• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

956 Courses

IT Security for IT Professionals

4.3(43)

By John Academy

Explore the world of cybersecurity with our "IT Security for IT Professionals" course. Gain expertise in fundamental areas such as network security, cryptography, web security, and emerging trends. Equip yourself with the skills needed to protect against evolving cyber threats. Enroll now for a comprehensive journey into IT security and fortify your role as a vigilant IT professional.

IT Security for IT Professionals
Delivered Online On Demand
£23.99

Risk Assessment Training - CPD Certified

4.7(26)

By Academy for Health and Fitness

24 Hours Left! Don't Let the Winter Deals Slip Away - Enrol Now! Risk Assessment and Management is important for any business to grow and succeed. Learn the importance of risk assessment and management in this course. Explore the hazards and risks to update the necessary control measures for your organisation. Know the fundamentals of accident reports and the appropriate risk management techniques. Make a disaster recovery plan that will help in your business Risk Assessment actions. If you are someone who wants to pursue a career in risk management, then this Risk Assessment course is very suitable for you. Learning Outcomes of Risk Assessment: After completing this risk assessment course, learners will be able to: Gain in-depth knowledge about risk assessment and its types Know more about the risk evaluation process Learn how to manage risk at the workplace Get to know what are the benefits of risk assessment Increase your financial and technological risk assessment skills So, join our comprehensive risk assessment course before the offer ends and complete it at your earliest convenience. Why Choose Our Risk Assessment Course? Opportunity to earn a certificate accredited by CPD. Get a free student ID card with this Risk Assessment Get instant access to this Risk Assessment course. Learn Risk Assessment from anywhere in the world Risk Assessment is affordable and simple to understand Risk Assessment is entirely online, interactive lesson with voiceover audio Lifetime access to the Risk Assessment course materials Risk Assessment comes with 24/7 tutor support *** Course Curriculum of the Risk Assessment Course *** Module 01: Risk and Types of Risk Overview of various risks, including financial, operational, strategic, and compliance risks, and their potential impacts on businesses. Module 02: The Risk Evaluation Process Introduction to the process of evaluating risks, including identification, assessment, and prioritisation of risks. Module 03: Risk Analysis & Assessment Covers techniques for analysing and assessing risks, focusing on qualitative and quantitative methods. Module 04: Risk Assessment and Common Risks Discussion on conducting risk assessments and identifying common risks faced by organisations. Module 05: Introduction to Risk Management Provides a foundation in risk management, including key concepts, principles, and the importance of managing risks effectively. Module 06: Risk Management Process Detailed overview of the risk management process, from risk identification to monitoring and review. Module 07: Benefits of Risk Management Highlights the advantages of effective risk management, such as improved decision-making, reduced losses, and enhanced business resilience. Module 08: Enterprise Risk Management Explores enterprise risk management (ERM) frameworks and their application in managing risks across an organisation. Module 09: Managing Financial Risks Focuses on identifying and managing financial risks, including market, credit, and liquidity risks. Module 10: Managing Technology Risks Discusses strategies for managing technology risks, including cybersecurity, data protection, and IT system failures. Assessment Start your learning journey straight away with this Risk Assessment course and take a step toward a brighter future! The Risk Assessment course is designed to provide participants with a comprehensive understanding of the principles, methodologies, and techniques involved in effectively assessing and managing risks. In today's dynamic business environment, organisations face a wide range of risks that can have a significant impact on their operations, finances, and reputation. This Risk Assessment course equips learners with the knowledge and skills needed to identify, analyse, evaluate, and mitigate risks across various domains. CPD 10 CPD hours / points Accredited by CPD Quality Standards Module 1: Risk and Types of Risk 11:15 1: Risk and Types of Risk Preview 11:15 Module 2: The Risk Evaluation Process 20:16 2: The Risk Evaluation Process 20:16 Module 3: Risk Analysis & Assessment 15:04 3: Risk Analysis & Assessment 15:04 Module 4: Risk Assessment and Common Risks 11:31 4: Risk Assessment and Common Risks 11:31 Module 5: Introduction to Risk Management 13:06 5: Introduction to Risk Management 13:06 Module 6: Risk Management Process 08:38 6: Risk Management Process 08:38 Module 7: Benefits of Risk Management 08:47 7: Benefits of Risk Management 08:47 Module 8: Enterprise Risk Management 15:39 8: Enterprise Risk Management 15:39 Module 9: Managing Financial Risks 20:22 9: Managing Financial Risks 20:22 Module 10: Managing Technology Risks 14:04 10: Managing Technology Risks 14:04 Order Your Certificate 02:00 11: Order Your CPD Certificate 01:00 12: Order Your QLS Endorsed Certificate 01:00 Who is this course for? Risk Assessment This risk assessment course is available to all. So, if you are interested in learning more about this topic, enrol and start your learning journey now. Requirements Risk Assessment You don't need any prior knowledge or qualifications to join this risk assessment course. Career path Risk Assessment After the completion of this risk assessment course. Certificates Certificate Accredited by CPD Digital certificate - Included Cademy certificate of completion Digital certificate - Included Will be downloadable when all lectures have been completed Certificate Accredited by CPD Hard copy certificate - £29 If you are an international student, then you have to pay an additional 10 GBP as an international delivery charge.

