• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1238 Security courses in Pontefract delivered Live Online

Working with Data

By futureCoders SE

Learn how to work with data using Python (the coding language) as a tool. Learn how data is structured and how to manipulate it into a usable, clean form ready for analysis. Work on a small real-life project from conception to solution, in a team or on your own.

Working with Data
Delivered OnlineJoin Waitlist
£200

Legal Aid - Family Controlled Work Billing Course

By DG Legal

The LAA operates a strict compliance regime when it comes to auditing family controlled work matters, and mistakes can often result in a Contract Notice, corrective action, and further follow-up activity within 6 months. This course will discuss the various aspects of family controlled work billing, with discussions on topics such as how to bill private law, public law, and help with mediation matters; how to evidence whether substantive negotiations and a settlement have taken place in private law matters; how do the LAA audit travel and other disbursement claims; what evidence must be present on files to avoid any issues on audit – including scope, gateway evidence, and forms/evidence of means (rules on evidence of means will be included in brief, however, a separate, more in-depth course will be announced in due course); and the rules on claiming separate matters and escape fees. Key aspects of the Civil Contract and associated LAA Guidance (including the Codes Guidance) will be included, along with a discussion of common errors that are made. Target Audience This online course is aimed at anyone involved in billing Family Controlled Work matters or managing an LAA Family Contract. Resources Course notes will be provided to all delegates which may be useful for ongoing reference or cascade training. Please note a recording of the course will not be made available. Speaker Steve Keeling, Consultant, DG Legal Steve joined DG Legal after leaving the Legal Aid Agency in August 2016. In his 17 years at the LAA, he worked in the audit team as both auditor and manager and was a Contract Manager for several years. Steve is also a certified SQM auditor and undertakes audits on behalf of Recognising Excellence as well as running training sessions for the SQM Audit Team periodically.

Legal Aid - Family Controlled Work Billing Course
Delivered Online
£67.50 to £90

ISO 22301 Lead Implementer

By Nexus Human

Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Project managers and consultants involved in business continuity Expert advisors seeking to master the implementation of the business continuity management system Individuals responsible to maintain conformity with BCMS requirements within an organization Members of the BCMS team Overview Understand the concepts, approaches, methods, and techniques used for the implementation and effective management of a BCMS. Learn how to interpret and implement the requirements of ISO 22301 in the specific context of an organization. Understand the operation of the business continuity management system and its processes based on ISO 22301. Learn how to interpret and implement the requirements of ISO 22301 in the specific context of an organization. No two disasters in the world cause equal damage. Between the unpredictability of natural disasters, information security breaches, and incidents of different nature, preparedness can make you stand out in the crowd and predict the future of your business. In light of this, proper planning is essential to mitigating risks, avoiding consequences, coping with the negative effects of disasters and incidents, but at the same time, continuing your daily operations so that customer needs do not remain unfulfilled.This training course will prepare its participants to implement a business continuity management system (BCMS) in compliance with the requirements of ISO 22301. Attending this training course allows you to gain a comprehensive understanding of the best practices of the business continuity management system and to be able to establish a framework that allows the organization to continue operating efficiently during disruptive events Introduction to ISO 22301 and initiation of a BCMS Training course objectives and structure Standards and regulatory frameworks Business continuity management system (BCMS) Fundamental business continuity concepts and principles Initiation of the BCMS implementation Understanding the organization and its context BCMS scope Implementation plan of a BCMS Leadership and commitment Business continuity policy Risks, opportunities, and business continuity objectives Support for the BCMS Business impact analysis Risk assessment Implementation of a BCMS Business continuity strategies and solutions Business continuity plans and procedures Incident response and emergency response Crisis management Exercise programs Monitoring, measurement, analysis, and evaluation Internal audit BCMS monitoring, continual improvement, and preparation for the certification audi Management review Treatment of nonconformities Continual improvement Preparation for the certification audit Closing of the training course

