• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2713 Courses

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Security engineers Security administrators Security architects Operations engineers Network engineers Network administrators Network or security technicians Network managers System designers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and administer the Cisco Email Security Appliance (ESA) Control sender and recipient domains Control spam with Talos SenderBase and anti-spam Use anti-virus and outbreak filters Use mail policies Use content filters Use message filters to enforce email policies Prevent data loss Perform LDAP queries Authenticate Simple Mail Transfer Protocol (SMTP) sessions Authenticate email Encrypt email Use system quarantines and delivery methods Perform centralized management using clusters Test and troubleshoot This course shows you how to deploy and use Cisco© Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA). Describing the Cisco Email Security Appliance Cisco Email Security Appliance Overview Technology Use Case Cisco Email Security Appliance Data Sheet SMTP Overview Email Pipeline Overview Installation Scenarios Initial Cisco Email Security Appliance Configuration Centralizing Services on a Cisco Administering the Cisco Email Security Appliance Distributing Administrative Tasks System Administration Managing and Monitoring Using the Command Line Interface (CLI) Other Tasks in the GUI Advanced Network Configuration Using Email Security Monitor Tracking Messages Logging Controlling Sender and Recipient Domains Public and Private Listeners Configuring the Gateway to Receive Email Host Access Table Overview Recipient Access Table Overview Configuring Routing and Delivery Features Controlling Spam with Talos SenderBase and Anti-Spam SenderBase Overview Anti-Spam Managing Graymail Protecting Against Malicious or Undesirable URLs File Reputation Filtering and File Analysis Bounce Verification Using Anti-Virus and Outbreak Filters Anti-Virus Scanning Overview Sophos Anti-Virus Filtering McAfee Anti-Virus Filtering Configuring the Appliance to Scan for Viruses Outbreak Filters How the Outbreak Filters Feature Works Managing Outbreak Filters Using Mail Policies Email Security Manager Overview Mail Policies Overview Handling Incoming and Outgoing Messages Differently Matching Users to a Mail Policy Message Splintering Configuring Mail Policies Using Content Filters Content Filters Overview Content Filter Conditions Content Filter Actions Filter Messages Based on Content Text Resources Overview Using and Testing the Content Dictionaries Filter Rules Understanding Text Resources Text Resource Management Using Text Resources Using Message Filters to Enforce Email Policies Message Filters Overview Components of a Message Filter Message Filter Processing Message Filter Rules Message Filter Actions Attachment Scanning Examples of Attachment Scanning Message Filters Using the CLI to Manage Message Filters Message Filter Examples Configuring Scan Behavior Preventing Data Loss Overview of the Data Loss Prevention (DLP) Scanning Process Setting Up Data Loss Prevention Policies for Data Loss Prevention Message Actions Updating the DLP Engine and Content Matching Classifiers Using LDAP Overview of LDAP Working with LDAP Using LDAP Queries Authenticating End-Users of the Spam Quarantine Configuring External LDAP Authentication for Users Testing Servers and Queries Using LDAP for Directory Harvest Attack Prevention Spam Quarantine Alias Consolidation Queries Validating Recipients Using an SMTP Server SMTP Session Authentication Configuring AsyncOS for SMTP Authentication Authenticating SMTP Sessions Using Client Certificates Checking the Validity of a Client Certificate Authenticating User Using LDAP Directory Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate Establishing a TLS Connection from the Appliance Updating a List of Revoked Certificates Email Authentication Email Authentication Overview Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing Verifying Incoming Messages Using DKIM Overview of Sender Policy Framework (SPF) and SIDF Veri?cation Domain-based Message Authentication Reporting and Conformance (DMARC) Verification Forged Email Detection Email Encryption Overview of Cisco Email Encryption Encrypting Messages Determining Which Messages to Encrypt Inserting Encryption Headers into Messages Encrypting Communication with Other Message Transfer Agents (MTAs) Working with Certificates Managing Lists of Certificate Authorities Enabling TLS on a Listener?s Host Access Table (HAT) Enabling TLS and Certi?cate Verification on Delivery Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services Using System Quarantines and Delivery Methods Describing Quarantines Spam Quarantine Setting Up the Centralized Spam Quarantine Using Safelists and Blocklists to Control Email Delivery Based on Sender Configuring Spam Management Features for End Users Managing Messages in the Spam Quarantine Policy, Virus, and Outbreak Quarantines Managing Policy, Virus, and Outbreak Quarantines Working with Messages in Policy, Virus, or Outbreak Quarantines Delivery Methods Centralized Management Using Clusters Overview of Centralized Management Using Clusters Cluster Organization Creating and Joining a Cluster Managing Clusters Cluster Communication Loading a Configuration in Clustered Appliances Best Practices Testing and Troubleshooting Debugging Mail Flow Using Test Messages: Trace Using the Listener to Test the Appliance Troubleshooting the Network Troubleshooting the Listener Troubleshooting Email Delivery Troubleshooting Performance Web Interface Appearance and Rendering Issues Responding to Alerts Troubleshooting Hardware Issues Working with Technical Support References Model Specifications for Large Enterprises Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch O?ces Cisco Email Security Appliance Model Specifications for Virtual Appliances

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)
Delivered OnlineFlexible Dates
Price on Enquiry

