• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

128 Advisor courses in Sheffield delivered Live Online

Academic Profiling Test (APT)

By Academic Profiling Tests

The Academic Profiling Test (APT) is an online assessment for students aged 6 to 16. It is designed for use with professional consultants and advisors, who can support your child's learning goals and aspirations. It might be used for finding gaps in their learning, identifying academic strengths or weaknesses, establishing their profile to assist in applying to a new school, or simply to get an independent idea of your child's progress.

Academic Profiling Test (APT)
Delivered on-request, onlineDelivered Online
Price on Enquiry

ISACA CGEIT Training Boot Camp

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Risk professionals Business analysts Project managers Compliance professionals IT professionals Anyone whose work includes evaluating and mitigating risk Overview This boot camp prepares you to pass the ISACA CGEIT exam, which covers four domain areas designed to reflect the work performed by individuals who have a significant management, advisory or assurance role relating to the governance of IT. Domain 1: Governance of enterprise IT Domain 2: IT resources Domain 3: Benefits realization Domain 4: Risk optimization This CGEIT Boot Camp is designed for experienced IT governance personnel and those who have responsibilities for the stewardship of IT resources. You will learn how to effectively implement and manage governance across all areas of technology ? as well as align that technology with strategic enterprise goals. This training also explains the CGEIT examination process and helpsprepare you for your CGEIT exam by providing guidance and testing your exam readiness through sample questions. You?ll leave fully prepared to earn your CGEIT certification. COURSE OUTLINE * Domain 1: Governance of enterprise IT * Domain 2: IT resources * Domain 3: Benefits realization * Domain 4: Risk optimization

ISACA CGEIT Training Boot Camp
Delivered on-request, onlineDelivered Online
Price on Enquiry

ISO 27001 Lead Implementer

By Nexus Human

Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Project managers and consultants involved in and concerned with the implementation of an ISMS, expert advisors seeking to master the implementation of an ISMS, individuals responsible for ensuring conformity to information security requirements within an organization Overview Master the concepts, approaches, methods and techniques used for the implementation and effective management of an ISMS Learn how to interpret the ISO/IEC 27001 requirements in the specific context of an organization Learn how to support an organization to effectively plan, implement, manage, monitor and maintain an ISMS Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks Acquire the expertise to advise an organization in implementing Information Security Management System best practices This training course is designed to prepare you to implement an information security management system (ISMS) based on the requirements of ISO/IEC 27001. It aims to provide a comprehensive understanding of the best practices of an ISMS and a framework for its continual management and improvement. INTRODUCTION TO ISO/IEC 27001 AND INITIATION OF AN ISMS * Training course objectives and structure * Standards and regulatory frameworks * Information Security Management System (ISMS) * Fundamental information security concepts and principles * Initiation of the ISMS implementation * Understanding the organization and its context * ISMS scope PLANNING THE IMPLEMENTATION OF AN ISMS * Leadership and project approval * Organizational structure * Analysis of the existing system * Information security policy * Risk management * Statement of Applicability IMPLEMENTATION OF AN ISMS * Documented information management * Selection and design of controls * Implementation of controls * Trends and technologies * Communication * Competence and awareness * Security operations management ISMS MONITORING, CONTINUAL IMPROVEMENT, AND PREPARATION FOR THE CERTIFICATION AUDIT * Monitoring, measurement, analysis, and evaluation * Internal audit h Management review * Treatment of nonconformities * Continual improvement * Preparing for the certification audit * Certification process and closing of the training course

ISO 27001 Lead Implementer
Delivered on-request, onlineDelivered Online
Price on Enquiry

