• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

47 Business Continuity Management courses in Manchester delivered Live Online

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites * CompTIA Network+ Certification 1 - SECURITY AND RISK MANAGEMENT * Security Governance Principles * Compliance * Professional Ethics * Security Documentation * Risk Management * Threat Modeling * Business Continuity Plan Fundamentals * Acquisition Strategy and Practice * Personnel Security Policies * Security Awareness and Training 2 - ASSET SECURITY * Asset Classification * Privacy Protection * Asset Retention * Data Security Controls * Secure Data Handling 3 - SECURITY ENGINEERING * Security in the Engineering Lifecycle * System Component Security * Security Models * Controls and Countermeasures in Enterprise Security * Information System Security Capabilities * Design and Architecture Vulnerability Mitigation * Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems * Cryptography Concepts * Cryptography Techniques * Site and Facility Design for Physical Security * Physical Security Implementation in Sites and Facilities 4 - INFORMATION SECURITY MANAGEMENT GOALS * Organizational Security * The Application of Security Concepts 5 - INFORMATION SECURITY CLASSIFICATION AND PROGRAM DEVELOPMENT * Information Classification * Security Program Development 6 - RISK MANAGEMENT AND ETHICS * Risk Management * Ethics 7 - SOFTWARE DEVELOPMENT SECURITY * Software Configuration Management * Software Controls * Database System Security 8 - CRYPTOGRAPHY * Ciphers and Cryptography * Symmetric-Key Cryptography * Asymmetric-Key Cryptography * Hashing and Message Digests * Email, Internet, and Wireless Security * Cryptographic Weaknesses 9 - PHYSICAL SECURITY * Physical Access Control * Physical Access Monitoring * Physical Security Methods * Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered Online6 days, Jun 17th, 13:00 + 8 more
£3395

