• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

121 Privacy courses delivered Live Online

Introduction to Social Media Marketing

5.0(1)

By Let’s Do Business Group

Want learn how to use social media to market your business effectively? Join this short course from Let’s Do Marketing to learn how to create your social media strategy for success – and come away with the knowledge, skills and confidence to start connecting with your customers online!

Introduction to Social Media Marketing
Delivered Online + more
£35

CertNexus Certified Internet of Things Security Practitioner (CIoTSP) v1.0

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for IoT practitioners who are looking to improve their skills and knowledge of IoT security and privacy. This course is also designed for students who are seeking the CertNexus Certified Internet of Things Security Practitioner (CIoTSP) certification and who want to prepare for Exam ITS-110. Overview This program will validate that the candidate has the knowledge, skills, and abilities to secure network environments for IoT devices, analyze vulnerabilities and determine reasonable controls against threats, and effectively monitor IoT devices and respond to incidents. This course is designed for practitioners who are seeking to demonstrate a vendor-neutral, cross-industry skill set that will enable them to design, implement, operate, and/or manage a secure IoT ecosystem. Managing IoT Risks Map the IoT Attack Surface Build in Security by Design Securing Web and Cloud Interfaces Identify Threats to IoT Web and Cloud Interfaces Prevent Injection Flaws Prevent Session Management Flaws Prevent Cross-Site Scripting Flaws Prevent Cross-Site Request Forgery Flaws Prevent Unvalidated Redirects and Forwards Securing Data Use Cryptography Appropriately Protect Data in Motion Protect Data at Rest Protect Data in Use Controlling Access to IoT Resources Identify the Need to Protect IoT Implement Secure Authentication Implement Secure Authorization Implement Security Monitoring on IoT Systems Securing IoT Networks Ensure the Security of IP Networks Ensure the Security of Wireless Networks Ensure the Security of Mobile Networks Ensure the Security of IoT Edge Networks Ensuring Privacy Improve Data Collection to Reduce Privacy Concerns Protect Sensitive Data Dispose of Sensitive Data Managing Software and Firmware Risks Manage General Software Risks Manage Risks Related to Software Installation and Configuration Manage Risks Related to Software Patches and Updates Manage Risks Related to IoT Device Operating Systems and Firmware Promoting Physical Security Protect Local Memory and Storage Prevent Physical Port Access

CertNexus Certified Internet of Things Security Practitioner (CIoTSP) v1.0
Delivered OnlineFlexible Dates
Price on Enquiry

Data Protection (GDPR) Foundation Certificate

By CloudLearn

The Data Protection (GDPR) Foundation Certificate is the course for people who need a formal qualification to demonstrate a clear, concise and generic understanding of the UK General Data Protection Regulation and Data Protection Act 2018, in support of the practical knowledge often acquired in the workplace. It is suitable for the public, private and third sectors and will teach participants essential UK GDPR skills and sufficient knowledge to assist their organisation toward their data protection implementation and UK GDPR accountability requirement. The course is suitable for beginners but anyone with significant data protection knowledge will also get considerable benefit from it. This Foundation Certificate is an internationally recognised qualification, endorsed by TQUK, which is regulated by Ofqual, a UK Government department. Copies of the slides for the course are sent out a few days in advance. As the course covers a lot of ground in a short time we recommend attendees who know nothing about data protection to read through these. Note: This course is delivered live, online, using Zoom. It will be delivered 9.30 - 12.30 and 13.30 - 16.30 approx. Course Content Topics covered include: Background to Data Protection Legislation Scope Essential Definitions The Core of Data ProtectionPrinciplesLegal BasisTransparency/Privacy NoticesRights and Their Management Data Security Obligations and Breach Notification International Transfers (including cloud) Data Processors and ContractsDue Diligence Data Sharing and Joint ControllersAd Hoc and Planned Data Protection by DesignData Protection Impact Assessments Data Protection Officers Accountability and Action Plan The ICO and Enforcement Questions/discussion throughout the course Suitability - Who should attend? Anyone with an interest in data protection or needing a detailed introduction. Anyone involved in supporting data protection compliance in an organisation. Outcome / Qualification etc. Learning Outcomes: Be aware of the importance of data protection legislation and the GDPR Understand the key obligations of the GDPR and DPA Understand the rationale behind a data protection audit and gap analysis Assist with policies and procedures required for data protection compliance and accountability

Data Protection (GDPR) Foundation Certificate
Delivered OnlineFlexible Dates
£300

[Data Bites for Comms Pros] #5 Using AI for instant actionable insight from difficult data (1 hour BONUS session)

By Alex Waddington

Whetstone Communications and comms2point0 are pleased to bring you the Data Bites series of free webinars. Our aim is to boost interest and levels of data literacy among not-for-profit communicators.

