• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

926 Courses

Information Management & Data Protection

By NextGen Learning

Information management is at the heart of business growth. It influences how companies develop their strategies and carry out the procedures that follow. This Information Management course will enhance your ability to manage and analyse information. The course will introduce you to the components of an information management strategy and educate you about database management systems, auditing information systems and more. Learning Outcomes Gain an excellent understanding of information management Understand how to deal with the ethical and social issues in data protection Learn about the data protection regulations What will Make You Stand Out? On completion of this Information Management & Data Protection online course, you will gain: CPD QS Accredited course After successfully completing the Course, you will receive a FREE PDF Certificate as evidence of your newly acquired abilities. Lifetime access to the whole collection of learning materials. Enroling in the Course has no additional cost. 24x7 Tutor Support You can study and complete the course at your own pace. Course Curriculum Information Management & Data Protection Show off your new skills with a certificate of completion. After successfully completing the course, you can order your CPD Accredited Certificates as proof of your achievement absolutely free. Please Note: The delivery charge inside the U.K. is £4.99, and international students have to pay £8.99. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Is This Course the Right Option for You? This Information Management & Data Protection course is open to everybody. You can access the course materials from any location in the world and there are no requirements for enrolment. Requirements Without any formal requirements, you can delightfully enrol in this Information Management & Data Protection course. Just get a device with internet connectivity and you are ready to start your learning journey. Thus, complete this course at your own pace. Career path The aim of this exclusive Information Management & Data Protection course is to help you toward your dream career. So, complete this course and enhance your skills to explore opportunities in relevant areas.

Information Management & Data Protection
Delivered Online On Demand4 hours
£12

Enterprise Risk Management and ISO 31000

5.0(10)

By Apex Learning

Overview This comprehensive course on Enterprise Risk Management and ISO 31000 Income will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Enterprise Risk Management and ISO 31000 Income comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Enterprise Risk Management and ISO 31000 Income. It is available to all students, of all academic backgrounds. Requirements Our Enterprise Risk Management and ISO 31000 Income is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 5 sections • 15 lectures • 02:13:00 total length •What is Risk and Risk Management?: 00:09:00 •Why Manage Risk?: 00:09:00 •Why Manage Risk?: 00:09:00 •Overview of ISO 31000 Principles, Framework and Process: 00:05:00 •Overview of COSO ERM 2013 Framework: 00:08:00 •Communication and Consultation: 00:05:00 •Establishing the Context: 00:03:00 •Risk Identification - Process and Tools: 00:16:00 •Risk Analysis - Process and Tools: 00:20:00 •Risk Evaluation - Process and Tools: 00:08:00 •Risk Treatment - Process and Tools: 00:12:00 •Monitoring and Review - Process and Tools: 00:09:00 •Risk Management Maturity and Aware Culture: 00:12:00 •Risk Managing Supply Chain Risk: 00:08:00 •Assignment - Enterprise Risk Management and ISO 31000: 00:00:00

Enterprise Risk Management and ISO 31000
Delivered Online On Demand2 hours 13 minutes
£12

Professional Certificate Course in CSR Ethics in Risk Management in London 2024

4.9(261)

