• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2 Information Security (IS) courses in Kesgrave

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Information Security Management Principle

5.0(10)

By GBA Corporate

OVERVIEW -------------------------------------------------------------------------------- Objective * Understand the requirement of Information Security  * Concepts and Definitions of Information Security Management Systems * Deeply Analysing the policies, Standards and procedures * How to deliver a balanced ISMS and following its security procedures * Analysing the Information risk management  * Evaluating the organisational responsibilities  * Understanding the Information security controls  * Scrutinising Legal framework  * Techniques of Cryptographic models

Information Security Management Principle
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1718 to £3626

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

PENETRATION TESTING TRAINING COURSE DESCRIPTION An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. WHAT WILL YOU LEARN * Perform penetration tests. * Explain the technical workings of various penetration tests. * Produce reports on results of penetration tests. * Defend against hackers. PENETRATION TESTING TRAINING COURSE DETAILS * Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. * Prerequisites: IP Security IP VPNs * Duration 5 days PENETRATION TESTING TRAINING COURSE CONTENTS * Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. * Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering * Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. * Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. * Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. * Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. * Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. * Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. * DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. * SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. * Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. * Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. * Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Online Options

Show all 269

CRISC Certified in Risk and Information Systems Control

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is ideal for Professionals preparing to become CRISC certified. Risk practitioners Students or recent graduates Overview At course completions, students will understand the essential concepts in the 4 ISACA CRISC domains: Governance IT Risk Assessment Risk Response and Reporting Information Technology and Security This 3 Day CRISC course is geared towards preparing students to pass the ISACA Certified in Risk and Information Systems Control examination. The course covers all four of the CRISC domains, and each section corresponds directly to the CRISC job practice. CRISC validates your experience in building a well-defined, agile risk-management program, based on best practices to identify, analyze, evaluate, assess, prioritize and respond to risks. This enhances benefits realization and delivers optimal value to stakeholders. GOVERNANCE - A. ORGANIZATIONAL GOVERNANCE * Organizational Strategy, Goals, and Objectives * Organizational Structure, Roles, and Responsibilities * Organizational Culture * Policies and Standards * Business Processes * Organizational Assets GOVERNANCE - B. RISK GOVERNANCE * Enterprise Risk Management and Risk Management Framework * Three Lines of Defense * Risk Profile * Risk Appetite and Risk Tolerance * Legal, Regulatory, and Contractual Requirements * Professional Ethics of Risk Management IT RISK ASSESSMENT - A. IT RISK IDENTIFICATION * Risk Events (e.g., contributing conditions, loss result) * Threat Modelling and Threat Landscape * Vulnerability and Control Deficiency Analysis (e.g., root cause analysis) * Risk Scenario Development IT RISK ASSESSMENT - B. IT RISK ANALYSIS AND EVALUATION * Risk Assessment Concepts, Standards, and Frameworks * Risk Register * Risk Analysis Methodologies * Business Impact Analysis * Inherent and Residual Risk RISK RESPONSE AND REPORTING - A. RISK RESPONSE * Risk Treatment / Risk Response Options * Risk and Control Ownership * Third-Party Risk Management * Issue, Finding, and Exception Management * Management of Emerging Risk RISK RESPONSE AND REPORTING - B. CONTROL DESIGN AND IMPLEMENTATION * Control Types, Standards, and Frameworks * Control Design, Selection, and Analysis * Control Implementation * Control Testing and Effectiveness Evaluation RISK RESPONSE AND REPORTING - C. RISK MONITORING AND REPORTING * Risk Treatment Plans * Data Collection, Aggregation, Analysis, and Validation * Risk and Control Monitoring Techniques * Risk and Control Reporting Techniques (heatmap, scorecards, dashboards) * Key Performance Indicators * Key Risk Indicators (KRIs) * Key Control Indicators (KCIs) INFORMATION TECHNOLOGY AND SECURITY - A. INFORMATION TECHNOLOGY PRINCIPLES * Enterprise Architecture * IT Operations Management (e.g., change management, IT assets, problems, incidents) * Project Management * Disaster Recovery Management (DRM) * Data Lifecycle Management * System Development Life Cycle (SDLC) * Emerging Technologies INFORMATION TECHNOLOGY AND SECURITY - B. INFORMATION SECURITY PRINCIPLES * Information Security Concepts, Frameworks, and Standards * Information Security Awareness Training * Business Continuity Management * Data Privacy and Data Protection Principles

