• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

21417 Courses

Level 3 Diploma in Cyber Security Management and Operations

4.0(2)

By London School Of Business And Research

This Level 3 Diploma in Cyber Security Management and Operations qualification (Accredited by Qualifi, UK) has been created to develop those learners who are looking to choose, or already have chosen, a career in a business-related sector. It is envisaged that this programme will encourage both academic and professional development so that your learners move forward to realise not just their own potential but also that of organisations across a broad range of sectors. The rationale of the programme is to provide a career path for learners who wish to develop their core capabilities within the cyber security sector. The outcome of the Level 3 Diploma in Cyber Security Management and Operations, which is a recognised UK qualification, is for learners to develop the skills required by organisations globally. This qualification is especially designed for organisational executives and leaders who are tasked with responsibility for cyber security, digital risk management, or the oversight thereof. The Level 3 Diploma in Cyber Security Management and Operations qualifications' primary focus is to prepare administrators and executives to manage and operate generic, nontechnical cyber security activities within a business, third sector or government organisation. This course is particularly suited for learners already in full-time work or those seeking to evolve their careers into cyber and information security fields. The qualification will identify and evaluate practical and lawful ways to safely and securely protect networks, information and assets from cyber-attacks and associated impacts. This Level 3 Diploma in Cyber Security Management and Operations qualification is about 'cyber security' as a holistic discipline. It examines both 'cyber' and 'security' domains which relate to IT security. It is therefore in most parts a non-technical qualification that looks at both cyber-technical and cyber-physical security threats, risks, responses and risk treatments. The Diploma is accredited at Level 3 with a total equivalence of 60 credits. It is envisaged that learners completing this Level 3 programme will progress to Level 4 Diplomas including the Level 4 Diploma in Cyber Security. Key Highlights of this Level 3 Diploma in Cyber Security Management and Operations qualification are: Program Duration: 9 Months (Fast track 6 months duration mode Available) Program Credits: 60 Designed for working Professionals Format: Online No Written Exam. The Assessment is done via Submission of Assignment Tutor Assist available Dedicated Student Success Manager Timely Doubt Resolution Regular Networking Events with Industry Professionals Become eligible to gain direct entry into relevant Undergraduate degree programme. Alumni Status No Cost EMI Option Requirements This Level 3 Diploma in Cyber Security Management and Operations (Accredited by Qualifi, UK) qualifications has been designed to be accessible without artificial barriers that restrict access and progression. Entry to the qualification will be through centre interview and learners will be expected to hold the following: Qualifications at Level 2 OR A Level 3 qualification in another discipline and want to develop their careers in Cyber Security or Information Technology. Career path Learners after completing of this course progress to: Diploma in Accounting and Business level -4 and level - 5 , or BEng (Hons) in Software Engineering, or BSc (Hons) in Business Computing and Information Systems, or BA (Hons) Business Management, or BA (Hons) Tourism and Hospitality Managements, or The First Year of Undergraduate study, or Directly into employment in an associated profession. Certificates Certificate of Achievement Hard copy certificate - Included Qualifi courses: Once you complete the course, you would be receiving a Physical hard copy of your Diploma along with its Transcript which we would Courier to your address via DHL or Royal Mail without any additional charge

Level 3 Diploma in Cyber Security Management and Operations
Delivered Online On Demand
£1,499