COBIT 2019 Foundation

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The COBIT 2019 Foundation course would suit candidates working in the following IT professions or areas: IT Auditors IT Managers IT Quality professionals IT Leadership IT Developers Process practitioners Managers in IT service providing firms The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs. Overview This COBIT 2019 Foundation course is designed as an introduction to COBIT 2019 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions and increased productivity. The syllabus areas that this course is designed to cover are: New framework introduction Key concepts and terminology Governance and Framework Principles Governance system and components Governance and management objectives Performance management Designing a tailored governance system COBIT 2019 builds on and integrates more than 25 years of development in this field, not only incorporating new insights from science, but also operationalizing these insights as practice. The heart of the COBIT framework updates COBIT principles while laying out the structure of the overall framework including: New concepts are introduced and terminology is explained?the COBIT Core Model and its 40 governance and management objectives provide the platform for establishing your governance program. The performance management system is updated and allows the flexibility to use maturity measurements as well as capability measurements. Introductions to design factors and focus areas offer additional practical guidance on flexible adoption of COBIT 2019, whether for specific projects or full implementation. From its foundation in the IT audit community, COBIT has developed into a broader and more comprehensive information and technology (I&T) governance and management framework and continues to establish itself as a generally accepted framework for I&T governance. 1 - COBIT 5 OVERVIEW AND INTRODUCTION Course Administration Course Objectives Exam Overview Certification Scheme History of COBIT COBIT 2019 Improvements Major differences with 2019 Misconceptions about COBIT COBIT and Other Standards 2 - KEY CONCEPTS AND TERMINOLOGY Introduction to Enterprise Governance of Information and Technology Benefits of Information and Technology Governance COBIT Information and Technology Governance Framework Distinction of Governance and Management Three Principles of a Governance Framework Six Principles for a Governance System 3 - GOVERNANCE SYSTEMS AND COMPONENTS Introduction to the Components of a Governance System Processes and Capability Levels Organizational Structures and Defined Roles Information Flows and Items People, Skills and Competencies Principles, Policies and Frameworks Culture, Ethics and Behavior Services, Infrastructure and Applications 4 - GOVERNANCE MANAGEMENT OBJECTIVES Governance and Management Objectives Publication Governance and Management Objectives Governance and Management Objectives Core Model Evaluate, Direct and Monitor Align, Plan and Organize Build, Acquire and Implement Deliver, Service and Support Monitor, Evaluate and Assess 5 - GOALS CASCADE Governance and Management Objective Relationships Governance and Management Objective Descriptions High-Level Information Example Introduction to the Goals Cascade Enterprise Goals Alignment Goals Mapping Tables ? Appendix A 6 - PERFORMANCE MANAGEMENT Introduction to Performance Management COBIT Performance Management Principles COBIT Performance Management (CPM) Overview Process Capability Levels Rating Process Activities Focus Area Maturity Levels Performance Management of Organizational Structures Performance Management of Information Items Performance Management of Culture and Behavior 7 - DESIGNING A TAILORED GOVERNANCE SYSTEM The Need for Tailoring Design Factors Enterprise Strategy Enterprise Goals Risk Profile I&T Related Issues Threat Landscape Compliance Requirements Role of IT Sourcing Model for IT IT Implementation Methods Technology Adoption Strategy Enterprise Size Focus Areas Designing a Tailored Governance System Management Objective Priority and Target Capability Levels Component Variations Specific Focus Areas Stages and Steps in the Design Process 8 - IMPLEMENTING ENTERPRISE GOVERNANCE OF IT The Business Case The COBIT Implementation Guide Purpose COBIT Implementation Approach Phase 1 ? What are the Drivers Phase 2 ? Where are we Now Phase 3 ? Where do we Want to be Phase 4 ? What Needs to be Done Phase 5 ? How do we get There Phase 6 ? Did we get There Phase 7 How do we Weep the Momentum Going? EGIT Implementation Program Challenges

COBIT 2019 Foundation
Delivered OnlineFlexible Dates
£1,330

Salesforce Integration With External Systems Part 1

By Packt

Accelerate your Salesforce integration expertise and master SOAP, REST, BULK API, and Streaming. Gain hands-on experience with Postman and SOAP UI and set up your environment with Visual Studio Code. Tailored for developers and Salesforce certification aspirants, this course will elevate your skills technically. Enroll now to advance your career!

Salesforce Integration With External Systems Part 1
Delivered Online On Demand10 hours 9 minutes
£44.99