CRISC Certified in Risk and Information Systems Control
Delivered Online4 days, Jun 5th, 13:00 + 2 more
£2037

EC-Council Certified Cybersecurity Technician (C|CT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to: Early-career IT professionals, IT managers, career changers, and career advancers Students and recent graduates Overview After completing this course, you will understand: Key concepts in cybersecurity, including information security and network security Information security threats, vulnerabilities, and attacks The different types of malware Identification, authentication, and authorization Network security controls Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management) Application security design and testing techniques Fundamentals of virtualization, cloud computing, and cloud security Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures Cryptography and public-key infrastructure Data security controls, data backup and retention methods, and data loss prevention techniques Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic The incident handling and response process Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation Concepts in business continuity and disaster recovery Risk management concepts, phases, and frameworks EC-Council?s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs. COURSE OUTLINE * Information Security Threats and Vulnerabilities * Information Security Attacks * Network Security Fundamentals * Identification, Authentication, and Authorization * Network Security Controls: Administrative Controls * Network Security Controls: Physical Controls * Network Security Controls: Technical Controls * Network Security Assessment Techniques and Tools * Application Security * Virtualization and Cloud Computing * Wireless Network Security * Mobile Device Security * Internet of Things (IoT) and Operational Technology (OT) Security * Cryptography * Data Security * Network Troubleshooting * Network Traffic Monitoring * Network Log Monitoring and Analysis * Incident Response * Computer Forensics * Business Continuity and Disaster Recovery * Risk Management

EC-Council Certified Cybersecurity Technician (C|CT)
Delivered Online6 days, Jun 10th, 13:00 + 1 more
£3495

Security Engineering on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for security engineers, security architects, and information security professionals. Overview Identify security benefits and responsibilities of using the AWS Cloud Build secure application infrastructures Protect applications and data from common security threats Perform and automate security checks Configure authentication and permissions for applications and resources Monitor AWS resources and respond to incidents Capture and process logs Create and configure automated and repeatable deployments with tools such as AMIs and AWS CloudFormation This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents. Prerequisites We recommend that attendees of this course have: * Working knowledge of IT security practices and infrastructure concepts * Familiarity with cloud computing concepts * Completed AWS Security Essentials and Architecting on AWS courses 1 - SECURITY ON AWS * Security in the AWS cloud * AWS Shared Responsibility Model * Incident response overview * DevOps with Security Engineering 2 - IDENTIFYING ENTRY POINTS ON AWS * Identify the different ways to access the AWS platform * Understanding IAM policies * IAM Permissions Boundary * IAM Access Analyzer * Multi-factor authentication * AWS CloudTrail 3 - SECURITY CONSIDERATIONS: WEB APPLICATION ENVIRONMENTS * Threats in a three-tier architecture * Common threats: user access * Common threats: data access * AWS Trusted Advisor 4 - APPLICATION SECURITY * Amazon Machine Images * Amazon Inspector * AWS Systems Manager 5 - DATA SECURITY * Data protection strategies * Encryption on AWS * Protecting data at rest with Amazon S3, Amazon RDS, Amazon DynamoDB * Protecting archived data with Amazon S3 Glacier * Amazon S3 Access Analyzer * Amazon S3 Access Points 6 - SECURING NETWORK COMMUNICATIONS * Amazon VPC security considerations * Amazon VPC Traffic Mirroring * Responding to compromised instances * Elastic Load Balancing * AWS Certificate Manager 7 - MONITORING AND COLLECTING LOGS ON AWS * Amazon CloudWatch and CloudWatch Logs * AWS Config * Amazon Macie * Amazon VPC Flow Logs * Amazon S3 Server Access Logs * ELB Access Logs 8 - PROCESSING LOGS ON AWS * Amazon Kinesis * Amazon Athena 9 - SECURITY CONSIDERATIONS: HYBRID ENVIRONMENTS * AWS Site-to-Site and Client VPN connections * AWS Direct Connect * AWS Transit Gateway 10 - OUT-OF-REGION PROTECTION * Amazon Route 53 * AWS WAF * Amazon CloudFront * AWS Shield * AWS Firewall Manager * DDoS mitigation on AWS 11 - SECURITY CONSIDERATIONS: SERVERLESS ENVIRONMENTS * Amazon Cognito * Amazon API Gateway * AWS Lambda 12 - THREAT DETECTION AND INVESTIGATION * Amazon GuardDuty * AWS Security Hub * Amazon Detective 13 - SECRETS MANAGEMENT ON AWS * AWS KMS * AWS CloudHSM * AWS Secrets Manager 14 - AUTOMATION AND SECURITY BY DESIGN * AWS CloudFormation * AWS Service Catalog 15 - ACCOUNT MANAGEMENT AND PROVISIONING ON AWS * AWS Organizations * AWS Control Tower * AWS SSO * AWS Directory Service

