• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

135 Certified Cyber Professional (CCP) courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Cisco Understanding Cisco Contact Center Enterprise Foundations (CCEF)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Account and project managers Business liaisons Deployment engineers Managers overseeing CCE deployments Technical sales Overview After taking this course, you should be able to: Provide a high-level overview of the Cisco Contact Center portfolio List the key components within the Packaged Contact Center Enterprise (PCCE) architecture and their functions Describe how calls flow through PCCE using appropriate terms and naming conventions Introduce the tools used in the configuration, scripting, reporting and support of a PCCE deployment Identify advanced features available within the PCCE solution The Understanding Cisco Contact Center Enterprise Foundations (CCEF) v1.0 course gives you an overview of the Cisco© Packaged Contact Center Enterprise (PCCE) and Unified Contact Center Enterprise solutions. You will learn about the Cisco Contact Center Enterprise (CCE) products and explore features and functionality of the solution including major system components. INTRODUCTION TO CCE * Cisco Contact Center Basics Cisco Contact Center Fundamentals FUNCTIONALITY OF PCCE COMPONENTS * Public Switched Telephone Network (PSTN) and Voice Gateways Cisco Unified Border Element (CUBE) TERMS AND NAMING CONVENTIONS USED IN CCE * CCE Access Environment CCE Routing Configuration ACCESS TOOLS AVAILABLE IN CCE * Single Pane of Glass (SPOG) Cisco Intelligent Contact Management (ICM) Configuration Manager DISCOVERING CCE FEATURES BEYOND DEFAULT * Agent Management Agent Efficiency

Cisco Understanding Cisco Contact Center Enterprise Foundations (CCEF)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Check Point Software - Check Point Certified Security Expert R80.20 (CCSE)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security Engineers Network Engineers Overview Upon completion of this course, students will be able to: Deploy gateways using the Gaia web interface Configure a Security Policy Learn about managing and monitoring a secure network Upgrade and configure a Security Gateway to implement a virtual private network for both internal and external, remote users The growing frequency and sophistication of security threats makes protecting your organization more difficult every year. Check Point?s integrated products provide end-to-end security from the enterprise to the cloud to your mobile worker?s personal devices. They prevent and mitigate cyberattacks and limit the data theft that often results from these threats. INTRODUCTION TO CHECK POINT TECHNOLOGY DEPLOYMENT PLATFORMS INTRODUCTION TO THE SECURITY POLICY MONITORING TRAFFIC & CONNECTIONS NETWORK ADDRESS TRANSLATION USING SMARTUPDATE USER MANAGEMENT & AUTHENTICATION IDENTITY AWARENESS INTRODUCTION TO CHECK POINT VPNS SMARTLOG

Check Point Software - Check Point Certified Security Expert R80.20 (CCSE)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cisco Reporting Cisco Contact Center Enterprise (CCER)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Account and project managers Business liaisons Deployment engineers Managers overseeing CCE deployments Technical sales Overview After taking this course, you should be able to: Provide a high-level overview of the Cisco Contact Center portfolio List the key components within the Packaged Contact Center Enterprise (PCCE) architecture and their functions Describe how calls flow through PCCE using appropriate terms and naming conventions Introduce the tools used in the configuration, scripting, reporting and support of a PCCE deployment Identify advanced features available within the PCCE solution The Reporting Cisco Contact Center Enterprise (CCER) v1.0 course provides an architectural overview of the Contact Center Enterprise (CCE) Solution components and deployment models. You will learn the end-to-end reporting solutions of CCE designed to assist customers and partners in the task of creating reports and managing disparate data sources. INTRODUCTION TO CCE * Cisco Contact Center Basics Cisco Contact Center Fundamentals FUNCTIONALITY OF PCCE COMPONENTS * Public Switched Telephone Network (PSTN) and Voice Gateways Cisco Unified Border Element (CUBE) TERMS AND NAMING CONVENTIONS USED IN CCE * CCE Access Environment CCE Routing Configuration ACCESS TOOLS AVAILABLE IN CCE * Single Pane of Glass (SPOG) Cisco Intelligent Contact Management (ICM) Configuration Manager DISCOVERING CCE FEATURES BEYOND DEFAULT * Agent Management Agent Efficiency

