• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1450 Privacy courses

Information Governance and Data Management Training

4.5(3)

By Studyhub UK

The 'Information Governance and Data Management Training' is a comprehensive program that equips participants with the knowledge and skills needed to effectively manage and protect information in today's data-driven world. The course covers essential topics such as data protection, records management, information security, cybersecurity, and compliance. It also delves into critical areas like privacy, confidentiality, and freedom of information (FOI), as well as data governance, risk management, and ethics. Through practical examples and real-world scenarios, learners will gain a deep understanding of information governance practices and their application in various industries.   Learning Outcomes of Information Governance and Data Management Training: Upon completion of this course, participants will be able to: Understand the fundamental concepts and principles of information governance. Comprehend the legal and regulatory frameworks surrounding data protection and privacy. Master records management techniques for effective data organization and retrieval. Implement robust information security and cybersecurity measures. Navigate privacy, confidentiality, and freedom of information (FOI) requirements. Develop and maintain a data governance framework. Identify, assess, and mitigate information-related risks. Uphold information ethics and compliance standards.   Why buy this Information Governance and Data Management Training? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home   Certification After studying the course materials of the Information Governance and Data Management Training there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60.   Who is this Information Governance and Data Management Training course for? This Information Governance and Data Management Training does not require you to have any prior qualifications or experience. You can just enrol and start learning.  Data Managers and Analysts: Enhance their skills in data management and protection. Compliance Officers: Learn about data compliance and auditing. Privacy and Security Professionals: Gain a holistic view of information security. Legal and Compliance Teams: Understand the legal aspects of data protection. Business Managers: Develop expertise in managing corporate data assets.   Prerequisites This Information Governance and Data Management Training was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection.   Career path Data Protection Officer: £40,000 - £80,000 per year. Information Security Analyst: £30,000 - £60,000 per year. Compliance Manager: £40,000 - £90,000 per year. Records Manager: £30,000 - £60,000 per year. Data Governance Specialist: £40,000 - £80,000 per year. Privacy Consultant: £40,000 - £80,000 per year. Legal Counsel (Data Protection): £50,000 - £100,000+ per year. Course Curriculum Module 01: Introduction to Information Governance Introduction to Information Governance 00:05:00 Module 02: Data Protection and Privacy Data Protection and Privacy 00:06:00 Module 03: Records Management Records Management 00:07:00 Module 04: Information Security Information Security 00:06:00 Module 05: Cybersecurity Cybersecurity 00:06:00 Module 06: Privacy, Confidentiality and Freedom of Information (FOI) Privacy, Confidentiality and Freedom of Information (FOI) 00:05:00 Module 07: Data Governance Data Governance 00:06:00 Module 08: Information Risk Management Information Risk Management 00:06:00 Module 09: Information Ethics Information Ethics 00:06:00 Module 10: Compliance and Auditing Compliance and Auditing 00:05:00 Module 11: Information Governance in Practice Information Governance in Practice 00:04:00

Information Governance and Data Management Training
Delivered Online On Demand1 hour 2 minutes
£10.99

GDPR Workshop

By Computer Law Training

A one day course on GDPR for beginners, including practical exercises.

GDPR Workshop
Delivered OnlineFlexible Dates
£250

Professional Certificate Course in Recognizing the Legal and Security Framework of E-Commerce in London 2024

4.9(261)

