• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

57911 Courses

Certified Data Centre Risk Professional (CDRP)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for There is no specific prerequisite for the CDRP© course. However, participants who have at least three years' experience in a data centre and/or IT infrastructures will be best suited. Overview After completion of the course, the participant will be able to: 1. Understand the different standards and methodologies for risk management and assessment 2. Establish the required project team for risk management 3. Perform the risk assessment, identifying current threats, vulnerabilities and the potential impact based on customised threat catalogues 4. Report on the current risk level of the data centre both quantitative and qualitative 5. Anticipate and minimise potential financial impacts 6. Understand the options for handling risk 7. Continuously monitor and review the status of risk present in the data centre 8. Reduce the frequency and magnitude of incidents 9. Detect and respond to events when they occur 10. Meet regulatory and compliance requirements 11. Support certification processes such as ISO/IEC 27001 12. Support overall corporate and IT governance Introduction to Risk Management Risk management concepts Senior management and risk Enterprise Risk Management (ERM) Benefits of risk management Data Centre Risk and Impact Risk in facility, power, cooling, fire suppression, infrastructure and IT services Impact of data centre downtime Main causes of downtime Cost factors in downtime Standards, Guidelines and Methodologies ISO/IEC 27001:2013, ISO/IEC 27005:2011, ISO/IEC 27002:2013 NIST SP 800-30 ISO/IEC 31000:2009 SS507:2008 ANSI/TIA-942 Other methodologies (CRAMM, EBIOS, OCTAVE, etc.) Risk Management Definitions Asset Availability/Confidentiality/Integrity Control Information processing facility Information security Policy Risk Risk analysis/Risk assessment/Risk evaluation/ Risk treatment Threat/Vulnerability Types of risk Risk Assessment Software The need for software Automation Considerations Risk Management Process The risk management process Establishing the context Identification Analysis Evaluation Treatment Communication and consultation Monitoring and review Project Approach Project management principles Project management methods Scope Time Cost Cost estimate methods Context Establishment General considerations Risk evaluation, impact and acceptance criteria Severity rating of impact Occurrence rating of probability Scope and boundaries Scope constraints Roles & responsibilities Training, awareness and competence Risk Assessment - Identification The risk assessment process Identification of assets Identification of threats Identification of existing controls Identification of vulnerabilities Identification of consequences Hands-on exercise: Identification of assets, threats, existing controls, vulnerabilities and consequences Risk Assessment - Analysis and Evaluation Risk estimation Risk estimation methodologies Assessment of consequences Assessment of incident likelihood Level of risk estimation Risk evaluation Hands-on exercise: Assessment of consequences, probability and estimating level of risk Risk Treatment The risk treatment process steps Risk Treatment Plan (RTP) Risk modification Risk retention Risk avoidance Risk sharing Constraints in risk modification Control categories Control examples Cost-benefit analysis Control implementation Residual risk Communication Effective communication of risk management activities Benefits and concerns of communication Risk Monitoring and Review Ongoing monitoring and review Criteria for review Risk scenarios Risk assessment approach Data centre site selection Data centre facility Cloud computing UPS scenarios Force majeure Organisational shortcomings Human failure Technical failure Deliberate acts Exam: Certified Data Centre Risk Professional Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Certified Data Centre Risk Professional (CDRP)
Delivered OnlineFlexible Dates
Price on Enquiry

