• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

267 Risk Management courses delivered Live Online

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou

Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry

C)ISSO - Certified Information Security Systems Officer Mile 2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview The person who carries this certification should be able to acquire necessary resources, advise senior leadership, collaborate with stakeholders, evaluate effectiveness, identify cybersecurity problems, manage threats, oversee information security awareness programs, participate in risk assessments, support compliance activities, and define or implement policies and procedures to ensure protection of critical infrastructure within an information security environment. If you are looking for the ?gotta have it? cybersecurity course, then the Certified Information Systems Security Officer is for you.ÿ The C)ISSO will prepare you for multiple managerial roles inside the INFOSEC community by covering a broad range of topics. You will learn theories in security concepts, practices, monitoring and compliance in IS management. An Information Systems Security Officer is able to implement and maintain cost-effective security controls that are closely aligned with business and industry standards. The C)ISSO certification course is an idealÿway to increaseÿknowledge, expertise, and skill for managers, auditors, and INFOSEC professionals.ÿ At Mile2 we consider the C)ISSO to be one of our flagship courses.The things you learn in this course can be applied to management, prevention teams, and recovery professionals. Material learned in the Live Class or Self-Study options will apply directly to the certification exam. Course Outline Risk Management Security Management Identification and Authentication Access Control Security Models and Evaluation Operations Security Vulnerability Assessments Symmetric Cryptography and Hashing Network Connections Network Protocols and Devices Telephony, VPNs, and Wireless Security Architecture and Attacks Software Development Security Database Security Malware and Software Attacks Business Continuity Disaster Recovery Incident Management, Law, and Ethics Physical Security Additional course details: Nexus Humans C)ISSO - Certified Information Security Systems Officer Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSO - Certified Information Security Systems Officer Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)ISSO - Certified Information Security Systems Officer Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

Scrum Developer Certified (SDC)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This is highly recommended for everyone in a company who works in a Scrum Team or anyone who interacts with any Scrum Team. This will also be very useful for those who are interested in understanding the basics of Scrum and how this method could be used effectively. Overview To ensure that students understand the basics of Scrum To enable Scrum Team members to effectively contribute to a Scrum project. To enable Scrum Team members to apply Scrum effectively in Scrum/Agile projects. In this course, students learn to understand the basics of Scrum, effectively contribute to a Scrum project, and learn how to enable Scrum Team members to apply Scrum effectively in Scrum/Agile projects.Successful candidates will be awarded the Scrum Developer Certified (SDC?) certification by SCRUMstudy after passing the included certification exam. Introduction Agile Overview Scrum Overview Principles The Six Scrum Principles Organization Core Roles and Non-core Roles Business Justification Value-driven Delivery Factors used to Determine Business Justification Confirm Benefits Realization Quality Quality Defined Quality, Scope and Business Value Quality Management in Scrum Change Unapproved and Approved Changes Change in Scrum Risk Risks and Issues Risk Management Procedure Introduction to Scrum Project PhasesInitiate Create Project Vision Process Identify Scrum Master and Stakeholders Process Form Scrum Team and Develop Epics processes Create Prioritized Product Backlog and Conduct Release Planning Processes Plan and Estimate Create User Stories Process Estimate User Stories and Commit User Stories Processes Identify Tasks and Estimate Tasks Processes Create Sprint Backlog Process Implement Create Deliverables and Conduct Daily Stand-up processes Groom Prioritized Product Backlog Process Review and Retrospect Demonstrate and Validate Sprint Process Retrospect Sprint Process Additional course details: Nexus Humans Scrum Developer Certified (SDC) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Scrum Developer Certified (SDC) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Scrum Developer Certified (SDC)
Delivered OnlineFlexible Dates
Price on Enquiry

Strategic Project Management – Level 7

By NextGen Learning

Master project leadership, risk management & strategy with this CPD-accredited Level 7 course. Gain globally recognised project management skills.

