• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

957 Courses

Information Management Fundamental

By Online Training Academy

Unlock the power of information with our comprehensive course on Information Management Fundamentals. Whether you're a seasoned professional or just starting your journey in the world of data, this course will equip you with essential knowledge and skills to navigate the complexities of information management. Key Features: CPD Certified Free Certificate from Reed CIQ Approved Developed by Specialist Lifetime Access In the course "Information Management Fundamentals," learners delve into various aspects of handling and utilizing information effectively. They start by understanding the basics of information management, including its importance and how it is applied in different contexts. They explore management information systems, learning how organizations use technology to gather and process data for decision-making. Diving deeper, learners study databases and how information is organized and retrieved efficiently. They also examine strategies for managing information within an organization, focusing on planning and implementation. Ethical considerations are another crucial aspect covered, including issues related to data protection and social responsibility when handling information. Finally, learners gain insights into auditing information systems, ensuring they understand how to assess and improve information management practices. Throughout the course, emphasis is placed on practical applications and ethical considerations to prepare learners for roles where they manage and utilize information responsibly and effectively. Course Curriculum Module 01: Introduction to Information Management Module 02: Management Information Systems Module 03: Databases and Information Management Module 04: Information Management Strategy Module 05: Ethical and Social Issues and Data Protection Module 06: Auditing Information Systems Learning Outcomes: Understand foundational concepts in Information Management and its importance in organisations. Analyse the role of Management Information Systems in enhancing business operations. Evaluate different types of databases used in effective information management. Formulate strategies for efficient Information Management within organisational contexts. Examine ethical and social implications concerning data protection and privacy. Apply auditing techniques to assess the effectiveness of Information Systems. CPD 10 CPD hours / points Accredited by CPD Quality Standards Information Management Fundamental 1:23:19 1: Module 01: Introduction to Information Management 18:08 2: Module 02: Management Information Systems 09:17 3: Module 03: Databases and Information Management 17:08 4: Module 04: Information Management Strategy 10:28 5: Module 05: Ethical and Social Issues and Data Protection 18:00 6: Module 06: Auditing Information Systems 09:18 7: CPD Certificate - Free 01:00 Who is this course for? IT professionals seeking deeper insights into information management strategies. Business managers aiming to enhance organisational data handling capabilities. Students pursuing careers in data analysis and information governance. Consultants advising on technology-driven business solutions. Government officials involved in policy-making for data protection. Career path Data Analyst Information Systems Manager Database Administrator IT Security Consultant Compliance Officer Business Intelligence Analyst Certificates Digital certificate Digital certificate - Included Reed Courses Certificate of Completion Digital certificate - Included Will be downloadable when all lectures have been completed.

Information Management Fundamental
Delivered Online On Demand2 minutes
£12

CCSP Certification Prep Course

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Anyone whose position requires CCSP certificationIndividuals whose responsibilities involve procuring, securing, and managing cloud environments or purchased cloud services Overview In-depth coverage of the six domains required to pass the CCSP exam:Architectural concepts and design requirementsCloud data securityCloud platform and infrastructure securityCloud application securityOperationsLegal and compliance This course is the most comprehensive review of cloud security concepts and industry best practices covering the six domains of the CCSP Common Body of Knowledge (CBK). You will gain knowledge in identifying the types of controls necessary to administer various levels of confidentiality, integrity, and availability, with regard to securing data in the cloud. You will identify the virtual and physical components of the cloud infrastructure with regard to risk management analysis, including tools and techniques necessary for maintaining a secure cloud infrastructure. You will gain an understanding in cloud software assurance and validation, utilizing secure software, and the controls necessary for developing secure cloud environments. You will identify privacy issues and audit processes utilized within a cloud environment, including auditing controls, assurance issues, and the specific reporting attributes. Architectural Concepts and Design Requirements Cloud Data SecurityCloud Platform and Infrastucture Security Cloud Application SecurityOperations Legal and compliance