CompTIA Network+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for entry-level computer support professionals with a basic knowledge of computer hardware, software, and operating systems who wish to increase their knowledge and understanding of networking concepts and acquire the required skills to prepare for a career in network support or administration, or who wish to prepare for the CompTIA Network+ certification. CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT professionals with job roles such as network administrator, network technician, network installer, help desk technician, and IT cable installer. This course is also designed for students who are seeking the CompTIA Network+ certification and who want to prepare for the CompTIA Network+ N10-008 Certification Exam. Overview In this course, you will describe the major networking technologies and systems of modern networks and configure, manage, and troubleshoot modern networks. Explain the OSI and TCP/IP Models. Explain properties of network traffic. Install and configure switched networks. Configure IP networks. Install and configure routed networks. Configure and monitor ports and protocols. Explain network application and storage issues. Monitor and troubleshoot networks. Explain network attacks and mitigations. Install and configure security devices. Explain authentication and access controls. Deploy and troubleshoot cabling solutions. Implement and troubleshoot wireless technologies. Compare and contrast WAN technologies. Use remote access methods. Identify site policies and best practices. CompTIA's Network+ certification is a foundation-level certification designed for IT professionals with around one year of experience, whose job role is focused on network administration. The CompTIA Network+ exam will certify the successful candidate has the knowledge and skills required to troubleshoot, configure, and manage common network devices; establish basic network connectivity; understand and maintain network documentation; identify network limitations and weaknesses; and implement network security, standards, and protocols. The candidate will have a basic understanding of enterprise technologies, including cloud and virtualization technologies. The Official CompTIA© Network+© (Exam N10-008): will teach you the fundamental principles of installing, configuring, and troubleshooting network technologies and help you to progress a career in network administration. In this course, you will build on your existing user-level knowledge and experience with personal computer operating systems and networks to master the fundamental skills and concepts that you will need to use on the job in any type of networking career. Prerequisites * CompTIA A+ Certification (Exams 220-1001 and 220-1002) 1 - EXPLAINING THE OSI AND TCP/IP MODELS * Topic A: Explain OSI Model Layers * Topic B: Explain the TCP/IP Suite 2 - EXPLAINING PROPERTIES OF NETWORK TRAFFIC * Topic A: Explain Media Types and Access Methods * Topic B: Deploy Ethernet Standards * Topic C: Configure and Monitor Network Interfaces 3 - INSTALLING AND CONFIGURING SWITCHED NETWORKS * Topic A: Install and Configure Hubs and Bridges * Topic B: Install and Configure Switches * Topic C: Compare and Contrast Network Topologies * Topic D: Compare and Contrast Network Types 4 - CONFIGURING IP NETWORKS * Topic A: Configure IPv4 Addressing Components * Topic B: Test IP Interfaces with Command Line Tools * Topic C: Configure IPv4 Subnets * Topic D: Configure Private and Public IPv4 Addressing Schemes * Topic E: Configure IPv6 Addressing Components * Topic F: Configure DHCP Services 5 - INSTALLING AND CONFIGURING ROUTED NETWORKS * Topic A: Explain Characteristics of Routing * Topic B: Install and Configure Routers 6 - CONFIGURING AND MONITORING PORTS AND PROTOCOLS * Topic A: Explain the Uses of Ports and Protocols * Topic B: Use Port Scanners and Protocol Analyzers * Topic C: Explain the Use of Name Resolution Services * Topic D: Configure DNS and IPAM Services 7 - EXPLAINING NETWORK APPLICATION AND STORAGE SERVICES * Topic A: Explain the Uses of Network Applications * Topic B: Explain the Uses of Voice Services and Advanced Networking Devices * Topic C: Explain the Uses of Virtualization and Network Storage Services * Topic D: Summarize the Concepts of Cloud Services 8 - MONITORING AND TROUBLESHOOTING NETWORKS * Topic A: Monitor Network Interfaces and Logs * Topic B: Explain Network Troubleshooting Methodology * Topic C: Troubleshoot Common Network Services Issues 9 - EXPLAINING NETWORKING ATTACKS AND MITIGATIONS * Topic A: Summarize Common Networking Attacks * Topic B: Explain the Characteristics of VLANs * Topic C: Explain the Characteristics of NAT and Port Forwarding 10 - INSTALLING AND CONFIGURING SECURITY DEVICES * Topic A: Install and Configure Firewalls and Proxies * Topic B: Explain the Uses of IDS/IPS and UTM 11 - EXPLAINING AUTHENTICATION AND ACCESS CONTROLS * Topic A: Explain Authentication Controls and Attacks * Topic B: Explain the Uses of Authentication Protocols and Directory Services * Topic C: Explain the Uses of Port Security and NAC * Topic D: Implement Network Device Hardening * Topic E: Explain Patch Management and Vulnerability Scanning Processes 12 - DEPLOYING AND TROUBLESHOOTING CABLING SOLUTIONS * Topic A: Deploy Structured Cabling Systems * Topic B: Deploy Twisted Pair Cabling Solutions * Topic C: Test and Troubleshoot Twisted Pair Cabling Solutions * Topic D: Deploy Fiber Optic Cabling Solutions 13 - IMPLEMENTING AND TROUBLESHOOTING WIRELESS TECHNOLOGIES * Topic A: Install and Configure Wireless Technologies * Topic B: Troubleshoot Wireless Performance Issues * Topic C: Secure and Troubleshoot Wireless Connectivity 14 - COMPARING AND CONTRASTING WAN TECHNOLOGIES * Topic A: Compare and Contrast WAN Core Service Types * Topic B: Compare and Contrast WAN Subscriber Service Types * Topic C: Compare and Contrast WAN Framing Service Types * Topic D: Compae and Contrast Wireless and IoT WAN Technologies 15 - USING REMOTE ACCESS METHODS * Topic A: Use Remote Access VPNs * Topic B: Use Remote Access Management Methods 16 - IDENTIFYING SITE POLICIES AND BEST PRACTICES * Topic A: Manage Networks with Documentation and Diagrams * Topic B: Summarize the Purposes of Physical Security Devices * Topic C: Compare and Contrast Business Continuity and Disaster Recovery Concepts * Topic D: Identify Policies and Best Practices

