• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3350 Officer courses delivered Online

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou

Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry

Chairing meetings skills for Elected Members Masterclass (In-House)

By The In House Training Company

Meetings are a traditional and essential component of local government. For both elected members and officers, meetings serve as a forum for discussion and agreement, planning and monitoring, communication and leadership, and decision-making. Used appropriately, meetings can challenge, inspire, illuminate and inform. And while they are not the only meetings that elected members will be asked to attend, committee meetings, in particular, are a mainstay of the political management process. Effective chairing is important because it can provide clear leadership and direction, ensure that debates are focused and balanced, enable decisions to be reached and ensure that resources are used to best effect. This two-hour 'masterclass'-style workshop will help elected members to understand their role, offer some approaches and ideas that will help to tackle typical challenges, and help to generally improve their effectiveness as a chair. To understand the skills and qualities of a good chair To learn ideas and approaches for chairing a successful meeting that is on time and achieves its outcomes To understand the protocols and boundaries for appropriate meeting etiquette and the chair's role in managing this effectively To appreciate how to manage yourself and others appropriately To take away personal actions to apply to your role 1 Welcome and introductions Objectives What's the challenge for you? 2 We can't go on meeting like this Common meeting challenges for chairs and why they succeed or fail Consequences and impact for the Council What's the context? 3 Roles and responsibilities of an effective chair Activities and input that explore the role, skills and qualities needed Role of the chair: what is it and how to do it well 4 Chairing for success - ideas and approaches to meet the challenges Managing time and boundaries Preparation and planning Creating the right environment Self-management Challenging personalities and good meeting behaviour 5 Final plenary session What's your plan? Take away actions

Chairing meetings skills for Elected Members Masterclass (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Credit control and debt recovery - legal issues (In-House)

By The In House Training Company

It is essential that those charged with responsibility for credit control and debt recovery have a full appreciation of the relevant law: no-one can negotiate effectively to recover a debt if they don't understand the ultimate sanctions they can apply. This programme is designed to give them a practical, up-to-date understanding of the law as it applies to your particular organisation. This course will help ensure that participants: Understand the relevant laws Know how and when to invoke legal processes Avoid legal pitfalls in debt collection negotiations Specific, practical learning points include: Definition of 'harassment' How to set up an in-house collection identity Whether cheques in 'full and final settlement' are binding The best steps to trace a 'gone away'... and many, many more. 1 Data protection and debt recovery There are a whole range of things which can be checked on members of the public and which are not affected by the restraints of the Data Protection Act. These will be explained in simple, clear terms so that staff can use this information immediately. 2 County Court suing The expert trainer will show how to sue for money owed, obtain judgment and commence enforcement action without leaving your desk. This module is aimed at showing how to make the Courts work for you instead of the other way around! 3 Enforcement of judgments There are many people who have a County Court Judgment (CCJ) against their debtor but who still remain unpaid. This session explains each of the enforcement methods and how to use them to best effect. Enforcement methods covered include: Warrant of Execution Using the sheriff (now known as High Court Enforcement Officers) Attachment of earnings Third Party Debt Orders Charging Orders (over property and goods) Winding-up companies and making individuals bankrupt 4 Office of Fair Trading rules on debt recovery Surprisingly few people are aware of the Office of Fair Trading rules on debt recovery and many of those that do know think they don't apply to them - but they do. Make sure you know what you need to! 5 New methods to trace elusive, absentee and 'gone away' debtors Why write the money off when you can trace the debtor and collect the money you are owed? 6 Credit checking of new and existing customers It makes sense to credit check would-be, new and existing customers to evaluate the likelihood of payment delays or perhaps not being paid at all. This session shows a range of credit checking steps, many of which can be done completely free of charge, including a sample credit application/ account opening form. 7 Late Payment of Commercial Debts Regulations Do your staff understand this legislation and how to use it to make people pay quicker than ever before? The trainer shows how. 8 The Enterprise Act The Enterprise Act made some startling changes to corporate and personal insolvency. What are the implications for credit control and debt recovery within your organisation?