SC-400T00 Administering Information Protection and Compliance in Microsoft 365

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The information protection administrator translates an organization?s risk and compliance requirements into technical implementation. They are responsible for implementing and managing solutions for content classification, data loss prevention (DLP), information protection, data lifecycle management, records management, privacy, risk, and compliance. They also work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization's risk reduction and compliance goals. This role assists workload administrators, business application owners, human resources departments, and legal stakeholders to implement technology solutions that support the necessary policies and controls. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400). Prerequisites Foundational knowledge of Microsoft security and compliance technologies. Basic knowledge of information protection concepts. Understanding of cloud computing concepts. Understanding of Microsoft 365 products and services. 1 - Introduction to information protection and data lifecycle management in Microsoft Purview Know your data Protect your data Prevent data loss Govern your data 2 - Classify data for protection and governance Data classification overview Classify data using sensitive information types Classify data using trainable classifiers Review sensitive information and label usage Explore labeled and sensitive content Understand activities related to your data 3 - Create and manage sensitive information types Compare built-in versus custom sensitive information types Create and manage custom sensitive information types Describe custom sensitive information types with exact data match Implement document fingerprinting Create keyword dictionary 4 - Understand Microsoft 365 encryption Learn how Microsoft 365 data is encrypted at rest Understand service encryption in Microsoft Purview Explore customer key management using Customer Key Learn how data is encrypted in-transit 5 - Deploy Microsoft Purview Message Encryption Implement Microsoft Purview Message Encryption Implement Microsoft Purview Advanced Message Encryption Use Microsoft Purview Message Encryption templates in mail flow rules 6 - Protect information in Microsoft Purview Information protection overview Configure sensitivity labels Configure sensitivity label policies Configure auto-labeling policies Manage, monitor, and remediate information protection 7 - Apply and manage sensitivity labels Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites Plan on-premises labeling Configure on-premises labeling for the Unified Labeling Scanner Apply protections and restrictions to email and files Monitor label performance using label analytics 8 - Prevent data loss in Microsoft Purview Data loss prevention overview Identify content to protect Define policy settings for your DLP policy Test and create your DLP policy Prepare Endpoint DLP Manage DLP alerts in the Microsoft Purview compliance portal View data loss prevention reports Implement the Microsoft Purview Extension 9 - Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform Configure data loss prevention policies for Power Platform Integrate data loss prevention in Microsoft Defender for Cloud Apps Configure policies in Microsoft Defender for Cloud Apps Manage data loss prevention violations in Microsoft Defender for Cloud Apps 10 - Manage data loss prevention policies and reports in Microsoft 365 Configure data loss prevention for policy precedence Implement data loss prevention policies in test mode Explain data loss prevention reporting capabilities Manage permissions for data loss prevention reports Manage and respond to data loss prevention policy violations 11 - Manage the data lifecycle in Microsoft Purview Data Lifecycle Management overview Configure retention policies Configure retention labels Configure manual retention label policies Configure auto-apply retention label policies Import data for Data Lifecycle Management Manage, monitor, and remediate Data Lifecycle Management 12 - Manage data retention in Microsoft 365 workloads Explain retention in Exchange Online Explain retention in SharePoint Online and OneDrive Explain retention in Microsoft Yammer Activate archive mailboxes in Microsoft Exchange Apply mailbox holds in Microsoft Exchange Recover content in Microsoft Exchange 13 - Manage records in Microsoft Purview Records management overview Import a file plan Configure retention labels Configure event driven retention Manage, monitor, and remediate records 14 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 15 - Search for content in the Microsoft Purview compliance portal Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 16 - Manage Microsoft Purview eDiscovery (Standard) Explore Microsoft Purview eDiscovery solutions Implement Microsoft Purview eDiscovery (Standard) Create eDiscovery holds Search for content in a case Export content from a case Close, reopen, and delete a case 17 - Manage Microsoft Purview eDiscovery (Premium) Explore Microsoft Purview eDiscovery (Premium) Implement Microsoft Purview eDiscovery (Premium) Create and manage an eDiscovery (Premium) case Manage custodians and non-custodial data sources Analyze case content 18 - Manage Microsoft Purview Audit (Standard) Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Search the audit log Export, configure, and view audit log records Use audit log searching to investigate common support issues 19 - Prepare Microsoft Purview Communication Compliance Plan for communication compliance Identify and resolve communication compliance workflow Case study--Configure an offensive language policy Investigate and remediate communication compliance alerts 20 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 21 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 22 - Manage regulatory and privacy requirements with Microsoft Priva Create and manage risk management policies Investigate and remediate risk management alerts Create rights requests Manage data estimate and retrieval for rights requests Review data from rights requests Get reports from rights requests 23 - Implement privileged access management Case study--Implementing privileged access management 24 - Manage Customer Lockbox Manage Customer Lockbox requests

SC-400T00 Administering Information Protection and Compliance in Microsoft 365
Delivered OnlineFlexible Dates
£2,380

CompTIA Security+ Certification SY0-601: The Total Course

By Packt

This video course is designed to prepare you to achieve the internationally recognized fundamental IT training certification, CompTIA Security+ Certification SY0-601 exam. The course covers all the major domains needed for the certification and will help you develop the basics of IT and computers with the help of examples and quizzes.