ISO 22301 Lead Implementer
Delivered OnlineFlexible Dates
Price on Enquiry

ISO 27701 Lead Implementer

By Training Centre

  Delivered in either our Live Online (4 days) or in our Classroom (5 days), the ISO/IEC 27701 Lead Implementer training course enables you to develop the necessary expertise to assist an organization to establish, implement, maintain and continually improve a Privacy Information Management System (PIMS) based on ISO/IEC 27701 by enhancing an existing ISMS based on ISO/IEC 27001 and the guidance of ISO/IEC 27002. About This Course   This training course is designed to prepare its participants implement a Privacy Information Management System (PIMS) in compliance with the requirements and guidance of the ISO/IEC 27701. Moreover, you will gain a comprehensive understanding of the best practices of privacy information management and learn how to manage and process data while complying with various data privacy regimes.   After mastering the implementation and management of a Privacy Information Management System (PIMS), you can sit for the exam and gain the "Certified ISO/IEC 27701 Lead Implementer' credential. The internationally recognized Certificate proves that you have the practical knowledge and professional capabilities to implement the ISO/IEC 27701 requirements in an organization.   Learning objectives   Master the concepts, approaches, methods and techniques used for the implementation and effective management of a PIMS. Learn about the correlation between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks. Understand the operation of a PIMS based on ISO/IEC 27701 and its principal processes. Learn how to interpret the requirements of ISO/IEC 27701 in the specific context of an organization. Develop the expertise to support an organization in effectively planning, implementing, managing, monitoring and maintaining a PIMS.   Education approach   This training course is based on both theory and best practices used in the implementation of PIMS. Lecture sessions are illustrated with examples based on case studies. Practical exercises are based on a case study which includes role playing and discussions. Practice tests are similar to the Certification Exam Prerequisites   A fundamental understanding of information security and comprehensive knowledge of the ISMS implementation principles What's Included?   Refreshments & Lunch (Classroom courses only) Course Slide Deck Official Study Guides CPD Certificate The Exam fees   Who Should Attend?   Managers and consultants involved in privacy and data management Expert advisors seeking to master the implementation of a Privacy Information Management System Individuals responsible and accountable for Personally Identifiable Information (PII) within organizations Individuals responsible for maintaining conformance with data privacy regimes requirements PIMS team members Accreditation Our Guarantee     We are an approved IECB Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training and exam retake offered Assessment   The exam consists of a 12 question essay type format, to be completed within 150 minutes and achieve a pass mark of 70%. Exam results are provided within 24 hours. Provided by   This course is Accredited by NACS and Administered by the IECB.

ISO 27701 Lead Implementer
Delivered OnlineFlexible Dates
£1,450

Introduction to DAX for Power BI

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for business users who have been using Power BI to build analytic solutions and are ready to take advantage of the power and flexibility that DAX provides. Learning DAX is a very common 'next step' for experienced Power BI users. Overview At course completion, you should be able to describe DAX syntax, data types, and errors use DAX to create calculated columns, measures, and tables explain how DAX calculations are evaluated, along with the differences between row context and filter context configure and use Time Intelligence to perform common time-based calculations, for example to-date calculations, year-over-year analysis, moving averages, etc. create calculated columns and measures that use data from multiple tables in the data model write measures that handle error conditions gracefully use DAX to enhance the Power BI user experience use DAX Studio to connect to a Power BI data model and execute simple queries Welcome to Introduction to DAX for Power BI. This two-day instructor-led course is intended for business users who have been using Power BI and want to use DAX to create custom calculations in their data models. In this class, you will be introduced to using Data Analysis Expressions (DAX), which is the expression language that is used to create custom calculations in the Power BI Data model. The course covers some of the theoretical underpinnings of the data model and the DAX language, but the emphasis is on using DAX to solve common business problems. You will learn how to write your own calculated columns, measures, and tables, how to visualize the way Power BI computes DAX calculations, and how to troubleshoot custom code. MODULE 1: GETTING STARTED WITH DAX INTRODUCTION TODAX CREATING OBJECTS WITHDAX CONTEXT AND RULES OF EVALUATION VARIABLES,COMMENTS,AND TESTING MODULE 2: PERFORMING BASIC CALCULATIONS GETTING STARTED IMPLICIT MEASURES ADDING QUICK MEASURES WORKING WITH DAX DATA TYPES . DOING BASIC MATH USING LOGIC IN YOUR CALCULATIONS USING THE IF() FUNCTION NESTED IF() USING THE SWITCH() FUNCTION ADVANCED SWITCH() LOGICAL OPERATORS & FUNCTIONS: ||, OR(), &&, AND(), NOT() AGGREGATING AND SUMMARIZING DATA THE SUM() FUNCTION MODULE 3: WORKING WITH CONTEXT IN THE DATA MODEL CONTEXT DEFINED DATA MODELING BASICS INTRODUCTION TO DIMENSIONAL MODELING RELATIONSHIPS AND THEIR EFFECT ON THE EVALUATION CONTEXT GETTING DATA FROM OTHER TABLES USING RELATED() AND RELATEDTABLE LOOKING UP DATA WITHOUT USING RELATIONSHIPS MODIFYING THE CONTEXT USING CALCULATE() MODULE 4: PERFORMING MORE ADVANCED CALCULATIONS THE DAX ITERATOR FUNCTIONS USING TABLE MANIPULATION FUNCTIONS MODULE 5: WORKING WITH TIME PERFORMING DATE CALCULATIONS WORKING WITH DATE TABLES GENERATING A DATE TABLE WITH THE CALENDAR() FUNCTION DEFINING CUSTOM OPERATING PERIODS YTD, QTD, AND MTD CALCULATIONS CUSTOM TO-DATE CALCULATIONS FINDING YEAR-OVER-YEAR CHANGE FINDING MOVING AVERAGES MODULE 6: ENHANCING THE USER EXPERIENCE CONTROLLING VISIBILITYOF YOUR MEASURES USING WHAT-IF PARAMETERS ADDING BANDING USING DAX TO PROVIDE ROW-LEVEL SECURITY