By Metropolitan School of Business & Management UK

CSR Ethics in Risk Management equips professionals with the tools to navigate the complex landscape of ethical considerations and risk mitigation strategies in business. From understanding risk management fundamentals to evaluating the impact of ethical conduct, this course empowers individuals to foster a culture of responsibility and sustainability within their organizations. After the successful completion of this course, you will be able to: Explore the core elements of effective risk management systems and their practical application. Gain insights into Corporate Social Responsibility and its evolving role in contemporary business practices. Recognize the pivotal role of ethics in organizational culture and its impact on workplace behavior. Learn to apply STEP analysis as a tool to assess external factors influencing business environments. Comprehend the stages involved in managing CSR-related risks within an organizational context. Identify and understand the benefits stemming from ethical business practices and their broader impact. Develop skills to evaluate and mitigate the negative repercussions of a lack of ethical conduct in business settings. This course provides a holistic perspective on integrating CSR, ethics, and risk management. Participants will engage in practical exercises, case studies, and discussions to reinforce theoretical concepts. By the end of the course, individuals will possess the knowledge and skills necessary to navigate ethical dilemmas, contribute to effective risk management, and champion CSR initiatives within their organizations. Uncover the synergy between Corporate Social Responsibility (CSR) and Ethics in Risk Management. This course provides practical insights, linking ethical considerations to effective risk mitigation. Explore real-world applications and enhance your ability to integrate CSR principles into risk strategies for responsible business practices. Elevate your expertise in socially conscious risk management. Course Structure and Assessment Guidelines Watch this video to gain further insight. Navigating the MSBM Study Portal Watch this video to gain further insight. Interacting with Lectures/Learning Components Watch this video to gain further insight. CSR Ethics in Risk Management Self-paced pre-recorded learning content on this topic. CSR Ethics in Risk Management Put your knowledge to the test with this quiz. Read each question carefully and choose the response that you feel is correct. All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course. The certificate is designed to enhance the learner's knowledge in the field. This certificate is for everyone eager to know more and get updated on current ideas in their respective field. We recommend this certificate for the following audience. CSR Risk Manager Ethical Compliance Officer Corporate Sustainability Analyst Business Ethics Consultant Risk Assessment Specialist CSR Strategist Workplace Ethics Coordinator Corporate Responsibility Advisor Average Completion Time 2 Weeks Accreditation 3 CPD Hours Level Advanced Start Time Anytime 100% Online Study online with ease. Unlimited Access 24/7 unlimited access with pre-recorded lectures. Low Fees Our fees are low and easy to pay online.

Professional Certificate Course in CSR Ethics in Risk Management in London 2024
Delivered Online On Demand14 days
£25

Cisco Implementing Automation for Cisco Security Solutions v1.0 (SAUI)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Channel and Customer Engineers Network Engineer System Engineer Wireless Engineer Consulting Systems Engineer Technical Solutions Architect Network Admisnistrator Wireless Design Engineer Network Manager Channel SEs Sales Engineer Channel AMs Account Manager Overview Upon completing this course, students will be able to meet these objectives: Understand the overall architecture of the Cisco security solutions and how APIs help enable security Understand how to use Cisco Firepower APIs Understand how pxGrid APIs function and their benefits Understand what capabilities the Cisco Stealthwatch APIs offer and construct API requests to them for configuration changes and auditing purposes Understand the features and benefits of using Cisco Stealthwatch Cloud APIs Learn how to use the Cisco Umbrella Investigate API Understand the Functionality provided by Cisco AMP and its APIs Learn how to use Cisco Threat Grid APIs to analyze, search, and dispose of threats This course demonstrates the tools and the benefits of leveraging programmability and automation in Cisco Security Solutions, including Cisco Firepower Management Center, Cisco Firepower Threat Defense, Cisco ISE, Cisco pxGrid, Cisco Stealthwatch Enterprise, Cisco Stealthwatch Cloud, Cisco Umbrella, Cisco AMP, Cisco Threat grid, and Cisco Security Management Appliances. Students will learn how to use the API for each Cisco security solution and specific applications of when the API benefits IT security content. Introducing Cisco Security APIs Role of APIs in Cisco Security Solutions Cisco Firepower, Cisco ISE, Cisco pxGrid, and Cisco Stealthwatch APIs Use cases and security workflow Consuming Cisco Advanced Malware Protection APIs Cisco AMP overview Cisco AMP endpoint API Cisco AMP use cases and workflows Discovery 1: Query Cisco AMP endpoint APIs for verifying compliance Using Cisco ISE Introducing Cisco Identity services engine Cisco ISE use cases Cisco ISE APIs Using Cisco pxGrid APIs Cisco pxGrid overview WebSockets and STOMP messaging protocol Discovery 2: Use the REST API and Cisco pxGrid with Cisco Identity services engine Using Cisco Threat Grid APIs Cisco threat grid overview Cisco threat grid API Cisco threat grid use cases and workflows Discovery 3: Construct a Python script using the Cisco threat grid API Investigating Cisco Umbrella Security Data Programmatically Cisco Umbrella investigate API overview Cisco Umbrella investigate API: Details Discovery 4: Query security data with the Cisco Umbrella investigate API Exploring Cisco Umbrella Reporting and Enforcement APIs Cisco Umbrella reporting and enforcement APIs: Overview Cisco Umbrella reporting and enforcement APIs: Deep dive Discovery 5: Generate reports using the Cisco Umbrella reporting API Automating Security with Cisco Firepower APIs Review basic constructs of Firewall policy management Design policies for automation Cisco FMC APIs in depth Discovery 6: Explore the Cisco Firepower management center API Cisco FTD automation with ansible Discovery 7: Use ansible to automate Cisco Firepower threat defense configuration Cisco FDM API in depth Discovery 8: Automate Firewall policies using the Cisco Firepower device manager API Operationalizing Cisco Stealthwatch and Its API Capabilities Cisco Stealthwatch overview Cisco Stealthwatch APIs: Details Discovery 9: Automate alarm policies and create reports using the Cisco Stealthwatch APIs Using Cisco Stealthwatch Cloud APIs Cisco Stealthwatch Cloud overview Cisco Stealthwatch Cloud APIs: Deep dive Discovery 10: Construct a report using Cisco stealthwatch Cloud APIs Describing Cisco Security Management Appliance APIs Cisco SMA APIs overview Cisco SMA API Discovery 11: Construct reports using Cisco SMA APIs

