• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

955 Courses

Cryptocurrency Security Simplified

By NextGen Learning

Are you concerned about keeping your cryptocurrency investments secure? Look no further than our Cryptocurrency Security Simplified course! Discover the fundamentals of cryptocurrencies, types of cryptocurrencies, NFTs, cryptocurrency wallets, decentralised finance, investing in cryptos, and more. Learn how to keep your investments safe and navigate the UK's cryptocurrency laws. Enrol now and take the first step towards securing your financial future Learning Outcomes: Gain a deep understanding of the fundamentals of cryptocurrencies and the blockchain technology Understand the different types of cryptocurrencies, including Bitcoin, Ethereum, and more Learn about NFTs and their uses in the market Understand the importance of wallets and how to keep your investments safe Master the best practices for cryptocurrency security to protect your investments from potential threats Gain knowledge of decentralised finance and how to invest in cryptocurrencies Explore the opportunities and future of cryptocurrencies and their potential impact on the financial industry Cryptocurrency Security Simplified is the perfect course for anyone looking to secure their investments in the fast-paced world of cryptocurrencies. In this course, you'll learn the fundamentals of cryptocurrencies, including the blockchain technology that underpins them. You'll also explore different types of cryptocurrencies, such as Bitcoin and Ethereum, and their uses in the market. The course also covers NFTs, or non-fungible tokens, which are digital assets that are unique and cannot be replicated. You'll learn about the value of NFTs in the market and how to invest in them. Additionally, you'll explore the different types of cryptocurrency wallets and how to use them to keep your investments safe. One of the key focuses of this course is on cryptocurrency security. You'll learn best practices for keeping your investments secure, such as using strong passwords and two-factor authentication. You'll also explore the basics of decentralised finance and how it relates to cryptocurrency. Certification Upon completion of the course, learners can obtain a certificate as proof of their achievement. You can receive a £4.99 PDF Certificate sent via email, a £9.99 Printed Hardcopy Certificate for delivery in the UK, or a £19.99 Printed Hardcopy Certificate for international delivery. Each option depends on individual preferences and locations. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Individuals interested in investing in cryptocurrencies Cryptocurrency enthusiasts who want to learn more about cryptocurrency security Individuals who want to understand the fundamentals of cryptocurrencies and the blockchain technology Anyone who wants to learn about the potential impact of cryptocurrencies on the financial industry Individuals who want to keep their cryptocurrency investments safe and secure Career path Cryptocurrency Analyst: £35,000 - £75,000 Cryptocurrency Trader: £25,000 - £100,000 Cryptocurrency Investment Advisor: £40,000 - £100,000 Blockchain Developer: £40,000 - £80,000 Cryptocurrency Compliance Officer: £45,000 - £100,000