Security Engineering on AWS
Delivered Online4 days, Jun 12th, 13:00 + 2 more
£2025

BCS Foundation Certificate in Information Security Management Principles

5.0(12)

By Nemstar Ltd

This CISMP course and exam is for anyone wishing to progress their career in the rapidly expanding fields of Information Security, risk and cyber especially within the UK public sector.

BCS Foundation Certificate in Information Security Management Principles
Delivered Online
Dates arranged on request
£1914

Nemstar's CISSP Programme

5.0(12)

By Nemstar Ltd

Our unique 5 day workshop prepares you for a first time pass of your CISSP exam. Covering each of the famous 8 CBK's, cram the theory before testing your knowledge during exam simulations. Led by a multi-award winning InfoSec consultant, this workshop delivers everything you need to pass,

Nemstar's CISSP Programme
Delivered Online
Dates arranged on request
£2754

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites * CompTIA Network+ Certification 1 - SECURITY AND RISK MANAGEMENT * Security Governance Principles * Compliance * Professional Ethics * Security Documentation * Risk Management * Threat Modeling * Business Continuity Plan Fundamentals * Acquisition Strategy and Practice * Personnel Security Policies * Security Awareness and Training 2 - ASSET SECURITY * Asset Classification * Privacy Protection * Asset Retention * Data Security Controls * Secure Data Handling 3 - SECURITY ENGINEERING * Security in the Engineering Lifecycle * System Component Security * Security Models * Controls and Countermeasures in Enterprise Security * Information System Security Capabilities * Design and Architecture Vulnerability Mitigation * Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems * Cryptography Concepts * Cryptography Techniques * Site and Facility Design for Physical Security * Physical Security Implementation in Sites and Facilities 4 - INFORMATION SECURITY MANAGEMENT GOALS * Organizational Security * The Application of Security Concepts 5 - INFORMATION SECURITY CLASSIFICATION AND PROGRAM DEVELOPMENT * Information Classification * Security Program Development 6 - RISK MANAGEMENT AND ETHICS * Risk Management * Ethics 7 - SOFTWARE DEVELOPMENT SECURITY * Software Configuration Management * Software Controls * Database System Security 8 - CRYPTOGRAPHY * Ciphers and Cryptography * Symmetric-Key Cryptography * Asymmetric-Key Cryptography * Hashing and Message Digests * Email, Internet, and Wireless Security * Cryptographic Weaknesses 9 - PHYSICAL SECURITY * Physical Access Control * Physical Access Monitoring * Physical Security Methods * Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered Online6 days, Jun 17th, 13:00 + 8 more
£3395

Complete Information Security

4.7(160)

By Janets

Register on the Complete Information Security today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The Complete Information Security is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! WHAT YOU GET WITH THE COMPLETE INFORMATION SECURITY * Receive a e-certificate upon successful completion of the course * Get taught by experienced, professional instructors * Study at a time and pace that suits your learning style * Get instant feedback on assessments  * 24/7 help and advice via email or live chat * Get full tutor support on weekdays (Monday to Friday) COURSE DESIGN The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of * Video lessons * Online study materials CERTIFICATION Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. WHO IS THIS COURSE FOR: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. REQUIREMENTS: The online training is open to all students and has no formal entry requirements. To study the Complete Information Security, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. 