ISO 14001 Lead Implementer

By Nexus Human

Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Managers or consultants involved in Environmental Management, Expert advisors seeking to master the implementation of an Environmental Management System, Individuals responsible for maintaining conformance with EMS requirements , EMS team members Overview Acknowledge the correlation between ISO 14001, ISO 14040 and other standards and regulatory frameworks Master the concepts, approaches, methods and techniques used for the implementation and effective management of an EMS Learn how to interpret the ISO 14001 requirements in the specific context of an organization Learn how to support an organization to effectively plan, implement, manage, monitor and maintain an EMS Acquire the expertise to advise an organization in implementing Environmental Management System best practices ISO 14001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Environmental Management System (EMS) based on ISO 14001. During this training course, you will also gain a thorough understanding of the best practices of Environmental Management Systems, consequently reducing an organization?s negative environmental impacts and improving its overall performance and efficiency INTRODUCTION TO ISO 14001 AND INITIATION OF AN EMS * Course objective and structure * Standard and regulatory framework * Environmental Management System (EMS) * Fundamental principles of environmental management * Initiating the EMS implementation * Understanding the organization and clarifying the environmental objectives * Analysis of the existing management system PLAN THE IMPLEMENTATION OF THE EMS * Leadership and approval of the EMS project * EMS scope * Policies for environmental management * Risk assessment * Definition of the organizational structure of environmental management IMPLEMENTATION OF AN EMS * Definition of the document management process * Design of controls and drafting of specific policies & procedures * Communication plan * Training and awareness plan * Implementation of controls * Incident Management * Operations Management EMS MONITORING, MEASUREMENT, CONTINUOUS IMPROVEMENT AND PREPARATION FOR CERTIFICATION AUDIT * Monitoring, measurement, analysis and evaluation * Internal audit * Management review * Treatment of problems and non-conformities * Continual improvement * Preparing for the certification audit * Competence and evaluation of implementers * Closing the training

ISO 14001 Lead Implementer
Delivered on-request, onlineDelivered Online
Price on Enquiry

ISO 45001 Lead Implementer

By Nexus Human

Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Individuals responsible for maintaining and improving the workplace safety, Occupational health and safety officers, consultants, and advisors, Professionals wishing to acquaint themselves with PECB's IMS2 Methodology for implementing an OH&S MS, Individuals responsible for maintaining the conformity of OH&S MS to ISO 45001 requirements, Members of OH&S teams, Individuals aspiring to pursue a career as OH&S MS implementers, consultants, or officers Overview Explain the fundamental concepts and principles of an occupational health and safety management system (OH&S MS) based on ISO 45001 Interpret the ISO 45001 requirements for an OH&S MS from the perspective of an implementer Initiate and plan the implementation of an OH&S MS based on ISO 45001, by utilizing PECB's IMS2 Methodology and other best practices Support an organization in operating, maintaining, and continually improving an OH&S MS based on ISO 45001 Prepare an organization to undergo a third-party certification audit This course is designed to equip you with the competence to establish, implement, manage, and maintain an occupational health and safety management system (OH&S MS) in accordance with ISO 45001:2018 requirements and guidance. This training course aims to provide an in-depth understanding of ISO 45001 requirements, as well as the best practices and approaches used for the implementation and subsequent maintenance of an OH&S MS. The ultimate ambition of this training course is to enable you to create the conditions for a safer workplace. INTRODUCTION TO ISO 45001 AND INITIATION OF AN OH&S MS IMPLEMENTATION * Training course objectives and structure * Standards and regulatory frameworks * Fundamental concepts and principles of OH&S * Initiation of the OH&S MS implementation * The organization and its context IMPLEMENTATION PLAN OF AN OH&S MS * Leadership and worker participation * OH&S MS scope * OH&S policy and objectives * Hazard identification and assessment of risks and opportunities IMPLEMENTATION OF AN OH&S MS * Resource management * Awareness and communication * Documented information management * Operations management * Emergency preparedness and response OH&S MS PERFORMANCE EVALUATION, CONTINUAL IMPROVEMENT, AND PREPARATION FOR THE CERTIFICATION AUDIT * Monitoring, measurement, analysis, and evaluation * Internal audit * Management review * Treatment of nonconformities and incidents * Continual improvement * Preparation for the certification audit * Closing of the training course