CCSP Certification Prep Course
Delivered OnlineFlexible Dates
Price on Enquiry

CCCS Check Point Certified Cloud Specialist-Administrator

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Technical professionals who support, install, deploy, or administer Check Point products in Cloud Environments. Overview Explain the nature of the cloud environment. Describe the five pillars of cloud architecture. Explain the Basics of Cloud Infrastructure. Explain the Basics of Cloud Automation. Explain Check Point Security Management and How it Applies to CloudGuard. Describe CloudGuard Security Gateway offerings. Describe Cloud Load Balancers. Explain CloudGuard Licensing. Explain the different Deployment options and architectures for CloudGuard. Explain how and why CloudGuard is automated. Describe the functions of CloudGuard that can be automated. Describe the tools used to automate CloudGuard. Explain CloudGuard Automation Requirements. Explain basic troubleshooting techniques specific to Check Point Security Management Servers and Security Gateways. Describe the steps for Troubleshooting CloudGuard Network Installation. Explain the tools and techniques used to troubleshoot CloudGuard Network Automation. Explain the need for Cloud Security Posture Management. Describe the posture management tools available in CloudGuard. Explain methods for correcting Cloud Security Posture Management issues. Learn basic concepts and develop skills necessary to administer Check Point CloudGuard security solutions Course Outline Deploy a Security Management Server in the Cloud. Install a Security Gateway Image. Create Virtual Networks. Deploy Internal and External Load Balancers Deploy a Security Gateway Using Templates. Assign Public IP Addresses to Cloud Devices Create Web Servers in the Cloud. Configure North-South Traffic Policy. Configure East-West Traffic Policy and Routes. Troubleshoot North-South Traffic Issues. Troubleshoot East-West Traffic Issues.

CCCS Check Point Certified Cloud Specialist-Administrator
Delivered OnlineFlexible Dates
Price on Enquiry

Security Management Level 5 Diploma - 8 Courses Bundle

By NextGen Learning

Are you ready to embark on an enlightening journey of wisdom with the Security Management bundle and pave your way to an enriched personal and professional future? If so, then Step into a world of knowledge with our course bundle - Security Management Level 5 Diploma - QLS Endorsed. Delve into eight immersive CPD Accredited courses, each a standalone course: The QLS Endorsed Course is: Course 01: Security Management Level 5 Diploma The CPD Accredited Courses are: Course 02: Criminal Intelligence Analyst Course 03: Criminal Investigator Course 04: Criminal Law Course 05: Interrogations And Confessions Psychology Course 06: Extremism & Terrorism Awareness Course 07: Criminology & Profiling Course Course 08: Cyber Security Awareness Training Traverse the vast landscapes of theory, unlocking new dimensions of understanding at every turn. Let the Security Management - QLS Endorsed bundle illuminate your path to wisdom. The Security Management Level 5 Diploma - QLS Endorsed bundle offers a comprehensive exploration into a rich tapestry of vast knowledge across eight carefully curated courses. The journey is designed to enhance your understanding and critical thinking skills. Each course within the bundle provides a deep dive into complex theories, principles, and frameworks, allowing you to delve into the nuances of the subject matter at your own pace. In the framework of the Security Management Level 5 Diploma - QLS Endorsed package, you are bestowed with complimentary PDF certificates for all the courses included in this bundle, all without any additional charge. Adorn yourself with the Security Management bundle, empowering you to traverse your career trajectory or personal growth journey with self-assurance. Register today and ignite the spark of your professional advancement! So, don't wait further. Join the Security Management Level 5 Diploma - QLS Endorsedcommunity today and let your voyage of discovery begin! Learning Outcomes: Attain a holistic understanding of the designated areas of study with the Security Management bundle. Establish robust bases across each course nestled within the Security Management bundle. Decipher intricate concepts through the articulate content of the Security Management bundle. Amplify your prowess in interpreting, scrutinising, and implementing theories. Procure the capacity to engage with the course material on an intellectual and profound level. Become proficient in the art of problem-solving across various disciplines. Stepping into the Security Management Level 5 Diploma - QLS Endorsed bundle is akin to entering a world overflowing with deep theoretical wisdom. Each course within this distinctive bundle is an individual journey meticulously crafted to untangle the complex web of theories, principles, and frameworks. Learners are inspired to explore, question, and absorb, thus enhancing their understanding and honing their critical thinking skills. Each course invites a personal and profoundly enlightening interaction with knowledge. The Security Management bundle shines in its capacity to cater to a wide range of learning needs and lifestyles. It gives learners the freedom to learn at their own pace, forging a unique path of discovery. More than just an educational journey, the Security Management bundle fosters personal growth, enabling learners to navigate the complexities of the world skillfully. The Security Management bundle also illuminates the route to a rewarding career. The theoretical insight acquired through this bundle forms a strong foundation for various career opportunities, from academia and research to consultancy and programme management. The profound understanding fostered by the Security Management bundle allows learners to make meaningful contributions to their chosen fields. Embark on the Security Management journey and let knowledge guide you towards a brighter future. Quality Licence Scheme Endorsed Certificate of Achievement: Upon successful completion of the course, you will be eligible to order an original hardcopy certificate of achievement. This prestigious certificate, endorsed by the Quality Licence Scheme, will be titled 'Diploma in Security Management at QLS Level 5'. Your certificate will be delivered directly to your home. The pricing scheme for the certificate is as follows: £109 GBP for addresses within the UK. Please note that delivery within the UK is free of charge. Please Note: NextGen Learning is a Compliance Central approved resale partner for Quality Licence Scheme Endorsed courses. CPD 80 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Security Management Level 5 Diploma - QLS Endorsed Bundle is perfect for: Individuals keen on deepening their firm understanding in their respective fields. Students pursuing higher education looking for comprehensive theory modules. Professionals seeking to refresh or enhance their knowledge. Anyone with a thirst for knowledge and a passion for continuous learning. Requirements Without any formal requirements, you can delightfully enrol in this Security Management Level 5 Diploma - QLS Endorsed bundle. Career path Armed with the Security Management Level 5 Diploma - QLS Endorsed bundle, your professional journey can reach new heights. The comprehensive theoretical knowledge from this bundle can unlock diverse career opportunities across several fields. Whether it's academic research, consultancy, or programme management, the Security Management bundle lays a solid groundwork. Certificates CPD Certificate Of Completion Digital certificate - Included 8 Digital Certificates Are Included With This Bundle CPD Quality Standard Hardcopy Certificate (FREE UK Delivery) Hard copy certificate - £9.99 Hard copy Transcript - £9.99