Google Cloud Engineer Associate Certification Bootcamp

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Cloud Solutions Architects  DevOps Engineers  Individuals using Google Cloud Platform who deploy applications, monitor operations, and manage enterprise solutions Overview At course completion, you will have attained knowledge of: Fundamentals of Google Cloud Platform (GCP) Google Cloud Storage Google Compute Engine Google Cloud SQL Load Balancing (LB) Google Cloud Monitoring Auto-Scaling Virtual Private Cloud (VPC) Network Cloud Identity and Access Management (IAM) Cloud CDN and DNS Cloud VPN Google Cloud Deployment Manager Google Container Engine Cloud Run Cloud Bigtable Cloud Datastore Cloud BigQuery Cloud DataFlow Cloud DataProc Cloud Pub/Sub In this course you will attain a deep knowledge of Google Cloud Platform infrastructure and design patterns on developing applications on GCP. This course will prepare you for the Google Cloud Architect Associate Certification Exam. Fundamentals of Google Cloud Platform (GCP) Overview Regions and Zones Review of major GCP services Google Cloud Storage Fundamental APIs Consistency Cloud Storage Namespace Buckets and Objects Bucket and Object Naming Guidelines Encryption Object Versioning Object Lifecycle Management Access Control Access Control Lists Signed URL Multipart upload Resumable upload Understanding Pricing for Cloud Storage Offline Media Import/Export Architecture case study of common Use Cases of Google Cloud Storage Hands-on: Cloud Storage Lab; Creating Buckets, objects, and managing access control Google Compute Engine Compute Engine Architecture VM Instances types Persistence Disks Images Generating Custom Images IP Addresses Static IPs Ephemeral Access Control Options IAM Service Account Monitoring Instances with Google Cloud Monitoring Compute Engine Networks and Firewalls Hands-on: Hosting an Application on Compute Engine Google Cloud SQL Core advantages of Cloud SQL Cloud SQL database instance types Access Control High availability options Failover Read replica Backup options On Demand Automated Understanding Pricing of Cloud SQL Load Balancing (LB) Fundamentals of a Load Balancer Network Load balancing HTTPS Load balancing Cross region Load balancing Content Load balancing Target proxies SSL Load Balancing Internal Load Balancing Network Load Balancing Understanding Pricing for Load Balancer Google Cloud Monitoring Architecture of Cloud Monitoring Supported metrics Stackdriver Monitoring APIs Auto-Scaling Overview of Autoscaling Auto-scaling Fundamentals Instance groups Templates Policies Decisions Hands-on: Deploying a scale application on GCP using Autoscaling, Compute Engine, Cloud SQL, Load Balancers. Virtual Private Cloud (VPC) Network Salient features of Virtual Private Cloud (VPC) Network Infrastructure Virtual Private Cloud (VPC) Networking Fundamentals Subnetworks Firewall Internal DNS Network Routes Hands-on: Hosting Secure Applications in Google Cloud VPC Networks Cloud Identity and Access Management (IAM) Introduction User and Service Accounts IAM Roles Policy Hands-on: Managing Users, Policies and Granting Roles using Service Accounts Cloud CDN and DNS What is CDN Google Cloud CDN Cloud CDN Concepts Some of the Cloud CDN Edge locations Cloud DNS Cloud DNS Terminologies Supported Record Types Hands-on: Moving an Existing Domain Name to Cloud DNS Cloud VPN Cloud VPN overview Types of Cloud VPN Specifications Maintenance and Availability Google Cloud Deployment Manager Deployment Manager Deployment Manager Fundamentals Runtime Configurator Quotas Hands-on: Generating and Creating Cloud Deployment Manager Template Google Container Engine Google Container Engine Overview Docker Overview Kubernetes Terminologies Replication Controller Deployment Price and Quotas Hands-on: Deploying WordPress Cluster using Container Engine Cloud Run Overview of Cloud Run Deploy a Prebuilt Sample container Cloud Bigtable Overview of Cloud Bigtable Access Control Performance Locations Cloud Datastore Overview of Cloud Datastore Limits Storage Size Multitenancy Benefits of Multitenancy Encryption Locations Cloud BigQuery BigQuery Overview Interacting with BigQuery Datasets, Tables, and Views Partitioned Tables Query Plan Explanation Hands-on: Getting Started with BigQuery Cloud DataFlow Overview Programming Model DataFlow SDK 1.x for java Cloud Dataflow SDK 2.x Security and Permissions Advanced Access Control Cloud DataProc Overview Clusters Versioning Cloud Pub/Sub Overview of Cloud Pub/Sub Pub/Sub Concepts and Message Flow Data Model Cleanup of All Services Hands-on: Cloud Pub/Sub Lab with Background Cloud Function Additional course details: Nexus Humans Google Cloud Engineer Associate Certification Bootcamp training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Google Cloud Engineer Associate Certification Bootcamp course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Google Cloud Engineer Associate Certification Bootcamp
Delivered OnlineFlexible Dates
Price on Enquiry

