Requirements This The Complete Cyber Security Course: Securing Network doesn't require prior experience and is suitable for diverse learners. Career path This is The Complete Cyber Security Course: Securing Network bundle will allow you to kickstart or take your career in the related sector to the next stage. Cyber Security Analyst Network Security Engineer Penetration Tester Digital Forensics Investigator Data Scientist Certificates CPD Accredited Digital certificate Digital certificate - Included CPD Accredited Hard copy certificate Hard copy certificate - Included If you are an international student, then you have to pay an additional 10 GBP for each certificate as an international delivery charge.

The Complete Cyber Security Course: Securing Network - CPD Certified
Delivered Online On Demand8 days
£149

Spill Management Training

4.7(47)

By Academy for Health and Fitness

Deal Price is Active! Offer Ends Soon; Hurry Up!! Are you looking to improve your current abilities or make a career move? Our unique Spill Management Course might help you get there! Expand your expertise with high-quality training - study the course and get an expertly designed, great value training experience. Learn from industry professionals and quickly equip yourself with the specific knowledge and skills you need to excel in your chosen career through the online training course. The Spill Management Training online course is accredited by CPD with 10 CPD points for professional development. You'll also get dedicated expert assistance from us to answer any queries you may have while studying our Training course. The Spill Management Training course is broken down into several in-depth modules to provide you with the most convenient and rich learning experience possible. Upon successful completion of the training course, you will receive an instant PDF certificate as proof of the comprehensive skill development and competency. Add these amazing new skills to your resume and boost your employability by simply enrolling on this course. With this comprehensive training course, you can achieve your dreams and train for your ideal career. This course provides students with an in-depth learning experience that they can work through at their own pace to enhance their professional development. The Spill Management Training course covers everything you need in order to progress in your chosen career. Furthermore, in this Course, you will get the opportunity to test the water by getting the First Module for Free. In addition, you will receive a Free Student ID card, which will grant you many discounts on bus tickets, movie tickets, library cards, & other services. Enrolling on the Spill Management Training course will ensure that you land your dream career faster than you thought possible. Stand out from the crowd and train for the job you want with the training program. Experts created the training course to provide a rich and in-depth training experience for all students who enrol in it. Enrol in the course right now and you'll have immediate access to all of the course materials. Then, from any internet-enabled device, access the course materials and learn when it's convenient for you. Start your learning journey straight away with this course and take a step toward a brighter future! Why Prefer this Spill Management Training Course? Opportunity to earn a certificate that is accredited by CPDQS. Get a free student ID card! (£10 postal charge will be applicable for international delivery). Innovative and engaging content. Free assessments. 24/7 tutor support. *** Course Curriculum *** Here is the curriculum breakdown of the course: Module 01: Introduction to Spill Management Module 02: Hazardous Substances Module 03: Pollution Incident Response Planning Module 04: Managing a Spill Module 05: Spill Clean-Up Guideline Module 06: Spills on a Road or Highway Module 07: Diesel Spillages: An Overview Module 08: Site-Specific Pollution Control Options Module 09: Spill Prevention & Control Checklist Module 10: Ways to Encourage Best Practice Assessment Process Once you have completed all the modules in the training course, your skills and knowledge will be tested with an automated multiple-choice assessment. You will then receive instant results to let you know if you have successfully passed the training course. CPD 10 CPD hours / points Accredited by CPD Quality Standards Module 01: Introduction to Spill Management 14:48 1: Introduction to Spill Management Preview 14:48 Module 02: Hazardous Substances 15:05 2: Hazardous Substances 15:05 Module 03: Pollution Incident Response Planning 06:31 3: Pollution Incident Response Planning 06:31 Module 04: Managing a Spill 21:58 4: Managing a Spill 21:58 Module 05: Spill Clean-Up Guideline 09:50 5: Spill Clean-Up Guideline 09:50 Module 06: Spills on a Road or Highway 08:39 6: Spills on a Road or Highway 08:39 Module 07: Diesel Spillages: An Overview 14:08 7: Diesel Spillages: An Overview 14:08 Module 08: Site-Specific Pollution Control Options 07:19 8: Site-Specific Pollution Control Options 07:19 Module 09: Spill Prevention & Control Checklist 08:36 9: Spill Prevention & Control Checklist 08:36 Module 10: Ways to Encourage Best Practice 07:45 10: Ways to Encourage Best Practice 07:45 Assessment (Optional) 13:00 11: MCQ Exam 13:00 Order Your Certificate 02:00 12: Order Your CPD Certificate 01:00 13: Order Your QLS Endorsed Certificate 01:00 Who is this course for? Is This Spill Management Training Course Right for You? Anyone interested in learning more about this subject should take this training course. This training will help you grasp the basic concepts as well as develop a thorough understanding of the subject. All are welcome to take this course. There are no prerequisites for enrolment, and you can access the course materials from any location in the world. Requirements The Spill Management Training program does not require any prior knowledge; everyone may participate! This Spill Management Training course is open to anyone interested in learning from anywhere in the world. Every student must be over the age of 16 and have a passion for learning and literacy. This 100% online course can be accessed from any internet-connected device, such as a computer, tablet, or smartphone. This Spill Management Training course allows you to study at your speed and grow a quality skillset. Career path After completing this Spill Management Training Course, you are to start your career or begin the next phase of your career in this field. Our entire Spill Management Training course will help you to gain a position of respect and dignity over your competitors. The certificate enhances your CV and helps you find work in the field concerned. Certificates CPDQS Accredited Certificate Digital certificate - Included Cademy certificate of completion Digital certificate - Included Will be downloadable when all lectures have been completed CPDQS Accredited Certificate Hard copy certificate - £29 For Internation students you have to pay additional 10 GBP as a International Shipping Fees.

Spill Management Training
Delivered Online On Demand2 hours 12 minutes
£12

CND - EC Council Official Certified Network Defender

5.0(12)

By Nemstar Ltd

This is the perfect launch pad for a technical career in Cyber Security and fully prepares every delegate for the prestigious Certified Ethical Hacking (CEH) Course that comes next on the Cyber & Hacking Learning Pathways by Nemstar.

CND - EC Council Official Certified Network Defender
Delivered OnlineFlexible Dates
£3,294
1...34567...27