ISO 45001 Lead Implementer
Delivered on-request, onlineDelivered Online
Price on Enquiry

ISO 22301 Lead Implementer

By Nexus Human

Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Project managers and consultants involved in business continuity Expert advisors seeking to master the implementation of the business continuity management system Individuals responsible to maintain conformity with BCMS requirements within an organization Members of the BCMS team Overview Understand the concepts, approaches, methods, and techniques used for the implementation and effective management of a BCMS. Learn how to interpret and implement the requirements of ISO 22301 in the specific context of an organization. Understand the operation of the business continuity management system and its processes based on ISO 22301. Learn how to interpret and implement the requirements of ISO 22301 in the specific context of an organization. No two disasters in the world cause equal damage. Between the unpredictability of natural disasters, information security breaches, and incidents of different nature, preparedness can make you stand out in the crowd and predict the future of your business. In light of this, proper planning is essential to mitigating risks, avoiding consequences, coping with the negative effects of disasters and incidents, but at the same time, continuing your daily operations so that customer needs do not remain unfulfilled.This training course will prepare its participants to implement a business continuity management system (BCMS) in compliance with the requirements of ISO 22301. Attending this training course allows you to gain a comprehensive understanding of the best practices of the business continuity management system and to be able to establish a framework that allows the organization to continue operating efficiently during disruptive events INTRODUCTION TO ISO 22301 AND INITIATION OF A BCMS * Training course objectives and structure * Standards and regulatory frameworks * Business continuity management system (BCMS) * Fundamental business continuity concepts and principles * Initiation of the BCMS implementation * Understanding the organization and its context * BCMS scope IMPLEMENTATION PLAN OF A BCMS * Leadership and commitment * Business continuity policy * Risks, opportunities, and business continuity objectives * Support for the BCMS * Business impact analysis * Risk assessment IMPLEMENTATION OF A BCMS * Business continuity strategies and solutions * Business continuity plans and procedures * Incident response and emergency response * Crisis management * Exercise programs * Monitoring, measurement, analysis, and evaluation * Internal audit BCMS MONITORING, CONTINUAL IMPROVEMENT, AND PREPARATION FOR THE CERTIFICATION AUDI * Management review * Treatment of nonconformities * Continual improvement * Preparation for the certification audit * Closing of the training course

ISO 22301 Lead Implementer
Delivered on-request, onlineDelivered Online
Price on Enquiry

GDPR Data Protection Officer

By Nexus Human

Duration 4.125 Days 24.75 CPD hours This course is intended for Managers or consultants seeking to prepare and support an organization in planning, implementing, and maintaining a compliance program based on the GDPR DPOs and individuals responsible for maintaining conformance with the GDPR requirements Members of information security, incident management, and/or business continuity teams Technical and compliance experts seeking to prepare for a data protection officer role Expert advisors involved in the security of personal data Overview Understand the concepts of the GDPR and interpret its requirements Understand the content and the correlation between the General Data Protection Regulation and other regulatory frameworks and applicable standards, such as ISO/IEC 27701 and ISO/IEC 29134 Develop the ability to inform, advise, and monitor compliance with the GDPR and cooperate with the supervisory authority Acquire the competence to perform the role and daily tasks of the data protection officer in an organizationit Considering that data breaches have become highly sophisticated in the recent years, the need for data protection has increased as well.Information Security is crucial to the success of any organization since it deals with the protection of sensitive data from unauthorized access, use, replication and destruction. As such, organizations should put in place measures and controls to manage and diminish Information Security risks and comply with GDPR requirements. In case organizations fail to comply with the GDPR requirements, the penalties can reach up to 2% of an organization?s annual turnover. Also, in case of more serious infringements, the penalties can amount to 4% of an organization?s annual revenue. The implementation of a Privacy Framework, on the other hand, will allow professionals to develop and implement reliable controls that are generally accepted.Becoming a Certified Data Protection Officer will enable you to acquire the necessary expertise to understand the risks that could have a negative impact on your organization and implement the required strategic responses based on the GDPR best practices, requirements and principles. INTRODUCTION TO THE GDPR CONCEPTS AND PRINCIPLES * Training course objectives and structure * General Data Protection Regulation (GDPR) * Core considerations for the GDPR DESIGNATION OF THE DPO AND ANALYSIS OF THE GDPR COMPLIANCE PROGRAM * Designation of the DPO * Analysis of the GDPR compliance program * Relationship with the top management * Data protection policy * Register of processing activities * Risk management process DPO OPERATIONS * Data protection impact assessment * Documentation management * Evaluation of the data protection controls * Data protection and technology * Awareness, training, and communication MONITORING AND CONTINUAL IMPROVEMENT OF GDPR COMPLIANCE * Incident management and personal data breaches * Monitoring and measuring compliance * Data protection internal audit * Treatment of nonconformities * Continual improvement * Closing the training course