Cryptocurrency Security Simplified
Delivered Online On Demand6 hours
£15

Cyber Security and Digital Forensics for Pentesters - Hands-on

By Study Plex

Highlights of the Course Course Type: Online Learning Duration: 8 hours 13 minutes Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about forensic investigation Understand the core competencies and principles of forensic investigation Explore the various areas of forensic investigation Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert pentester Cyber Security and Digital Forensics for Pentesters - Hands-on Course Master the skills you need to propel your career forward in digital forensic investigation. This course will equip you with the essential knowledge and skillset that will make you a confident pentester and take your career to the next level. This comprehensive cyber security and digital forensics course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this cyber security and digital forensics course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This cyber security and digital forensics course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries.  This comprehensive course will teach you the theory of effective digital forensic investigation practice and equip you with the essential skills, confidence and competence to assist you in the digital forensic investigation industry. You'll gain a solid understanding of the core competencies required to drive a successful career in digital forensic investigation. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for pentester or for people who are aspiring to specialise in digital forensic investigation. This cyber security and digital forensics course has been endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. This course is not regulated by Ofqual and is not an accredited qualification.  Enrol in this cyber security and digital forensics course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive cyber security and digital forensics course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this digital forensic investigation can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This cyber security and digital forensics course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This cyber security and digital forensics course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This cyber security and digital forensics course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Course Overview Course Overview 00:06:00 Building Your Forensics Lab Environment Using VirtualBox Video - Downloading ISO and OVA Files for VirtualBox 00:08:00 Video and lab - Create a Virtual Install of CSI Linux 2021.2 00:12:00 Video and Lab - Create a Kali Live (Forensic Mode) VM Using VirtualBox 00:06:00 Video and lab - Create a Virtual Install Kali Image Using VirtualBox 00:11:00 Video and Lab - Create Virtual Install of Windows 10 Using VirtualBox 00:08:00 Video and Lab - Create a Virtual Install of Metasploitable2 Using VirtualBox 00:10:00 Using Kali Forensic Mode and Autopsy Video and Lab -Getting Started with Autopsy 00:10:00 Video and Lab - Simulate Creating a Disk Image for a Forensic Analysis 00:11:00 Video and Lab - Examining a forensic Disk Image Using Autopsy 00:12:00 Digital Forensics Case Management Video and Lab - Installing the WebMap-Nmap Dashboard 00:12:00 Open-source Intelligence (OSINT) Video and Lab - Conducting OSINT Using CSI Linux Investigator 00:08:00 Video and Lab - Find Social Media Accounts Using Sherlock 00:07:00 Video - OSINT Framework - Overview 00:16:00 Using Shodan to Search for Vulnerable Devices Video and Lab - Preparing CSI Investigator to Use Shodan 00:05:00 Video and Lab - Using Shodan to Find Vulnerable Devices 00:16:00 Video and lab - Using Shodan to Search for Vulnerable Databases 00:08:00 Computer Forensics Video - Attaching an External USB Device in Kali 00:07:00 Video and Lab - Acquiring a Forensic Copy of the Windows Registry 00:15:00 Video and Lab - Analyzing the Windows Registry for Evidence 00:14:00 Video and Lab - Dumping Wi-Fi Credentials Using netsh 00:04:00 Video and Lab - Email Header Analysis 00:17:00 Video and Lab - Using Shellbags to View Hidden or Deleted Folders 00:06:00 Video and Lab - Extracting Thumbnail Images From a Suspects Machine 00:05:00 Video and lab - Memory Forensics Using the Volatility Framework 00:19:00 Reverse Engineering and Malware Analysis Video and Lab - Install Ghidra on CSI Linux 00:07:00 Video and Lab - Introduction to Using Ghidra 00:14:00 Video and Lab - Reverse Engineering crackme0x00 Using Ghidra 00:06:00 Video and Lab - Reverse Engineering crackme0x05 Using Ghidra 00:12:00 Video and Lab - Analyzing the WannaCry KillSwitch Using Ghidra 00:17:00 Malware Hunting with Sysinternal Tools Video - Overview of Sysinternal Tools 00:08:00 Video - Overview of Sysinternal's Process Explorer 00:00:00 Video and Lab - Finding Malware with Sysinternals Process Explorer 00:09:00 Stenography Video and Lab - Using Steghide for Hiding and Extracting Data 00:11:00 Video and Lab - Using the EXIFtool to Read and Write EXIF Tags 00:10:00 Network Forensics Using Wireshark Video - Overview of Wireshark 3.2 00:11:00 Video - Wireshark Capture Options 00:07:00 Video - Wireshark Toolbar Icons 00:03:00 Video and Lab - Installing a Wireless Adapter in Kali 00:09:00 Video and Lab - Hacking a Wireless Network Using Kali Linux 00:14:00 Video - Capturing Wireless Traffic Using Wireshark 00:05:00 Practice What You Learned Video and Lab - CTF Lab Build for HA: Forensics 00:11:00 Video and lab - Capture flag #1 00:12:00 Video and lab - Capture flag #2 00:10:00 Video and lab - Capture flag #3 00:20:00 Video and lab - Capture flag #4 00:09:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Cyber Security and Digital Forensics for Pentesters - Hands-on
Delivered Online On Demand
£19