Complete Information Security
Delivered Online On Demand
£25

gcp training in hyderabad

By gcpmasters

GCP provides infrastructure as a service (IaaS), platform as a service (PaaS), and serverless computing environments to help businesses build, deploy, and scale applications and services.

gcp training in hyderabad
Delivered Online On Demand
£500

EXIN Information Security Foundation based on ISO/IEC 27001 - Professional

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security professionals. This module is intended for everyone who is involved in the implementation, evaluation and reporting of an information security program, such as an Information Security Manager (ISM), Information Security Officer (ISO) or a Line Manager, Process Manager or Project Manager with security responsibilities. Basic knowledge of Information Security is recommended, for instance through the EXIN Information Security Foundation based on ISO/IEC 27001 certification. Overview The module Information Security Management Professional based on ISO/IEC 27001 (ISMP.EN) tests understanding of the organizational and managerial aspects of information security.The subjects of this module are: Information security perspectives: business, customer, service provider/supplier Risk Management: analysis, controls, remaining risks Information security controls: organizational, technical, physical. Information security is the preservation of confidentiality, integrity and availability of information (ISO/IEC 27000 definition). Information security is gaining importance in the Information Technology (IT) world. Globalization of the economy is leading to an ever-increasing exchange of information between organizations (their staff, customers and suppliers) and an explosion in the use of networked computers and computing devices. The core activities of many companies completely rely on IT. Enterprise resource planning (ERP) management systems, the control systems that govern how a building runs or a manufacturing machine functions, day-to-day communications - everything - runs on computers. The vast majority of information - the most valuable commodity in the world - passes through IT. Information is crucial for the continuity and proper functioning of both individual organizations and the economies they fuel; this information must be protected against access by unauthorized people, protected against accidental or malicious modification or destruction and must be available when it is needed. Companies and individual users of technology are also beginning to understand how important security is and are beginning to make choices based on the security of the technology or service. INFORMATION SECURITY PERSPECTIVES * The candidate understands the business interest of information security * The canidate understands the customer perspective on governance * The candidate understands the supplierïs responsibilities in security assurance RISK MANGEMENT * The candidate understands the principles of risk management * The candidate knows how to control risks * The candidate knows how to deal with remaining risks INFORMATION SECURITY CONTROLS * The candidate has knowledge of organizational controls * The candidate has knowledge of technical controls * The candidate has knowledge of physical, employment-related and continuity controls

EXIN Information Security Foundation based on ISO/IEC 27001 - Professional
Delivered on-request, onlineDelivered Online
Price on Enquiry

CND - EC Council Official Certified Network Defender

5.0(12)

By Nemstar Ltd

This is the perfect launch pad for a technical career in Cyber Security and fully prepares every delegate for the prestigious Certified Ethical Hacking (CEH) Course that comes next on the Cyber & Hacking Learning Pathways by Nemstar.

CND - EC Council Official Certified Network Defender
Delivered Online
Dates arranged on request
£3294

Educators matching "Information Security (IS)"