GDPR Data Protection Officer
Delivered on-request, onlineDelivered Online
Price on Enquiry

ISO 9001 Lead Implementer

By Nexus Human

Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Personnel responsible for maintaining and improving the quality of the products and services of the organization, Personnel responsible for meeting customer requirements, Consultants, advisors, professionals wishing to obtain in-depth knowledge of ISO 9001 requirements for a QMS, Professionals wishing to acquaint themselves with PECB's IMS2 Methodology for implementing a QMS, Individuals responsible for maintaining the conformity of QMS to ISO 9001 requirements, Members of QMS implementation and operation teams, Individuals aspiring to pursue a career in quality management Overview Explain the fundamental concepts and principles of a quality management system (QMS) based on ISO 9001 Interpret the requirements of ISO 9001 for a QMS from the perspective of an implementer Initiate and plan the implementation of a QMS based on ISO 9001, by utilizing PECB's IMS2 Methodology and other best practices Support an organization in operating, maintaining, and continually improving a QMS based on ISO 9001 Prepare an organization to undergo a third-party certification audit The ISO 9001 aims to help you develop the competence necessary to establish, implement, operate, maintain, and continually improve a QMS. This training course aims to equip you with in-depth knowledge on ISO 9001 requirements, as well as the best practices and approaches used for the implementation and subsequent maintenance of a QMS. INTRODUCTION TO ISO 9001 AND THE INITIATION OF A QMS IMPLEMENTATION * Training course objectives and structure * Overview of ISO, management systems, and * ISO 9000 family * Introduction to quality and QMS based on ISO 9001 * Initiation of the QMS implementation * Leadership and commitment * Quality policy * Roles, responsibilities, and authorities IMPLEMENTATION PLAN OF A QMS * Context of the organization * QMS scope * Actions to address risks and opportunities * Quality objectives * Change management * Resources * Competence IMPLEMENTATION OF A QMS * Awareness and communication * Management of documented information * Requirements for products and services * Design and development of products and services * Outsourcing * Production and service provision * Monitoring, measurement, analysis, and evaluation QMS MONITORING, CONTINUAL IMPROVEMENT, AND PREPARATION FOR THE CERTIFICATION AUDIT * Internal audit * Management reviews * Nonconformities and corrective actions * Continual improvement * Preparation for the certification audit * Closing of the training course ADDITIONAL COURSE DETAILS: Nexus Humans ISO 9001 Lead Implementer training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ISO 9001 Lead Implementer course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