By Metropolitan School of Business & Management UK

The aim of this course is to provide a comprehensive understanding of E-commerce security fundamentals, business laws and regulations, ethical, social and political issues, basic ethical concepts, privacy and information rights, customer data collection methods, and the concept of E-Governance and its types. After the successful completion of this lecture, you will be able tolearn the following: Understand E-commerce Security Fundamentals and deal with issues arising. Understand and comply with E-commerce Business Laws and Regulations. Understand Ethics, Social and Political Issues. Learn about the Basic Ethical Concepts: Responsibility, Accountability and Liability. Understand Privacy and Information Rights. Understand What is Customer Data, the Importance of Collecting Customer Data, and Data Collection Methods. Understand the concept of E-Governance and its types. The aim of this course is to provide students with a comprehensive understanding of E-commerce Security Fundamentals and the ability to deal with the issues arising in this field. The course will also cover the E-commerce Business Laws and Regulations that apply to this field. Students will learn about the ethical, social, and political issues surrounding E-commerce, as well as the basic ethical concepts of responsibility, accountability, and liability. They will gain an understanding of privacy and information rights and learn about customer data, including its importance and methods for collecting it. Finally, the course will cover the concept of E-Governance and its various types, providing students with an understanding of how it applies to E-commerce. The aim of this course is to provide students with a comprehensive understanding of E-commerce Security Fundamentals and the ability to deal with the issues arising in this field. The course will also cover the E-commerce Business Laws and Regulations that apply to this field. Students will learn about the ethical, social, and political issues surrounding E-commerce, as well as the basic ethical concepts of responsibility, accountability, and liability. They will gain an understanding of privacy and information rights and learn about customer data, including its importance and methods for collecting it. Finally, the course will cover the concept of E-Governance and its various types, providing students with an understanding of how it applies to E-commerce. VIDEO - Course Structure and Assessment Guidelines Watch this video to gain further insight. Navigating the MSBM Study Portal Watch this video to gain further insight. Interacting with Lectures/Learning Components Watch this video to gain further insight. Recognizing the Legal and Security Framework of E-commerce Self-paced pre-recorded learning content on this topic. Recognizing The Legal And Security Framework Of E-Commerce Put your knowledge to the test with this quiz. Read each question carefully and choose the response that you feel is correct. All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course.The certificate is designed to enhance the learner's knowledge in the field. This certificate is for everyone eager to know more and get updated on current ideas in their respective field. We recommend this certificate for the following audience. E-commerce Legal and Security Consultant E-commerce Compliance Manager E-commerce Security Analyst E-commerce Legal Analyst E-commerce Privacy Officer E-commerce Compliance Analyst E-commerce Risk Management Specialist E-commerce Fraud Investigator E-commerce Contract Administrator E-commerce Data Protection Officer Average Completion Time 2 Weeks Accreditation 3 CPD Hours Level Advanced Start Time Anytime 100% Online Study online with ease. Unlimited Access 24/7 unlimited access with pre-recorded lectures. Low Fees Our fees are low and easy to pay online.

Professional Certificate Course in Recognizing the Legal and Security Framework of E-Commerce in London 2024
Delivered Online On Demand14 days
£37

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites CompTIA Network+ Certification 1 - Security and Risk Management Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training 2 - Asset Security Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling 3 - Security Engineering Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities 4 - Information Security Management Goals Organizational Security The Application of Security Concepts 5 - Information Security Classification and Program Development Information Classification Security Program Development 6 - Risk Management and Ethics Risk Management Ethics 7 - Software Development Security Software Configuration Management Software Controls Database System Security 8 - Cryptography Ciphers and Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Hashing and Message Digests Email, Internet, and Wireless Security Cryptographic Weaknesses 9 - Physical Security Physical Access Control Physical Access Monitoring Physical Security Methods Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered OnlineFlexible Dates
£3,395

GDPR with Security Management QLS Training

By Imperial Academy

Level 3 & 5 Endorsed Diploma | QLS Hard Copy Certificate Included | Plus 5 CPD Courses | Lifetime Access

GDPR with Security Management QLS Training
Delivered Online On Demand
£199

WiFi Hacking: Wireless Penetration Testing for Beginners

By Packt

A Complete Guide to Hacking WiFi (WEP, WPA, and WPA2) Wireless Security and How to Exploit (Pentest) Their Vulnerabilities!

WiFi Hacking: Wireless Penetration Testing for Beginners
Delivered Online On Demand1 hour 43 minutes
£141.99

