• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

67 Educators providing Information Security (IS) courses in Bristol

Spd Tuition And Coaching

spd tuition and coaching

London

Hello! I am Samantha Dholakia, the founder of SPD Tuition and Coaching and creator of The Behaviour Balance System© (TBBS) and The Behaviour Bank© (TBB). I am an Executive Coach and mentor, Neurolinguistic Programmer and Consultant Trainer. With over 15 years experience in the education sector, I have worked in multiple managerial and leadership roles, including deputy head, RMT consultant trainer, educational consultant and accredited CPD creation for companies such as Twinkle and TTS. I am the host of @spdtuitionandcoaching which supports thousands of parents and teachers daily with behaviour strategies and wellbeing support, and in 2020 I set up our SPD children’s Confidence and Communications Coaching Programme, of which I could not be prouder. Not only have we had great results in the social, emotional and behaviour impact, but also academic achievement. Some of the children in our programmes make over 1 year’s academic progress in less than 12 weeks. It was in fact the children that encouraged me to support with the adults around them, and I am so pleased that I listened to their wise words. The Behaviour Balance System I created TBBS in 2021 to support the desperate need for an alternative approach to behaviour, providing strategies that not only create sustainable change but aid wellbeing, support good mental health, build confidence and resilience - and also accelerates academic achievement. With every technique and tool backed by the neuroscience behind behaviour, our TBBS strategies not only make sense, they WORK. We now support schools, nurseries, universities, Local Authorities, charities and a whole host of other providers globally through our training, workshops and 360 online portal, TBB. Underpinned by three elements, physiology, belief and communication, TBBS is an alternative approach to traditional behaviour systems. An inclusive, revolutionary behaviour programme that supports behaviour through working with children’s needs not outcomes, it is a research led approach that removes external rewards and punitive punishments whilst prioritising emotional intelligence and literacy to empowerment through independence and intrinsic motivation. Our mission is to equip educators, providers and parents with strategies THAT WORK. TBBS removes the behaviour firefighting and power struggles, through promoting a healthy and collaborative culture in homes, classrooms and various other environments. Within TBBS we have brought together several core pedagogies, including trauma informed approaches, restorative practice, emotional regulation and many more. TBBS focuses on teaching children about their brains and how to use them most effectively. Through TBBS educators, providers, parents and carers can empower children in regulating their emotions more independently. The Behaviour Bank TBB is THE ONLY 360 online platform, in the world, that bridges home and school with a collective approach. This platform allows us to support parents, educators and providers that may not feel confident in reaching out directly. It allows provides a platform for ongoing support through a variety of delivery methods. TBB takes our members on a personalised journey full of downloadable handbooks, resources, short courses, live workshops and bitesize clips. It also offers connection through its community page, which enables members to share experiences, tips and celebrate their wins together.  The Behaviour Bank supports educators, providers and parents in saving time and energy for their WHY as the invest in their HOW www.spdtuitionandcoaching.co.uk

1...567

Courses matching "Information Security (IS)"

Show all 2

Information Security Management Principle

5.0(10)

By GBA Corporate

Overview Objective Understand the requirement of Information Security Concepts and Definitions of Information Security Management Systems Deeply Analysing the policies, Standards and procedures How to deliver a balanced ISMS and following its security procedures Analysing the Information risk management Evaluating the organisational responsibilities Understanding the Information security controls Scrutinising Legal framework Techniques of Cryptographic models

Information Security Management Principle
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997