Cyber Security Training

By Study Plex

Highlights of the Course Course Type: Self-paced online course Duration: 25 minutes Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Understand the fundamentals of cyber security Recognise the potential causes of cyber attacks and data breaches Know how to develop reliable cyber attack protections Identify the possible "cyber threat actors" who commit such crimes Determine the primary reasons why cyber attacks target people and businesses Understand the need to maintain effective password security Detect malicious activity and respond appropriately Learn how to protect devices like desktop PCs, laptops, tablets, and smartphones Understand how to tackle and report a possible cyber attack Demonstrate the value of collaboration in preventing cyber attacks Transform into a competent and confident cyber security manager Understand how to use the skills you gained in this course in a practical setting Cyber Security Training This Cyber Security Training Course will cover a selection of the most prevalent causes of cyber attacks and strategies and tactics for preventing or controlling these potential cyber attacks. You will learn from expert instructors with experience in the field who will impart the most relevant expertise and best practices. Common cyber security threats Main causes of cyber attacks Guidelines for password security Recommendations on various device security Protect your company from potential cyber attacks Ensure employees see it as their personal duty to protect against data breach Essential skills, confidence and competence to assist you in the cyber security industry Core competencies required to drive a successful career in the cyber security industry This Cyber Security Training course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. This Cyber Security Training course has been endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. This course is not regulated by Ofqual and is not an accredited qualification. Who is this course for? Information Technology managers and cyber security managers looking to gain extensive knowledge about cyber serenity can take this Cyber Security Training Course This course is ideal for supervisors and managers who are in charge of organising, directing, or overseeing the cyber security precautions and procedures of their workplace Business owners thinking of implementing proper cyber security measures within the workplace can also take this course Anyone who wishes to protect their sensitive files, emails, accounts, and personal information from hackers can also take this course Aspiring cyber security experts or anyone looking to gain knowledge about cyber security procedures can enrol into this Cyber Security Training Course Entry Requirements This Cyber Security Training Course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone and a reliable internet connection. Assessment This Cyber Security Training Course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure.  Through the MCQs, it is measured how much a learner can grasp from each section. In the assessment, the pass mark is 60%. Advance Your Career This Cyber Security Training Course will provide you with significant opportunities to enter the relevant job market and select your desired career path. Additionally, by showcasing these skills on your resume, you will be able to develop your career, face more competitors in your chosen sector, and increase your level of competition. If you are looking for Asbestos Awareness Course, enrol into our affordable and highly informative course, which will open your door towards a wide range of opportunities within your chosen sector.  Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Module 1: Cyber Security - An Overview Module 2: Combating Cyber Attacks Obtain Your Certificate of Achievement Order Your Certificate of Achievement 00:00:00

Cyber Security Training
Delivered Online On Demand
£19

Workplace Confidentiality

5.0(10)

By Apex Learning

Overview Breaches in corporate information can cost companies millions, both in terms of financial loss and reputation damage. 'Workplace Confidentiality' is not just a course; it is a critical arsenal in equipping professionals with the knowledge and strategies to navigate this delicate terrain. Delve into the 'Introduction to Workplace Confidentiality', where the foundational concepts are laid bare, preparing you for the intricate nuances of 'Business Etiquette and Types of Confidentiality'. Understand deeply 'The Importance of Confidentiality' before diving into actionable strategies in 'Preventing Confidentiality Breach'. Finally, empower every employee with tools and techniques in 'How Employees Can Protect Confidential Information'.  Secure your place in this essential course and fortify your professional stature in the competitive corporate world. How will I get my certificate? After successfully completing the course you will be able to order your certificate, these are included in the price. Who is This course for? There is no experience or previous qualifications required for enrolment on this Workplace Confidentiality. It is available to all students, of all academic backgrounds. Requirements Our Workplace Confidentiality is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 6 sections • 6 lectures • 00:52:00 total length •Introduction to Workplace Confidentiality: 00:05:00 •Business Etiquette and Types of Confidentiality: 00:11:00 •The Importance of Confidentiality: 00:06:00 •Maintaining Confidentiality with Co-workers: 00:11:00 •Preventing Confidentiality Breach: 00:08:00 •How Employees Can Protect Confidential Information: 00:11:00