SC-900T00 Microsoft Security Compliance and Identity Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution. Before attending this course, students must have: General understanding of networking and cloud computing concepts. General IT knowledge or any general experience working in an IT environment. General understanding of Microsoft Azure and Microsoft 365. This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions. Prerequisites General understanding of networking and cloud computing concepts. General IT knowledge or any general experience working in an IT environment. General understanding of Microsoft Azure and Microsoft 365. 1 - Describe security and compliance concepts Describe the shared responsibility model Describe defense in depth Describe the Zero Trust model Describe governance, risk, and compliance (GRC) concepts 2 - Describe identity concepts Define authentication and authorization Define identity as the primary security perimeter Describe the role of the identity provider Describe the concept of directory services and Active Directory Describe the concept of federation 3 - Describe the function and identity types of Microsoft Entra ID Describe Microsoft Entra ID Describe types of identities Describe hybrid identity Describe external identities 4 - Describe the authentication capabilities of Microsoft Entra ID Describe authentication methods Describe multifactor authentication Describe self-service password reset Describe password protection and management capabilities 5 - Describe access management capabilities of Microsoft Entra ID Describe Conditional Access Describe Microsoft Entra roles and role-based access control (RBAC) 6 - Describe the identity protection and governance capabilities of Azure AD Describe Microsoft Entra ID Governance Describe access reviews Describe entitlement management Describe the capabilities of Privileged identity Management Describe Microsoft Entra ID Protection Describe Microsoft Entra Permissions Management Describe Microsoft Entra Verified ID 7 - Describe core infrastructure security services in Azure Describe Azure DDoS protection Describe Azure Firewall Describe Web Application Firewall Describe network segmentation in Azure Describe Azure Network Security Groups Describe Azure Bastion Describe Azure Key Vault 8 - Describe the security management capabilities in Azure Describe Microsoft Defender for Cloud Describe how security policies and initiatives improve cloud security posture Describe Cloud security posture management Describe the enhanced security of Microsoft Defender for Cloud Describe DevOps security management 9 - Describe security capabilities of Microsoft Sentinel Describe threat detection and mitigation capabilities in Microsoft Sentinel Describe Microsoft Security Copilot 10 - Describe threat protection with Microsoft Defender XDR Describe Microsoft Defender XDR services Describe Microsoft Defender for Office 365 Describe Microsoft Defender for Endpoint Describe Microsoft Defender for Cloud Apps Describe Microsoft Defender for Identity Describe Microsoft Defender Vulnerability Management Describe Microsoft Defender Threat Intelligence Describe the Microsoft Defender portal 11 - Describe Microsoft?s Service Trust portal and privacy capabilities Describe the offerings of the Service Trust portal Describe Microsoft's privacy principles Describe Microsoft Priva 12 - Describe the compliance management capabilities in Microsoft Purview Describe the Microsoft Purview compliance portal Describe Compliance Manager Describe use and benefits of compliance score 13 - Describe information protection, data lifecycle management, and data governance capabilities in Microsoft Purview Know your data, protect your data, and govern your data Describe the data classification capabilities of the compliance portal Describe sensitivity labels and policies Describe data loss prevention Describe retention policies and retention labels Describe records management Describe the Microsoft Purview unified data governance solution 14 - Describe the insider risk capabilities in Microsoft Purview Describe insider risk management Describe communication compliance 15 - Describe the eDiscovery and Audit capabilities in Microsoft Purview Describe the eDiscovery solutions in Microsoft Purview Describe the audit solutions in Microsoft Purview

SC-900T00 Microsoft Security Compliance and Identity Fundamentals
Delivered OnlineFlexible Dates
£595

IT, Information Management and Data Protection (GDPR) Practitioner

4.5(3)