CompTIA Network+
Delivered Online6 days, Jun 24th, 13:00 + 18 more
£2475

Certified Cloud Security Professional (CCSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CCSP is ideal for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration. Overview Upon completing this course, the participants will gain valuable knowledge and skills including the ability to: - Successfully pass the CCSP exam. - Understand the fundamentals of the cloud computing architecture framework. - Understand security challenges associated with different types of cloud services. - Identify and evaluate security risks for their organization?s cloud environments. - Select and implement appropriate controls to ensure secure implementation of cloud services. - Thoroughly understand the 6 essential core domains of the CCSP common body of knowledge: 1. Architectural Concepts & Design Requirements 2. Cloud Data Security 3. Cloud Platform & Infrastructure Security 4. Cloud Application Security 5. Operations 6. Legal & Compliance The goal of the course is to prepare professionals for the challenging CCSP exam by covering the objectives of the exam based on the six domains as defined in the (ISC)2 CCSP common body of knowledge. 1 - ARCHITECTURAL CONCEPTS AND DESIGN REQUIREMENTS * Cloud Computing Concepts * Cloud Reference Architecture * Cloud Computing Security Concepts * Design Principles of Secure Cloud Computing * Trusted Cloud Services 2 - CLOUD DATA SECURITY * CSA (Cloud Security Alliance) Cloud Data Lifecycle * Cloud Data Storage Architectures * Data Security Strategies * Data Discovery and Classification Technologies * Protecting Privacy and PII (Personally Identifiable Information) * Data Rights Management * Data Retention, Deletion, and Archiving Policies * Auditability, Traceability, and Accountability of Data Events 3 - CLOUD PLATFORM AND INFRASTRUCTURE SECURITY * Cloud Infrastructure Components * Cloud Infrastructure Risks * Designing and Planning Security Controls * Disaster Recovery and Business Continuity Management 4 - CLOUD APPLICATION SECURITY * The Need for Security Awareness and Training in application Security * Cloud Software Assurance and Validation * Verified Secure Software * SDLC (Software Development Life Cycle) Process * Secure SDLC * Specifics of Cloud Application Architecture * Secure IAM (Identity and Access Management) Solutions 5 - OPERATIONS * Planning Process for the Data Center Design * Installation and Configuration of Physical Infrastructure for Cloud Environment * Running Physical Infrastructure for Cloud Environment * Managing Physical Infrastructure for Cloud Environment * Installation and Configuration of Logical Infrastructure for Cloud Environment * Running Logical Infrastructure for Cloud Environment * Managing Logical Infrastructure for Cloud Environment * Compliance with Regulations and Controls * Risk Assessment for Logical and Physical Infrastructure * Collection, Acquisition, and Preservation of Digital Evidence * Managing Communication with Stakeholders 6 - LEGAL AND COMPLIANCE * Legal Requirements and Unique Risks within the Cloud Environment * Relevant Privacy and PII Laws and Regulations * Audit Process, Methodologies, and Required Adaptions for a Cloud Environment * Implications of Cloud to Enterprise Risk Management * Outsourcing and Cloud Contract Design * Vendor Management

Certified Cloud Security Professional (CCSP)
Delivered Online6 days, Jul 15th, 13:00 + 1 more
£4549