Strategic Project Management – Level 7
Delivered OnlineFlexible Dates
£12.99

Cognicert Root Cause Analysis Professional Course

5.0(1)

By Cognicert Limited

Root Cause Analysis (RCA) is used to analyse the root causes of focus events with both positive and negative outcomes, but it is most commonly used for the analysis of failures and incidents. Causes for such events can be varied in nature, including design processes and techniques, organizational characteristics, human aspects and external events. RCA can be used for investigating the causes of non-conformances in quality (and other) management systems as well as for failure analysis, for example in maintenance or equipment testing.

Cognicert Root Cause Analysis Professional Course
Delivered OnlineFlexible Dates
£250

Symantec Data Center Security - Server Advanced 6.0

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for information technology professionals, security professionals, network, system managers and administrators tasked with installing, configuring and maintaining Symantec Data Center Security: Server Advanced. Overview At the completion of the course, you will be able to: Describe the major components of Symantec Data Center Security: Server Advanced and how they communicate. Install the management server, console and agent. Define, manage and create assets, policies, events and configurations. Understand policy creation and editing in depth. course is an introduction to implementing and managing a Symantec Data Center Security: Server Advanced 6.0 deployment. Introduction Course Overview The Classroom Lab Environment Introduction to Security Risks and Risk Security Risks Security Risk Management Managing and Protecting Systems Corporate Security Policies and Security Assessments Host-Based Computer Security Issues SDCS:Server Advanced Overview SDCS: Server Advanced Component Overview Policy Types and Platforms Management Console Overview Agent User Interface Overview DEMO of Management Console Installation and Deployment Planning the Installation Deploying SDCS:SA for High Availability Scalability Installing the Management Server Installing the Management Console Installing a Windows Agent Installing a UNIX Agent LAB: Install Manager and Agents Configuring Assets Asset and Agent Overview Viewing Agents and Assets Managing Agents Managing Agents on Assets LAB: Create Asset Groups LAB: Examine Agent Interface Policy Overview Policies Defined Prevention Policy Overview Process Sets Resource Access Policy Options Detection Policy Overview IDS Capabilities Rules Collectors Policy Management Workspace User Interface on Agent Example Use Cases LAB: Paper Based Scenarios LAB: What type of security strategy should be used? Detailed Prevention Policies Policy Editor Policy Structure Global Policy Options Service Options Program Options Policy Processing Order Network Rules File Rules Registry Rules Process Sets Predefined Policies LAB: Deploy Strict policy LAB: Examine Functionality Advanced Prevention Profiling Applications Customizing Predefined Policies LAB: Modify Policy Previously Deployed LAB: Re-examine Functionality LAB: Preparing for Policy deployment LAB: Best Practice - Covering Basics LAB: Further Enhance Strict Policy LAB: Create Custom Process Set LAB :Secure an FTP Server LAB: Troubleshoot Policy/pset Assignment Using CLI Detection Policies Detection Policies Structure Collectors Rules Predefined Detection Policies Creating a Detection Policy Using the Template Policy LAB: Deploy Baseline Policy LAB: Create Custom Policy Event Management Events Defined Viewing Events Reports and Queries Overview Creating Queries and Reports Creating Alerts LAB: View Monitor Types and Search Events LAB: Create Real Time Monitor Agent Management and Troubleshooting Configurations Defined Creating and Editing Configurations Common Parameters Prevention Settings Detection Settings Analyzing Agent Log Files Diagnostic Policies Local Agent Tool ? sisipsconfig LAB: Create Custom Configurations LAB: Implement Bulk Logging LAB: Disable Prevention on Agent Using CLI LAB: Use Diagnostic Policy to Gather Logs LAB: Troubleshoot a Policy System Management Managing Users and Roles Server Security Viewing and Managing Server Settings Viewing and Managing Database Settings Viewing and Managing Tomcat Settings LAB: Create a New User LAB: View System Settings

Symantec Data Center Security - Server Advanced 6.0
Delivered OnlineFlexible Dates
Price on Enquiry

Interest Rate Futures & Swaps - Pricing, Hedging & xVA Adjustments

5.0(5)

By Finex Learning

This 3 Days programme will equip you to use, price, manage and evaluate interest rate and cross-currency derivatives. The course starts with the building blocks of money markets and futures, through yield curve building to interest-rate and cross-currency swaps, and applications. The approach is hands-on and learning is enhanced through many practical exercises covering hedging, valuation, and risk management. This course also includes sections on XVA, documentation and settlement. The programme includes extensive practical exercises using Excel spreadsheets for valuation and risk-management, which participants can take away for immediate implementation.

