An introduction to data protection and the GDPR, explaining all the main requirements.
The Short Range Certificate is the minimum qualification required by law to control the operation of VHF and VHF Digital Selective Calling (DSC) equipment on any British flagged vessel voluntarily fitted with a radio. This includes both fixed and hand held equipment using International channels. A radio is an important piece of safety equipment on board and it is vital to understand the correct procedures. Unnecessary transmissions could block out a Mayday distress call. Course topics include: the basics of radio operation the correct frequencies (channels) to be used distress, emergency and medical assistance procedures making ship to shore communication Digital Selective Calling (DSC) using simulators Global Maritime Distress and Safety System (GMDSS) Emergency Position Indicating Radio Beacons (EPIRB) Search and Rescue (SART)
The main subject areas of the course are: Controlling the health risks of asbestos. Sample handling and waste disposal. Identification of asbestos by PLM. Gravimetric quantification of asbestos-containing materials. Discrimination and quantification of free fibres by dispersion and PCM. Analysis of soils - practical application.
Duration 5 Days 30 CPD hours This course is intended for The CCSP is ideal for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration. Overview Upon completing this course, the participants will gain valuable knowledge and skills including the ability to: - Successfully pass the CCSP exam. - Understand the fundamentals of the cloud computing architecture framework. - Understand security challenges associated with different types of cloud services. - Identify and evaluate security risks for their organization?s cloud environments. - Select and implement appropriate controls to ensure secure implementation of cloud services. - Thoroughly understand the 6 essential core domains of the CCSP common body of knowledge: 1. Architectural Concepts & Design Requirements 2. Cloud Data Security 3. Cloud Platform & Infrastructure Security 4. Cloud Application Security 5. Operations 6. Legal & Compliance The goal of the course is to prepare professionals for the challenging CCSP exam by covering the objectives of the exam based on the six domains as defined in the (ISC)2 CCSP common body of knowledge. 1 - Architectural Concepts and Design Requirements Cloud Computing Concepts Cloud Reference Architecture Cloud Computing Security Concepts Design Principles of Secure Cloud Computing Trusted Cloud Services 2 - Cloud Data Security CSA (Cloud Security Alliance) Cloud Data Lifecycle Cloud Data Storage Architectures Data Security Strategies Data Discovery and Classification Technologies Protecting Privacy and PII (Personally Identifiable Information) Data Rights Management Data Retention, Deletion, and Archiving Policies Auditability, Traceability, and Accountability of Data Events 3 - Cloud Platform and Infrastructure Security Cloud Infrastructure Components Cloud Infrastructure Risks Designing and Planning Security Controls Disaster Recovery and Business Continuity Management 4 - Cloud Application Security The Need for Security Awareness and Training in application Security Cloud Software Assurance and Validation Verified Secure Software SDLC (Software Development Life Cycle) Process Secure SDLC Specifics of Cloud Application Architecture Secure IAM (Identity and Access Management) Solutions 5 - Operations Planning Process for the Data Center Design Installation and Configuration of Physical Infrastructure for Cloud Environment Running Physical Infrastructure for Cloud Environment Managing Physical Infrastructure for Cloud Environment Installation and Configuration of Logical Infrastructure for Cloud Environment Running Logical Infrastructure for Cloud Environment Managing Logical Infrastructure for Cloud Environment Compliance with Regulations and Controls Risk Assessment for Logical and Physical Infrastructure Collection, Acquisition, and Preservation of Digital Evidence Managing Communication with Stakeholders 6 - Legal and Compliance Legal Requirements and Unique Risks within the Cloud Environment Relevant Privacy and PII Laws and Regulations Audit Process, Methodologies, and Required Adaptions for a Cloud Environment Implications of Cloud to Enterprise Risk Management Outsourcing and Cloud Contract Design Vendor Management
Attend our world class Kanban University accredited Certified Kanban System Design training course and learn to implement Kanban in your company
Attend our world class Kanban University accredited Certified Kanban System Design training course and learn to implement Kanban in your company
Attend our world class Kanban University accredited Certified Kanban System Design training course and learn to implement Kanban in your company
Our Equality and Diversity Training course covers the Equality Act 2010 and discusses the details relating to discrimination as well as unfair treatment within a professional environment.
Overview Internal control, as defined by accounting and auditing, is a process for assuring an organization's objectives in operational effectiveness and efficiency, reliable financial reporting, and compliance with laws, regulations and policies. It is very important for the organisation to have a smooth flow of accounting as it plays a very important role in the development of the organisation. Financial Managers or any person who deals with Accounts need to see that the company accounts are very updated and are free from any risks that can become a problem during the time of Auditing. This course will feed you with all the skills required to have a good Internal Management process it is important to analyse Risk Management to see if the process is working efficiently and measures the effectiveness of controls put in place to alleviate risks.
Overview Corporate frauds have the inherent power to bring large organizations to their knees, cause huge monetary loss, prompt lawsuits followed by significant legal expenses, lead to the imprisonment of employees and deteriorate confidence in the market, governments, and institutions. In response, corporations and governments across the globe have stepped up their effort to inspect, prevent and penalize fraudulent practices; resulting in a greater emphasis on the domains of forensic auditing and accounting in the current economy. This training course will empower you to recognize the root causes of fraud and white-collar crime in the current economy, understand the categories of fraud, equip you with methodologies of fraud detection and prevention, and heighten your ability to detect potential fraudulent situations. In addition to the fundamentals of fraud investigation and detection in a digital environment; profit-loss evaluation, analysis of accounting books, legal concepts, and quantification of financial damages are also examined in this course