Architecting on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for solutions architects, solution-design engineers, developers seeking an understanding of AWS architecting and individuals seeking the AWS Solutions Architect-Associate certification. Overview Identify AWS architecting basic practices. Explore using the AWS management tools: The AWS Console, Command Line Interface (CLI), and CloudFormation in a lab environment. Examine the enforcement of accounts security using policies. Identify the elements that build an elastic, secure, virtual network that includes private and public subnets. Practice building an AWS core networking infrastructure. Determine strategies for a layered security approach to Virtual Private Cloud (VPC) subnets. Identify strategies to select the appropriate compute resources based on business use-cases. Practice building a VPC and adding an Elastic Cloud Compute (EC2) instance in a lab environment. Practice installing an Amazon Relational Database Service (RDS) instance and an Application Load Balancer (ALB) in the VPC you created. Compare and contrast AWS storage products and services, based on business scenarios. Compare and contrast the different types of AWS database services based on business needs. Practice building a highly available, auto-scaling database layer in a lab. Explore the business value of AWS monitoring solutions. Identify the role of monitoring, event driven load balancing, and auto scaling responses, based on usage and needs. Identify and discuss AWS automation tools that will help you build, maintain and evolve your infrastructure. Discuss network peering, VPC endpoints, gateway and routing solutions based on use-cases. Discuss hybrid networking configurations to extend and secure your infrastructure. Discuss the benefits of microservices as an effective decoupling strategy to power highly available applications at scale. Explore AWS container services for the rapid implementation of an infrastructure-agnostic, portable application environment. Identify the business and security benefits of AWS serverless services based on business examples. Practice building a serverless infrastructure in a lab environment. Discuss the ways in which AWS edge services address latency and security. Practice building a CloudFront deployment with an S3 backend in a lab environment. Explore AWS backup, recovery solutions, and best practices to ensure resiliency and business continuity. Build a highly available and secure cloud architecture based on a business problem, in a project-based facilitator-guided lab. Architecting on AWS is for solutions architects, solution-design engineers, and developers seeking an understanding of AWS architecting. In this course, you will learn to identify services and features to build resilient, secure and highly available IT solutions on the AWS Cloud. Architectural solutions differ depending on industry, types of applications, and business size. AWS Authorized Instructors emphasize best practices using the AWS Well-Architected Framework, and guide you through the process of designing optimal IT solutions, based on real-life scenarios. The modules focus on account security, networking, compute, storage, databases, monitoring, automation, containers, serverless architecture, edge services, and backup and recovery. At the end of the course, you will practice building a solution and apply what you have learned with confidence. Prerequisites * AWS Cloud Practitioner Essentials classroom or digital training, or * Working knowledge of distributed systems * Familiarity with general networking concepts * Familiarity with IP addressing * Working knowledge of multi-tier architectures * Familiarity with cloud computing concepts 0 - INTRODUCTIONS & COURSE MAP REVIEW * Welcome and course outcomes 1 - ARCHITECTING FUNDAMENTALS REVIEW * AWS Services and Infrastructure * Infrastructure Models * AWS API Tools * Securing your infrastructure * The Well-Architected Framework * Hands-on lab: Explore Using the AWS API Tools to Deploy an EC2 Instance 2 - ACCOUNT SECURITY * Security Principals * Identity and Resource-Based Policies * Account Federation * Introduction to Managing Multiple Accounts 3 - NETWORKING, PART 1 * IP Addressing * Amazon Virtual Private Cloud (VPC), Patterns and Quotas * Routing * Internet Access * Network Access Control Lists (NACLs) * Security Groups 4 - COMPUTE * Amazon Elastic Cloud Compute (EC2) * EC2 Instances and Instance Selection * High Performance Computing on AWS * Lambda and EC2, When to Use Which * Hands-On Lab: Build Your Amazon VPC Infrastructure 5 - STORAGE * Amazon S3, Security, Versioning and Storage Classes * Shared File Systems * Data Migration Tools 6 - DATABASE SERVICES * AWS Database Solutions * Amazon Relational Database Services (RDS) * DynamoDB, Features and Use Cases * Redshift, Features, Use Cases and Comparison with RDS * Caching and Migrating Data * Hands-on Lab: Create a Database Layer in Your Amazon VPC Infrastructure 7 - MONITORING AND SCALING * Monitoring: CloudWatch, CloudTrail, and VPC Flow Logs * Invoking Events 8 - AUTOMATION * CloudFormation * AWS Systems Manager 9 - CONTAINERS * Microservices * Monitoring Microservices with X-Ray * Containers 10 - NETWORKING PART 2 * VPC Peering & Endpoints * Transit Gateway * Hybrid Networking * Route 53 11 - SERVERLESS ARCHITECTURE * Amazon API Gateway * Amazon SQS, Amazon SNS * Amazon Kinesis Data Streams & Kinesis Firehose * Step Functions * Hands-on Lab: Build a Serverless Architecture 12 - EDGE SERVICES * Edge Fundamentals * Amazon CloudFront * AWS Global Accelerator * AWS Web Application Firewall (WAF), DDoS and Firewall Manager * AWS Outposts * Hands-On Lab: Configure an Amazon CloudFront Distribution with an Amazon S3 Origin 13 - BACKUP AND RECOVERY * Planning for Disaster Recovery * AWS Backup * Recovery Strategie ADDITIONAL COURSE DETAILS: Nexus Humans Architecting on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Architecting on AWS
Delivered Online4 days, Jun 25th, 13:00 + 5 more
£2025