55039 Windows PowerShell Scripting and Toolmaking

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for administrators in a Microsoft-centric environment who want to build reusable units of automation, automate business processes, and enable less-technical colleagues to accomplish administrative tasks. Overview Describe the correct patterns for building modularized tools in Windows PowerShell Build highly modularized functions that comply with native PowerShell patterns Build controller scripts that expose user interfaces and automate business processes Manage data in a variety of formats Write automated tests for tools Debug tools This course covers advanced Windows PowerShell topics, with an emphasis on building reusable tools. Students are introduced to workflow, engage in best practices, and learn a variety of script development and toolmaking techniques. Tool Design Tools do one thing Tools are flexible Tools look native Start with a Command Why start with a command? Discovery and experimentation Build a Basic Function and Module Start with a basic function Create a script module Check prerequisites Run the new command Adding CmdletBinding and Parameterizing About CmdletBinding and common parameters Accepting pipeline input Mandatory-ness Parameter validation Parmeter aliases Emitting Objects as Output Assembling information Constructing and emitting output Quick tests An Interlude: Changing Your Approach Examining a script Critiquing a script Revising the script Using Verbose, Warning, and Informational Output Knowing the six channels Adding verbose and warning output Doing more with verbose output Informational output Comment-Based Help Where to put your help Getting started Going further with comment-based help Broken help Handling Errors Understanding errors and exceptions Bad handling Two reasons for exception handling Handling exceptions in our tool Capturing the actual exception Handling exceptions for non-commands Going further with exception handling Deprecated exception handling Basic Debugging Two kinds of bugs The ultimate goal of debugging Developing assumptions Write-Debug Set-PSBreakpoint The PowerShell ISE Going Deeper with Parameters Parameter positions Validation Multiple parameter sets Value from remaining arguments Help messages Aliases More CmdletBinding Writing Full Help External help Using PlatyPs Supporting online help ?About? topics Making your help updatable Unit Testing Your Code Sketching out the test Making something to test Expanding the test Going further with Pester Extending Output Types Understanding types The Extensible Type System Extending an object Using Update-TypeData Analyzing Your Script Performing a basic analysis Analyzing the analysis Publishing Your Tools Begin with a manifest Publishing to PowerShell Gallery Publishing to private repositories Basic Controllers: Automation Scripts and Menus Building a menu Using UIChoice Writing a process controller Proxy Functions A proxy example Creating the proxy base Modifying the proxy Adding or removing parameters Working with XML Data Simple: CliXML Importing native XML ConvertTo-XML Creating native XML from scratch Working with JSON Data Converting to JSON Converting from JSON Working with SQL Server Data SQL Server terminology and facts Connecting to the server and database Writing a query Running a query Invoke-SqlCmd Thinking about tool design patterns Design tools that use SQL Server for data storage Final Exam Lab problem Break down the problem Do the design Test the commands Code the tool

55039 Windows PowerShell Scripting and Toolmaking
Delivered OnlineFlexible Dates
Price on Enquiry

Transgender Awareness & Understanding

By National Gender Training Ltd

To give you a good understanding of the long medical journeys a trans person undergoes, together with an understanding of the reference terms in common use, including language and terminology, cis-gender, non-binary, intersex, the pathways from M to F and F to M with the key stages in each pathway, the lived experiences of the facilitators plus a short life story video, LGBT facts, gender clinics, how to support a trans child, equality in the workplace, the laws surrounding gender and equality and how they affect you, and so much more…… Who is this course for? Everyone is the simple answer. Everyone and particularly those in a public-facing role, be that the police or other emergency services, to business managers, ship captains and shop floor workers. What will it cost? Both face to face and Teams presentations are charged at the same rates, which are very competitive. Face to face would incur travel and accommodation etc, as applicable How large are the groups? We will only normally accept a maximum of 20 people in each presentation, as this allows everyone the opportunity for questions, and allows us to keep to the 4 hour duration. We can, however, work with larger groups by negotiation, typically up to a total of 50 people. How will I benefit from this course? You will learn about the full pathways to allow you to be more understanding, and you will understand how to address a trans person without causing offence Do we get handouts? All participants receive a comprehensive workbook either in person or electronically. What is the course content? Language & terminology, intersex, non-binary, use of pronouns, pathways from male to female & female to male, key stages in each pathway, supporting trans children, facts and figures, personal life stories of the facilitators together with a video presentation, equality in the workplace, important legislation and how it affects you and more How are the courses delivered? This presentation is delivered as a face to face session for businesses and organisations around the UK. Alternatively it can be delivered using Teams. There is a lot of hatred towards the trans community, will I get harangued? Yes, there is hatred but by educating people on this subject we aim to achieve a more inclusive society, not just in the UK, but around the world also. I want to book a complete session for my staff, is there a group discount available? Yes, for any large group booking we are negotiable. Is this course recognised? Yes, it is a fully accredited CPD course for which you will receive a certificate upon completion Upcoming public/open courses These are arranged according to demand.

Transgender Awareness & Understanding
Delivered In-PersonFlexible Dates
FREE

Non-Domestic Energy Assessor Level 3 & 4 Combined 05 Days Online Live Course

By EPC Training Courses

This course prepares you to qualify as both a Level 3 and Level 4 Commercial Energy Assessor. Achieving Level 4 certification expands your opportunities, allowing you to assess all types of commercial buildings, including hotels, warehouses, and offices, for Energy Performance Certificates (EPCs).