Security Management Level 5 Diploma - 8 Courses Bundle
Delivered Online On Demand31 hours
£39

Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is open to engineers, administrators, and security-minded users of public, private, and hybrid cloud infrastructures responsible for implementing security in cloud environments: Security architects Cloud architects Security engineers Cloud engineers System engineers Cisco integrators and partners Overview After taking this course, you should be able to: Contrast the various cloud service and deployment models. Implement the Cisco Security Solution for SaaS using Cisco Cloudlock Micro Services. Deploy cloud security solutions using Cisco AMP for Endpoints, Cisco Umbrella, and Cisco Cloud Email Security. Define Cisco cloud security solutions for protection and visibility using Cisco virtual appliances and Cisco Stealthwatch Cloud. Describe the network as a sensor and enforcer using Cisco Identity Services Engine (ISE), Cisco Stealthwatch Enterprise, and Cisco TrustSec. Implement Cisco Firepower NGFW Virtual (NGFWv) and Cisco Stealthwatch Cloud to provide protection and visibility in AWS environments. Explain how to protect the cloud management infrastructure by using specific examples, defined best practices, and AWS reporting capabilities. This course shows you how to implement Cisco© cloud security solutions to secure access to the cloud, workloads in the cloud, and software as a service (SaaS) user accounts, applications, and data. This course covers usage of Cisco Cloudlock, Cisco Umbrella?, Cisco Cloud Email Security, Cisco Advanced Malware Protection (AMP) for Endpoints, Cisco Stealthwatch© Cloud and Enterprise, Cisco Firepower© NGFW (next-generation firewall), and more. Introducing the Cloud and Cloud Security Describe the Evolution of Cloud Computing Explain the Cloud Service Models Explore the Security Responsibilities Within the Infrastructure as a Service (IaaS) Service Model Explore the Security Responsibilities Within the Platform as a Service (PaaS) Service Model Explore the Security Responsibilities Within the SaaS Service Model Describe Cloud Deployment Models Describe Cloud Security Basics Implementing the Cisco Security Solution for SaaS Access Control Explore Security Challenges for Customers Using SaaS Describe User and Entity Behavior Analytics, Data Loss Prevention (DLP), and Apps Firewall Describe Cloud Access Security Broker (CASB) Describe Cisco CloudLock as the CASB Describe OAuth and OAuth Attacks Deploying Cisco Cloud-Based Security Solutions for Endpoints and Content Security Describe Cisco Cloud Security Solutions for Endpoints Describe AMP for Endpoints Architecture Describe Cisco Umbrella Describe Cisco Cloud Email Security Design Comprehensive Endpoint Security Introducing Cisco Security Solutions for Cloud Protection and Visibility Describe Network Function Virtualization (NFV) Describe Cisco Secure Architectures for Enterprises (Cisco SAFE) Describe Cisco NGFWv/Cisco Firepower Management Center Virtual Describe Cisco ASAv Describe Cisco Services Router 1000V Describe Cisco Stealthwatch Cloud Describe Cisco Tetration Cloud Zero-Trust Model Describing the Network as the Sensor and Enforcer Describe Cisco Stealthwatch Enterprise Describe Cisco ISE Functions and Personas Describe Cisco TrustSec Describe Cisco Stealthwatch and Cisco ISE Integration Describe Cisco Encrypted Traffic Analytics (ETA) Implementing Cisco Security Solutions in AWS Explain AWS Security Offerings Describe AWS Elastic Compute Cloud (EC2) and Virtual Private Cloud (VPC) Discover Cisco Security Solutions in AWS Explain Cisco Stealthwatch Cloud in AWS Describing Cloud Security Management Describe Cloud Management and APIs Explain API Protection Illustrate an API Example: Integrate to ISE Using pxGrid Identify SecDevOps Best Practices Illustrate a Cisco Cloud Security Management Tool Example: Cisco Defense Orchestrator Illustrate a Cisco Cloud Security Management Tool Example: Cisco CloudCenter? Describe Cisco Application Centric Infrastructure (ACI) Describe AWS Reporting Tools Additional course details: Nexus Humans Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD)
Delivered OnlineFlexible Dates
Price on Enquiry