ISO 22301 Lead Auditor

By Training Centre

  ISO 22301 Lead Auditor training enables you to develop the necessary expertise to perform a Business Continuity Management System (BCMS) audit by applying widely recognized audit principles, procedures and techniques. ABOUT THIS COURSE   During this training course, you will acquire the knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process. Based on practical exercises, you will be able to master audit techniques and become competent to manage an audit program, audit team, communication with customers, and conflict resolution.    After attending this 4 day course, candidates can sit for the exam with the aim of gaining the "ISO22301 Lead Auditor' credential. You will then be in a position to demonstrate that you have the capabilities and competencies to audit organizations based on best practices.      LEARNING OBJECTIVES   * Understand the operations of a Business Continuity Management System based on ISO 22301 * Acknowledge the correlation between ISO 22301 and other standards and regulatory frameworks * Understand an auditor's role to: plan, lead and follow-up on a management system audit in accordance with ISO 19011 * Learn how to lead an audit and audit team * Learn how to interpret the requirements of ISO 22301 in the context of a BCMS audit * Acquire the competencies of an auditor to: plan an audit, lead an audit, draft reports, and follow-up on an audit in compliance with ISO 19011   EDUCATIONAL APPROACH   * This training is based on both theory and best practices used in BCMS audits * Lecture sessions are illustrated with examples based on case studies  * Practical exercises are based on a case study which includes role playing and discussions * Practice tests are similar to the Certification Exam PREREQUISITES   A foundational understanding of ISO 22301 and knowledge of audit principles. WHAT'S INCLUDED?   Refreshments & Lunch (Classroom courses only)                   Course Slide Deck              Official Study Materials  CPD Certificate          The Exam fees WHO SHOULD ATTEND?   * Auditors seeking to perform and lead Business Continuity Management System (BCMS) certification audits * Managers or consultants seeking to master a Business Continuity Management System audit process * Individuals responsible for maintaining conformance with Business Continuity Management System requirements * Technical experts seeking to prepare for a Business Continuity Management System audit * Expert advisors in Business Continuity Management OUR GUARANTEE   * We are an approved IECB Training Partner. * You can learn wherever and whenever you want with our robust classroom and interactive online training courses. * Our courses are taught by qualified practitioners with commercial experience. * We strive to give our delegates the hands-on experience. * Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. * Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. * Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam. ASSESSMENT   The exam is a 12 question essay type exam completed in the afternoon of Day 4. The pass mark for the exam is 70%. Exam results are provided within 24 hours. PROVIDED BY   This course is Accredited by NACS [http://www.nacs.ee]and administered by the IECB [https://www.iecb.org]. ACCREDITATION

ISO 22301 Lead Auditor
Delivered Online
Dates arranged on request
£1450

ISO 22301 Lead Implementer

By Training Centre

  Delivered in either our Live Online (4 days) or in a Classroom environment (5 days), the ISO 22301 Lead Implementer training course enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining a Business Continuity Management System (BCMS) based on ISO 22301. ABOUT THIS COURSE   During this training course, you will gain a thorough understanding of the best practices of Business Continuity Management Systems and be able to provide a framework that allows the organization to continue operating efficiently during disruptive events. After mastering all the necessary concepts of Business Continuity Management Systems, you can sit for the exam and gain the "ISO 22301 Lead Implementer' credential. By holding this Certificate, you will demonstrate that you have the practical knowledge and professional capabilities to implement ISO 22301 in an organization.   LEARNING OBJECTIVES   * Acknowledge the correlation between ISO 22301 and other standards and regulatory frameworks * Master the concepts, approaches, methods and techniques used for the implementation and effective management of a BCMS * Learn how to interpret the ISO 22301 requirements in the specific context of an organization * Learn how to support an organization to effectively plan, implement, manage and maintain a BCMS * Acquire the expertise to advise an organization in implementing Business Continuity Management System best practices   EDUCATIONAL APPROACH   * This training is based on both theory and best practices used in the implementation of a BCMS * Lecture sessions are illustrated with examples based on case studies * Practical exercises are based on a case study which includes role playing and discussions * Practice tests are similar to the Certification Exam PREREQUISITES   A foundational understanding of ISO 22301 and knowledge of implementation principles. WHAT'S INCLUDED?   Refreshments & Lunch (Classroom based only)                   Course Slide Deck              Official Study Materials CPD Certificate              The Exam fees WHO SHOULD ATTEND?   * Managers or consultants involved in Business Continuity Management * Expert advisors seeking to master the implementation of a Business Continuity Management System * Individuals responsible for maintaining conformance with BCMS requirements * BCMS team members ACCREDITATION OUR GUARANTEE   * We are an approved IECB Training Partner. * You can learn wherever and whenever you want with our robust classroom and interactive online training courses. * Our courses are taught by qualified practitioners with commercial experience. * We strive to give our delegates the hands-on experience. * Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. * Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. * Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam. ASSESSMENT   The exam is a 12 question essay type. The pass mark for the exam is 70% and should be completed within the 150 minutes allocated. Results are provided within 24 hours of completion. PROVIDED BY   This course is Accredited by NACS [http://www.nacs.ee] and Administered by the IECB [https://www.iecb.org]