Introduction to DAX for Power BI
Delivered OnlineFlexible Dates
£900

Symantec ProxySG 6.6 Basic Administration (BCCPA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The ProxySG 6.6 Basic Administration course is intended for students who wish to master the fundamentals of the ProxySG. It is designed for students who have not taken any previous training courses about the ProxySG. Overview Describe the major Secure Web Gateway functions of the ProxySG.License and configure a ProxySG.Deploy a ProxySG in either explicit or transparent mode.Use the Visual Policy Manager to write policies to manage web filtering, authentication, and SSL traffic management.Use ProxySG access logs to generate reports. The ProxySG 6.6 Basic Administration course is an introduction to deployment options and management of the individual key features offered using the ProxySG 6.6 solution. Introduction to the Symantec ProxySG Secure Web Gateway Describe the functions of a proxy server Differentiate proxy servers from firewalls Describe the key features and benefits of the ProxySG List the various ProxySG models Access online Symantec community resources ProxySG Security Deployment Options Describe the three network deployment methods Describe the three possible roles of the ProxySG ProxySG Management Console Describe the relationship between the Management Console and the ProxySG CLI Describe the primary function of the major areas of the Management Console Use the Management Console to access on-box help and Symantec product documentation Traffic Interception Using Proxy Services Understand the functions of proxy services, listeners, and proxy types Describe the three most common proxy services Explain how the intercept and bypass settings affect what happens to network traffic passing through the ProxySG Explain the function of common global proxy service settings Hypertext Transfer Protocol Understand how a connection is initiated over the transport layer Identify the components of an HTTP URL Explain the two types of HTTP messages: request and response Identify common response codes Introduction to the Visual Policy Manager Describe the relationship among the VPM, CPL, and the Management Console Describe the default processing order for policy layers and rules Describe triggers and actions that can be used in writing policy Identify the types of objects that the VPM supports Describe some of the best practices to be followed when using the VPM to create policy Filtering Web Content Describe the main concepts of web filtering Describe the primary category databases Describe the category types available to policy Describe how WebFilter and WebPulse work together Using Threat Intelligence to Defend the Network Understand Intelligence Services as provided by the Global Intelligence Network Understand Geolocation and Threat Risk Levels and how they can be used in policy Ensuring Safe Downloads Describe how malware can be transmitted via HTTP Explain the methods, advantages, and disadvantages of file type detection Describe some of the considerations in deciding what content to block as possible malware sources Notifying User of Internet Usage Policies Explain the function and various components of built-in and custom exception pages Describe the function of Notify User objects Identify the types of pages that can be sent to users by using Notify User objects Describe splash pages and coaching pages using Notify User objects in the VPM Access Logging on the ProxySG Describe, at a high level, how the ProxySG performs access logging Describe the components of a ProxySG access log facility Identify default log facilities and log formats Describe common use cases for periodic and continuous uploading of access logs

Symantec ProxySG 6.6 Basic Administration (BCCPA)
Delivered OnlineFlexible Dates
Price on Enquiry

Microsoft Access Advanced (live online classes)

By Microsoft Office Training

Course Objectives At the end of this course you will be able to: Do advance Table design Do advance Query design and Action Querys Do advance Form design with the use of macros and buttons Export and import data to and from different sources. 1 year email support service Take a look at the consistent excellent feedback from our corporate clients visiting our site ms-officetraining co uk With more than 20 years experience, we deliver courses on all levels of the Desktop version of Microsoft Office and Office 365; ranging from Beginner, Intermediate, Advanced to the VBA level. Our trainers are Microsoft certified professionals with a proven track record with several years experience in delivering public, one to one, tailored and bespoke courses. Tailored in company training courses: You can choose to run the course exactly as they are outlined by us or we can customise it so that it meets your specific needs. A tailored or bespoke course will follow the standard outline but may be adapted to your specific organisational needs. Advanced Table Design Advanced Field Properties Table Properties Advanced Query Design Advanced Naming Conventions Join Tables in Queries Manage Query Joins Use Self-Joins in Queries Summarise Data in Queries Parameter Queries Action Queries Crosstab Queries Advanced Form Design Create Subforms and Linked Forms Form Controls Command Buttons Form Properties Interface, Start-Up and Navigations Forms Working with Macros Create Single Macros Run Macros Work with Sub Macros Use Conditional Macros Run Macros from Buttons Assign Macros to Events Extending Data Reach Import Data Export Data Work with Linked Tables Managing Databases Object Dependencies Database Documenter Performance Analyzers Regular Management of a Database Access Database Security Who is this course for? Who is this course for? The course is aimed at all users who would like to obtain the necessary skills to create advanced table, query, form and reports as well as to automate tasks with the use of macros. Career path Career path Microsoft Office know-how can instantly increase your job prospects as well as your salary. 80 percent of job openings require spreadsheet and word-processing software skills