Use Cases for Business Analysis

By IIL Europe Ltd

Use Cases for Business Analysis The use case is a method for documenting the interactions between the user of a system and the system itself. Use cases have been in the software development lexicon for over twenty years, ever since it was introduced by Ivar Jacobson in the late 1980s. They were originally intended as aids to software design in object-oriented approaches. However, the method is now used throughout the Solution Development Life Cycle from elicitation through to specifying test cases, and is even applied to software development that is not object oriented. This course identifies how business analysts can apply use cases to the processes of defining the problem domain through elicitation, analyzing the problem, defining the solution, and confirming the validity and usability of the solution. What you will Learn You'll learn how to: Apply the use case method to define the problem domain and discover the conditions that need improvement in a business process Employ use cases in the analysis of requirements and information to create a solution to the business problem Translate use cases into requirements Getting Started Introductions Course structure Course goals and objectives Foundation Concepts Overview of use case modeling What is a use case model? The 'how and why' of use cases When to perform use case modeling Where use cases fit into the solution life cycle Use cases in the problem domain Use cases in the solution domain Use case strengths and weaknesses Use case variations Use case driven development Use case lexicon Use cases Actors and roles Associations Goals Boundaries Use cases though the life cycle Use cases in the life cycle Managing requirements with use cases The life cycle is use case driven Elicitation with Use Cases Overview of the basic mechanics and vocabulary of use cases Apply methods of use case elicitation to define the problem domain, or 'as is' process Use case diagrams Why diagram? Partitioning the domain Use case diagramming guidelines How to employ use case diagrams in elicitation Guidelines for use case elicitation sessions Eliciting the problem domain Use case descriptions Use case generic description template Alternative templates Elements Pre and post conditions Main Success Scenario The conversation Alternate paths Exception paths Writing good use case descriptions Eliciting the detailed workflow with use case descriptions Additional information about use cases Analyzing Requirements with Use Cases Use case analysis on existing requirements Confirming and validating requirements with use cases Confirming and validating information with use cases Defining the actors and use cases in a set of requirements Creating the scenarios Essential (requirements) use case Use case level of detail Use Case Analysis Techniques Generalization and Specialization When to use generalization or specialization Generalization and specialization of actors Generalization and specialization of use cases Examples Associating generalizations Subtleties and guidelines Use Case Extensions The <> association The <> association Applying the extensions Incorporating extension points into use case descriptions Why use these extensions? Extensions or separate use cases Guidelines for extensions Applying use case extensions Patterns and anomalies o Redundant actors Linking hierarchies Granularity issues Non-user interface use cases Quality considerations Use case modeling errors to avoid Evaluating use case descriptions Use case quality checklist Relationship between Use Cases and Business Requirements Creating a Requirements Specification from Use Cases Flowing the conversation into requirements Mapping to functional specifications Adding non-functional requirements Relating use cases to other artifacts Wire diagrams and user interface specifications Tying use cases to test cases and scenarios Project plans and project schedules Relationship between Use Cases and Functional Specifications System use cases Reviewing business use cases Balancing use cases Use case realizations Expanding and explaining complexity Activity diagrams State Machine diagrams Sequence diagrams Activity Diagrams Applying what we know Extension points Use case chaining Identifying decision points Use Case Good Practices The documentation trail for use cases Use case re-use Use case checklist Summary What did we learn, and how can we implement this in our work environment?

Use Cases for Business Analysis
Delivered In-Person in LondonFlexible Dates
£1,495

Use Cases for Business Analysis: In-House Training

By IIL Europe Ltd

Use Cases for Business Analysis: In-House Training The use case is a method for documenting the interactions between the user of a system and the system itself. Use cases have been in the software development lexicon for over twenty years, ever since it was introduced by Ivar Jacobson in the late 1980s. They were originally intended as aids to software design in object-oriented approaches. However, the method is now used throughout the Solution Development Life Cycle from elicitation through to specifying test cases, and is even applied to software development that is not object oriented. This course identifies how business analysts can apply use cases to the processes of defining the problem domain through elicitation, analyzing the problem, defining the solution, and confirming the validity and usability of the solution. What you will Learn You'll learn how to: Apply the use case method to define the problem domain and discover the conditions that need improvement in a business process Employ use cases in the analysis of requirements and information to create a solution to the business problem Translate use cases into requirements Getting Started Introductions Course structure Course goals and objectives Foundation Concepts Overview of use case modeling What is a use case model? The 'how and why' of use cases When to perform use case modeling Where use cases fit into the solution life cycle Use cases in the problem domain Use cases in the solution domain Use case strengths and weaknesses Use case variations Use case driven development Use case lexicon Use cases Actors and roles Associations Goals Boundaries Use cases though the life cycle Use cases in the life cycle Managing requirements with use cases The life cycle is use case driven Elicitation with Use Cases Overview of the basic mechanics and vocabulary of use cases Apply methods of use case elicitation to define the problem domain, or 'as is' process Use case diagrams Why diagram? Partitioning the domain Use case diagramming guidelines How to employ use case diagrams in elicitation Guidelines for use case elicitation sessions Eliciting the problem domain Use case descriptions Use case generic description template Alternative templates Elements Pre and post conditions Main Success Scenario The conversation Alternate paths Exception paths Writing good use case descriptions Eliciting the detailed workflow with use case descriptions Additional information about use cases Analyzing Requirements with Use Cases Use case analysis on existing requirements Confirming and validating requirements with use cases Confirming and validating information with use cases Defining the actors and use cases in a set of requirements Creating the scenarios Essential (requirements) use case Use case level of detail Use Case Analysis Techniques Generalization and Specialization When to use generalization or specialization Generalization and specialization of actors Generalization and specialization of use cases Examples Associating generalizations Subtleties and guidelines Use Case Extensions The <> association The <> association Applying the extensions Incorporating extension points into use case descriptions Why use these extensions? Extensions or separate use cases Guidelines for extensions Applying use case extensions Patterns and anomalies o Redundant actors Linking hierarchies Granularity issues Non-user interface use cases Quality considerations Use case modeling errors to avoid Evaluating use case descriptions Use case quality checklist Relationship between Use Cases and Business Requirements Creating a Requirements Specification from Use Cases Flowing the conversation into requirements Mapping to functional specifications Adding non-functional requirements Relating use cases to other artifacts Wire diagrams and user interface specifications Tying use cases to test cases and scenarios Project plans and project schedules Relationship between Use Cases and Functional Specifications System use cases Reviewing business use cases Balancing use cases Use case realizations Expanding and explaining complexity Activity diagrams State Machine diagrams Sequence diagrams Activity Diagrams Applying what we know Extension points Use case chaining Identifying decision points Use Case Good Practices The documentation trail for use cases Use case re-use Use case checklist Summary What did we learn, and how can we implement this in our work environment?