ISO 22301 Lead Implementer
Delivered Online
Dates arranged on request
£1450

CRISC Certified in Risk and Information Systems Control

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is ideal for Professionals preparing to become CRISC certified. Risk practitioners Students or recent graduates Overview At course completions, students will understand the essential concepts in the 4 ISACA CRISC domains: Governance IT Risk Assessment Risk Response and Reporting Information Technology and Security This 3 Day CRISC course is geared towards preparing students to pass the ISACA Certified in Risk and Information Systems Control examination. The course covers all four of the CRISC domains, and each section corresponds directly to the CRISC job practice. CRISC validates your experience in building a well-defined, agile risk-management program, based on best practices to identify, analyze, evaluate, assess, prioritize and respond to risks. This enhances benefits realization and delivers optimal value to stakeholders. GOVERNANCE - A. ORGANIZATIONAL GOVERNANCE * Organizational Strategy, Goals, and Objectives * Organizational Structure, Roles, and Responsibilities * Organizational Culture * Policies and Standards * Business Processes * Organizational Assets GOVERNANCE - B. RISK GOVERNANCE * Enterprise Risk Management and Risk Management Framework * Three Lines of Defense * Risk Profile * Risk Appetite and Risk Tolerance * Legal, Regulatory, and Contractual Requirements * Professional Ethics of Risk Management IT RISK ASSESSMENT - A. IT RISK IDENTIFICATION * Risk Events (e.g., contributing conditions, loss result) * Threat Modelling and Threat Landscape * Vulnerability and Control Deficiency Analysis (e.g., root cause analysis) * Risk Scenario Development IT RISK ASSESSMENT - B. IT RISK ANALYSIS AND EVALUATION * Risk Assessment Concepts, Standards, and Frameworks * Risk Register * Risk Analysis Methodologies * Business Impact Analysis * Inherent and Residual Risk RISK RESPONSE AND REPORTING - A. RISK RESPONSE * Risk Treatment / Risk Response Options * Risk and Control Ownership * Third-Party Risk Management * Issue, Finding, and Exception Management * Management of Emerging Risk RISK RESPONSE AND REPORTING - B. CONTROL DESIGN AND IMPLEMENTATION * Control Types, Standards, and Frameworks * Control Design, Selection, and Analysis * Control Implementation * Control Testing and Effectiveness Evaluation RISK RESPONSE AND REPORTING - C. RISK MONITORING AND REPORTING * Risk Treatment Plans * Data Collection, Aggregation, Analysis, and Validation * Risk and Control Monitoring Techniques * Risk and Control Reporting Techniques (heatmap, scorecards, dashboards) * Key Performance Indicators * Key Risk Indicators (KRIs) * Key Control Indicators (KCIs) INFORMATION TECHNOLOGY AND SECURITY - A. INFORMATION TECHNOLOGY PRINCIPLES * Enterprise Architecture * IT Operations Management (e.g., change management, IT assets, problems, incidents) * Project Management * Disaster Recovery Management (DRM) * Data Lifecycle Management * System Development Life Cycle (SDLC) * Emerging Technologies INFORMATION TECHNOLOGY AND SECURITY - B. INFORMATION SECURITY PRINCIPLES * Information Security Concepts, Frameworks, and Standards * Information Security Awareness Training * Business Continuity Management * Data Privacy and Data Protection Principles

CRISC Certified in Risk and Information Systems Control
Delivered Online4 days, Sept 9th, 13:00 + 1 more
£2037

