• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

28 Privacy courses in Cardiff

Certified Artificial Intelligence Practitioner

By Mpi Learning - Professional Learning And Development Provider

This course shows you how to apply various approaches and algorithms to solve business problems through AI and ML, follow a methodical workflow to develop sound solutions, use open-source, off-the-shelf tools to develop, test, and deploy those solutions, and ensure that they protect the privacy of users. This course includes hands-on activities for each topic area.

Certified Artificial Intelligence Practitioner
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£595

This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects.

Cyber Secure Coder
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£350

Essential WiMax

5.0(3)

By Systems & Network Training

WiMax training course description Broadband wireless access is an emerging technology area. This course looks at WiMAX, where it can be used, how it works and the alternative technologies. What will you learn Describe WiMAX. Explain how WiMAX works. Compare and contrast WiMAX with alternative broadband wireless access technologies. WiMax training course details Who will benefit: Anyone wishing to know more about WiMAX. Prerequisites: None. Duration 2 days WiMax training course contents Introduction What is WiMAX? WiMAX applications, The Internet, Internet access choices, wireless broadband access, WiMAX benefits. WiMAX overview Spectrums, LOS vs. non-LOS, bit rates, modulation, mobility, channel bandwidth, cell radius. WiMAX standards The WiMAX forum, IEEE, ETSI, HIPERACCESS, HIPERMAN, 802.16, 802.16-2004, 802.16a, 802.16e, 802.16f. WiMAX architecture Subscriber Stations (SS), Indoors, outdoors, antennas, Radio Base Stations (BS), LOS, Non LOS BackHaul, Point to multipoint, mesh support. Physical layer 10 - 66GHz, TDMA, TDD, FDD, 2 -11 GHz, SC2, OFDM, OFDMA, QPSK, QAM, Radio Link Control (RLC), uplink, downlink. MAC layer Traffic types (continuous, bursty), QoS, service types. MAC operations, connection oriented, frame structure, addressing. Convergence sublayers, service specific, common part, profiles (IP, ATM). Bandwidth request-grant, ARQ, Management messages. Security MAC privacy sublayer, network access authentication, AAA, 802.1x, key exchange and privacy. WiMAX alternatives WiMAX vs. 3G, WiMAX vs. 802.20.

Essential WiMax
Delivered in Internationally or OnlineFlexible Dates
£1,727

Security+

5.0(3)

By Systems & Network Training

Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in Internationally or OnlineFlexible Dates
£2,797

Essential Lawful Intercept

5.0(3)

By Systems & Network Training

Lawful Intercept training course description Packet based networks require a different approach to Lawful Intercept (LI) than that used in circuit switched networks. This course focuses on what Lawful Interception and Data Retention (DR) means to communications service providers in the IP and NGN areas. The course assumes a basic knowledge of IP networking (i.e. DNS, TCP/UDP, IP, RTP) and the building of services on an IP platform (e.g. SIP, SDP, FTP, HTTP). The course first looks at the regulatory context for LI and DR and how this is translated to a practical architecture. What will you learn Recognise the legal and regulatory obligations to provide LI and DR. Identify the components of the handover architecture for each of LI and DR. Identify the preferred location of points of interception and points of retention in the IP network. Map intercepted material to handover protocols. Understand the data mapping defined in the available standards for both LI and DR. Lawful Intercept training course details Who will benefit: Technical and managerial staff needing to implement public networks. Prerequisites: TCP/IP Foundation Duration 1 day Lawful Intercept training course contents What is meant by LI and DR? Review of regulation: Data protection Directive; Data Retention Directive; RIPA. LI architectures Handover and Interception: ETSI standards ES 201 671 and TS 102 232. LI handover protocol IRI and CC handover; correlation; manual interfaces. DR architectures Handover of query results; points of retention. DR query command set Retrieval of retained records. Security concerns Operation privacy; target privacy; storage and transmission integrity. Implementation Identifying PoI and PoR for provided services. LI and DR wrap up Interaction with other services, storage obligations (volume, time, availability).

Essential Lawful Intercept
Delivered in Internationally or OnlineFlexible Dates
£1,397

Certified Internet of Things Practitioner

By Mpi Learning - Professional Learning And Development Provider

In this course, students will learn general strategies for planning, designing, developing, implementing, and maintaining an IoT system through various case studies and by assembling and configuring an IoT device to work in a sensor network.