Credit control and debt recovery - legal issues (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

How to make an impact in your first 90 days as a new DPO

4.4(5)

By The Security Company (International) Limited

Information on the risks and practical advice to address them TSC's eBooks, whitepapers, and reports cover some of the most important risks in information and cyber security — risks that constantly challenge information and cyber security professionals who work tirelessly to reduce them across their organisations and home users alike.

How to make an impact in your first 90 days as a new DPO
Delivered Online On Demand20 minutes
FREE

Forensic Accounting & Analysis

5.0(5)

By Finex Learning

Overview 1 day course on forensic accounting and analysis to unearth financial manipulation by companies Who the course is for Investors and analysts – equity and credit; public and private Bank loan officers M&A advisors Restructuring advisors Auditors Course Content To learn more about the day by day course content please request a brochure To learn more about schedule, pricing & delivery options, book a meeting with a course specialist now

Forensic Accounting & Analysis
Delivered in Internationally or OnlineFlexible Dates
Price on Enquiry

Credit Risk Capital Modelling Under Basel Internal Ratings Based Approach (IRB)

5.0(5)

By Finex Learning

Overview 2 day applied course in modelling Basel IRB parameters and generating IRB Pillar 1 credit risk capital requirement for a mixed retail and corporate loan book Who the course is for Credit risk management, model validators and quants Loan officers / loan portfolio management ALM staff Bank investors – equity and credit investors Course Content To learn more about the day by day course content please request a brochure To learn more about schedule, pricing & delivery options, book a meeting with a course specialist now

Credit Risk Capital Modelling Under Basel Internal Ratings Based Approach (IRB)
Delivered in Internationally or OnlineFlexible Dates
Price on Enquiry

ESG Analysis & Investing - Integration into Equity & Credit Investment

5.0(5)

By Finex Learning

Overview 2 day course on scorecards, rating agency frameworks, regulation and integration and quantification of Environmental, Social and Governance (ESG) analysis into equity and credit investing / lending for / to corporates, banks and other financial institutions, applied to many case study companies and industries Who the course is for Investors and analysts – equity and credit; public and private Bank loan officers M&A advisors Restructuring advisors Course Content To learn more about the day by day course content please request a brochure To learn more about schedule, pricing & delivery options, book a meeting with a course specialist now

ESG Analysis & Investing - Integration into Equity & Credit Investment
Delivered in Internationally or OnlineFlexible Dates
Price on Enquiry

Fixed Income Attribution

5.0(5)

By Finex Learning

Overview This 2-day programme covers the latest techniques used for fixed income attribution. This hands-on course enables participants to get a practical working experience of fixed income attribution, from planning to implementation and analysis. After completing the course you will have developed the skills to: Understand how attribution works and the value it adds to the investment process Interpret attribution reports from commercial systems Assess the strengths and weaknesses of commercially available attribution software Make informed decisions about the build vs. buy decision Present results in terms accessible to all parts of the business Who the course is for Performance analysts Fund and portfolio managers Investment officers Fixed Income professionals (marketing/sales) Auditors and compliance Quants and IT developers Course Content To learn more about the day by day course content please request a brochure To learn more about schedule, pricing & delivery options, book a meeting with a course specialist now

Fixed Income Attribution
Delivered in Internationally or OnlineFlexible Dates
Price on Enquiry

Is it possible to build resilience to stress?