Non-Domestic Energy Assessor Level 3 & 4 Combined 05 Days Online Live Course
Delivered Online On Demand5 days
FREE

Internal Workplace Mediation Skills Course (5 days)

By Buon Consultancy

Workplace Mediation

Internal Workplace Mediation Skills Course (5 days)
Delivered in Edinburgh or UK Wide or OnlineFlexible Dates
Price on Enquiry

This comprehensive course, developed in line with the esteemed guidelines of the Resuscitation Council (UK), Skills for Health, and the Faculty of Pre-Hospital Care (RCS Ed), is designed to enhance your abilities in delivering superior emergency care across various settings.

FREC 4
Delivered In-Person in Bury St Edmunds + 1 more or UK WideFlexible Dates
Price on Enquiry

Cisco Securing the Web with Cisco Web Security Applicance v3.0 (SWSA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting This course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.This course helps you prepare to take the exam, Securing the Web with Cisco Web Security Appliance (300-725 SWSA). Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface

Cisco Securing the Web with Cisco Web Security Applicance v3.0 (SWSA)
Delivered OnlineFlexible Dates
Price on Enquiry

Risk Assessing in the Care Sector

By Prima Cura Training

This course is designed to enable learners to increase their understanding of risk assessment and risk management in Health and Social Care settings.

Risk Assessing in the Care Sector
Delivered in person or OnlineFlexible Dates
Price on Enquiry

Mastering Your Assignments: Tips for Success

By Writingservices

When it comes to academic success, mastering assignments is crucial. Whether you're in high school or pursuing a higher degree, assignments are a significant part of your learning journey. They not only help you grasp the subject matter but also develop essential skills like time management and critical thinking. However, balancing assignments with other commitments can be challenging. That’s where services like MyAssignmentHelp come into play, providing students the support they need to excel. If you're feeling overwhelmed, you can easily do my assignment and ensure that your work meets the required standards. Organizing Your Work One of the best ways to tackle assignments is through organization. Start by breaking your assignments into manageable tasks. Create a timeline or schedule that outlines when you will work on each section. This not only makes the workload seem less daunting but also helps you allocate time wisely. Research Thoroughly Before you start writing, invest time in research. A well-researched assignment reflects depth and understanding of the topic. Use credible sources such as academic journals, books, and reputable websites. Take notes and highlight key points that you find relevant to your assignment Writing with Clarity When it comes to writing, clarity is key. Make sure your arguments are coherent and logically structured. Use headings and bullet points to enhance readability. Avoid jargon unless necessary, and define any complex terms you do use. Remember, the goal is to communicate your ideas effectively. Review and Edit Never underestimate the power of editing. After completing your assignment, take a break before reviewing it. This will help you see your work from a fresh perspective. Check for grammatical errors, typos, and ensure that you’ve followed all the guidelines. If you’re unsure about your writing, you can also seek feedback from peers or use professional editing services. Conclusion Assignments are an integral part of the academic experience, but they don’t have to be a source of stress. By organizing your work, conducting thorough research, and writing clearly, you can improve your chances of success. And if you ever find yourself in need of extra help, remember to do my assignment through MyAssignmentHelp to ensure you stay on track. With the right approach and resources, you can tackle any assignment that comes your way!

Mastering Your Assignments: Tips for Success
Delivered In-PersonFlexible Dates
FREE

Discover the Exciting Field of Clinical Research

By John Huber

Learn more about entering the exciting field of Clinical Research, and how you can quickly start or grow your career! Tuesday, August 27 · 1 - 2am GMT+1 Join us to learn about Clinical Research--a growing field that offers a variety of career opportunities--and how you can acquire the skills to work in Clinical Research! Ask questions of experts working in the field. Discover the PCC Clinical Research program. In this 6 month, part-time class, you learn the foundational terms, concepts, and elements of designing and implementing clinical research, preparing you for a great job for an in-demand role. Most positions offer starting hourly rates ranging between $23-$36 per hour, and typically include benefits. Clinical research skills and knowledge are used in research sites such as medical centers and hospitals, pharmaceutical, device or biotechnology companies, or in contract research organizations. PCC's Foundations of Clinical Research curriculum was developed in partnership with local Oregon healthcare leaders including OHSU, Kaiser Permanente, Providence Health & Services, and Legacy Health. In the Foundations of Clinical Research non-credit certificate program at PCC's Institute for Health Professionals, you will learn will ethical, regulatory, historical and operational, recruitment, reporting, and other principles that support successful clinical trials. Seeking a new opportunity in a growing field? Already a CNA or Nurse and looking to transition to a role that doesn't have you running ragged all day? Check out PCC's IHP Clinical Research program!

Discover the Exciting Field of Clinical Research
Delivered OnlineFlexible Dates
FREE