Cisco Reporting Cisco Contact Center Enterprise (CCER)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certified Information Privacy Professional (CIPP/CAN)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection OfficersData Protection ManagersAuditorsLegal Compliance OfficersSecurity ManagerInformation ManagersAnyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they?ve gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure their place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. COMMON PRINCIPLES AND APPROACHES TO PRIVACY * This unit includes a brief discussion about the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles. JURISDICTION AND INDUSTRIES * This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors. INFORMATION SECURITY: SAFEGUARDING PERSONAL INFORMATION * This unit presents introductions to information security, including definitions, elements, standards, and threats/ vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM). ONLINE PRIVACY: USING PERSONAL INFORMATION ON WEBSITES AND WITH OTHER INTERNET-RELATED TECHNOLOGIES * This unit focuses on the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children?s online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices. CANADIAN LEGAL FRAMEWORK * This unit provides an introduction to the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. CANADIAN PRIVATE-SECTOR PRIVACY LAWS * This unit focuses on the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. CANADIAN PUBLIC-SECTOR PRIVACY LAWS * This unit highlights key concepts and practices related to the collection, retention, use, disclosure and disposal of personal information by federal, provincial and territorial governments. HEALTH INFORMATION PRIVACY LAWS * This unit touches on the applicability and purpose of health information privacy laws. PRIVATE-SECTOR COMPLIANCE PRACTICES * This unit delves into the components that make up compliance regulations, including Generally Accepted Privacy Principals and security breach notification, and also examines compliance track records and Federal Commissioner Findings. PUBLIC-SECTOR COMPLIANCE PRACTICES * This unit presents the various methods that can be implemented for compliance in the public sector, such as privacy impact assessments and data sharing agreements. In addition, it discusses the challenges presented by digital information exchanges, as well as non-legislative considerations. HEALTH-SECTOR COMPLIANCE PRACTICES * This unit covers the issues presented with digital compliance in the health sector. ADDITIONAL COURSE DETAILS: Nexus Humans Certified Information Privacy Professional (CIPP/CAN) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Professional (CIPP/CAN) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Information Privacy Professional (CIPP/CAN)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certified Information Privacy Manager (CIPM)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programmes Overview Principles of Privacy Program Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organization through process and technology?regardless of jurisdiction or industry. The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Manager (CIPM) certification program. Founded in 2000, the IAPP is the world?s largest and most comprehensive privacy resource with a mission to define, support and improve the Privacy profession globally. Every organization has data protection needs. Every day, we access, share and manage data across companies, continents and the globe. Knowing how to implement a privacy program is an invaluable skill that will help you protect your organization?s data?and take your career to the next level. Our Principles of Privacy Program Management training is the premier course on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a privacy team. INTRODUCTION TO PRIVACY PROGRAM MANAGEMENT * Privacy program management responsibilities * Accountability in privacy program management PRIVACY GOVERNANCE * Considerations for developing and implementing a privacy program * Position of the privacy function within an organization * Role of the DPO * Program scope and charter * Privacy strategy * Support and ongoing involvement of key functions and privacy frameworks APPLICABLE LAWS AND REGULATIONS * The regulatory environment * Common elements across jurisdictions * Strategies for aligning compliance with organizational strategy DATA ASSESSMENTS * Practical processes for creating and using data inventories/maps * Generating and applying gap analyses * Privacy assessments * Privacy impact assessments/data protection impact assessments * Vendor assessments POLICIES * Common types of privacy-related policies * Policy components * Strategies for implementation DATA SUBJECT RIGHTS * Operational considerations for communicating and ensuring data subject rights * Privacy notice * Choice and consent * Access and rectification * Data portability * Erasure TRAINING AND AWARENESS * Developing privacy training and awareness programs * Implementing privacy training and awareness programs PROTECTING PERSONAL INFORMATION * Holistic approach to protecting personal information * Privacy by design DATA BREACH INCIDENT PLANS * Planning for a data security incident or breach * Responding to a data security incident or breach MONITORING AND AUDITING PROGRAM PERFORMANCE * Common practices for monitoring privacy program performance * Measuring, analyzing and auditing privacy programs ADDITIONAL COURSE DETAILS: Nexus Humans Certified Information Privacy Manager (CIPM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Manager (CIPM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Information Privacy Manager (CIPM)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Educators matching "Certified Cyber Professional (CCP)"

Show all 53