Workplace Confidentiality
Delivered Online On Demand52 minutes
£12

Corporate Risk And Crisis Management

5.0(10)

By Apex Learning

Overview This comprehensive course on Corporate Risk And Crisis Management will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Corporate Risk And Crisis Management comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Corporate Risk And Crisis Management. It is available to all students, of all academic backgrounds. Requirements Our Corporate Risk And Crisis Management is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 9 sections • 9 lectures • 06:03:00 total length •Introduction to Risks and Risk Analysis: 00:31:00 •The Process of Risk Analysis and Management: 00:29:00 •Corporate Risk Management: 00:34:00 •Managing Financial Risks: 00:54:00 •Introduction to Crisis and Crisis Management: 00:37:00 •Crisis Response and Communication: 00:37:00 •Incidents Management and Emergency Response Plan: 00:51:00 •Crisis Management Team: 01:02:00 •Post Crisis Phase: 00:28:00

Corporate Risk And Crisis Management
Delivered Online On Demand6 hours 3 minutes
£12

Intelligence Analyst Certification

By NextGen Learning

In today's data-driven world, the demand for skilled analysts is rising. Our Intelligence Analyst Certification course provides the knowledge and expertise to succeed in this critical field. With eight modules covering essential topics, this Intelligence Analyst course equips you with the theoretical foundations needed to excel as an intelligence analyst. Statistics reveal an increasing demand for skilled intelligence analysts in both the public and private sectors. In a complex world, gathering, analysing, and interpreting information is crucial for informed decision-making and safeguarding national security. Enrolling in our Intelligence Analyst Certification course positions you for a rewarding and impactful career in this Intelligence Analyst field. Learning Outcomes: By completing this Intelligence Analyst course, you will be able to: Define the role and principles of intelligence analysis, including its purpose, scope, and ethics, with our Intelligence Analyst course Understand its historical context and importance in modern security settings with our Intelligence Analyst course Use the intelligence cycle to effectively gather, evaluate, analyse, and share intelligence with our Intelligence Analyst course Apply critical thinking and structured techniques to interpret complex information accurately through our Intelligence Analyst course Follow best practices in intelligence analysis, including data collection, source evaluation, and report synthesis. Consider legal and ethical aspects such as privacy, data protection, and responsible intelligence use. "Intelligence Analyst Certification" Our comprehensive Intelligence Analyst Certification course covers eight modules essential for success in this field. You'll learn to define intelligence analysis and understand its development and the intelligence cycle. Gain critical thinking skills, and master the analysis process and best practices. Explore intelligence's role in national security, legal issues, and ethics. Finally, discover your responsibilities and functions as an analyst. Start your journey towards becoming a skilled intelligence analyst today. CPD 10 CPD hours / points Accredited by CPD Quality Standards Module 01: Defining Intelligence Analysis 17:29 1: Defining Intelligence Analysis Preview 17:29 Module 02: Development of Intelligence Analysis 18:04 2: Development of Intelligence Analysis 18:04 Module 03: The Intelligence Cycle 12:19 3: The Intelligence Cycle 12:19 Module 04: Critical Thinking and Structuring 17:12 4: Critical Thinking and Structuring 17:12 Module 05: Analysis Process and Best Practice 25:15 5: Analysis Process and Best Practice 25:15 Module 06: Intelligence and National Security 17:02 6: Intelligence and National Security 17:02 Module 07: Legal Issues and Ethics 17:40 7: Legal Issues and Ethics 17:40 Module 08: Your Role, Responsibilities, and Functions as an Analyst 21:28 8: Your Role, Responsibilities, and Functions as an Analyst 21:28 Who is this course for? The target audience for the Intelligence Analyst Certification course is: Aspiring intelligence analysts seeking theoretical knowledge. Law enforcement professionals who are eager to deepen their understanding of intelligence. Students of political science or international relations who are aiming to expand their career horizons. Policymakers who are looking to leverage intelligence in strategic decision-making. Requirements There is no formal qualification for Intelligence Analyst Certification. Anyone from any background can enrol in this Intelligence Analyst Certification. Career path Some career paths related to this Intelligence Analyst Certification in the UK are: Intelligence Analyst National Security Analyst Law Enforcement Intelligence Officer Corporate Intelligence Consultant Political Risk Analyst Counterterrorism Analyst The average salary for these roles is £28K to £70k per year.