Information Management & Data Protection

By NextGen Learning

Information management is at the heart of business growth. It influences how companies develop their strategies and carry out the procedures that follow. This Information Management course will enhance your ability to manage and analyse information. The course will introduce you to the components of an information management strategy and educate you about database management systems, auditing information systems and more. Learning Outcomes Gain an excellent understanding of information management Understand how to deal with the ethical and social issues in data protection Learn about the data protection regulations What will Make You Stand Out? On completion of this Information Management & Data Protection online course, you will gain: CPD QS Accredited course After successfully completing the Course, you will receive a FREE PDF Certificate as evidence of your newly acquired abilities. Lifetime access to the whole collection of learning materials. Enroling in the Course has no additional cost. 24x7 Tutor Support You can study and complete the course at your own pace. Course Curriculum Information Management & Data Protection Show off your new skills with a certificate of completion. After successfully completing the course, you can order your CPD Accredited Certificates as proof of your achievement absolutely free. Please Note: The delivery charge inside the U.K. is £4.99, and international students have to pay £8.99. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Is This Course the Right Option for You? This Information Management & Data Protection course is open to everybody. You can access the course materials from any location in the world and there are no requirements for enrolment. Requirements Without any formal requirements, you can delightfully enrol in this Information Management & Data Protection course. Just get a device with internet connectivity and you are ready to start your learning journey. Thus, complete this course at your own pace. Career path The aim of this exclusive Information Management & Data Protection course is to help you toward your dream career. So, complete this course and enhance your skills to explore opportunities in relevant areas.

Information Management & Data Protection
Delivered Online On Demand4 hours
£12

C)ISSA Certified Information Systems Security Auditor Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers IS Systems Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Information Systems Security Auditor students will be able to establish industry acceptable Cyber Security & IS management standards with current best practices and be prepared to competently take the C)ISSA exam. The Certified Information Systems Security Auditor, C)ISSA , course covers the skills and knowledge to assess vulnerabilities, report on compliance and implement controls for private and public enterprises. Many organizations require an Information System Auditor?s expert knowledge when it comes to identifying critical issues and providing effective auditing solutions. Through the use of a risk-based approach, the C)ISSA is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Course Outline The Process of Auditing Information Systems Risk-Based Auditing Audit Planning and Performance IS Systems Auditor reports IT Governance and Management Systems Acquisition, Development and Implementation Systems Development Models Types of Specialized Business Applications Application Controls Information Systems Operations, Maintenance, and Support System and Communications Hardware Additional course details: Nexus Humans C)ISSA Certified Information Systems Security Auditor Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSA Certified Information Systems Security Auditor Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)ISSA Certified Information Systems Security Auditor Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

ISACA CGEIT Training Boot Camp

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Risk professionals Business analysts Project managers Compliance professionals IT professionals Anyone whose work includes evaluating and mitigating risk Overview This boot camp prepares you to pass the ISACA CGEIT exam, which covers four domain areas designed to reflect the work performed by individuals who have a significant management, advisory or assurance role relating to the governance of IT. Domain 1: Governance of enterprise IT Domain 2: IT resources Domain 3: Benefits realization Domain 4: Risk optimization This CGEIT Boot Camp is designed for experienced IT governance personnel and those who have responsibilities for the stewardship of IT resources. You will learn how to effectively implement and manage governance across all areas of technology ? as well as align that technology with strategic enterprise goals. This training also explains the CGEIT examination process and helpsprepare you for your CGEIT exam by providing guidance and testing your exam readiness through sample questions. You?ll leave fully prepared to earn your CGEIT certification. Course Outline Domain 1: Governance of enterprise IT Domain 2: IT resources Domain 3: Benefits realization Domain 4: Risk optimization

ISACA CGEIT Training Boot Camp
Delivered OnlineFlexible Dates
Price on Enquiry

Your guide to Malware

4.4(5)

By The Security Company (International) Limited

Information on the risks and practical advice to address them TSC's eBooks, whitepapers, and reports cover some of the most important risks in information and cyber security — risks that constantly challenge information and cyber security professionals who work tirelessly to reduce them across their organisations and home users alike.

Your guide to Malware
Delivered Online On Demand20 minutes
FREE

A snapshot of what we offer. See something you like, please get in touch.

TSC Showreel
Delivered Online On Demand2 minutes
FREE