Certified Internet of Things Practitioner
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£350

Session Border Controllers for engineers

5.0(3)

By Systems & Network Training

Session Border Controllers course description A hands on course covering Session Border Controllers with a focus on the technical workings of features commonly found in Session Border Controllers. Hands on practicals follow each major theory session. What will you learn Explain how Session Border Controllers work. Explain the SIP call flow using a SBC. Deploy Session Border Controllers Describe the features found in Session Border Controllers. Session Border Controllers course details Who will benefit: Technical staff working with SIP. Prerequisites: Definitive SIP for engineers Duration 2 days Session Border Controllers course contents SIP review Signalling, media, RTP, SIP, peer to peer, SIP proxies, SIP call flows. Hands on: SIP packet analysis. Session Border Controllers What is a SBC? SBC features, peering scenario, access scenario, NNI SBC, UNI SBC, enterprise SBC. Hands on: SBC call flows SBC topology hiding Header privacy, B2BUA. Hands on: Header analysis. Session control Call admissions, QoS, statistics and billing, redundancy and scalability. Hands on: SBC session control SBC and NAT NAT traversal, STUN, ICE, NAT and SIP, NAT and RTP. Hands on: SBC and NAT traversal. SBC and security DoS, access control, encryption, authentication, toll fraud, regulatory issues, lawful intercept. Hands on: Security. Interoperability mediation Manipulating SIP headers, IMS, IETF, TISPAN, SIP-I. SBC interworking.

Session Border Controllers for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Private Counselling London Miss Date Doctor

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

Access confidential and personalized private counselling in London. Our experienced therapists provide one-on-one sessions to address your unique mental health needs, including anxiety, depression, stress, and more. With a focus on privacy and individualized care, our therapy services aim to support your journey towards mental well-being and personal growth. Key areas: confidential therapy, one-on-one counselling, private therapy, individual counselling, personal therapy sessions, private mental health support, discreet counselling. 3 x 1 hour sessions

Private Counselling London Miss Date Doctor
Delivered in London or UK Wide or OnlineFlexible Dates
£600

Essential Cloud Technologies

5.0(3)

By Systems & Network Training

Cloud technologies training course description This course provides an introduction to cloud technologies, including, configuration and deployment, security, maintenance, and management. It covers all aspects of cloud computing infrastructure. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. . What will you learn Contrast and compare AWS, GCP and Azure. Explain the different cloud services, models and characteristics. Explain cloud virtualization components and options. Explain cloud security options. Describe cloud automation, orchestration, monitoring and performance options. Cloud technologies training course details Who will benefit: Anyone working with or looking to work with cloud technologies. Prerequisites: None. Duration 2 days Cloud technologies training course contents What is the cloud? The Internet Cloud computing Benefits Disadvantages Cloud services IaaS, PaaS, SaaS, others. Cloud service providers AWS, GCP Microsoft Azure, others Cloud architectures Private, public, hybrid others Cloud based delivery The cloud and virtualization Virtual Machines, networks, storage, deployment. Accessing the Virtual Machine Secure cloud environments Security considerations. Data privacy considerations Automation and orchestration Monitoring and performance Performance Cost issues Cost containment

Essential Cloud Technologies
Delivered in Internationally or OnlineFlexible Dates
£1,497

Definitive Kerberos for engineers

5.0(3)

By Systems & Network Training

Kerberos for engineers training course description This hands on course covers the details of Kerberos, from installation and administration through to how it all works including the protocols. What will you learn Describe what Kerberos is. Explain how Kerberos works. Install Kerberos. Configure Kerberos. Troubleshoot Kerberos. Kerberos for engineers training course details Who will benefit: Engineers interested in security. Prerequisites: TCP/IP foundation for engineers Duration 2 days Kerberos for engineers training course contents What is Kerberos? Single Sign On, The protocol, the standard, history, v4, v5, RFCs, Linux, Windows. Kerberos concepts and technology AAA, Authentication, Authorization, Accounting. Kerberos vs LDAP and directories. Privacy, integrity. Kerberos realms, principles, instances. Keys, salts, passwords. Key Distribution Centre, Authentication server, ticket granting server. Tickets. Installation and administration of Kerberos Installing Kerberos, creating realms, testing. DNS and Kerberos, Kerberos clients. Hands on Windows and Linux Kerberos. Kerberos protocols The Needham-Schroeder protocol, Kerberos v4. Authentication server, ticket granting server, Kerberos v5, encryption options, ticket options, other protocol features and extensions. Related protocols: GSSAPI, SPNEGO. Hands on Using Wireshark to 'see' Kerberos. Troubleshooting Kerberos Approach, debugging tools, errors and solutions. Hands on Kerberos troubleshooting. Kerberos security concerns Kerberos attacks, protocol security issues. Dictionary attacks, brute force attacks, replay attacks, MITM attacks, security solutions, protecting the KDC, firewalls, NAT and Kerberos. Hands on Kerberos logging. Software which uses Kerberos Kerberos logins, Kerberos and web based applications, Directory services. Advanced Kerberos issues Cross realm authentication, Windows issues, Windows and UNIX interoperability, Hands on Using a Windows DC for UNIX clients.