By Studyhub UK

Do you want to prepare for your dream job but strive hard to find the right courses? Then, stop worrying, for our strategically modified IT and Data Protection (GDPR) Practitioner bundle will keep you up to date with the relevant knowledge and most recent matters of this emerging field. So, invest your money and effort in our 33 course mega bundle that will exceed your expectations within your budget. The IT and Data Protection (GDPR) Practitioner related fields are thriving across the UK, and recruiters are hiring the most knowledgeable and proficient candidates. It's a demanding field with magnitudes of lucrative choices. If you need more guidance to specialise in this area and need help knowing where to start, then StudyHub proposes a preparatory bundle. This comprehensive IT and Data Protection (GDPR) Practitioner bundle will help you build a solid foundation to become a proficient worker in the sector. This IT and Data Protection (GDPR) Practitioner Bundle consists of the following 30 CPD Accredited Premium courses - Course 1: IT Support Technician Course 2: Network Security and Risk Management Course 3: CompTIA Network Course 4: Information Management Course 5: Web Application Penetration Testing Course Course 6: CompTIA Cloud+ (CV0-002) Course 7: Learn Ethical Hacking with Kali Linux Course 8: Computer Operating System and Troubleshooting Course 9: Building Your Own Computer Course Course 10: It: Ethical Hacking, IT Security and IT Cyber Attacking Course 11: SQL Database Administrator Course 12: MS Word Essentials - The Complete Word Course - Level 3 Course 13: Data Protection (GDPR) Practitioner Course 14: Website Hacking From Scratch Course 15: Diploma in Front-End Web Development (HTML, CSS, & Bootstrap) Course 16: Data Science and Visualisation with Machine Learning Course 17: SQL For Data Analytics & Database Development Course 18: PLC Programming Diploma Course 19: Cisco ASA Firewall Training Course Course 20: Create Your First Responsive Website Course 21: C# (C-Sharp) Course 22: Web Design (HTML, CSS, Bootstrap) Complete Course Course 23: Python Course Course 24: JavaScript Course 25: Net MVC and Entity Framework Course Course 26: Learn Spring & Angular Material with a Full Web Application Course 27: Typescript Course 28: U&P AI - Natural Language Processing (NLP) with Python Course 29: Ruby on Rails Web Application Framework Course 30: SQL Server 101 : Microsoft SQL Server for Absolute Beginners 3 Extraordinary Career Oriented courses that will assist you in reimagining your thriving techniques- Course 1:Career Development Plan Fundamentals Course 2:CV Writing and Job Searching Course 3:Interview Skills: Ace the Interview Learning Outcome This tailor-made IT and Data Protection (GDPR) Practitioner bundle will allow you to- Uncover your skills and aptitudes to break new ground in the related fields Deep dive into the fundamental knowledge Acquire some hard and soft skills in this area Gain some transferable skills to elevate your performance Maintain good report with your clients and staff Gain necessary office skills and be tech savvy utilising relevant software Keep records of your work and make a report Know the regulations around this area Reinforce your career with specific knowledge of this field Know your legal and ethical responsibility as a professional in the related field This IT and Data Protection (GDPR) Practitioner Bundle resources were created with the help of industry experts, and all subject-related information is kept updated on a regular basis to avoid learners from falling behind on the latest developments. Certification After studying the complete training you will be able to take the assessment. After successfully passing the assessment you will be able to claim all courses pdf certificates and 1 hardcopy certificate for the Title Course completely free. Other Hard Copy certificates need to be ordered at an additional cost of •8. CPD 330 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Ambitious learners who want to strengthen their CV for their desired job should take advantage of the IT and Data Protection (GDPR) Practitioner bundle! This bundle is also ideal for professionals looking for career advancement. Certified Information Privacy Manager (CIPM) Certified Information Privacy Technologist (CIPT) Certified Information Privacy Professional/Europe (CIPP/E) Requirements To participate in this course, all you need is - A smart device A secure internet connection And a keen interest in IT and Data Protection (GDPR) Practitioner Career path Upon completing this essential Bundle, you will discover a new world of endless possibilities. These courses will help you to get a cut above the rest and allow you to be more efficient in the relevant fields. Certificates Quality Licence Scheme Endorsed Certificate of Achievement Hard copy certificate - Included Upon successful completion of the course, you will be eligible to order QLS Endorsed Hardcopy Certificate titled ' Data Protection (GDPR) Practitioner at QLS Level 3 ' Please Note: Studyhub is a Compliance Central approved resale partner for Quality Licence Scheme Endorsed courses.

IT, Information Management and Data Protection (GDPR) Practitioner
Delivered Online On Demand7 days
£279