ISO 9001 Lead Implementer
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware vSphere: Troubleshooting [V8]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System architects and system administrators Overview By the end of the course, you should be able to meet the following objectives: Introduce troubleshooting principles and procedures Use command-line interfaces, log files, and the vSphere Client to diagnose and resolve problems in the vSphere environment Explain the purpose of common vSphere log files Identify networking issues based on reported symptoms Validate and troubleshoot the reported networking issue Identify the root cause of networking issue Implement the appropriate resolution to recover from networking problems Analyze storage failure scenarios using a logical troubleshooting methodology identify the root cause of storage failure Apply the appropriate resolution to resolve storage failure problems Troubleshoot vSphere cluster failure scenarios Analyze possible vSphere cluster failure causes Diagnose common VMware vSphere High Availability problems and provide solutions Identify and validate VMware ESXiTM host and VMware vCenter problems Analyze failure scenarios of ESXi host and vCenter problems Select the correct resolution for the failure of ESXi host and vCenter problems Troubleshoot virtual machine problems, including migration problems, snapshot problems, and connection problems Troubleshoot performance problems with vSphere components This five-day training course provides you with the knowledge, skills, and abilities to achieve competence in troubleshooting the VMware vSphere© 8 environment. This course increases your skill level and competence in using the command-line interface, VMware vSphere© Client?, log files, and other tools to analyze and solve problems. COURSE INTRODUCTION * Introductions and course logistics * Course objectives INTRODUCTION TO TROUBLESHOOTING * Define the scope of troubleshooting * Use a structured approach to solve configuration and operational problems * Apply troubleshooting methodology to logically diagnose faults and improve troubleshooting efficiency TROUBLESHOOTING TOOLS * Discuss the various methods to run commands * Discuss the various ways to access ESXi Shell * Use commands to view, configure, and manage your vSphere components * Use the vSphere CLI * Use ESXCLI commands from the vSphere CLI * Use Data Center CLI commands * Identify the best tool for command-line interface troubleshooting * Identify important log files for troubleshooting vCenter Server and ESXi * Describe the benefits and capabilities of VMware SkylineTM * Explain how VMware Skyline works * Describe VMware SkylineTM Health * Describe VMware Skyline AdvisorTM TROUBLESHOOTING VIRTUAL NETWORKING * Analyze and troubleshoot standard switch problems * Analyze and troubleshoot virtual machine connectivity problems * Analyze and troubleshoot management network problems * Analyze and troubleshoot distributed switch problems TROUBLESHOOTING STORAGE * Discuss the vSphere storage architecture * Identify the possible causes of problems in the various types of datastores * Analyze the common storage connectivity and configuration problems * Discuss the possible storage problems causes * Solve the storage connectivity problems, correct misconfigurations, and restore LUN visibility * Review vSphere storage architecture and functionality necessary to troubleshoot storage problems * Use ESXi and Linux commands to troubleshoot storage problems * Analyze log file entries to identify the root cause of storage problems * Investigate ESXi storage issues * Troubleshoot VM snapshots * Troubleshoot storage performance problems * Review multipathing * Identify the common causes of missing paths, including PDL and APD conditions * Solve the missing path problems between hosts and storage devices TROUBLESHOOTING VSPHERE CLUSTERS * Identify and troubleshoot vSphere HA problems * Analyze and solve vSphere vMotion problems * Diagnose and troubleshoot common vSphere DRS problems TROUBLESHOOTING VIRTUAL MACHINES * Discuss virtual machine files and disk content IDs * Identify, analyze, and solve virtual machine snapshot problems * Troubleshoot virtual machine power-on problems * Identify possible causes and troubleshoot virtual machine connection state problems * Diagnose and recover from VMware Tools installation failures TROUBLESHOOTING VCENTER SERVER AND ESXI * Analyze and solve vCenter Server service problems * Diagnose and troubleshoot vCenter Server database problems * Use vCenter Server Appliance shell and the Bash shell to identify and solve problems * Identify and troubleshoot ESXi host problems

VMware vSphere: Troubleshooting [V8]
Delivered on-request, onlineDelivered Online
Price on Enquiry