Definitive Kerberos for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Educators matching "Privacy"

Show all 6
Academii

academii

London

Academii Limited is committed to protecting the privacy and security of your personal information. This privacy notice describes how we collect and use personal information about you during and after your working relationship with us, in accordance with the General Data Protection Regulation (GDPR). It applies to all workers and contractors. Academii Limited is a “data controller”. This means that we are responsible for deciding how we hold and use personal information about you. We are required under data protection legislation to notify you of the information contained in this privacy notice. This notice applies to workers and contractors. This notice does not form part of any contract of employment or other contract to provide services. We may update this notice at any time. It is important that you read this notice, together with any other privacy notice we may provide on specific occasions when we are collecting or processing personal information about you, so that you are aware of how and why we are using such information. Data Protection Principles We will comply with data protection law. This says that the personal information we hold about you must be: Used lawfully, fairly and in a transparent way. Collected only for valid purposes that we have clearly explained to you and not used in any way that is incompatible with those purposes. Relevant to the purposes we have told you about and limited only to those purposes. Accurate and kept up to date. Kept only as long as necessary for the purposes we have told you about. Kept securely. The kind of information we hold about you

Crane Process Flow Technologies

crane process flow technologies

Torfaen

CRANE Co is a diversified manufacturer of highly engineered industrial products. Founded in 1855, Crane provides products and solutions to customers in the hydrocarbon processing, petrochemical, chemical, power generation, unattended payment, automated merchandising, aerospace, electronics, transportation and other markets. The Company has four business segments: Process Flow Technologies, Payment & Merchandising Technologies, Aerospace & Electronics and Engineered Materials. Crane has approximately 11,000 employees in the Americas, Europe, the Middle East, Asia and Australia. Crane Co. is traded on the New York Stock Exchange (NYSE:CR). For more information, visit www.craneco.com. Crane’s Process Flow Technologies segment is a global provider of highly engineered products and systems, serving chemical, petrochemical, pharmaceutical, water and wastewater, and general industrial markets. With proprietary technology and differentiated designs, we are Solving Customers’ Toughest Challenges in many of the harshest and most hazardous environments. EXECUTIVE OFFICES Crane ChemPharma & Energy 4526 Research Forest Drive, Suite 400 The Woodlands, TX 77381 USA QUICK LINKS INDUSTRY LINKS CERTIFICATES CRANE CHEMPHARMA & ENERGY LOGOS CRANE IN THE MEDIA OVERVIEW BROCHURES Copyright © 2022 Crane Co., CRANE ChemPharma & Energy Corp. All Rights Reserved. IMPORTANT: This site uses cookies to enhance your user experience. Continued use of this site indicates your consent. Privacy PolicyTerms & Conditions

Nacro Education Centre Sandwell

nacro education centre sandwell

2DF,

Nacro makes every possible effort to ensure that the information published on its websites is accurate and up to date, but cannot guarantee this and does not accept any responsibility for errors or omissions. Nacro reserves the right to make amendments at any time and without prior notice. These Terms and our Privacy Policy (which sets out how we use any information we gather from you) will govern our relationship with you in relation to your use of our websites. Loss Nacro does not accept any responsibility for any loss or damage suffered by you (directly or indirectly) by making use of the information on its websites. Liability for loss suffered through using our websites is excluded to the maximum extent permitted by law. Liability for loss of income, profit or goodwill as well as loss of any expected saving, is not accepted. Liability for any inability to use the website and liability resulting from the use of information on other sites Nacro links to is also excluded. Copyright Unless otherwise stated, the copyright and other rights in all material published on nacro.org.uk, beyondyouthcustody.net, recoverynearyou.org.uk, totton.ac.uk and opussalon.co.uk, belongs to Nacro and/or Nacro’s licensors, as the case may be. As a visitor to our websites, you may download material from these websites on a single computer for your own personal, non-commercial use only. You may print out single copies of pages from these websites for the sole purpose of enabling you to retain a copy for your own personal records. No other use or reproduction is permitted without the explicit prior written consent of Nacro.

