Duration 4 Days 24 CPD hours This course is intended for Penetration Testers Microsoft Administrators Security Administrators Active Directory Administrators Anyone looking to learn more about security Overview Upon completion, Certified IS Security Manager students will have a strong foundation in Cyber Security & IS management standards with current best practices and will be prepared to competently take the C)ISSM exam. Companies will lean on a Certified IS Security Manager, C)ISSM to create solutions for tomorrow?s problems, today. When it comes to identifying critical issues and providing effective IS management solutions.ÿ ÿThe knowledge and course content provided in the Certified Information Systems Security Manager ? C)ISSM will not only cover ISACA©?s CISM exam but will provide a measurable certification that demonstrates proficiency in the IS Management Field. The Certified Information Systems Security Manager covers the skills and knowledge to assess threat analysis and risks, Risk & incident management, Security programs and CISO roles, IS security strategy and frameworks, Audit and Risk management creation of policies, compliance and awareness, as well as DR and BCP development, deployment and maintenance. Course Outline Introduction Information Security Governance Information Risk Management and Compliance Information Security Program Development and Management Information Security Incident Management Additional course details: Nexus Humans C)ISSM - Certified Information Systems Security Manager Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSM - Certified Information Systems Security Manager Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for #NAME? Overview At the completion of this course, students already familiar with the RHCT/RHCSA administration skills will have exposure to all competencies tested by the RHCSA and RHCE exams. If you are an experienced Linux© system administrator and hold a Red Hat Certified System Administrator (RHCSA©) credential or possess equivalent skills and want to broaden your ability to administer Linux systems at an enterprise level, this is the perfect course.The course will empower you to deploy and manage network servers running caching domain name service (DNS), MariaDB, Apache HTTPD, Postfix SMTP null clients, network file sharing with network file system (NFS) and server message block (SMB), iSCSI initiators and targets, advanced networking and firewall configurations, and to use bash shell scripting to help automate, configure, and troubleshoot your system. Through lectures and hands-on labs, you will be exposed to all competencies covered by the Red Hat Certified Engineer (RHCE) exam (EX300), supplementing what you have already learned in earning your RHCSA credential.This course is based on Red Hat© Enterprise Linux 7. Getting Started with the Classroom Environment Given a virtualized environment, begin to administrate multiple systems using prerequisite skills Enhance User Security Configure system to use Kerberos to verify credentials and grant privileges via sudo Bash Scripting and Tools Automate system administration tasks utilizing Bash scripts and text-based tools File Security with GnuPG Secure files with GnuPG. Software Management Use yum plugins to manage packages and understand the design of packages to build a simple package Network Monitoring Profile running services then capture and analyze network traffic Route Network Traffic Configure system to route traffic and customize network parameters with sysctl Secure Network Traffic Secure network traffic through SSH port forwarding and iptables filtering/network address translation (NAT) NTP Server Configuration Configure an NTP server Filesystems and Logs Manage local file system integrity, monitor system over time, and system logging Centralized and Secure Storage Access centralized storage (iSCSI) and encrypt filesystems SSL-encapsulated Web Services Understand SSL certificates and deploy an SSL encapsulated web service Web Server Additional Configuration Configure web server with virtual hosts, dynamic content, and authenticated directories Basic SMTP Configuration Configure an SMTP server for basic operation (null client, receiving mail, smarthost relay) Caching-Only DNS Server Understand DNS resource records and configure a caching-only name server File Sharing with NFS Configure file sharing between hosts with NFS File Sharing with CIFS Configure file and print sharing between hosts with CIFS File Sharing with FTP Configure file sharing with anonymous FTP Troubleshooting Boot Process Understand the boot process and recover unbootable systems with rescue mode
Students who complete PV203 will be able to: Recognize demand and PV production curves Identify the common types of PV systems and their major components Describe DC and AC coupled systems Discuss load profiles and modes of operation, including: peak load shaving, time-of-use, zero-sell, self-consumption prioritization, demand-side management Introduce utility-scale storage and microgrids Explain the relationship between real power, apparent power, and reactive power Complete a load estimate for different system types and for seasonal loads; evaluate electrical requirements of loads Identify phantom loads and efficiency upgrades Estimate starting surge and power factor requirements Describe the differences when sizing battery-based systems compared to grid-direct systems Choose a peak sun hour value based on design criteria for various systems Review battery basics and terminology Describe and compare different battery chemistries and technologies Find the capacity and voltage of different batteries; determine state of charge List safety precautions and hazards to be aware of when working with batteries; list appropriate personal protective equipment (PPE) Identify appropriate battery enclosures Calculate values for current, voltage, and energy for different battery bank configurations Review battery bank design parameters Complete a lithium-ion battery bank design example Review and compare different design example costs List features, options, and metering available for different types of battery chargers Explain basics of lithium battery charging Compare generator types and duty cycle ratings, including fuel options Identify specifications critical for choosing appropriate battery-based inverters Discuss different overcurrent protection devices and equipment disconnects and when/where they are required Define the maximum voltage drop slowed for the proper functioning of a battery-based PV system Identify safe installation procedures List basic commissioning tests which should be completed before and after a system is operating
This driver CPC course Vehicle Roadworthiness & Load Safety is suitable for LGV drivers only and will cover: Requirements, Walk Around Checks, Legal Requirements, Additional Checks, Safety Equipment, Defect Reporting, Maintenance, Prohibitions, Considerations Before Loading, Overloading, Load Distribution, Load Security, Vehicle Dimensions, Loading Equipment.