Use Cases for Business Analysis: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,495

Certified Information Privacy Manager (CIPM)

By Training Centre

  Make a difference in your organization and in your career. The CIPM designation says that you're a leader in privacy program administration and that you've got the goods to establish, maintain and manage a privacy program across all stages of its lifecycle. The CIPM is the world's first and only certification in privacy program management. When you earn a CIPM, it shows that you don't just know privacy regulations-you know how to make it work for your organization. In other words, you're the go-to person for day-to-day operations when it comes to privacy. Developed in collaboration with the law firms, Bird and Bird, Field Fisher, Wilson/Sonsini and Covington and Burling, the CIPM encompasses pan-European and national data protection laws, key privacy terminology and practical concepts concerning the determination of control measures designed to protect personal data and trans-border data flows. About This Course   Delivered in a modular format, the course covers;   Module 1: Introduction to privacy program management Identifies privacy program management responsibilities, and describes the role of accountability in privacy program management. Module 2: Privacy governance Examines considerations for developing and implementing a privacy program, including the position of the privacy function within the organization, role of the DPO, program scope and charter, privacy strategy, support and ongoing involvement of key functions and privacy frameworks. Module 3: Applicable laws and regulations Discusses the regulatory environment, common elements across jurisdictions and strategies for aligning compliance with organizational strategy. Module 4: Data assessments Relates practical processes for creating and using data inventories/maps, gap analyses, privacy assessments, privacy impact assessments/data protection impact assessments and vendor assessments. Module 5: Policies Describes common types of privacy-related policies, outlines components and offers strategies for implementation. Module 6: Data subject rights Discusses operational considerations for communicating and ensuring data subject rights, including privacy notice, choice and consent, access and rectification, data portability, and erasure and the right to be forgotten. Module 7: Training and awareness Outlines strategies for developing and implementing privacy training and awareness programs. Module 8: Protecting personal information Examines a holistic approach to protecting personal information through privacy by design. Module 9: Data breach incident plans Provides guidance on planning for and responding to a data security incident or breach. Module 10: Measuring, monitoring and auditing program performance Relates common practices for monitoring, measuring, analyzing and auditing privacy program performance   The CIPM body of knowledge outlines all the concepts and topics that you need to know to become certified. The exam blueprint gives you an idea of how many questions from each topic area you can expect on the exam.  Prerequisites   There are no prerequisites for this course but attendees would benefit from a review of the materials on the IAPP site What's Included?   Breakfast, Lunch and refreshments (Classroom based courses only)  The Official Study Guide (Privacy Programme Management - Third Edition)*  Official Exam Q&A's*  Official Practice Exam Participant Guide* 1 years membership of the IAPP  The Exam Fees * In electronic format for Live Online and hard copy for Classroom delegates   Who Should Attend?   The CIPM is ideal for IT and information security leaders responsible for developing Data Protection frameworks and applying best practice, including those in the following positions: Data Analysts Cyber Security Analysts and Managers Aspiring Data Protection Officers IT Managers  Accreditation Our Guarantee   We are an approved IAPP Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.

Certified Information Privacy Manager (CIPM)
Delivered OnlineFlexible Dates
£1,395

Adobe InDesign CC Advanced

5.0(1)

By Course Gate

Learn how to create posters, newspapers design, magazines design, brochures, presentation, books, and ebooks through our Adobe InDesign CC Advanced course to pursue the best position in this role. The contents of the course instruct you to learn all these aforementioned aspects exponentially and easily. The course teaches you how to use InDesign scripts to create multiple designs using color, inserting images and videos, changing forms of letters and many more things. It also guides you on how to create image girds, large table based design, and illustration using theme and color mode. Furthermore, it teaches you different types of styles so that you can distinguish the pros and cons in order to teach you the easiest way of graphic design However, learning this course, you can start your career as a design master effectively. Who is this course for? Adobe InDesign CC Advanced is suitable for anyone who wants to gain extensive knowledge, potential experience and professional skills in the related field. This course is CPD accredited so you don't have to worry about the quality. Requirements Our Adobe InDesign CC Advanced is open to all from all academic backgrounds and there is no specific requirements to attend this course. It is compatible and accessible from any device including Windows, Mac, Android, iOS, Tablets etc. CPD Certificate from Course Gate  At the successful completion of the course, you can obtain your CPD certificate from us. You can order the PDF certificate for £9 and the hard copy for £15. Also, you can order both PDF and hardcopy certificates for £22. Career path This course opens a new door for you to enter the relevant job market and also gives you the opportunity to acquire extensive knowledge along with required skills to become successful. You will be able to add our qualification to your CV/resume which will help you to stand out in the competitive job industry. Course Curriculum Introduction Introduction 00:04:00 Advanced Document Setup Saving to Previous Versions 00:02:00 Saving Templates 00:03:00 Using Different Page Sizes 00:03:00 Sectioning for Page Numbering 00:07:00 Working with Text Flow Using Breaks 00:06:00 Working with Tabs 00:05:00 Creating Jump Lines 00:05:00 Auto-sizing Text Frames 00:00:00 Using Text on a Path 00:08:00 Working with Text Outlines 00:03:00 Advanced Text Options Replacing Fonts 00:04:00 Changing Text Formatting 00:04:00 Applying Character Formatting 00:00:00 Using Bullets and Numbering 00:04:00 Understanding Types of Spaces 00:05:00 Understanding Types of Dashes 00:06:00 Using Grep 00:04:00 Editing AutoCorrect 00:03:00 Beyond the Basics - Text Styles Loading Styles 00:03:00 Redefining Styles 00:03:00 Creating Group Styles 00:03:00 Using Nested Styles 00:05:00 Using Hyphenation and Justification 00:05:00 Understanding Keep Options 00:02:00 Breaking a Link to a Style 00:02:00 Advanced Place Options Using Place Text Options 00:06:00 Using Place Image Options 00:10:00 Placing Adobe Illustrator Files 00:03:00 Using Metadata Caption 00:06:00 Placing InCopy Documents 00:05:00 Using Anchored Objects 00:05:00 Illustration in InDesign Using the Pen Tool 00:08:00 Using the Direct Selection Tool 00:02:00 Understanding Pathfinder Panel Basics 00:07:00 Using Advanced Alignment 00:04:00 Organizing Swatches Using Color Groups 00:03:00 Loading Swatches 00:01:00 Loading the CC Libraries 00:05:00 Converting Tables Converting a Table to Text 00:02:00 Converting Text to a Table 00:02:00 Working with Headers and Footers 00:04:00 Embedding Cell Styles into Table Styles 00:05:00 Working with Long Documents Creating Books 00:04:00 Developing a Table of Contents and Bookmarks 00:09:00 Creating Interactive Elements Inserting QR Codes 00:05:00 Creating Bookmarks 00:04:00 Using Hyperlinks 00:05:00 Applying Page Transitions and Exporting to PDFs 00:05:00 Conclusion Course Recap 00:03:00 Certificate and Transcript Order Your Certificates or Transcripts 00:00:00