Caversham Primary School

caversham primary school

7RA,

We, Ruth’s family, are left devastated by the sudden loss of a lovely mother, wife, daughter, sister, aunt, niece, sister-in-law and friend. She leaves a huge, aching gap in all our lives and, we know, in the lives of so many others who were lucky enough to know her. We are grateful to all our friends for their thoughts and support now and in the difficult years ahead. Ruth will be remembered as the kind, funny, confident, vivacious, caring person she was and for all that she achieved in life. We also ask those who did not know Ruth please to respect our privacy, as we come to terms with our unfathomable grief, and to consider carefully how their words and actions might impact on others. As the many tributes to her from the broader school and Caversham community attest, Ruth cared deeply not just about academic results, but also about the general well-being and happiness of the pupils and staff whom she taught and led. Caversham Primary was a very happy school under Ruth’s leadership and, despite the many challenges that always go with the role of Head, she was happy there too. Ruth was a dedicated headteacher and an excellent teacher. She loved the pupils and the staff of Caversham Primary School and was very proud to have been its Head Teacher for 12 years and previously Deputy Head Teacher for four years. Ruth was a force for good in her life, and we want her to be a force for positive change after her death too. We would urge anyone who has been affected by her death to talk about their feelings and know that help is available. Local and national helplines, advice and support can be found on the Reading Family Information Service website.

Smr Training

smr training

Wales

SMR International specializes in the management of knowledge services and the relationship of knowledge services to knowledge strategy development. The company is known for excellence in delivering consulting, publishing, and strategic learning services to its clients, and the company’s reputation in its field is unsurpassed, thanks to the expertise and commitment of the finest team of KM/knowledge services specialists working in the knowledge domain today. Guy St. Clair Guy St. Clair is President, Consulting Specialist for Knowledge Strategy, and Knowledge Services Evangelist for SMR International. In his professional work, Guy is recognized as an expert adviser in knowledge services and in building the organizational knowledge culture, with a special emphasis on knowledge strategy development. Guy is a prolific author and a frequent speaker on management and leadership issues relating to KM and knowledge services. In a filmed interview (available for view on Guy’s Profile on LinkedIn) with Knowledge Value Chain® expert Timothy W. Powell, Guy talks about knowledge services and knowledge strategy. In another filmed interview (also available for view on Guy’s Profile on LinkedIn), Tony Saadat of Soutron Global, SMT International’s long-time strategic affiliate, interviews Guy about his book — Knowledge Services: A Strategic Framework for the 21st Century Organization — published in 2016 by De Gruyter. Guy’s other books are listed in his Wikipedia site and on his Amazon Author Page. In June, 2017 Guy’s article “Knowledge Services: Your Foundation for Building the Twentieth-First Century Knowledge Organization” was published in Issue 85 of Leader to Leader, the award-winning journal of the Frances Hesselbein Leadership Institute (formerly the Peter F. Drucker Foundation). In the article, Guy provides direction for senior executives and organizational leaders seeking to initiate and implement knowledge services in the workplace. Many of Guy’s presentations, articles, special reports, briefings for clients and colleagues, white papers, and other professional writings can be accessed through SMRShare. Additionally, SMR International blog posts can be accessed by subject using the search engine for the site (to the right) or accessed by date (see chronological listing, also to the right). With Dale Stanley, Deb Hunt, and other members of the SMR International team, the company provides consulting services and strategic learning activities for a wide range of companies and organizations, including non-profit and not-for-profit organizations. In addition to his work with SMR International, Guy teaches at Columbia University in the City of New York. In 2010 Guy came to Columbia to work with the university’s School of Professional Studies in developing the M.S. in Information and Knowledge Strategy program, and he was for four years a Lecturer and Subject Matter Expert for Knowledge Services in that program. Guy currently serves as Lecturer in Knowledge Services for the school’s Postbaccalaureate Studies Program, teaching Managing Information and Knowledge: Applied Knowledge Services. Guy is also the Series Editor for Knowledge Services, the new series from Verlag Walter de Gruyter GmbH, Berlin, the scholarly publishing house specializing in academic literature. Guy and Barrie Levy, his Associate Lecturer at Columbia University, are the authors of the first title in the series, The Knowledge Services Handbook: A Guide for the Knowledge Strategist, published by De Gruyter in 2019. Two other titles in the series were published in 2020: Powell, Timothy W.: The Value of Knowledge: The Economics of Enterprise Knowledge and Intelligence. Garfield, Stan. Handbook of Community Management: A Guide to Leading Communities of Practice. Two new titles are currently scheduled for publication and will be announced when available for purchase: Stepanek, Marcia: Knowledge Services and Knowledge Strategy: Closing the New Digital Divide (2021). Edler, Beatrice: Knowledge Services and Privacy-by-Design: The Nature of Doing Business in Modern Innovation (2022) The new series presents and discusses new and innovative approaches to knowledge sharing used in all fields of work, with authors chosen to provide critical analysis of issues and present solutions to selected knowledge leadership challenges. Since knowledge services is industry and workplace agnostic, the series strives to present practical solutions that can be applied in all institutions worldwide. It thereby contributes significantly to improvements in knowledge management, knowledge services, knowledge strategy development, and knowledge sharing within the organization.