Gain comprehensive knowledge and practical skills for safe and effective oxygen therapy with our "An Understanding of Oxygen Administration" course. Equip yourself with evidence-based best practices to assess, administer, and monitor oxygen therapy appropriately. Ideal for healthcare professionals.
This IMI qualification is designed for technicians who maintain and repair electric/hybrid vehicles. It contains the skills and knowledge required to work safely around the electric/hybrid vehicles high and low voltage electrical system and electric drive train systems, whilst carrying out repairs and maintenance. On completing this qualification, technicians will have gained knowledge of both low and high voltage technologies and an understanding of their dangers. The content of this qualification has been designed to give learners the knowledge and skills required to work safely around Electric/Hybrid vehicles whilst carrying out routine maintenance and repair activities (not high voltage components or systems)
Overview Governance is now acknowledged as a core business function. Governance is not simply about compliance - whether with the law, regulation or guidance. Compliance provides a company with its 'licence to operate, but high-quality systems of governance lead to better-run companies which create, grow and protect value for all their stakeholders Objective Learn the best strategies for building a high-quality governance framework Define the role of the board of directors and your role within Explore different governance models across the globe and identify which of them works best for your organisation Recognise and deliver your obligations as a director Learn the strategies for creating and protecting value for your organisation Explore the tools to protect your organisation's reputation and brand value Gain an understanding of governance as a business-critical function Manage governance function within different business contexts - listed, private, state-owned, family-owned businesses Master the strategies for improving board effectiveness
Master per unit analysis in electrical engineering with our comprehensive course. Learn single and three-phase system analysis techniques for real-world applications.
Gain an in-depth understanding of GDPR solutions and how they map to compliance requirements. Learn how to perform and lead Privacy Information Management System (PIMS) certification audits to ISO 19011 standards. Enhance your existing or learn with new skills in the field of Data Protection; Candidates deliver Assurance services to organisations by advising on conformance with PIMS requirements; Become a Technical expert on the preparation required for ISO 27701 Certification About This Course Learning outcomes Understand a Privacy Information Management System (PIMS) and its processes based on ISO/IEC 27701 Identify the relationship between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks Acquire the competences of the auditor's role in planning, leading, and following up on a management system audit in accordance with ISO 19011. Learn how to interpret the requirements of ISO/IEC 27701 in the context of a PIMS audit Course Overview Domain 1-The Process of Auditing Information Privacy Systems & Solutions Domain 2-Governance & Management of Information Privacy Technology Domain 3-Information Systems Acquisition, Development & Implementation Domain 4-Information Systems Operations, Maintenance & Service Management Domain 5-Protection of Personally Identifiable Information (PII) Assets Course Agenda Day 1: Introduction to Privacy Information Management System (PIMS) and ISO/IEC 27701 Day 2: Audit principles, preparation, and launching of an audit Day 3: On-site audit activities and Closing the Audit Accreditation This course is Accredited by NAS and Administered by the IECB Assessment All candidates at official training courses will be tested throughout the course delivery, with quizzes and exercises. The final exam is a 10 question essay type exam, offered on the afternoon of the final day. This exam should be completed within 180 minutes. A passing score is achieved at 70%. Self-study candidates can purchase an exam voucher from our Store. Prerequisites None, but candidates would benefit from having a fundamental understanding of Audit principles What's Included? Comprehensive course materials totalling some 450 pages Case Study Exam fees Exam pass guarantee Who Should Attend? Auditors seeking to perform and lead Privacy Information Management System (PIMS) certification audits Managers or consultants seeking to master a PIMS audit process Individuals responsible for maintaining conformance with PIMS requirements Technical experts seeking to prepare for a PIMS audit Expert advisors in the protection of Personally Identifiable Information (PII)