Intelligence Analyst Certification
Delivered Online On Demand24 hours
£12

Confidentiality in the Workplace Training

4.3(43)

By John Academy

Overview Confidentiality breaches can hamper an organisation's reputation and cause financial and legal issues. Hence, both employers and employees should be educated on the significance of confidentiality and learn how to maintain it. Our Confidentiality in Workplace Training is the perfect training solution. This course aims to provide an overall understanding of confidentiality and its importance in the workplace. Here, you will learn how to acquire better business confidentiality and be able to practice it with your colleagues. The course will also help you avoid any breaches in confidentiality.  Finally, the course will educate you on organisational responsibilities and the UK government guidelines regarding confidentiality. If you are ready to enhance your knowledge and understanding, enrol now! Course Preview Learning Outcomes Understand the significance of workplace confidentiality Learn how to improve business confidentiality Develop the ability to maintain confidentiality with colleagues Build the skills required to prevent confidentiality breaches Deepen your knowledge of the organisational responsibilities regarding confidentiality Why Take This Course From John Academy? Affordable, well-structured and high-quality e-learning study materials Engaging tutorial videos, materials from the industry-leading experts Opportunity to study in a user-friendly, advanced online learning platform Efficient exam systems for the assessment and instant result Earn UK & internationally recognised accredited qualification Easily access the course content on mobile, tablet, or desktop from anywhere, anytime Excellent career advancement opportunities Get 24/7 student support via email. What Skills Will You Learn from This Course? Maintaining Confidentiality Business Confidentiality Improvement Preventing Breaches Who Should Take This Confidentiality in the Workplace Training? Whether you're an existing practitioner or an aspiring professional, this course is an ideal opportunity. It will elevate your expertise and boost your CV with key skills and a recognised qualification attesting to your knowledge. Are There Any Entry Requirements? This Confidentiality in the Workplace Training is available to all learners of all academic backgrounds. But learners should be aged 16 or over to undertake the qualification. And a good understanding of the English language, numeracy, and ICT will be helpful. Certificate of Achievement After completing this course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates & Transcripts can be obtained either in Hardcopy at £14.99 or in PDF format at £11.99. Career Path​ This exclusive Confidentiality in the Workplace Training course will equip you with effective skills and abilities and help you explore career paths such as  Corporate Trainer Compliance Officer Human Resources Specialist Data Protection Officer Module 01:Keeping Confidentiality with Colleagues Keeping Confidentiality with Colleagues 00:11:00 Module 02:Making Confidentiality Matter in Business Making Confidentiality Matter in Business 00:12:00 Module 03:Organisational Responsibilities Regarding Confidentiality Organisational Responsibilities Regarding Confidentiality 00:11:00 Module 04:Preventing Breaches of Confidentiality Preventing Breaches of Confidentiality 00:11:00 Module 05:The Importance of Workplace Confidentiality The Importance of Workplace Confidentiality 00:11:00 Module 06:UK Government Guidelines for Confidentiality UK Government Guidelines for Confidentiality 00:12:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Confidentiality in the Workplace Training
Delivered Online On Demand1 hour 8 minutes
£24.99

Certified Information Systems Professional - Complete Video Training

4.3(43)