Microsoft Access Advanced (live online classes)
Delivered OnlineFlexible Dates
£550

Email Etiquette

By Nexus Human

This course is intended for Beginner-Moderate exposure is recommended for this course. The topics covered are cumulative in nature, and they require minimal understanding of email applications and composition. Overview The objective of the course is to give students the information needed to create emails that are written in a succinct, effective, and user-friendly manner. Students will learn how to set up an email subject, salutation, and will then work on how to write a credible email. In this course, students will learn about e-mail policies and learn how to write professional e-mail memos that convey appropriate messages. 1 - E-mail basics E-mail characteristics Writing online versus on paper Understanding the advantages and disadvantages of e-mail Understanding the cultural significance of e-mail E-mail programs Using an e-mail program to send e-mail When to use e-mail Communicating by e-mail Understanding when to avoid using e-mail Writing an e-mail message Using the MAIL acronym 2 - E-mail policies Company policies Avoiding improper e-mail messages Ensuring employee compliance to e-mail policies Copyright laws, viruses, and liability Avoiding copyright infringement Avoiding viruses Identifying e-mail liability 3 - E-mail features and security Features of an e-mail program Using attachments Using priority labels and signature files Features of an e-mail program Using attachments Using priority labels and signature files Discussing e-mail program options Securing e-mail Using encryption and digital signatures Using passwords 4 - E-mail messages Message headers Using headers E-mail message body Including proper greeting Structuring an e-mail message Closing an e-mail message 5 - E-mail effectiveness E-mail recipients Considering the factors that determine e-mail writing Anticipating recipient reaction Message management Managing your e-mail effectively 6 - Netiquette guidelines Netiquette style Using proper tone Following formatting guidelines Emoticons and abbreviations Using emoticons and electronic abbreviations 7 - Composing online correspondence Online communication Achieving the objective of the message Language and punctuation Improving online writing style Using punctuation correctly Efficient writing habits Constructing sentences Constructing paragraphs Editing e-mail messages

Email Etiquette
Delivered OnlineFlexible Dates
£395

Certified Secure Web Application Engineer

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Coders Web Application Engineers IS Managers Application Engineers Developers Programmers Overview Upon completion, Certified Secure Web Application Engineer students will be able to establish industry acceptable auditing standards with current best practices and policies. Students will also be prepared to competently take the CSWAE exam. Secure Web Application Engineers work to design information systems that are secure on the web. Organizations and governments fall victim to internet-based attacks every day. In many cases, web attacks could be thwarted but hackers, organized criminal gangs, and foreign agents are able to exploit weaknesses in web applications. The Secure Web programmer knows how to identify, mitigate and defend against all attacks through designing and building systems that are resistant to failure. With this course you will learn how to develop web applications that aren?t subject to common vulnerabilities, and how to test and validate that their applications are secure, reliable and resistant to attack. Course Outline Web Application Security OWASP Top 10 Threat Modeling & Risk Management Application Mapping Authentication and Authorization Attacks Session Management Attacks Application Logic Attacks Data Validation AJAX Attacks Code Review And Security Testing Web Application Penetration Testing Secure SDLC Cryptography Additional course details: Nexus Humans Certified Secure Web Application Engineer training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Secure Web Application Engineer course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Secure Web Application Engineer
Delivered OnlineFlexible Dates
Price on Enquiry

Fire Alarm Foundation Course

By Hi-Tech Training

The Fire Alarm Foundation course is designed to give participants a practical knowledge of the operation and installation of Fire Alarm Systems at a foundation level. During this practical and theory-based course students will gain the skills and knowledge to install and wire up a Fire Alarm Control Panel to typical auxiliary equipment such as Break Glass Units, Smoke Detectors, Heat Detectors, Bells, and Sirens.

Fire Alarm Foundation Course
Delivered Online
£85 to £685