CompTIA Security+ Certification SY0-601: The Total Course
Delivered Online On Demand19 hours 38 minutes
£59.99

Level 3 Diploma in Cyber Security Management and Operations (Fast Track)

4.0(2)

By London School Of Business And Research

This Level 3 Diploma in Cyber Security Management and Operations (Fast Track) qualification (Accredited by Qualifi, UK) has been created to develop those learners who are looking to choose, or already have chosen, a career in a business-related sector. It is envisaged that this programme will encourage both academic and professional development so that your learners move forward to realise not just their own potential but also that of organisations across a broad range of sectors. The rationale of the programme is to provide a career path for learners who wish to develop their core capabilities within the cyber security sector. The outcome of this fast track Level 3 Diploma in Cyber Security Management and Operations, which is a recognised UK qualification, is for learners to develop the skills required by organisations globally. This qualification is especially designed for organisational executives and leaders who are tasked with responsibility for cyber security, digital risk management, or the oversight thereof. The Level 3 Diploma in Cyber Security Management and Operations fast track qualifications' primary focus is to prepare administrators and executives to manage and operate generic, nontechnical cyber security activities within a business, third sector or government organisation. This course is particularly suited for learners already in full-time work or those seeking to evolve their careers into cyber and information security fields. The qualification will identify and evaluate practical and lawful ways to safely and securely protect networks, information and assets from cyber-attacks and associated impacts. This fast track Level 3 Diploma in Cyber Security Management and Operations qualification is about 'cyber security' as a holistic discipline. It examines both 'cyber' and 'security' domains which relate to IT security. It is therefore in most parts a non-technical qualification that looks at both cyber-technical and cyber-physical security threats, risks, responses and risk treatments. The Diploma is accredited at Level 3 with a total equivalence of 60 credits. It is envisaged that learners completing this Level 3 programme will progress to Level 4 Diplomas including the Level 4 Diploma in Cyber Security. Key Highlights of this Level 3 Diploma in Cyber Security Management and Operations (Fast Track) qualification are: Program Duration: Fast Track 6 months (Regular 9 months course also available) Program Credits: 60 Designed for working Professionals Format: Online No Written Exam. The Assessment is done via Submission of Assignment Tutor Assist available Dedicated Student Success Manager Timely Doubt Resolution Regular Networking Events with Industry Professionals Become eligible to gain direct entry into relevant Undergraduate degree programme. Alumni Status No Cost EMI Option Requirements Level 3 Diploma in Cyber Security Management and Operations (Fast Track) This Level 3 Diploma in Cyber Security Management and Operations (Fast Track) (Accredited by Qualifi, UK) qualifications has been designed to be accessible without artificial barriers that restrict access and progression. Entry to the qualification will be through centre interview and learners will be expected to hold the following: Qualifications at Level 2 OR A Level 3 qualification in another discipline and want to develop their careers in Cyber Security or Information Technology. Career path Learners after completing this Fast Track course progress to: Diploma in Accounting and Business level -4 and level - 5, BEng (Hons) in Software Engineering, BSc (Hons) in Business Computing and Information Systems, BA (Hons) Business Management, BA (Hons) Tourism and Hospitality Managements, The First Year of Undergraduate study, Directly into employment in an associated profession. Certificates Certificate of Achievement Hard copy certificate - Included Qualifi courses: Once you complete the course, you would be receiving a Physical hard copy of your Diploma along with its Transcript which we would Courier to your address via DHL or Royal Mail without any additional charge

Level 3 Diploma in Cyber Security Management and Operations (Fast Track)
Delivered Online On Demand
£1,599