By Human Givens College

Resilience has become a buzzword in mental health and corporate well-being – but what does it mean and why are some people more resilient to stress than others? Discover important insights that will help to inform your work and bring much needed clarity to the topics of stress and resilience. Human givens psychotherapist, Julia Welstead explains the scientifically-sound answers to these important questions and an insightful view that will increase your understanding of “resilience” – allowing you to make more informed decisions and interventions. Your no-nonsense approach is always refreshing. I just wish more people knew about and practiced the human givens approach.HG STUDENT What will you learn What “resilience” & “stress” really mean and where resilience comes from A more helpful and sound alternative to the flawed concept of “good stress” How we can build resilience in a way that is healthy – and how organisations can contribute to this in the workplace An important model that will help you understand – and explain – stress and resilience A number of practical ways to immediately reduce stress levels – useful for yourself or to teach others Who is this webinar suitable for? You – if you want to know the best ways to help people who are suffering from stress – whether for professional or personal reasons HR consultants, HR managers, wellbeing officers, psychotherapists, counsellors, clinical psychologists, psychiatrists, doctors, psychiatric nurses, occupational therapists, health visitors, nurses, pastoral workers, social workers, youth workers, trainee counsellors, psychology students, etc. Anyone wanting to know more about the latest effective strategies for alleviating emotional distress that incorporate the latest insights from neuroscience

Is it possible to build resilience to stress?
Delivered Online On Demand1 hour
FREE

Environmental legislation (In-House)

By The In House Training Company

A thorough account of the UK and European legal framework and its requirements as regards managing environmental performance. This course will help staff to understand: The framework of UK and European legislation and its enforcement The principal features of the legislation as they apply to your organisation's activity/product/service The benefit of having an Environmental Management System such as ISO 14001 How their own actions and decisions can either expose or protect the organisation in relation to its legal obligations 1 Introduction and objectives 2 Introduction to environmental law and enforcement Sources of law (European and UK) Structure and enforcement Key legislation 3 Integrated Pollution Prevention and Control (IPPC) and Local Air Pollution and Control (LAPC) Pollution and Prevention Control Act 1999 EC Directives on PPC The meaning of BAT Transitional provisions Fit and proper persons Control of emissions to air National Air Quality Strategy 4 Packaging and producer responsibilities Who, what and how The Producer Responsibility Obligations (Packaging Waste) Regulations Obligations and exemptions Registration Recycling and recovery obligations Records Duties of the Environment Agency Offences Developments 5 Waste management National Waste Strategy Waste minimisation (re-use/recycling) Waste definition Disposal and recovery Controlled waste management Hazardous waste management 6 Proposed Legislation and EC Directives EU Commission's waste and resources strategies Implementation of ELV (End of Life Vehicles) Directive WEEE (Waste Electrical and Electronic Equipment) Directive transposition into UK legislation Other producer responsibility initiatives Other proposals from the EU 7 Conclusion Open forum Summary Close

Environmental legislation (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Educators matching "Officer"

Show all 455
The Exams Office

the exams office

The Exams Office is the largest exams officer support organisation in the UK. With over 4,000 member centres, it provides comprehensive support for exams staff We work in collaboration with major awarding organisations (including AQA, NCFE, OCR, Pearson, WJEC and Cambridge Assessment International Education) the Joint Council for Qualifications (JCQ) and Ofqual To gain instant access to the members-only sections of our website, get your centre membership here Member benefits These include: Access to high quality support materials to support the management, administration and conducting of examinations Access to the Exams Officer Digital Accreditation Access to The Exams Office Online Portal containing: Certificated online training and assessment modules for exams officers , senior leaders/line managers and JCQ-compliant invigilator training (providing access for up to 200 invigilators) Exams Timetable Tool Key Dates Calendar Tool Key Documents: Document Library and Online Exams Handbook Policy Generator Tool Provisional Exams Timetable Tool Training Videos Access to a range of invigilation support resources including training presentations and videos A free place at our Winter National Exams Officer Conferences and access to our Virtual Conference Receipt of our annual dispatch (including our exclusive Exams Desk Diary, Exams Calendar and Wall Planner) Receipt of our Exams Manual (produced in partnership with Pearson) to support contingency and succession planning within your centre Free membership to the National Association of Examinations Officers Discounted prices on a range of exam supplies such as secure storage, exam chairs, desks, and clocks