SC-400T00 Administering Information Protection and Compliance in Microsoft 365

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The information protection administrator translates an organization?s risk and compliance requirements into technical implementation. They are responsible for implementing and managing solutions for content classification, data loss prevention (DLP), information protection, data lifecycle management, records management, privacy, risk, and compliance. They also work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization's risk reduction and compliance goals. This role assists workload administrators, business application owners, human resources departments, and legal stakeholders to implement technology solutions that support the necessary policies and controls. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400). Prerequisites Foundational knowledge of Microsoft security and compliance technologies. Basic knowledge of information protection concepts. Understanding of cloud computing concepts. Understanding of Microsoft 365 products and services. 1 - Introduction to information protection and data lifecycle management in Microsoft Purview Know your data Protect your data Prevent data loss Govern your data 2 - Classify data for protection and governance Data classification overview Classify data using sensitive information types Classify data using trainable classifiers Review sensitive information and label usage Explore labeled and sensitive content Understand activities related to your data 3 - Create and manage sensitive information types Compare built-in versus custom sensitive information types Create and manage custom sensitive information types Describe custom sensitive information types with exact data match Implement document fingerprinting Create keyword dictionary 4 - Understand Microsoft 365 encryption Learn how Microsoft 365 data is encrypted at rest Understand service encryption in Microsoft Purview Explore customer key management using Customer Key Learn how data is encrypted in-transit 5 - Deploy Microsoft Purview Message Encryption Implement Microsoft Purview Message Encryption Implement Microsoft Purview Advanced Message Encryption Use Microsoft Purview Message Encryption templates in mail flow rules 6 - Protect information in Microsoft Purview Information protection overview Configure sensitivity labels Configure sensitivity label policies Configure auto-labeling policies Manage, monitor, and remediate information protection 7 - Apply and manage sensitivity labels Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites Plan on-premises labeling Configure on-premises labeling for the Unified Labeling Scanner Apply protections and restrictions to email and files Monitor label performance using label analytics 8 - Prevent data loss in Microsoft Purview Data loss prevention overview Identify content to protect Define policy settings for your DLP policy Test and create your DLP policy Prepare Endpoint DLP Manage DLP alerts in the Microsoft Purview compliance portal View data loss prevention reports Implement the Microsoft Purview Extension 9 - Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform Configure data loss prevention policies for Power Platform Integrate data loss prevention in Microsoft Defender for Cloud Apps Configure policies in Microsoft Defender for Cloud Apps Manage data loss prevention violations in Microsoft Defender for Cloud Apps 10 - Manage data loss prevention policies and reports in Microsoft 365 Configure data loss prevention for policy precedence Implement data loss prevention policies in test mode Explain data loss prevention reporting capabilities Manage permissions for data loss prevention reports Manage and respond to data loss prevention policy violations 11 - Manage the data lifecycle in Microsoft Purview Data Lifecycle Management overview Configure retention policies Configure retention labels Configure manual retention label policies Configure auto-apply retention label policies Import data for Data Lifecycle Management Manage, monitor, and remediate Data Lifecycle Management 12 - Manage data retention in Microsoft 365 workloads Explain retention in Exchange Online Explain retention in SharePoint Online and OneDrive Explain retention in Microsoft Yammer Activate archive mailboxes in Microsoft Exchange Apply mailbox holds in Microsoft Exchange Recover content in Microsoft Exchange 13 - Manage records in Microsoft Purview Records management overview Import a file plan Configure retention labels Configure event driven retention Manage, monitor, and remediate records 14 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 15 - Search for content in the Microsoft Purview compliance portal Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 16 - Manage Microsoft Purview eDiscovery (Standard) Explore Microsoft Purview eDiscovery solutions Implement Microsoft Purview eDiscovery (Standard) Create eDiscovery holds Search for content in a case Export content from a case Close, reopen, and delete a case 17 - Manage Microsoft Purview eDiscovery (Premium) Explore Microsoft Purview eDiscovery (Premium) Implement Microsoft Purview eDiscovery (Premium) Create and manage an eDiscovery (Premium) case Manage custodians and non-custodial data sources Analyze case content 18 - Manage Microsoft Purview Audit (Standard) Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Search the audit log Export, configure, and view audit log records Use audit log searching to investigate common support issues 19 - Prepare Microsoft Purview Communication Compliance Plan for communication compliance Identify and resolve communication compliance workflow Case study--Configure an offensive language policy Investigate and remediate communication compliance alerts 20 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 21 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 22 - Manage regulatory and privacy requirements with Microsoft Priva Create and manage risk management policies Investigate and remediate risk management alerts Create rights requests Manage data estimate and retrieval for rights requests Review data from rights requests Get reports from rights requests 23 - Implement privileged access management Case study--Implementing privileged access management 24 - Manage Customer Lockbox Manage Customer Lockbox requests

SC-400T00 Administering Information Protection and Compliance in Microsoft 365
Delivered OnlineFlexible Dates
£2,380

NIST Cybersecurity Professional Foundation

By IIL Europe Ltd

This course teaches business leaders and operational stakeholders the fundamentals of communicating with executive leadership on WHAT investments must be made to operationalize the NIST Cybersecurity Framework and its informative references to facilitate secure, resilient, and auditable digital outcomes. This course also introduces candidates to the DVMS Institute Create, Protect, and Deliver (CPD) overlay model. As Cloud Services revolutionized the creation and management of digital infrastructure, the DVMS CPD Overlay Model, underpinned by well-known frameworks from NIST and standards from ISO, will revolutionize how organizations manage their digital risk, resiliency, and privacy. Course Features • Foundation Certificate digital courseware • A Practical Guide to 'Adopting the NIST Cybersecurity Framework' eBook • Exam Voucher • Certificate of Attendance • Foundation Certificate Digital Badge on successful completion of exam • Access to the NIST Cybersecurity Professional LinkedIn community This Foundation level course covers the following topics: Today's Digital Economy Understanding Cyber Risks The NIST Cybersecurity Framework Fundamentals Core Functions, Categories, and Subcategories Implementation Tiers Developing Framework Profiles Cybersecurity Improvement NIST Cybersecurity Professional certification training programs are accredited by APMG International, certified by the National Cybersecurity Council (NCSC) in the UK, and recognized by the U.S. Department of Homeland Security CISA organization as qualified NIST Cybersecurity Framework training in alignment with the cybersecurity roles defined in the NICE Cybersecurity Workforce Framework.

NIST Cybersecurity Professional Foundation
Delivered Online On Demand18 hours
£995
1...56789...145