By John Academy

Description: A certificate in Information technology from an internationally recognized institution will increase your career opportunity very much. The Certified Information Systems Professional - Complete Video Training course provides you extensive lessons about the Information System field. Divided into four parts, the course teaches you how to be a certified auditor, security manager, security officer and security professional. Certified Information Systems Auditor (CISA) section illustrates you the process of auditing information systems while the Certified Information Security Manager (CISM) part deals with the information security issues. Here, you will learn the system of information security program development, incident management, and risk management. Next, Certified Information Systems Security Officer (CISSO) course teaches how to be an excellent information system security officer by utilising the information system in the security field. Finally, the Certified Information Systems Security Professional (CISSP) section shows you the path for becoming a security professional by focusing the security issues such as asset security, communication and network security, security operations, etc. In short, the bundle video course will help you to achieve certification in above four fields and helps you to know the practical knowledge about Information System. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Information Systems Professional - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Information Systems Professional - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. The Process of Auditing Information Systems Management of the Audit Function FREE 00:20:00 ISACA IT Audit and Assurance Standards and Guidelines 01:16:00 Risk Analysis 00:21:00 Internal Controls 00:17:00 Performing An IS Audit 01:07:00 Control Self-Assessment 00:09:00 The Evolving IS Audit Process 00:12:00 Governance and Management of IT Corporate Governance 00:06:00 IT Governance 00:02:00 IT Monitoring and Assurance Practices for Board and Senior Management 00:40:00 Information Systems Strategy 00:05:00 Maturity and Process Improvement Models 00:01:00 IT Investment and Allocation Practices 00:05:00 Policies and Procedures 00:17:00 Risk Management 00:31:00 IS Management Practices 00:50:00 IS Organizational Structure and Responsibilities 00:17:00 Auditing IT Governance Structure and Implementation 00:06:00 Business Continuity Planning 00:37:00 Information Systems Acquisition, Development and Implementation Business Realization 01:21:00 Project Management Structure 00:08:00 Project Management Practices 00:18:00 Business Application Development 00:42:00 Business Application Systems 00:38:00 Alternative Forms of Software Project Organization 00:03:00 Alternative Development Methods 00:10:00 Infrastructure Development/Acquisition Practices 00:09:00 Information Systems Maintenance Practices 00:09:00 System Development Tools And Productivity Aids 00:05:00 Business Process Reengineering And Process Change Projects 00:08:00 Application Controls 00:07:00 Auditing Application Controls 00:14:00 Auditing Systems Development, Acquisition And Maintenance 00:08:00 Information Systems Operations, Maintenance and Support Information Systems Operations 00:19:00 Information Systems Hardware 00:13:00 IS Architecture and Software 00:39:00 Network Infrastructure 01:16:00 Disaster Recovery Planning 00:19:00 Protection of Information Assets Importance Of Information Security 00:43:00 Logical Access 00:37:00 Network Infrastructure Security 00:39:00 Auditing Information Security Management Framework 00:03:00 Auditing Network Infrastructure Security 00:13:00 Environmental Exposures and Controls 00:02:00 Physical Access Exposures and Controls 00:05:00 Mobile Computing 00:05:00 Information Security Governance Information Security Governance Overview FREE 00:25:00 Effective Information Security Governance 00:24:00 Information Security Concepts and Technologies 00:20:00 Information Security Manager 00:09:00 Scope and Charter of Information Security Governance 00:10:00 Information Security Governance Metrics 00:23:00 Information Security Strategy Overview 00:02:00 Creating Information Security Strategy 00:36:00 Determining Current State Of Security 00:06:00 Information Security Strategy Development 00:10:00 Strategy Resources 00:40:00 Strategy Constraints 00:07:00 Action Plan to Implement Strategy 00:20:00 Information Risk Management Risk Management Overview 00:16:00 Good Information Security Risk Management 00:15:00 Information Security Risk Management Concepts 00:13:00 Implementing Risk Management 00:17:00 Risk Assessment 00:39:00 Controls Countermeasures 00:23:00 Recovery Time Objectives 00:18:00 Risk Monitoring and Communication 00:04:00 Information Security Program Development Development of Information Security Program 00:11:00 Information Security Program Objectives 00:09:00 Information Security Program Development Concepts 00:14:00 Scope and Charter of Information Security Program Development 00:22:00 Information Security Management Framework 00:16:00 Information Security Framework Components 00:12:00 Information Security Program Resources 01:04:00 Implementing an Information Security Program 00:27:00 Information Infrastructure and Architecture 00:14:00 Information Security Program 00:14:00 Security Program Services and Operational Activities 00:45:00 Information Security Incident Management Incident Management Overview 00:28:00 Incident Response Procedures 00:29:00 Incident Management Organization 00:19:00 Incident Management Resources 00:36:00 Incident Management Objectives 00:14:00 Incident Management Metrics and Indicators 00:17:00 Current State of Incident Response Capability 00:11:00 Developing an Incident Response Plan 00:32:00 BCP DRP 00:36:00 Testing Response and Recovery Plans 00:10:00 Executing the Plan 00:27:00 Information Systems Security Officer Risk Management FREE 00:58:00 Security Management 00:58:00 Authentication 01:01:00 Access Control 01:20:00 Security Models 01:01:00 Operations Security 01:10:00 Symmetric Cryptography and Hashing 01:19:00 Asymmetric Cryptography and PKI 01:31:00 Network Connections 01:28:00 Network Protocols and Devices 01:31:00 Telephony, VPNs and Wireless 01:13:00 Security Architecture 01:02:00 Software Development Security 01:05:00 Database Security and System Development 01:00:00 Malware and Software Attacks 00:17:00 Business Continuity 00:44:00 Disaster Recovery 00:53:00 Incident Management, Law, and Ethics 01:06:00 Physical 00:38:00 Information Systems Security Professional Security and Risk Management FREE 00:24:00 Asset Security 00:12:00 Security Engineering 00:15:00 Communication and Network Security 00:10:00 Identity and Access Management 00:10:00 Security Assessment and Testing 00:12:00 Security Operations 00:36:00 Software Development Security 00:13:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Information Systems Professional - Complete Video Training
Delivered Online On Demand48 hours
£22