Lean Six Sigma Yellow Belt Certification Program: Virtual In-House Training

By IIL Europe Ltd

Lean Six Sigma Yellow Belt Certification Program: Virtual In-House Training This course is designed to instill an in-depth understanding of Lean Six Sigma and a clear sense of what is required to define high-impact improvement projects, establish Lean Six Sigma measurements, and complete Lean Six Sigma projects using the systematic and proven Define, Measure, Analyze, Improve, and Control (DMAIC) methodology. This course is designed to instill an in-depth understanding of Lean Six Sigma and a clear sense of what is required to define high-impact improvement projects, establish Lean Six Sigma measurements, and complete Lean Six Sigma projects using the systematic and proven Define, Measure, Analyze, Improve, and Control (DMAIC) methodology. Participants will learn basic tools and techniques of Lean Six Sigma and those who pass a thirty-question exam (70% or above) will become a Certified Lean Six Sigma Yellow Belt. This course is delivered through four 3-hour online sessions. What you Will Learn You'll learn how to: Establish the structure that supports and sustains Lean Six Sigma Quality Identify and calculate key Lean Six Sigma Measurements (Sigma, DPMO, and Yield) Select successful, high-impact projects that match strategic objectives Document, measure, and improve key processes using the DMAIC (Define, Measure, Analyze, Improve, and Control) Methodology Utilize data-based thinking to make key business decisions Introduction to the Fundamentals and Vision of Lean Six Sigma Lean Six Sigma's focus on the customer, on quality, and on results The costs of poor quality Critical factors to consider when deploying Lean Six Sigma Lean Six Sigma as a process improvement methodology Lean Six Sigma metrics Why do it - ROI and payback for Lean Six Sigma Business Process Management Critical Lean Six Sigma roles and responsibilities Main aspects of managing the organizational change Project selection Metrics of Lean Six Sigma and the DMAIC Model How to strategically align business metrics and projects within an organization How to identify and measure quality characteristics which are critical to customers What does the customer (internal or external) really want from our products and services? Establishing appropriate teams and setting those teams up to be successful What defines a good measurement system? How are we doing (learning the secret to measuring the right things, right)? How to improve output measures by understanding and measuring the process Where are there defects (how to properly select and scope high-impact projects)? Where is the process broken (the Lean Six Sigma version of root cause analysis)? How to determine the process efficiency, or value add, of a process The appropriate use of quality tools Understanding the concept of variation and how to reduce knee-jerk reactions How to achieve breakthrough results for any key measure How can we ensure the identified improvements will be sustainable (the basics of process control)?

Lean Six Sigma Yellow Belt Certification Program: Virtual In-House Training
Delivered OnlineFlexible Dates
£850

CompTIA CySA+ Cybersecurity Analyst (CS0-002)

By Course Cloud

Course Overview Learn how to safeguard operating systems and protect personal data on any IT infrastructure with this training for CompTIA CySA+ Cybersecurity Analyst (CS0-002). Passing a CompTIA CySA+ exam will certify and validate your technical skills, allowing you to become an accomplished analyst who will excel in the IT industry. This course prepares you for the exam and also primes you for dealing with the world of hackers, cybersecurity, threat hunting, and digital forensics? This CompTIA CySA+ tutorial focuses on the competencies needed to apply behavioural analytics in order to prevent, detect and combat all manner of cybersecurity threats. You will be taught the importance of gathering threat intelligence, providing practical security solutions, and establishing a proactive wall of safety around any data structure. This is the complete learning package to complete your cybersecurity skillset and turn you into a senior analyst. Computer safety has never been more critical, so enrol now and learn how to protect others from the 'black hats' and Internet criminals. This best selling CompTIA CySA+ Cybersecurity Analyst (CS0-002) has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth CompTIA CySA+ Cybersecurity Analyst (CS0-002) is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The CompTIA CySA+ Cybersecurity Analyst (CS0-002) is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The CompTIA CySA+ Cybersecurity Analyst (CS0-002) is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the CompTIA CySA+ Cybersecurity Analyst (CS0-002), you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the CompTIA CySA+ Cybersecurity Analyst (CS0-002) will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the CompTIA CySA+ Cybersecurity Analyst (CS0-002) to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

CompTIA CySA+ Cybersecurity Analyst (CS0-002)
Delivered Online On Demand
£319

CompTIA IT Fundamentals ITF+ (FCO-U61)