Adobe InDesign CC Advanced
Delivered Online On Demand3 hours 32 minutes
£11.99

Electrical Machines Online Course for Electrical Engineers - Bundle

By Study Plex

Highlights of the Course Course Type: Online Learning Duration: 1 to 2 hours Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about electrical machines Understand the core competencies and principles of electrical machines Explore the various areas of electrical machines Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert electrical engineer Electrical Machines Online Course for Electrical Engineers - Bundle Course Master the skills you need to propel your career forward in electrical machines. This course will equip you with the essential knowledge and skillset that will make you a confident electrical engineer and take your career to the next level. This comprehensive electrical machines course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this electrical machines course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This comprehensive course will teach you the theory of effective electrical machines practice and equip you with the essential skills, confidence and competence to assist you in the electrical machines industry. You'll gain a solid understanding of the core competencies required to drive a successful career in electrical machines. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for electrical engineer or for people who are aspiring to specialise in electrical machines. Enrol in this electrical machines course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive electrical machines course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this electrical machines can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This electrical machines course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This electrical machines course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This electrical machines course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. Course Curriculum Course Content Introduction to Electric Machines 00:03:00 Types of Electric Machines and Principle of Electricity Generation 00:09:00 DC Machines Importance and Construction of DC Machines 00:26:00 Armature Winding and EMF Equation 00:39:00 Solved Example 1 00:04:00 Solved Example 2 00:03:00 Solved Example 3 00:07:00 Solved Example 4 00:06:00 Separately Excited DC Machine 00:20:00 Shunt and Series DC Machines 00:25:00 Solved Example 1 on Separately Excited DC Machine 00:07:00 Solved Example 2 on Separately Excited DC Machine 00:07:00 Solved Example 3 on Shunt Generator 00:04:00 Solved Example 4 on Shunt Generator 00:06:00 Solved Example 5 on Series DC Generator 00:06:00 Types and Applications of Compound DC Motors 00:07:00 Torque-Speed Characteristics and Speed Control of Separately Excited DC Motor 00:33:00 Torque-Speed Characteristics of Series DC Motor 00:08:00 Solved Example 1 on Speed Control 00:08:00 Solved Example 2 on Speed Control 00:05:00 Starting of DC Machine 00:13:00 Armature Reaction in DC Machines 00:10:00 Losses in DC Machines 00:03:00 Construction of Transformer What is The Construction of Transformer, Importance and Iron Core 00:02:00 Magnetic Circuit Inside Transformer 00:04:00 Windings of Transformer 00:03:00 Why are Windings Made of Copper 00:01:00 Classification of Windings 00:04:00 Insulating Material and Transformer Oil 00:02:00 Conservator of Transformer 00:02:00 Breather of Transformer 00:03:00 Bushings of Transformer 00:04:00 Tap Changer of Transformer 00:03:00 Cooling Tubes of Transformer 00:01:00 Buchholz Relay of Transformer 00:02:00 Explosion Vent In Transformer 00:02:00 Methods of Cooling In Transformer 00:02:00 Types of Transformers 00:02:00 Power Transformer and Distribution Transformer 00:05:00 Single Phase Core Type Transformer 00:04:00 Single Phase Shell Type Transformer 00:04:00 Three Phase Core Type Transformer 00:01:00 Three Phase Shell Type Transformer 00:01:00 Comparison between Shell and Core CSA 00:01:00 Comparison between Shell and Core Type 00:01:00 Notes 00:03:00 Video Explaining The Components in 3D and Real Life 00:04:00 Fundamentals of Magnetic Circuits for Electrical Engineering Introduction to Magnetic Circuits 00:02:00 Induced Emf and Current 00:04:00 Ampere Right Hand Rule 00:04:00 Magnetic Circuit and Important Definitions 00:06:00 Linear and Non Linear Materials 00:02:00 Flux Linkage and Reluctance 00:03:00 Analogy between Electric and Magnetic Circuits 00:05:00 Fringing Effect 00:01:00 Example 1 Magnetic Circuits 00:06:00 Example 2 00:02:00 Example 3 00:05:00 Application on Magnetic Circuit - Transformers 00:03:00 Theoretical Part on Transformers Introduction to Transformers 00:02:00 Construction of Transformer 00:01:00 Theory of Operation 00:04:00 Ideal Transformer 00:04:00 Non Ideal Transformer 00:02:00 Effect of Loading on Transformer 00:03:00 Transformer Regulation 00:02:00 Transformer Losses 00:03:00 Transformer Efficiency 00:04:00 Transformer Rating 00:01:00 Question 1 00:01:00 Question 2 00:01:00 Question 3 00:01:00 Example 1 00:01:00 Voltage Relation of Transformer 00:04:00 Transformer Exact Equivalent Circuit 00:06:00 Concept of Refereeing 00:04:00 Approximate Equivalent Circuit 00:02:00 Synchronous Machines Construction and Principle of Operation of Synchronous Generator 00:29:00 Principle of Operation of Synchronous Motor 00:24:00 Equivalent Circuit and Phasor Diagram of Non Salient Synchronous Machine 00:29:00 Solved Example 1 on Non Salient Machine 00:04:00 Solved Example 2 on Non Salient Machine 00:10:00 Solved Example 3 on Non Salient Machine 00:07:00 Solved Example 4 on Non Salient Machine 00:04:00 Solved Example 5 on Non Salient Machine 00:07:00 Solved Example 6 on Non Salient Machine 00:03:00 Equivalent Circuit and Phasor Diagram of Salient Synchronous Machine 00:38:00 Solved Example 1 on Salient Machine 00:09:00 Solved Example 2 on Salient Machine 00:05:00 Solved Example 3 on Salient Machine 00:09:00 Parallel Operation of Two Generators 00:17:00 Synchronization of Machine with Grid 00:10:00 Induction Machines Construction and Theory of Operation of Induction Machines 00:27:00 Equivalent Circuit and Power Flow in Induction Motor 00:23:00 Torque-Speed Characteristics of Induction Motor 00:19:00 Solved Example 1 on Induction Motor 00:07:00 Solved Example 2 on Induction Motor 00:06:00 Solved Example 3 on Induction Motor 00:06:00 Solved Example 4 on Induction Motor 00:18:00 Solved Example 5 on Induction Motor 00:13:00 Methods of Speed Control of Induction Motor 00:27:00 Methods of Starting of Induction Motor 00:21:00 Solved Example on Motor Starter 00:14:00 Principle of Operation of Doubly Fed Induction Generator 00:11:00 Self Excited Induction Generator 00:08:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Electrical Machines Online Course for Electrical Engineers - Bundle
Delivered Online On Demand
£19