[Data Bites for Comms Pros] #5 Using AI for instant actionable insight from difficult data (1 hour BONUS session)
Delivered OnlineJoin Waitlist
FREE to £40

M.D.D PRIVATE OCCUPATIONAL THERAPY LONDON PACKAGE (SELF IMPROVEMENT)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

Introducing Private Occupational Therapy London Package: Personalized Support for Your Unique Needs Are you looking for private occupational therapy services in London that prioritize your individual needs and goals? Miss Date Doctor’s Private Occupational Therapy London Package offers you dedicated one-on-one support and personalized interventions to help you overcome challenges and improve your quality of life. Private occupational therapy provides a focused and tailored approach, ensuring that you receive the highest level of care and attention. Our experienced occupational therapists in London are committed to understanding your specific needs and providing effective solutions to enhance your daily functioning and well-being. Here’s how the Private Occupational Therapy London Package can support you: Personalized Assessment: Our private occupational therapists will conduct a thorough and individualized assessment to gain a comprehensive understanding of your unique challenges, strengths, and goals. Tailored Treatment Plan: Based on the assessment, we’ll develop a customized treatment plan designed to address your specific needs and aspirations. This plan will focus on enhancing your functional abilities and promoting independence. Focused Attention: Private occupational therapy sessions offer you dedicated one-on-one attention, ensuring that you receive the most effective and personalized interventions. Individual Progress: Our therapists will closely monitor your progress throughout the therapy process, making adjustments to the treatment plan as needed to maximize your outcomes. Convenient Scheduling: Private occupational therapy allows for flexible scheduling options to accommodate your busy lifestyle and ensure that you have access to the support you need when it’s most convenient for you. Personal Empowerment: We believe in empowering you to take an active role in your therapy journey. Our therapists will collaborate with you, providing guidance and support as you work towards your goals. Confidentiality and Privacy: Private occupational therapy sessions offer a confidential and private environment where you can freely discuss your challenges and experiences. The Private Occupational Therapy London Package at Miss Date Doctor is committed to providing you with the highest level of personalized care and support. Our expert occupational therapists will work closely with you to help you overcome obstacles, regain independence, and enhance your daily living skills. Invest in your well-being and experience the benefits of private occupational therapy. Take the first step towards a more fulfilling and empowered life with the Private Occupational Therapy London Package. Let our skilled therapists guide you towards greater independence, improved functionality, and a more enriched quality of life. 3 x1 hour https://relationshipsmdd.com/product/private-occupational-therapy-london-package/

M.D.D PRIVATE OCCUPATIONAL THERAPY LONDON PACKAGE (SELF IMPROVEMENT)
Delivered in London or UK Wide or OnlineFlexible Dates
£450

LinkedIn Do's & Don'ts for Success

5.0(1)

By Let’s Do Business Group

Join us as we delve into the essential do's and don'ts of LinkedIn, uncovering the key tactics to optimize your profile, expand your network, and engage effectively with potential customers and collaborators.

LinkedIn Do's & Don'ts for Success
Delivered Online + more
£30

M.D.D ONLINE DATING TIPS PACKAGE (SINGLES)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

Introducing our comprehensive “Online Dating Tips for Miss Date Doctor” package, designed to equip you with expert guidance and proven strategies for navigating the digital dating landscape with confidence and success. Discover the secrets to standing out in the online dating world and attracting quality matches who are genuinely compatible with you. In this package, you’ll gain access to a wealth of valuable resources and personalized coaching from Miss Date Doctor, a trusted relationship expert. With her guidance, you’ll learn how to optimize your online dating profile, enhance your communication skills, and overcome common challenges faced in the world of online dating. Here’s what you can expect from our “Online Dating Tips for Miss Date Doctor” package: Profile Optimization Techniques: Craft an enticing and authentic online dating profile that captures attention and showcases your unique personality. Learn the art of choosing the perfect profile picture, writing engaging bios, and optimizing your presence on popular dating platforms like Tinder, Bumble, or OkCupid. Effective Communication Strategies: Master the art of online conversation and learn how to engage potential partners in meaningful dialogue. Discover techniques for initiating conversations, keeping them flowing, and creating a genuine connection that translates from the digital realm to real-life interactions. Gain insights into flirting, banter, and maintaining interesting conversations. Navigating Online Platforms: Understand the nuances of different online dating platforms and maximize your chances of finding success on each one. Whether it’s a mainstream app or a specialized dating website, you’ll learn how to tailor your approach and increase your visibility among potential matches. Explore related terms such as “best dating apps,” “dating site tips,” and “online dating platform comparison” to gain a comprehensive understanding. Safety and Security Guidelines: Prioritize your well-being with essential safety tips for online dating. Learn to identify red flags, protect your personal information, and ensure your online interactions remain secure. Explore related topics like “online dating safety,” “scam awareness,” and “privacy precautions” to stay informed and confident while navigating the digital dating world. Overcoming Common Challenges: Gain insights into overcoming common hurdles and setbacks encountered in online dating. From handling rejection gracefully to managing expectations, you’ll develop resilience and a positive mindset that will propel you forward on your dating journey. Explore related terms such as “dealing with rejection in online dating,” “managing dating expectations,” and “building dating confidence” for additional guidance. Enroll in our “Online Dating Tips for Miss Date Doctor” package today and empower yourself with the tools and knowledge necessary to transform your online dating experience. Let us guide you toward attracting meaningful connections and finding the love you deserve. Don’t let online dating become a source of frustration; embrace it as an exciting opportunity for personal growth and fulfilling relationships. With the “Online Dating Tips for Miss Date Doctor” package, you’ll be equipped to navigate the digital landscape confidently and embark on a journey towards love and happiness. https://relationshipsmdd.com/product/online-dating-tips-package/