By Course Cloud

Course Overview Learn about basic IT concepts and the principles of data security with this training for CompTIA IT Fundamentals ITF+ (FCO-U61). Passing a CompTIA ITF+ exam will improve your technical skills, allowing you to thoroughly understand the essential components of computers and mobile devices. Alongside preparing you for the CompTIA exam, this course will give in expert tuition in the basic skills needed to enter and excel in the IT employment sector with multidisciplinary awareness. This CompTIA ITF+ tutorial focuses on the knowledge needed to engage in the areas of setup, installation, configuration, connectivity, security, and troubleshooting. You will be taught the basics of hardware, software, data storage, databases, file management and much more. This is a complete learning package and an excellent introduction to the principles that every IT user should know. Whether you just want to enhance your existing computing knowledge or have aspirations to start a career in IT, this will be the perfect educational choice for you. This best selling CompTIA IT Fundamentals ITF+ (FCO-U61) has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth CompTIA IT Fundamentals ITF+ (FCO-U61) is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The CompTIA IT Fundamentals ITF+ (FCO-U61) is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The CompTIA IT Fundamentals ITF+ (FCO-U61) is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the CompTIA IT Fundamentals ITF+ (FCO-U61), you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the CompTIA IT Fundamentals ITF+ (FCO-U61) will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the CompTIA IT Fundamentals ITF+ (FCO-U61) to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

CompTIA IT Fundamentals ITF+ (FCO-U61)
Delivered Online On Demand
£319

VTCT Level 3 Award in Anatomical and Physiological Knowledge of Body Systems Online Course

By Cosmetic College

Designed to provide you with an in-depth understanding of the main systems of the body, this course covers a range of topics including skin, nails, and hair, the skeletal system, the muscular system, the nervous system, the endocrine system, the respiratory system, the cardiovascular system, the lymphatic system, and the digestive system. At a price of just £499, this online course is an affordable way to gain valuable knowledge and understanding of the human body, which is essential in many beauty and complementary therapy qualifications. Whether you have previous experience or not, this course is suitable for everyone. Our expert tutors will guide you through each module, providing you with the knowledge and skills you need to succeed. Upon completion of this course, you will not only have gained a solid understanding of the human body, but also have the opportunity to explore further career pathways in allied healthcare fields. Don't miss out on this fantastic opportunity to enhance your knowledge and take the first step towards your dream career. Sign up now and start your learning journey with us! Additional course details Course Features VTCT QualificationVetted accredited trainingFully Online TrainingTrain your way on any deviceFull DemonstrationComplete end to end treatment demonstrationQualificationSchedule online exam after completion

VTCT Level 3 Award in Anatomical and Physiological Knowledge of Body Systems Online Course
Delivered Online On Demand
£499

Theory of Constraints, Throughput Accounting and Lean Accounting Level 2

By Course Cloud

Lean Accounting and Throughput Accounting aim to align costs with the flow of work through a Value Stream or process. Throughput accounting is concerned with supporting management accounting, while Lean accounting focuses on improving the flow of work through a business process. The Theory of Constraints, Throughput Accounting and Lean Accounting Level 2 course is open to everyone, but is ideal for those who already have an understanding of the basic principles of accounting. It covers the basics of the Theory of Constraints in detail, as well as the core principles and tools of throughput and Lean accounting. If you are an accounting student, accountant, financial manager or business manager, then this certification is ideal for you. Gain advanced accounting skills and knowledge by enrolling in this practical training course today. This best selling Theory of Constraints, Throughput Accounting and Lean Accounting Level 2 has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Theory of Constraints, Throughput Accounting and Lean Accounting Level 2 is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Theory of Constraints, Throughput Accounting and Lean Accounting Level 2 is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Theory of Constraints, Throughput Accounting and Lean Accounting Level 2 is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Theory of Constraints, Throughput Accounting and Lean Accounting Level 2, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Theory of Constraints, Throughput Accounting and Lean Accounting Level 2 will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Theory of Constraints, Throughput Accounting and Lean Accounting Level 2 to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device. Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Theory of Constraints, Throughput Accounting and Lean Accounting Level 2
Delivered Online On Demand
£319

Remote Policy Evaluation Methods May 2025

By Institute for Fiscal Studies

The course covers research design principles and all main quantitative evaluation methods: randomised experiments, instrumental variables, sharp and fuzzy regression discontinuity designs, regression methods, matching methods and longitudinal methods (before-after, difference-in-differences and synthetic controls).

Remote Policy Evaluation Methods May 2025
Delivered Online
£450 to £1,662