Facebook Marketing and Building Messenger Chatbots

4.3(43)

By John Academy

Course Overview Direct messenger communication is more effective than Facebook posts. The faster you can answer the questions of your customers, the better response you'll get. And messenger chatbot makes you available for your customers 24/7. Learn how you can use messenger communication effectively and create your own chatbot from this Facebook Marketing and Building Messenger Chatbots course and boost your Facebook marketing skill today. In this Facebook Marketing and Building Messenger Chatbots course, you will learn how you can create a Facebook Messenger chatbot and turn your messenger inbox into a marketing platform. This course will teach you how you can create your chatbot with personalized text message conversation. You will also understand the settings of able to get an automatic notification for any emergency queries. This will also help you with messenger promotions, ad campaigns and increase sales through the chat platform. Learning Outcomes Understand how Facebook marketing works Be able to create an effective messenger chatbot Learn the functions of messenger chatbot Connect chatbot with webinars, Google sheets and other files Be able to create a highly successful or messenger ad campaign Learn how to set up SMS notifications from Facebook Messenger Develop chatbot drip campaign and attract new customers through Messenger Who is this course for? This course is for anyone who wants to learn about Facebook marketing and promote their business through Facebook. You will learn to build a messenger chatbot and be able to communicate with your customers more effectively. Entry Requirement This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Certification After you have successfully completed the course, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry-leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path Facebook Marketing and Building Messenger Chatbots is a useful qualification to possess and would be beneficial for any related profession or industry such as: Social Media Marketers Digital Marketers Social Media Influencers Small Business Owners Marketing Professionals Module 01: Introduction to Facebook Messenger Marketing Course Slides 01:40:00 MobileMonkey Support 00:05:00 Welcome to Facebook Messenger Chatbot Masterclass 00:08:00 What is messenger marketing? 00:10:00 Advantages of using Facebook messenger marketing 00:15:00 How is chatbot marketing different than other marketing channels? 00:07:00 Who can use messenger bots to their advantage? 00:05:00 Module 02: Example Use Cases For Facebook Messenger Chatbots Ecommerce chatbot strategies 00:10:00 Webinar/event registrations using chatbots 00:04:00 Lea-gen chatbot strategies 00:09:00 Using chatbots to promote educational resources 00:10:00 Using chatbots to stay in touch with your customers 00:08:00 Calculating LTV and CAC to formulate incentive plans 00:11:00 Ideas for incentive structures to promote through Facebook chatbots 00:09:00 Module 03: Psychological Principles of Persuasion in Effective Bot Design Commitment and Consistency in chatbot design 00:15:00 Increasing customer value with reciprocity 00:14:00 Using social proof to build trust and identity 00:12:00 Likability - your secret weapon to successful bot marketing 00:11:00 Using scarcity to drive your customers to convert faster 00:09:00 Understanding the Fogg Behavior Model and how to use it to your advantage 00:16:00 Module 04: Building Killer Chatbots With MobileMonkey What is MobileMonkey? 00:05:00 Creating a MobileMonkey account and connecting your Facebook page 00:06:00 Viewing active bots and adding users 00:03:00 Create your first chatbot! 