Show all 6
Eithne Leming Associates

eithne leming associates

Woodbridge

Eithne Leming has worked as a Teacher, Head Teacher, Education Consultant, Trainer and Writer. She has worked within mainstream education, special schools, and professional associations and for the Department of Education in a career that spans over 30 years. She is a member of the European register of NROLE (those Nationally Recognised as Outstanding Leaders in Education). OFSTED describe her as “A very effective and inspirational Leader who provides clear vision and direction.” She has project managed Additional Language Services, established a Parent Partnership Service in Suffolk that provided school improvement and parent support services as well as setting up PRU and Behavioural Support services. She has worked internationally as well as nationally and regularly speaks at Education Conferences. In addition for the last 10 years Eithne has written for magazines and publications such as the Heads Legal Guide, The Secondary Heads Association, Home-School Practice issues. During her years as a Head Teacher at First Base (a Pupil Referral Unit and Behaviour Support Service for 111 schools in Suffolk) she attracted national recognition for her innovative work with the main client group of 3 – 8 year olds and also for cross age tutoring of Key Stage 3 and 4 students (13 – 16 year olds) at risk of exclusion and disaffection. In recent years Eithne has gained experience in the National Strategies working in interim Regional Adviser roles for Early Years and also for School Improvement, providing advice and guidance to Local Authorities in Northamptonshire and more recently in Hounslow. Eithne's consultancy work in recent years has involved: training for teachers and headteachers in developing effective school improvement, schools and working in these areas at a more strategic level with Local Authorities. Eithne also provides parent and child coaching services and mentoring and coaching for headteachers and aspiring headteachers.

Shearwater Sailing School

shearwater sailing school

5.0(8)