Risk Assessment Training - CPD Certified
Delivered Online On Demand2 hours 18 minutes
£12

Certified Wireless Security Professional (CWSP)

4.8(9)

By Skill Up

Wireless security is essential for any organization, but it can be complex to implement and manage. The CWSP course will give you the skills and knowledge to secure your wireless network from various threats.

Certified Wireless Security Professional (CWSP)
Delivered Online On Demand13 hours 32 minutes
£25

Complete Python Course - Beginner to Expert

5.0(1)

By Course Gate

Unlock your potential in Python programming with our Complete Python Course - Beginner to Expert! From mastering syntax to advanced data analysis, machine learning, and web development, this comprehensive course equips you with essential programming skills. Start your journey today and become a proficient Python developer!

Complete Python Course - Beginner to Expert
Delivered Online On Demand15 hours 25 minutes
£11.99

Cisco CCENT/CCNA Interconnecting Cisco Networking Devices Part 1

4.8(9)

By Skill Up

Become a networking expert with Cisco CCENT/CCNA Interconnecting Cisco Networking Devices Part 1 (ICND1) Training. Learn to build and manage networks of all sizes, from simple to complex.

Cisco CCENT/CCNA Interconnecting Cisco Networking Devices Part 1
Delivered Online On Demand18 hours 23 minutes
£25

Microsoft Office Skills (MS Excel, Word, PowerPoint, Access), Administration & IT Training

4.8(9)

By Skill Up

All-in-one Package| CPD Certified| 35 Courses Training| 350 CPD Points| Free PDF+ Transcript Certificate| Lifetime Access

Microsoft Office Skills (MS Excel, Word, PowerPoint, Access), Administration & IT Training
Delivered Online On Demand8 days
£120

Ethical Hacking - Capture the Flag Walkthroughs - v2

By Packt

This course is designed to introduce students to skills similar to what pentesters and hackers use in real-life situations. In addition, this course will provide a greater understanding of how vulnerabilities are discovered and exploited. This course will guide you on how to use pentesting tools in the real world.

Ethical Hacking - Capture the Flag Walkthroughs - v2
Delivered Online On Demand1 hour 43 minutes
£13.99