Lead Disaster Recovery Manager

By Training Centre

  After mastering all the necessary concepts of Disaster Recovery processes, you can sit for the exam and gain the "Certified Lead Disaster Recovery Manager' credential. By holding this Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to support and lead Disaster Recovery teams in implementing Disaster Recovery strategies based on best practices.  ABOUT THIS COURSE   LEARNING OBJECTIVES   * Acknowledge the correlation between Disaster Recovery, Business Continuity Management, Information Security and other IT areas and frameworks * Master the concepts, approaches, methods and techniques used for the implementation and effective management of a Disaster Recovery Plan * Learn how to interpret the ICT Disaster Recovery strategies in the specific context of an organization * Learn how to support an organization to effectively plan, implement, manage, monitor and maintain DR services based on best practices * Acquire the expertise to advise an organization in implementing an effective Disaster Recovery Plan based on best practices   EDUCATIONAL APPROACH   * This training is based on both theory and best practices used in the implementation and management of a DR plan * Lecture sessions are illustrated with examples based on case studies * Practical exercises are based on a case study which includes role playing and discussions * Practice tests are similar to the Certification Exam   COURSE CONTENT   Day 1: Introduction to Disaster Recovery and initiation of a DR plan Day 2: Risk Mitigation Strategies and Disaster Recovery Planning Day 3: Disaster Recovery facilities, services, recovery sites, response and activation Day 4: DRP testing, monitoring, measurement and continuous improvement; the examination ACCREDITATION PREREQUISITES   A foundational understanding of Disaster Recovery Services and knowledge of management principles, concepts and strategies. ASSESSMENT   The exam for this course consists of 12 essay type questions, to be completed within the 150 minute timeframe and achieving the 70% pass mark. Exam results are provided within 24 hours. WHAT'S INCLUDED?   * Certification fees are included on the exam price * Training material containing over 450 pages of information and practical examples will be distributed * A participation certificate of 31 CPD (Continuing Professional Development) credits will be issued * In case of exam failure, you can retake the exam within 12 months for free PROVIDED BY   This course is Accredited by NACS [http://www.nacs.ee] and Administered by the IECB [https://www.iecb.org]. WHO SHOULD ATTEND?   * Information Security Managers * Incident Managers * Helpdesk Managers * Executives with Governance concerns  

Lead Disaster Recovery Manager
Delivered Online
Dates arranged on request
£1450

ISO 22301 Lead Implementer

By Nexus Human

Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Project managers and consultants involved in business continuity Expert advisors seeking to master the implementation of the business continuity management system Individuals responsible to maintain conformity with BCMS requirements within an organization Members of the BCMS team Overview Understand the concepts, approaches, methods, and techniques used for the implementation and effective management of a BCMS. Learn how to interpret and implement the requirements of ISO 22301 in the specific context of an organization. Understand the operation of the business continuity management system and its processes based on ISO 22301. Learn how to interpret and implement the requirements of ISO 22301 in the specific context of an organization. No two disasters in the world cause equal damage. Between the unpredictability of natural disasters, information security breaches, and incidents of different nature, preparedness can make you stand out in the crowd and predict the future of your business. In light of this, proper planning is essential to mitigating risks, avoiding consequences, coping with the negative effects of disasters and incidents, but at the same time, continuing your daily operations so that customer needs do not remain unfulfilled.This training course will prepare its participants to implement a business continuity management system (BCMS) in compliance with the requirements of ISO 22301. Attending this training course allows you to gain a comprehensive understanding of the best practices of the business continuity management system and to be able to establish a framework that allows the organization to continue operating efficiently during disruptive events INTRODUCTION TO ISO 22301 AND INITIATION OF A BCMS * Training course objectives and structure * Standards and regulatory frameworks * Business continuity management system (BCMS) * Fundamental business continuity concepts and principles * Initiation of the BCMS implementation * Understanding the organization and its context * BCMS scope IMPLEMENTATION PLAN OF A BCMS * Leadership and commitment * Business continuity policy * Risks, opportunities, and business continuity objectives * Support for the BCMS * Business impact analysis * Risk assessment IMPLEMENTATION OF A BCMS * Business continuity strategies and solutions * Business continuity plans and procedures * Incident response and emergency response * Crisis management * Exercise programs * Monitoring, measurement, analysis, and evaluation * Internal audit BCMS MONITORING, CONTINUAL IMPROVEMENT, AND PREPARATION FOR THE CERTIFICATION AUDI * Management review * Treatment of nonconformities * Continual improvement * Preparation for the certification audit * Closing of the training course

ISO 22301 Lead Implementer
Delivered on-request, onlineDelivered Online
Price on Enquiry

BCS Foundation Certificate in Information Security Management Principles

5.0(12)

By Nemstar Ltd

This CISMP course and exam is for anyone wishing to progress their career in the rapidly expanding fields of Information Security, risk and cyber especially within the UK public sector.