Ipswich

As we are a small school, we can be very flexible with the full range of RYA courses we offer. From RYA Start Yachting to RYA Yachtmaster Offshore, and more. Not sure what course to take, or require something not listed below, we can help. Sailing.jpg RYA Competent Crew This is a 5 day practical course where you can achieve your first major sailing certificate. The RYA Competent Crew course is aimed at beginners to the world of sailing, with little or no experience, who want to become active crew members rather than just passengers. After the course, you will be able to steer a yacht, handle sails, keep a lookout, row a dinghy and assist in the day-to-day routines of sailing a yacht as well as rope handling and general duties. No age limit. 5 Day Sailing Course - £695 RYA Instructor/Student Ratio max 1:5. We normally sail with 1:4 Check Dates And Availability IMG_2589_cropped.JPG RYA Day Skipper The RYA Day Skipper practical course is aimed at aspiring skippers who have some yachting experience and basic navigation. You’ll learn to skipper short passages, enter and exit ports , emergency skills such as Man Overboard training and how to sail up to and tie up to a mooring buoy. To take this course, you must have completed at least 5 days, 100 miles and 4 night hours on board a sailing yacht, and must be 16 or older. 5 Day Sailing Course - £695 RYA Instructor/Student Ratio max 1:5. We normally sail with 1:4 Check Dates And Availability IMG_3247.JPG RYA Coastal Skipper Or Yachtmaster Offshore Prep The RYA Coastal Skipper practical course is aimed at yachtsmen and women with considerable knowledge of sailing and navigation who are wanting to undertake coastal passages by day and night. After this course, you will have the confidence to skipper a yacht on a coastal passage by day or night. Or if completing the Yachtmaster Offshore prep you will arrange with the school to book a RYA Examiner to take the 8/10 hour practical exam soon afterwards. To take this course(Coastal) you will have completed at least 15 days, 300 miles, 8 night hours and 2 days as skipper on board a sailing yacht, and must be 17 for Coastal and 18 for Yachtmaster Offshore for which you will need 2500 miles and three skippered passages over 60 miles plus 50 night hours. 5 Day Sailing Course - £695 RYA Instructor/Student Ratio max 1:5. We normally sail with 1:4 Check Dates And Availability 29FE2516-6577-497D-8408-48B6C4F6E63B.jpeg RYA VHF/DSC RADIO COURSE A radio is an important piece of safety equipment on board and it is vital to understand the correct procedures for using it and communicating with other boats and ground based stations. This course is a requirement for anyone who owns a fixed or handheld marine VHF radio. The Short Range Certificate (SRC) is the minimum qualification required by law to control the operation of VHF and VHF Digital Selective Calling (DSC) equipment on any British flagged vessel voluntarily fitted with a radio. Materials supplied. VHF book and exam paper. Age 16 to complete the exam but no age limit to complete the course. 1 Day Course - £120 + £60 fee Instructor/Student Ratio max 1:8 Check Dates And Availability CD6D9CE2-D2DD-4FB3-BB66-AB441E5D4595.jpeg First Aid The 1 day First Aid course covers all the usual first aid subjects, all from a boating perspective. Additionally, this course covers: drowning protocol, cold, shock and hypothermia, seasickness, dehydration and helicopter rescue. It is aimed at anyone who goes afloat, whether on inland waters, rivers, estuaries or on cross channel passages. In a medical emergency, a little first aid knowledge and immediate action can save lives, especially in remote locations. Materials supplied. First aid handbook 1 Day Course - £120 Instructor/Student Ratio max 1:8 Check Dates And Availability 4631236162.jpg London, France, Belgium & Holland Cruises We offer two fantastic mile building cruises. - 6 day cruise into London - 7 day cruise to France, Belgium and/or Holland. These are not only excellent for those who need to build up miles for their Yachtmaster certificates, but also a great way to get your Day Skipper or Coastal Skipper qualification. 7/10 Day Cruise Check Dates And Availability Sailing.jpg Start Yachting 2 Day course The Start Yachting course is a fantastic introduction to sailing for complete beginners. The 2 day Start Yachting course covers all the basics and essential skills needed to go on too, and complete the Competent Crew course in a reduced time of 3 days instead of the usual 5. Although not a requirement for the Competent Crew course, it does offer a great opportunity to get on the water and see what it's like before making the leap to a full 5 day course. You won't see this course listed in our course schedule, but it is offered during the first 2 days of any 5 day course. Get in touch for more details. Get In Touch To Find Out More 17522596_606534616220837_3554248376439535476_n.jpg Day Skipper Theory This course equips you with enough knowledge to navigate around familiar waters by day. A basic knowledge of lights is also included to introduce you to night cruising. Topics include: essentials of coastal navigation and pilotage chart work electronic charts position fixing plotting a course to steer weather forecasting & tides and much more… This course is taught over 40 hours plus two exam papers. Materials supplied. DS Theory pack, almanac, exam papers and certificate. 40 Hour Course Instructor/Student Ratio max 1:10 Check Dates And Availability IMG_0794.jpg Coastal Skipper/ Yachtmaster Offshore Theory This course is aimed at sailors who have completed the Day Skipper course and wish to take their sailing skills to the next level by focusing on advanced navigation and meteorology. Topics include: course shaping and plotting use of almanacs and admiralty publications plotting weather systems collision regulations and much more… The course is taught over 40 hours plus three exam papers. Materials supplied. YM theory pack, almanac, exam papers and certificate. 40 Hour Course Instructor/Student Ratio max 1:10 Check Dates And Availability Next Course Winter 2023 RYA Diesel Course This one-day beginners’ course will help you prevent and solve diesel engine failures. The course covers: Principles of diesel engine operation Systems and parts of the engine Fault finding Rectification of common problems Bleeding the fuel system Changing the impeller Routine maintenance Winter lay up procedures This course teaches you how your engine works, how to keep it healthy by using basic checks and maintenance procedures, and how to get it started again in the event of a breakdown. diesel-engine.png Find Out When In addition to the above RYA Courses, we also offer a range of flexible solutions to meet your needs. Family sails, lasting a day or a whole week with an instructor as skipper. Two day brush up sails. Two day ICC Training Course and Exam. Own Boat Tuition where an RYA Instructor assists you on your own boat. Please don’t hesitate to get in touch if you have any questions. Get In Touch Today 4634409373.jpg Hi Mark and Tom, Just wanted to say how much we enjoyed our introduction to sailing course last week - you were amazingly calm the entire time - even when that boat was heading towards us and we were packing the sail away as Cecily steered! We are all really looking forward to our holiday even more now and will send you a photo of us all - in Shearwater t-shirts of course! Hope you are surviving in this wet weather! We are v bored and would rather be sailing! Jude (Start Yachting) Subscribe Keep up today with all of our courses and specials by signing up to our regular newsletter. First Name Last Name Email Address SIGN UP We respect your privacy.