Certified Data Centre Facilities Operations Specialist (CDFOS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is anyone who works in and around IT, facilities or data centre operations and needs to understand and improve the daily operations including important processes such as lock-out/tag-out, the right process for installing/de-installing equipment, safety procedures, capacity management and much more. Overview The old believe that a fully redundant data centre facility will save the day is no longer true as many research outcomes have revealed that the majority of downtime is caused by the human factor. Policies, processes, procedures and work instructions should be carefully developed, ideally following relevant standards, to ensure an effcient and effective data centre operations which are also compliant to the required regulations. The CDFOS© (Certified Data Centre Facilities Operations Specialist) course is a three-day course which will enable participants to fully understand the requirements of running the day-to-day operations of a mission critical data centre. Participants will gain all the required competences for running the daily operations, understand which processes should be in place, and the critical elements of those processes and how to execute them. The course is fully aligned with the DCOS© (Data Centre Operations Standard). Data centre facilities operations management have proven to be the key differentiator between a data centre that is performing well or badly. Service Level Management Service Level Management Needs analysis Capability assessment Service portfolio and catalogue Service Level Agreements Reporting - Complaint procedure Customer satisfaction Service Improvement Process (SIP) Safety and Crisis Management Most common type of accidents and why they often happen The roles and responsibilities of appointed safety staff The importance of the OH&S or WHS manual Calibration of measurement and test equipment Proper lock-out/tag-out procedures Emergency response plan requirement for various potential emergencies The importance of Permit To Work Physical Security Standard Operating Procedures (SOP) for security Security risk assessment Security zones Physical inspections / security patrols Delivery of goods / holding area Entry control of individuals Badges and key management Security monitoring Security incident reporting Facilities Maintenance The importance of maintenance Maintenance definitions Maintenance operations procedures (MOP) Service reports Spare management Tools Housekeeping Data Centre Operations Shift handover Walk around duties Service management Release management Configuration management Floor management Equipment life cycle management Monitoring/Reporting/Control Monitoring requirements Facilities monitoring matrix Sensor / alarm point testing and calibration Notification matrix Escalation requirements Reporting Project Management Project management Project organization Project manager Initiation Planning Execution Monitor and control Closing Evaluation / lessons learnt Environmental Sustainability The importance of sustainability Environmental standards Power efficiency indicators Energy saving best practises Water management Sustainable energy usage Governance and Compliance The importance of document management The siz sub-processes of document management Asset management Requirements or asset recording Exam: Certified Data Centre Facilities Operations Specialist (CDFOS©) Certification exams are administered at the end of the course. The exam is a 90-minute closed book exam, with 60 multiple-choice questions. The candidate requires a minimum of 42 correct answers to pass the exam. Online exam results are known immediately and paper-based exam results will be known within one week. Additional course details: Nexus Humans Certified Data Centre Facilities Operations Specialist (CDFOS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Data Centre Facilities Operations Specialist (CDFOS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Data Centre Facilities Operations Specialist (CDFOS)
Delivered OnlineFlexible Dates
£2,050

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

Technology and innovation and its profound impact on financial operations

By FD Capital

Technology and innovation and its profound impact on financial operations Technology adoption indeed comes with risks, particularly around data security and privacy. As CFOs, we must ensure robust cybersecurity measures and adhere to strict data protection regulations. It requires ongoing investment in secure systems, staff training, and proactive monitoring to mitigate risks and protect sensitive financial information. Change management is also crucial. The adoption of new technologies requires proper planning, training, and cultural adjustments. As CFOs, we need to foster a culture that embraces innovation and continuous learning. Clear communication about the benefits and objectives of technology adoption is essential to gain buy-in and drive successful implementation. Fantastic insights! Now, let’s discuss the future. What emerging technologies do you foresee shaping the future of finance functions? One area that holds immense potential is blockchain technology. Its decentralised and transparent nature has the potential to streamline financial transactions, enhance auditability, and revolutionize supply chain finance. We’re closely monitoring blockchain’s development and exploring pilot projects to leverage its benefits. I agree, blockchain is a game-changer. Additionally, as the internet of things (IoT) expands, we anticipate new opportunities and challenges. CFOs will need to adapt to the influx of real-time data from interconnected devices, leveraging this information to optimize financial processes, enhance risk management, and improve operational efficiencies. Before we wrap up, any final thoughts or advice for our CFO audience? Embrace technology and view it as an opportunity rather than a threat. Invest in understanding the technological landscape and its implications for finance. Stay curious, adapt, and be open to change. Technology will continue to evolve, and as CFOs, we must evolve with it. Absolutely. Collaboration is key. Engage with IT teams, industry peers, and external experts to stay informed about the latest technological advancements. By fostering partnerships and sharing knowledge, we can collectively navigate the ever-changing technology landscape and drive innovation within our organisations. https://www.fdcapital.co.uk/podcast/technology-and-innovation-and-its-profound-impact-on-financial-operations/ Tags Online Events Things To Do Online Online Conferences Online Science & Tech Conferences #technology #innovation #financial #impact #operations

Technology and innovation and its profound impact on financial operations
Delivered OnlineFlexible Dates
FREE