Attack Prevention with Juniper Networks Firewalls

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for network engineers, support personnel, reseller support, and others responsible for implementing ScreenOS products. Overview After successfully completing this course, you should be able to: Configure attack prevention features, including: ?SCREEN options; Deep Inspection (DI); and Antivirus (AV) scanning. Configure URL filtering. Configure antispam filters. This course meets the business needs of customers who are deploying the attack prevention features of ScreenOS software. The course focuses specifically on the attack-related features and assumes familiarity with ScreenOS software. Upon completing this course, you should be able to return to work and successfully configure and verify the desired attack prevention features. Chapter 1: Course Introduction Chapter 2: ScreenOS Basics Review Concepts Review Configuration Review Lab: ScreenOS Basics Review Chapter 3: SCREEN Options Multilayer Network Protection Types of Attacks SCREEN Options Configuration SCREEN Best Practices Lab: SCREEN Options Configuration Chapter 4: Deep Inspection Deep Inspection Overview Attack Database Configuration Policy Configuration Logging and Monitoring Lab: Deep Inspection Configuration Chapter 5: Antivirus Antivirus Operations Antivirus Configuration?Kaspersky Antivirus Configuration?ICAP Verifying Operations Lab: Antivirus Configuration Chapter 6: Web Filtering Web-Filtering Options Web-Filtering Configuration Verifying Operations Lab: Configuring Web Filtering Chapter 7: Antispam Antispam Concepts Antispam Configuration Verifying Operations Lab: Antispam Configuration Additional course details: Nexus Humans Attack Prevention with Juniper Networks Firewalls training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Attack Prevention with Juniper Networks Firewalls course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Attack Prevention with Juniper Networks Firewalls
Delivered OnlineFlexible Dates
Price on Enquiry

CyberSAFE: Staying Safe in a Digital World

By Nexus Human

Duration 0.25 Days 1.5 CPD hours This course is intended for This course is intended for individuals who want to learn how to stay safe online. Overview Upon successful completion of this course, students will be able to understand how to avoid social engineering and stay safe online. In this course, students will learn how to use the internet safely, and learn traps to avoid. The need for security Compliance Recognize social engineering and other attacks Secure Devices Passwords Identify viruses and malware Use the Internet safely Browsing the web Email Social media Cloud services Additional course details: Nexus Humans CyberSAFE: Staying Safe in a Digital World training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CyberSAFE: Staying Safe in a Digital World course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CyberSAFE: Staying Safe in a Digital World
Delivered OnlineFlexible Dates
Price on Enquiry