Cisco Implementing Automation for Cisco Security Solutions v1.0 (SAUI)
Delivered OnlineFlexible Dates
Price on Enquiry

NIST Cybersecurity Professional Foundation

By IIL Europe Ltd

This course teaches business leaders and operational stakeholders the fundamentals of communicating with executive leadership on WHAT investments must be made to operationalize the NIST Cybersecurity Framework and its informative references to facilitate secure, resilient, and auditable digital outcomes. This course also introduces candidates to the DVMS Institute Create, Protect, and Deliver (CPD) overlay model. As Cloud Services revolutionized the creation and management of digital infrastructure, the DVMS CPD Overlay Model, underpinned by well-known frameworks from NIST and standards from ISO, will revolutionize how organizations manage their digital risk, resiliency, and privacy. Course Features • Foundation Certificate digital courseware • A Practical Guide to 'Adopting the NIST Cybersecurity Framework' eBook • Exam Voucher • Certificate of Attendance • Foundation Certificate Digital Badge on successful completion of exam • Access to the NIST Cybersecurity Professional LinkedIn community This Foundation level course covers the following topics: Today's Digital Economy Understanding Cyber Risks The NIST Cybersecurity Framework Fundamentals Core Functions, Categories, and Subcategories Implementation Tiers Developing Framework Profiles Cybersecurity Improvement NIST Cybersecurity Professional certification training programs are accredited by APMG International, certified by the National Cybersecurity Council (NCSC) in the UK, and recognized by the U.S. Department of Homeland Security CISA organization as qualified NIST Cybersecurity Framework training in alignment with the cybersecurity roles defined in the NICE Cybersecurity Workforce Framework.

NIST Cybersecurity Professional Foundation
Delivered Online On Demand18 hours
£995

Crafting an Effective Information Management Strategy

By NextGen Learning

Craft an Effective Information Management Strategy and unlock the true potential of your organisation's data with our course. Learn about databases, management information systems, auditing information systems, and more. Join us to dive into the world of information management and turn data into valuable insights that drive business success. Learning outcomes: Understand the fundamentals of information management and its importance in modern organisations. Develop a comprehensive information management strategy that aligns with your business goals. Learn about databases and their role in information management. Gain knowledge of management information systems and how they can improve decision-making. Explore the principles of auditing information systems and data protection. Understand ethical and social issues related to information management and data protection. In this course, you'll discover the importance of crafting an effective information management strategy to maximise the value of your organization's data. Our modules cover everything from the basics of information management to the principles of data protection, providing a thorough understanding of the field. With the help of our expert instructors, you'll develop the skills and knowledge you need to create a strategy that aligns with your business goals. This course is perfect for professionals looking to deepen their understanding of information management and its role in driving business success. Whether you're an IT professional, business analyst, or data scientist, this course will help you gain the skills you need to succeed in your career. Certification Upon completion of the course, learners can obtain a certificate as proof of their achievement. You can receive a £4.99 PDF Certificate sent via email, a £9.99 Printed Hardcopy Certificate for delivery in the UK, or a £19.99 Printed Hardcopy Certificate for international delivery. Each option depends on individual preferences and locations. CPD 10 CPD hours / points Accredited by CPD Quality Standards Career path Information Manager: £30,000 - £65,000 Data Analyst: £25,000 - £45,000 IT Manager: £35,000 - £70,000 Business Analyst: £25,000 - £55,000 Database Administrator: £25,000 - £55,000 Cybersecurity Analyst: £25,000 - £60,000

Crafting an Effective Information Management Strategy
Delivered Online On Demand2 hours
£15