00:03:00 Module 05: Learning All About The MobileMonkey Chatbot Builder Widgets, Page Flow and Organisation 00:08:00 Effective Ways of Media relation & Public Relation 01:00:00 Adding Q&A items in MobileMonkey 00:06:00 Understanding unanswered questions 00:04:00 Configuring and editing bot builder settings 00:04:00 All about the text widget 00:07:00 All about the image widget 00:01:00 All about the form widget 00:10:00 All about the quick question widget 00:07:00 All about the gif widget 00:03:00 All about the attachment widget 00:02:00 All about the attribute widget 00:02:00 All about the connection widget 00:03:00 All about the email widget 00:03:00 All about the gallery widget 00:06:00 All about the list widget 00:03:00 All about the navigate widget 00:03:00 All about the typing widget 00:03:00 All about the video widget 00:03:00 Module 06: How to wield the Mobile Monkey Chat Blaster like a Jedi Master What's a chat blast anyway? 00:03:00 A few useful chat blaster use cases 00:06:00 Chat blasting vs. drip campaigns 00:06:00 Planning four chat blast ideas (Part 1) 00:10:00 Planning four chat blast ideas (Part 2) 00:12:00 Organising our chat blast pages in the Mobile Monkey page builder 00:05:00 Building our coupon chat blast 00:11:00 Testing our chat blast before blasting 00:05:00 Launching our first chat blast: Naming, audience, page and purpose 00:09:00 Building a chat blast to drive phone calls 00:14:00 Building our new product line chat blast 00:16:00 Building our competitive advantage/awareness chat blast 00:19:00 Analysing chat blast results 00:02:00 Module 07: Understanding Lead Magnets and Using Lead Magnets To Build Your Contact List Why are lead magnets important? 00:05:00 Installing your chat widget on a WordPress site 00:06:00 Installing your chat widget on a Shopify site 00:01:00 Installing your chat widget through Google Tag Manager 00:05:00 Link to the messenger and adding it to emails and blogs 00:10:00 Adding the checkbox plugin to your web forms 00:03:00 How to use Facebook Comment Guards 00:17:00 Creating Facebook messenger landing pages 00:13:00 Module 08: Facebook Messenger Ad Campaigns Using Your MobileMonkey Chatbots! What are Facebook Messenger Ads? 00:06:00 Messenger ads best practices and sample strategies 00:12:00 Creating a new messenger ad campaign on Facebook 00:09:00 Designing a messenger ad 00:14:00 Completing messenger campaign creation in Facebook ads manager 00:07:00 Drafting our mobile monkey messaging campaign blueprint 00:07:00 Creating and naming all our pages in MobileMonkey 00:04:00 Building our messenger landing page in Mobile Monkey 00:04:00 Finishing all the other Facebook messenger bot pages 00:14:00 Duplicating your ad groups to try different targeting settings 00:08:00 Setting up MobileMonkey Q&A and other loose ends 00:07:00 Module 09: Understanding Audiences in MobileMonkey and Using Them to Your Advantage What are audiences in MobileMonkey 00:08:00 Creating an all contacts and gender-based audience 00:04:00 Timezone and last active based audiences in mobile monkey 00:07:00 Creating an audience based on a custom variable 00:07:00 Module 10: Building Our First MobileMonkey Drip Campaign! What are the drip campaigns and drip campaign best practices? 00:07:00 Practical and useful drip campaign ideas 00:07:00 Building and reviewing our drip pages in MobileMonkey 00:08:00 Creating and launching our first MobileMonkey drip campaign 00:09:00 Module 11: Using the RSS Blaster in MobileMonkey RSS feed step by step and best practices 00:10:00 Module 12: Becoming a MobileMonkey Power User With Advanced Integrations and Connections SECTION 13 Becoming a Mobile Monkey power user with connections Chapter 01 What are connections and when would you use them_1 00:03:00 Creating a connection to Google Sheets 00:14:00 Creating a connection to GoToWebinar 00:10:00 Send new leads to your CRM (Hubspot) 00:08:00 Send an SMS to your sales team when a contact requests a callback 00:10:00 Module 13: Understanding Your MobileMonkey Audience Insights Contacts - searching, exporting and deleting 00:03:00 Audiences in MobileMonkey 00:02:00 Forms - what they are and how to use them 00:02:00 Bot analytics - how to find useful information using Mobile Monkey analytics 00:03:00 Module 14: Staying on Facebook's Good Side: Chatbot Compliance What you need to know about staying compliant with Facebook 00:04:00 Getting approved for subscription messaging 00:09:00 Module 15: Conclusion ... Goodbye for now but stay in touch! Thank you, getting help, final thoughts 00:05:00

Facebook Marketing and Building Messenger Chatbots
Delivered Online On Demand14 hours 13 minutes
£18