BCS Foundation Certificate in Information Security Management Principles
Delivered Online
Dates arranged on request
£1914
123...5

Educators matching "Business Continuity Management"

Show all 6
Raise Up Business Club (Silke Thistlewood)

raise up business club (silke thistlewood)

Cheshire

I (Silke Thistlewood, that’s me on the left with my 2 girls) set up a local networking group for mums in early 2017 after returning from (self employed) maternity leave and feeling decidedly isolated. I had lost my business mojo, felt pretty lonely, and couldn’t make any of the existing networking meetings (no babies allowed, too early, too late etc) so I decided to start my own. I called it Tonbridge Mums in Business and its facebook group grew to 500 members within just a few weeks (it surpassed 1,000 quite some time ago now). We’ve been having regular meetings ever since and the facebook community has grown from strength to strength, with the Thursday promotional thread having become a thing of legend. You have to see it to believe the amount of local talent! And now RuBC_LogoFinal_White_Rose.png In early 2019 I felt is was time to raise the bar and level up - in my own businesses and for the group. I had for some time been wanting to add more value for members - more structure, support and resources (mailing lists for meeting reminders, access to talks members can’t attend, accountability, goal setting etc). With 2 other businesses to run and young kids to look after this was logistically and financially not possible on a voluntary basis (paying for the yearly website subscription alone made my eyes water…..) so I made the decision to introduce a membership structure and a charge for the meetings. I very much hope that the pricing structure I have decided on reflects the value current members have gained from the group and the meetings, and the fact that most of us are working with small margins and reduced working hours crammed around child care and other responsibilities. To set the group apart from other networking meetings in the area, which are confusingly similar in name, the group has been re-branded and has a new name that I feel embodies what the group and community are - supportive, encouraging, non judgemental, inclusive, friendly and quite frankly, magical. I am blown away at each and every meeting by the friendships and kindness that members show each other. What you can expect Community, support, encouragement, friendship, collaborations, inspiration, education - online and in real life across both communities. Weekly check-ins, accountability prompts in the membership community to keep you on track, inspired and safe in the knowledge that this group of women will always have your back. We also co-work in real life and on zoom, go on walks together, discuss books and have coaching sessions with the one and only Action Woman. A wider community of businesses in the free facebook group with the chance to promote your business each Thursday, as well as getting to know others and forming friendships and a basis for collaborations. Someone will always have an answer to any questions you might have - business or otherwise. Regular networking meetings with expert speakers, mingling and cake and/or wine - and not an elevator pitch in sight (so no need to feel nervous). Easy going networking, without the need to “work the room” or hand out business cards at super sonic speed. Our meetings are informal but effective. Low key but inspirational, educational and supportive. Some kind words from business women in the community “There is always a warm excited, inclusive buzz within the group, with many friendships that have been formed over time and I know that some of us have started either using each other’s products or services – or formed collaborations with each other. It’s like a girls night out every month in Tonbridge! SAM HOGWOOD, ESCAPE FROM THE CITY This group has been very welcoming from my first step into my first meeting. I have found everyone in the group to be friendly and supportive of each other and encouraging of the development of one another's businesses. The facebook group and meetings have allowed for shared knowledge and experience in developing each others businesses. I have made great business links and come into work through the group, both paid and through joint collaborations. I have also made some lovely friends through the group which has been a really lovely added bonus CLAIRE READER, CAPTURE ME HAPPY PHOTOGRAPHY I started my Virtual Assistant business in the middle of last year and I am a regular on the weekly Thursday updates. These updates are great as not only do people learn how your business is growing but you can support and find out about other local businesses on your doorstep. I have not made it to one of the networking events that Silke kindly arranges yet, but I will, and when I do, I am sure it will be even more beneficial to my start up business than the group has been so far. EMMA HAGGART, KENT VIRTUAL ASSISTANT Since setting up my hypnotherapy business in 2018, I've found the support of this talented and diverse group to be wonderful. It's great knowing I am not alone in being new to setting up a business, and coming up against many of the same issues as others in the group. This is so reassuring, and I have really benefited from the shared knowledge, passion and experience of everyone in the group. Meet ups are friendly and dynamic, and the topics very fitting. I've made some good contacts and will always recommend fellow business owners where I can. Thanks to Silke this group has really grown and developed and I look forward to further collaboration this year.