Environmental Management Systems (EMS)

4.7(160)

By Janets

Environmental Management Systems (EMS) refers to the management of an organisation's environmental programs that allows an organisation to reduce its environmental impacts and increase its operating efficiency. As a result, environmental management is essential to maintain sustainability and social responsibility in business. The Environmental Management Systems (EMS) course teaches you how to develop an EMS and apply that in your organisation. Instead of these, the impact of environmental aspects, and ecological significances will be discussed in the course. Why choose this course Earn an e-certificate upon successful completion. Accessible, informative modules taught by expert instructors Study in your own time, at your own pace, through your computer tablet or mobile device Benefit from instant feedback through mock exams and multiple-choice assessments Get 24/7 help or advice from our email and live chat teams Full Tutor Support on Weekdays Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Mock exams Multiple-choice assessment Certification After the successful completion of the final assessment, you will receive a CPD-accredited certificate of achievement. The PDF certificate is for £9.99, and it will be sent to you immediately after through e-mail. You can get the hard copy for £15.99, which will reach your doorsteps by post.

Environmental Management Systems (EMS)
Delivered Online On Demand1 hour 40 minutes
£9.99

Security in Google Cloud

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following job roles: [Cloud] information security analysts, architects, and engineers Information security/cybersecurity specialists Cloud infrastructure architects Additionally, the course is intended for Google and partner field personnel who work with customers in those job roles. The course should also be useful to developers of cloud applications Overview This course teaches participants the following skills: Understanding the Google approach to security Managing administrative identities using Cloud Identity. Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM. Implementing IP traffic controls using VPC firewalls and Cloud Armor Implementing Identity Aware Proxy Analyzing changes to the configuration or metadata of resources with GCP audit logs Scanning for and redact sensitive data with the Data Loss Prevention API Scanning a GCP deployment with Forseti Remediating important types of vulnerabilities, especially in public access to data and VMs This course gives participants broad study of security controls and techniques on Google Cloud Platform. Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution. Participants also learn mitigation techniques for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. Foundations of GCP Security Google Cloud's approach to security The shared security responsibility model Threats mitigated by Google and by GCP Access Transparency Cloud Identity Cloud Identity Syncing with Microsoft Active Directory Choosing between Google authentication and SAML-based SSO GCP best practices Identity and Access Management GCP Resource Manager: projects, folders, and organizations GCP IAM roles, including custom roles GCP IAM policies, including organization policies GCP IAM best practices Configuring Google Virtual Private Cloud for Isolation and Security Configuring VPC firewalls (both ingress and egress rules) Load balancing and SSL policies Private Google API access SSL proxy use Best practices for structuring VPC networks Best security practices for VPNs Security considerations for interconnect and peering options Available security products from partners Monitoring, Logging, Auditing, and Scanning Stackdriver monitoring and logging VPC flow logs Cloud audit logging Deploying and Using Forseti Securing Compute Engine: techniques and best practices Compute Engine service accounts, default and customer-defined IAM roles for VMs API scopes for VMs Managing SSH keys for Linux VMs Managing RDP logins for Windows VMs Organization policy controls: trusted images, public IP address, disabling serial port Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys Finding and remediating public access to VMs VM best practices Encrypting VM disks with customer-supplied encryption keys Securing cloud data: techniques and best practices Cloud Storage and IAM permissions Cloud Storage and ACLs Auditing cloud data, including finding and remediating publicly accessible data Signed Cloud Storage URLs Signed policy documents Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys Best practices, including deleting archived versions of objects after key rotation BigQuery authorized views BigQuery IAM roles Best practices, including preferring IAM permissions over ACLs Protecting against Distributed Denial of Service Attacks: techniques and best practices How DDoS attacks work Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor Types of complementary partner products Application Security: techniques and best practices Types of application security vulnerabilities DoS protections in App Engine and Cloud Functions Cloud Security Scanner Threat: Identity and Oauth phishing Identity Aware Proxy Content-related vulnerabilities: techniques and best practices Threat: Ransomware Mitigations: Backups, IAM, Data Loss Prevention API Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API Additional course details: Nexus Humans Security in Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Security in Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Security in Google Cloud
Delivered OnlineFlexible Dates
Price on Enquiry