Interest Rate Futures & Swaps - Pricing, Hedging & xVA Adjustments
Delivered in Internationally or OnlineFlexible Dates
Price on Enquiry

PgMP Exam Prep: Virtual In-House Training

By IIL Europe Ltd

PfMP® Exam Prep: Virtual In-House Training This is an intensive PfMP® Exam preparation course. This learning experience guides you through the multi-faceted discipline of portfolio management by focusing on the related technical, leadership, and business skills required to navigate it in the real world. First and foremost, this is an intensive PfMP® exam preparation course. Over the course, we go beyond exam prep to provide selected practice in applying key portfolio management skills, tools, and techniques. This learning experience guides you through the multi-faceted discipline of portfolio management by focusing on the related technical, leadership, and business skills required to navigate it in the real world. The journey zooms in and out between governance context and specific operational activities. The ultimate goal is practical application, with the bonus of certification along the way. What You Will Learn By the end of this program, you will be able to: Align and manage the portfolio, strategically, to satisfy organizational objectives and priorities, through benefit realization Articulate and emulate the role of a portfolio manager Apply the principles and skills of a portfolio manager to your real-world environment Study and prepare for the PfMP® Examination Apply for the certification, per the PMI PfMP Handbook and pass the initial panel review on your application Getting Started Course Overview Details of the PfMP® Certification process Foundation Concepts Projects, program, and portfolios A portfolio management process Strategy and value The role of the portfolio manager The role of key stakeholders Life cycle management The Portfolio Life Cycle Overview of Life Cycle Portfolio Management Information System (PMIS) Governance within the Portfolio Life Cycle Strategic Management Strategy concepts Supporting documentation and the strategic plan Planning and optimization Organizational risk appetite Managing strategic change Governance Management Overview and Guiding Principles The Concept of Governance Effective Design Factors Governance Roles Capacity and Capability Management Overview and Guiding Principles Capacity Management and Planning Supply and Demand (Management and Optimization) Organization Capabilities (Assessment and Development) Performance Management (Reporting, Analytics, and Balance) Stakeholder Engagement The Importance of Stakeholders Overview and Guiding Principles Definition and Identification Analysis and Planning Communications Approaches and Management Value Management Overview (Guiding Principles, Definition, and Components) Negotiating Expected Value Maximizing Value Assuring Value Realizing Value Measuring and Reporting Value A Look at Tools Risk Management Overview and Guiding Principles Portfolio Risk Planning Portfolio Risk Identification Portfolio Risk Assessment Portfolio Risk Response Examination Content Outline (ECO) Overview Structure Strategic Tasks Mapping Governance Tasks Mapping Performance Tasks Mapping Risk Tasks Mapping Communication Tasks Mapping List of Knowledge and Skills Exam Prep and Practice Overview Documenting experience Submitting the application Preparing to sit for the exam

PgMP Exam Prep: Virtual In-House Training
Delivered OnlineFlexible Dates
Price on Enquiry

Successful project management (In-House)