The GDPR Primer for Data Protection Officers

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for A prior understanding of EU Data Protection legislation is recommended. Candidates are typically management professionals and decision-makers who already have responsibility for data protection compliance within their organisation.Co-Requisite Subjects Candidates should have a good understanding of their own organisation?s data management activities through the life cycle from initial acquisition, through the various areas of processing and usage, to eventual removal or destruction. Overview To equip the learner with a foundational understanding of the principles of the General Data Protection Regulation (GDPR) and to provide constructive suggestions on implementing compliant processes. THE SOCIAL, HISTORICAL AND LEGAL BACKGROUND LEADING TO THE GENERAL DATA PROTECTION REGULATION (GDPR) * The scope and global context of the GDPR * The key concepts within the GDPR * The definition of all key words and phrases relating to this Data Protection regulation PRINCIPLE ONE: THE CRITERIA GOVERNING FAIR, OPEN AND TRANSPARENT PROCESSING OF PERSONAL DATA * Principle Two: Purpose Limitation, the challenge of limiting the processing within the context of specified and lawful purposes * * Principle Three: Minimisation of processing, and ensuring that only that data is processed which is necessary to achieve the purpose. * Principle Two: Purpose Limitation, the challenge of limiting the processing within the context of specified and lawful purposes * * Principle Three: Minimisation of processing, and ensuring that only that data is processed which is necessary to achieve the purpose. * * Principle Four: Ensuring that any personal data held by the organisation is kept accurate and current, and that any processing of such data is appropriate * * Principle Five: Management and storage of personal data in a manner that meets regulatory obligations, while minimising the time that the individual remains identifiable * * Principle Six: The criteria governing safe, secure and confidential processing of personal data in order to protect its integrity * * Principle Seven: The key roles, responsibilities and accountabilities of those involved in Data Management within an organisation * Establishment within a single Member State * Joint Controllers * Privacy by Design and by Default * Nominated Representatives * Third-party Contracts and shared liability * Logging of data management processes * Data Breach Notification obligations * Privacy Impact Assessments * Overseas transfer of personal data * * L2.8 The Data Subject Rights, and their implications for the Data Controller and the Data Processor * * L2.8.1 The ?right to be forgotten? * L2.8.2 The right to restriction of processing * L2.8.3 The right to object to certain processing * L2.8.4 The right to have inaccurate data amended or erased * L2.8.5 The right to data portability * L2.8.6 The right of access to one?s personal data * L2.8.7 Rights in relation to automated decision-making and profiling THE ROLE OF THE DATA PROTECTION OFFICER (DPO) * The role of the Data Protection Officer (DPO) * Criteria for designating a DPO * Tasks of the DPO * Position of the DPO within the organisation * * The role of the Supervisory Authority within the Member State * * The Lead Supervisory Authority and independence * Investigative, corrective and advisory powers * Independence of the Supervisory Authority * Collaboration with other Supervisory Authorities * Codes of Conduct and Certification * * The role, powers and tasks of the European Data Protection Board (EDPB) THE REMEDIES, LIABILITIES AND PENALTIES AVAILABLE UNDER THE GDPR * Right to raise a complaint * Right to representation * Right to effective judicial remedy * Right to compensation and liability * Administrative fines of up to ?10m or 2% of GAT * Administrative fines of up to ?20m or 4% of GAT PROVISIONS FOR SPECIFIC PROCESSING SITUATIONS * Freedom of Expression * Processing of official documents * Processing of National Identification Numbers * Processing regarding employment * Processing for archiving purposes * Processing under obligations of official secrecy * Processing of data by religious organisations PREPARING FOR IMPLEMENTATION OF THE GDPR * Review of data management policies and procedures * Review of data assets and security structures * Training and Awareness-raising * Data management governance structures * Embedding Privacy By Design and Default * Codes of Conduct and Certification against standards * Breach detection and notification procedures * Review of third-party agreements, contracts

The GDPR Primer for Data Protection Officers
Delivered on-request, onlineDelivered Online
Price on Enquiry