EXIN Information Security Foundation based on ISO IEC 27001 - Foundation

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Die Zertifizierung EXIN Information Security Foundation based on ISO/IEC 27001 richtet sich an alle in der Datenverarbeitung tätigen Mitarbeiter. Das Modul eignet sich auch für kleine und mittelständische Unternehmer, die ein bestimmtes Grundwissen im Bereich der Informationssicherheit benötigen. Für Fachkräfte, die neu auf dem Gebiet der Informationssicherheit sind, ist dieses Modul ein guter Anfang. Overview Anwendungsbereich Mit einer Zertifizierung EXIN Information Security Foundation based on ISO/IEC 27001 können Professionals ihr Wissen in folgenden Bereichen nachweisen: Information und Sicherheit: der Begriff, der Wert, die Bedeutung und die Informationssicherheit Bedrohungen und Risiken: die Begriffe Bedrohung und Risiko und wie diese mit der Zuverlässigkeit von Informationen in Beziehung stehen Verfahren und Organisation: Sicherheitsrichtlinie und Sicherheitsorganisation einschließlich der Bestandteile der Sicherheitsorganisation sowie der Umgang mit (Sicherheits)vorfällen Maßnahmen: die Bedeutung von Sicherheitsmaßnahmen wie zum Beispiel physischen, technischen und organisatorischen Maßnahmen Gesetze und Vorschriften: die Bedeutung und Auswirkung von Gesetzen und Vorschriften ie EXIN-Module zum Thema Informationssicherheitsmanagement definieren Informationssicherheit wie folgt: Bei dem Informationssicherheitsmanagement geht es um die Definition, Umsetzung, Aufrechterhaltung, Einhaltung und Bewertung von koh„renten Kontrollen (Maánahmen), die die Verfgbarkeit, Integrit„t, und Vertraulichkeit der (manuellen und automatisierten) Informationsverarbeitung sichern. Das Modul EXIN Information Security Foundation based on ISO/IEC 27001 prft die Grundbegriffe der Informationssicherheit und ihre Beziehungen zueinander. Eine der Zielsetzungen des Moduls ist das Bewusstsein fr den Wert von Informationen zu wecken und ein Verst„ndnis fr die Schwachstellen der Informationsverarbeitung zu vermitteln, um zu verstehen, welche Maánahmen zum Schutz von Informationen notwendig sind. Information und Sicherheit Der Begriff Information Der Wert von Informationen Aspekte der Zuverl„ssigkeit Bedrohungen und Risiken Bedrohungen und Risiken Verfahren und Organisation Sicherheitsrichtlinie und Sicherheitsorganisation Bestandteile Incident Management Maánahmen Bedeutung von Maánahmen Physische Maánahmen Technische Maánahmen Organisatorische Maánahmen Gesetzgbeung und Vorschriften Gesetzgebung und Vorschriften

EXIN Information Security Foundation based on ISO IEC 27001 - Foundation
Delivered OnlineFlexible Dates
Price on Enquiry

ISO 27001 Lead Implementer

By Nexus Human

Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Project managers and consultants involved in and concerned with the implementation of an ISMS, expert advisors seeking to master the implementation of an ISMS, individuals responsible for ensuring conformity to information security requirements within an organization Overview Master the concepts, approaches, methods and techniques used for the implementation and effective management of an ISMS Learn how to interpret the ISO/IEC 27001 requirements in the specific context of an organization Learn how to support an organization to effectively plan, implement, manage, monitor and maintain an ISMS Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks Acquire the expertise to advise an organization in implementing Information Security Management System best practices This training course is designed to prepare you to implement an information security management system (ISMS) based on the requirements of ISO/IEC 27001. It aims to provide a comprehensive understanding of the best practices of an ISMS and a framework for its continual management and improvement. Introduction to ISO/IEC 27001 and initiation of an ISMS Training course objectives and structure Standards and regulatory frameworks Information Security Management System (ISMS) Fundamental information security concepts and principles Initiation of the ISMS implementation Understanding the organization and its context ISMS scope Planning the implementation of an ISMS Leadership and project approval Organizational structure Analysis of the existing system Information security policy Risk management Statement of Applicability Implementation of an ISMS Documented information management Selection and design of controls Implementation of controls Trends and technologies Communication Competence and awareness Security operations management ISMS monitoring, continual improvement, and preparation for the certification audit Monitoring, measurement, analysis, and evaluation Internal audit h Management review Treatment of nonconformities Continual improvement Preparing for the certification audit Certification process and closing of the training course

ISO 27001 Lead Implementer
Delivered OnlineFlexible Dates
Price on Enquiry