M.D.D ONLINE DATING TIPS PACKAGE (SINGLES)
Delivered in London or UK Wide or OnlineFlexible Dates
£500

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered OnlineFlexible Dates
£2,380

The GDPR Primer for Data Protection Officers

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for A prior understanding of EU Data Protection legislation is recommended. Candidates are typically management professionals and decision-makers who already have responsibility for data protection compliance within their organisation.Co-Requisite Subjects Candidates should have a good understanding of their own organisation?s data management activities through the life cycle from initial acquisition, through the various areas of processing and usage, to eventual removal or destruction. Overview To equip the learner with a foundational understanding of the principles of the General Data Protection Regulation (GDPR) and to provide constructive suggestions on implementing compliant processes. The social, historical and legal background leading to the General Data Protection Regulation (GDPR) The scope and global context of the GDPR The key concepts within the GDPR The definition of all key words and phrases relating to this Data Protection regulation Principle One: The criteria governing fair, open and transparent processing of personal data Principle Two: Purpose Limitation, the challenge of limiting the processing within the context of specified and lawful purposes Principle Three: Minimisation of processing, and ensuring that only that data is processed which is necessary to achieve the purpose. Principle Two: Purpose Limitation, the challenge of limiting the processing within the context of specified and lawful purposes Principle Three: Minimisation of processing, and ensuring that only that data is processed which is necessary to achieve the purpose. Principle Four: Ensuring that any personal data held by the organisation is kept accurate and current, and that any processing of such data is appropriate Principle Five: Management and storage of personal data in a manner that meets regulatory obligations, while minimising the time that the individual remains identifiable Principle Six: The criteria governing safe, secure and confidential processing of personal data in order to protect its integrity Principle Seven: The key roles, responsibilities and accountabilities of those involved in Data Management within an organisation Establishment within a single Member State Joint Controllers Privacy by Design and by Default Nominated Representatives Third-party Contracts and shared liability Logging of data management processes Data Breach Notification obligations Privacy Impact Assessments Overseas transfer of personal data L2.8 The Data Subject Rights, and their implications for the Data Controller and the Data Processor L2.8.1 The ?right to be forgotten? L2.8.2 The right to restriction of processing L2.8.3 The right to object to certain processing L2.8.4 The right to have inaccurate data amended or erased L2.8.5 The right to data portability L2.8.6 The right of access to one?s personal data L2.8.7 Rights in relation to automated decision-making and profiling The role of the Data Protection Officer (DPO) The role of the Data Protection Officer (DPO) Criteria for designating a DPO Tasks of the DPO Position of the DPO within the organisation The role of the Supervisory Authority within the Member State The Lead Supervisory Authority and independence Investigative, corrective and advisory powers Independence of the Supervisory Authority Collaboration with other Supervisory Authorities Codes of Conduct and Certification The role, powers and tasks of the European Data Protection Board (EDPB) The remedies, liabilities and penalties available under the GDPR Right to raise a complaint Right to representation Right to effective judicial remedy Right to compensation and liability Administrative fines of up to ?10m or 2% of GAT Administrative fines of up to ?20m or 4% of GAT Provisions for specific processing situations Freedom of Expression Processing of official documents Processing of National Identification Numbers Processing regarding employment Processing for archiving purposes Processing under obligations of official secrecy Processing of data by religious organisations Preparing for implementation of the GDPR Review of data management policies and procedures Review of data assets and security structures Training and Awareness-raising Data management governance structures Embedding Privacy By Design and Default Codes of Conduct and Certification against standards Breach detection and notification procedures Review of third-party agreements, contracts

The GDPR Primer for Data Protection Officers
Delivered OnlineFlexible Dates
Price on Enquiry

Supporting your learners’ wellbeing: A communication toolkit

By Panda Education and Training Ltd

Using a range a communication techniques, be able to support your learner's mental health and wellbeing.

Supporting your learners’ wellbeing: A communication toolkit
Delivered OnlineFlexible Dates
£75
1...56789...13