By The In House Training Company

The aim of this course is to provide an overview of the key principles and techniques for leading and managing project work. It will focus on the core principles and generic methods of project management, showing how these can be applied to typical projects. The scope of the programme includes: The course also emphasises the importance of the leadership and team-working skills needed by project managers and team members in carrying out their roles. The principal training objectives for this programme are to: Explain and demonstrate the key principles of successful project management Demonstrate a range of useful project management tools and techniques Define the role of, and help participants understand the skills required by, the project leader Illustrate the use of project skills through examples and case studies Identify ways to improve project management, both individually and corporately DAY ONE 1 Introduction (Course sponsor) Why this programme has been developed Review of participants' needs and objectives 2 Key concepts and requirements for success Projects and project management Lessons from past projects; the essential requirements for success Differences between projects; characteristic project life cycles The challenges of project management; the role of the project manager Project exerciseA team exercise to demonstrate the challenges of project management 3 Defining project objectives and scope Identifying the stakeholders; key roles and responsibilities Getting organised; managing the definition process Working with the 'customer' to define the project scope 4 Project case study: part 1 Defining the project objectives: syndicate teams define the objectives and scope for a typical project 5 Project planning The nature of planning; recognising planning assumptions Planning the plan; the importance of team involvement Developing the work breakdown structure Estimating task resources, timescales and costs Developing the project schedule Analysing the plan and identifying the critical path 6 Project case study: part 2 Creating the project plan Syndicate teams begin development of their project plans (for completion after session 7) Team presentations and group discussion (after session 7) DAY TWO 7 Managing project risks Understanding and defining project risks Classifying risks and adopting an appropriate risk strategy Identifying, evaluating and managing project risks Agreeing ownership of project risks; the risk register Integrating planning and risk management 8 Project control Pro-active and re-active control; striking the right balance Pre-requisites for effective, pro-active project control Avoiding unnecessary 'scope creep' and controlling change Selecting the data needed to provide early warning of problems Monitoring project performance: 'S' curves, slip charts, earned value Getting good data and assessing project status Defining the roles and responsibilities for control Setting up a routine process for keeping up to date Managing and controlling multiple projects 9 Project case study: part 3 Controlling the project Teams control their project as new developments take place 10 Course review and transfer planning (Course sponsor present) Identify actions to be implemented individually Identify corporate opportunities for improving project management Sponsor-led review and discussion of proposals Conclusion

Successful project management (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Project planning and control (In-House)

By The In House Training Company

This programme concentrates on the core planning skills needed to develop sound practical project plans in a team environment. This enables the plan to be modified should requirements change or difficulties arise. The programme also gives participants the confidence to practise those skills and apply them in the work environment and deliver their projects more successfully in the future. Participants learn fundamental project management concepts and terminology, demystifying the project management process, and, in particular, how to: Break a project down into manageable sections and ensure nothing is left out Understand and apply estimating techniques to develop realistic estimates Sequence work effectively and carry out critical path analysis to determine project duration and which tasks to pay closest attention to Manage project risk effectively to protect project value Monitor, control and re-plan the project to best keep it on track Close out the project and ensure the project comes to an orderly end 1 Introduction Self-introductions and personal objectives Course objectives Sharing of project issues 2 Project management concepts Characteristics of a project and what should be kept as operational responsibilities Understanding the triple and quadruple constraints - and their limitations Prioritising requirements through the MOSCOW technique Product v project life cycle Key project roles and responsibilities - the importance of sponsorship and clarity of roles 3 Starting a project, and the importance of the terms of reference / project brief Avoiding the pressure to 'just do it'! The importance and benefits of planning The best time to learn! Initial project documentation - the BOSCARDI approach 4 Breaking the work down Understanding alternative breakdown structures such as the product breakdown structure and work breakdown structure Guidelines for creating a work breakdown structure to ensure the full work scope is identified 5 Estimating Alternative estimating techniques and associated confidence levels Further considerations - loss and resource factors 6 Organising the work Use of network diagrams to develop a clear sequence of work Critical path analysis and calculating the project duration and task float - and usage 7 The management of project risk Understanding the nature of project risk The risk analysis and risk management processes How to best manage threats and opportunities Running a risk workshop Using the risk register 8 Scheduling the work The importance of the Gantt chart and understanding its limitations The Gantt chart layout and using alternative views such as the tracking Gantt Using alternative dependencies 9 Resource issues Assigning resources and resolving resource overloads Crashing and fast-tracking your project and potential issues to look out for 10 Controlling the project The control cycle and alternative feedback mechanisms Alternative progress reporting Assessing the impact The importance of re-planning The benefits of control Change control - the importance of impact analysis The steps of change control and the use of the issue register 11 Closing the project The project closure checklist Reviewing the project - things to avoid Developing meaningful lessons and ensuring they are applied effectively The post-project review - its importance to the organisation

Project planning and control (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry