• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2472 Officer courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

NR Medical Training offers the Qualsafe First Response Emergency Care (FREC 3) Level 3 RQF, a nationally accredited qualification ideal for anyone aspiring to be a first responder. This course is tailored for a wide range of professionals, including police officers, firefighters, and event medical staff, as well as roles like Emergency/Community First Responders, Door Supervisors, and Security Guards.

FREC 3
Delivered in-person, on-requestDelivered In-Person in Bury St Edmunds & 1 more
Price on Enquiry

C)HISSP-Certified Health Information Systems Security Practitioner Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for IS Security Officers Privacy Officers Health IS Managers Risk Managers Information Security Managers Compliance and Privacy Officers Overview Upon completion, the student will be ready to take the Certified Healthcare Information Systems Security Practitioner exam by mile2. In addition, at the end of the CHISSP course, the student will be versed with best practices in the healthcare industry and will be able to establish a framework with current best practices in respects to privacy, regulation and risk management. The Certified Healthcare IS Security Practitioner, C)HISSP certification course covers the skills and knowledge to implement the best IT healthcare practices, as well as, regulatory compliance and standards in the healthcare industry. Because of growing industry regulations and privacy requirements in the healthcare industry, the C)HISSP was developed by Mile2. Graduates of this course have become vital in managing and protecting healthcare data and are tasked to protect patient information by implementing, managing, and assessing proper IT controls for patient health information integrity. COURSE OUTLINE * Intro to the Healthcare Industry * Regulatory Environment * Healthcare Privacy and Security Policies * Information Governance * Risk Management * Third-Party Risk Management

C)HISSP-Certified Health Information Systems Security Practitioner Mile 2
Delivered on-request, onlineDelivered Online
Price on Enquiry

ISO 45001 Lead Implementer

By Nexus Human

Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Individuals responsible for maintaining and improving the workplace safety, Occupational health and safety officers, consultants, and advisors, Professionals wishing to acquaint themselves with PECB's IMS2 Methodology for implementing an OH&S MS, Individuals responsible for maintaining the conformity of OH&S MS to ISO 45001 requirements, Members of OH&S teams, Individuals aspiring to pursue a career as OH&S MS implementers, consultants, or officers Overview Explain the fundamental concepts and principles of an occupational health and safety management system (OH&S MS) based on ISO 45001 Interpret the ISO 45001 requirements for an OH&S MS from the perspective of an implementer Initiate and plan the implementation of an OH&S MS based on ISO 45001, by utilizing PECB's IMS2 Methodology and other best practices Support an organization in operating, maintaining, and continually improving an OH&S MS based on ISO 45001 Prepare an organization to undergo a third-party certification audit This course is designed to equip you with the competence to establish, implement, manage, and maintain an occupational health and safety management system (OH&S MS) in accordance with ISO 45001:2018 requirements and guidance. This training course aims to provide an in-depth understanding of ISO 45001 requirements, as well as the best practices and approaches used for the implementation and subsequent maintenance of an OH&S MS. The ultimate ambition of this training course is to enable you to create the conditions for a safer workplace. INTRODUCTION TO ISO 45001 AND INITIATION OF AN OH&S MS IMPLEMENTATION * Training course objectives and structure * Standards and regulatory frameworks * Fundamental concepts and principles of OH&S * Initiation of the OH&S MS implementation * The organization and its context IMPLEMENTATION PLAN OF AN OH&S MS * Leadership and worker participation * OH&S MS scope * OH&S policy and objectives * Hazard identification and assessment of risks and opportunities IMPLEMENTATION OF AN OH&S MS * Resource management * Awareness and communication * Documented information management * Operations management * Emergency preparedness and response OH&S MS PERFORMANCE EVALUATION, CONTINUAL IMPROVEMENT, AND PREPARATION FOR THE CERTIFICATION AUDIT * Monitoring, measurement, analysis, and evaluation * Internal audit * Management review * Treatment of nonconformities and incidents * Continual improvement * Preparation for the certification audit * Closing of the training course

ISO 45001 Lead Implementer
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certified Information Privacy Manager (CIPM)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programmes Overview Principles of Privacy Program Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organization through process and technology?regardless of jurisdiction or industry. The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Manager (CIPM) certification program. Founded in 2000, the IAPP is the world?s largest and most comprehensive privacy resource with a mission to define, support and improve the Privacy profession globally. Every organization has data protection needs. Every day, we access, share and manage data across companies, continents and the globe. Knowing how to implement a privacy program is an invaluable skill that will help you protect your organization?s data?and take your career to the next level. Our Principles of Privacy Program Management training is the premier course on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a privacy team. INTRODUCTION TO PRIVACY PROGRAM MANAGEMENT * Privacy program management responsibilities * Accountability in privacy program management PRIVACY GOVERNANCE * Considerations for developing and implementing a privacy program * Position of the privacy function within an organization * Role of the DPO * Program scope and charter * Privacy strategy * Support and ongoing involvement of key functions and privacy frameworks APPLICABLE LAWS AND REGULATIONS * The regulatory environment * Common elements across jurisdictions * Strategies for aligning compliance with organizational strategy DATA ASSESSMENTS * Practical processes for creating and using data inventories/maps * Generating and applying gap analyses * Privacy assessments * Privacy impact assessments/data protection impact assessments * Vendor assessments POLICIES * Common types of privacy-related policies * Policy components * Strategies for implementation DATA SUBJECT RIGHTS * Operational considerations for communicating and ensuring data subject rights * Privacy notice * Choice and consent * Access and rectification * Data portability * Erasure TRAINING AND AWARENESS * Developing privacy training and awareness programs * Implementing privacy training and awareness programs PROTECTING PERSONAL INFORMATION * Holistic approach to protecting personal information * Privacy by design DATA BREACH INCIDENT PLANS * Planning for a data security incident or breach * Responding to a data security incident or breach MONITORING AND AUDITING PROGRAM PERFORMANCE * Common practices for monitoring privacy program performance * Measuring, analyzing and auditing privacy programs ADDITIONAL COURSE DETAILS: Nexus Humans Certified Information Privacy Manager (CIPM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Manager (CIPM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Information Privacy Manager (CIPM)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certified Information Privacy Professional (CIPP/CAN)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection OfficersData Protection ManagersAuditorsLegal Compliance OfficersSecurity ManagerInformation ManagersAnyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they?ve gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure their place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. COMMON PRINCIPLES AND APPROACHES TO PRIVACY * This unit includes a brief discussion about the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles. JURISDICTION AND INDUSTRIES * This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors. INFORMATION SECURITY: SAFEGUARDING PERSONAL INFORMATION * This unit presents introductions to information security, including definitions, elements, standards, and threats/ vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM). ONLINE PRIVACY: USING PERSONAL INFORMATION ON WEBSITES AND WITH OTHER INTERNET-RELATED TECHNOLOGIES * This unit focuses on the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children?s online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices. CANADIAN LEGAL FRAMEWORK * This unit provides an introduction to the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. CANADIAN PRIVATE-SECTOR PRIVACY LAWS * This unit focuses on the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. CANADIAN PUBLIC-SECTOR PRIVACY LAWS * This unit highlights key concepts and practices related to the collection, retention, use, disclosure and disposal of personal information by federal, provincial and territorial governments. HEALTH INFORMATION PRIVACY LAWS * This unit touches on the applicability and purpose of health information privacy laws. PRIVATE-SECTOR COMPLIANCE PRACTICES * This unit delves into the components that make up compliance regulations, including Generally Accepted Privacy Principals and security breach notification, and also examines compliance track records and Federal Commissioner Findings. PUBLIC-SECTOR COMPLIANCE PRACTICES * This unit presents the various methods that can be implemented for compliance in the public sector, such as privacy impact assessments and data sharing agreements. In addition, it discusses the challenges presented by digital information exchanges, as well as non-legislative considerations. HEALTH-SECTOR COMPLIANCE PRACTICES * This unit covers the issues presented with digital compliance in the health sector. ADDITIONAL COURSE DETAILS: Nexus Humans Certified Information Privacy Professional (CIPP/CAN) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Professional (CIPP/CAN) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Information Privacy Professional (CIPP/CAN)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certified Information Privacy Professional (CIPP/US)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. The Certified Information Privacy Professional/United States (CIPP/US) program, developed by the International Association of Privacy Professionals (IAPP) - the world?s largest comprehensive global information privacy community and resource, was the first professional certification ever to be offered in information privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations and understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S., the EU and other jurisdictions.This course will provide you with a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. INTRODUCTION TO PRIVACY * Modern history of privacy * Introduction to personal information * Overview of data protection roles * Summary of modern privacy frameworks STRUCTURE OF U.S. LAW * Structure and sources of U.S. law and relevant terms * Governmental bodies having privacy and information security authority GENERAL DATA PROTECTION REGULATION OVERVIEW (GDPR) * High-level overview of the GDPR * Significance of the GDPR to U.S. organizations * Roles and responsibilities outlined in the law CALIFORNIA CONSUMER PRIVACY ACT OF 2018 (CCPA) * High-level overview of the newly passed California Consumer Privacy Act of 2018 * Scope * Consumer rights * Business obligations * Enforcement ENFORCEMENT OF U.S. PRIVACY AND SECURITY LAWS * Distinguishing between criminal and civil liability * Comparing federal and state authority * Theories of legal liability * Enforcement powers and responsibilities of government bodies, such as the FTC and state attorneys general INFORMATION MANAGEMENT FROM A U.S. PERSPECTIVE * Developing a privacy program * Role of privacy professionals and accountability * Employee training * User preferences * Managing vendors * Data classification FEDERAL VERSUS STATE AUTHORITY * Differences between federal and state authority * Preemption HEALTHCARE * Privacy laws in healthcare * Major components of HIPAA * Development of HITECH * Privacy protections mandated by other significant healthcare laws FINANCIAL PRIVACY * Goals of financial privacy laws * Key concepts of FCRA, FACTA and GLBA * Red Flags Rule, Dodd-Frank and consumer protection laws EDUCATION * Privacy rights and protections under FERPA * Recent amendments provided by PPRA and NCLBA TELECOMMUNICATIONS AND MARKETING * Rules and regulations of telecommunications entities * Laws that govern marketing * Addressing privacy in the digital advertising LAW ENFORCEMENT AND PRIVACY * Privacy laws on intercepting communication * Telecommunications industry and law enforcement * Laws ensuring rights to financial privacy NATIONAL SECURITY AND PRIVACY * Rules and regulations on intercepting communication * Evolution of the law * Collaboration of government agencies and private companies to improve cybersecurity CIVIL LITIGATION AND PRIVACY * Privacy issues related to litigation * Electronic discovery, redaction and protective orders * U.S. discovery rules versus foreign laws LEGAL OVERVIEW OF WORKPLACE PRIVACY * Federal and state laws regulating and protecting employee privacy * Federal laws prohibiting discrimination PRIVACY BEFORE, DURING AND AFTER EMPLOYMENT * Lifecycle of employee privacy * Background screening * Employee monitoring * Investigating misconduct and termination * Antidiscrimination laws * ?Bring your own device? policies STATE DATA SECURITY LAWS * State laws impacting data security * Social Security number use regulation * Laws governing data destruction DATA BREACH NOTIFICATION LAWS * Scope of state data breach notification law * Nine elements of state data breach notification laws * Major differences in state laws

Certified Information Privacy Professional (CIPP/US)
Delivered on-request, onlineDelivered Online
Price on Enquiry

C)PEH - Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IS Security Owners Security Officers Ethical Hackers Information Owners Penetration Testers System Owners and Managers Cyber Security Engineers Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the C)PEH exam. To protect an information system you need to be able to see that system through the eyes of the attacker.ÿThe Certified Professional Ethical Hackerÿcertification course is the foundational training to Mile2?s line of penetration testing courses because it teaches you to think like a hacker.ÿ Therefore, you can set up dynamic defenses to prevent intrusion. First, you will learn the value of vulnerability assessments.ÿ Then, you will discover how to use those assessments to make powerful changes in an information system?s security. Additionally, you will learn how malware and destructive viruses function and how to implement counter response and preventative measures when it comes to a network hack. COURSE INTRODUCTION * Introduction to Ethical Hacking * Linux Fundamentals * Protocols * Cryptography * Password Cracking * Malware * Security Devices * Information Gathering ? Passive Reconnaissance * Social Engineering * Active Reconnaissance * Vulnerability Assessment * Network Attacks * Hacking Servers * Hacking Web Technologies * Hacking Wireless Technologies * Maintaining Access and Covering Tracks

C)PEH - Certified Professional Ethical Hacker
Delivered on-request, onlineDelivered Online
Price on Enquiry

C)DRE-Certified Disaster Recovery Engineer Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers DR and BCP Engineers Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Disaster Recovery Engineer students will be able to establish industry acceptable DR & BCP standards with current best practices and policies. Students will also be prepared to competently take the C)DRE exam. A Certified Disaster Recovery Engineer, C)DRE, is the superhero of an information System! When a business is hit by a natural disaster, cybercrime or any other disruptive tragedy, how should the organization react? What if the network infrastructure is taken down? Will the business be able to continue operations? How much will it cost if the business is down during repairs? The answer is found in theÿ Certified Disaster Recovery Engineer certification course. Disaster recovery and business continuity planning is the process of having a professional work with a business to prepare processes, policies, and procedures to follow in the event of a disruption. The C)DRE prepares students to plan and present the latest methodologies and best practices for real-world system recovery. COURSE OUTLINE * Welcome to Disaster Recovery Training * Business Impact Analysis * Risk Analysis * Design & Development Phase (BCP Strategies) * IT Recovery Strategies * Implementation Phase * Testing and Exercise * Maintenance and Updating * Pandemics * Case Studies and Templates

C)DRE-Certified Disaster Recovery Engineer Mile 2
Delivered on-request, onlineDelivered Online
Price on Enquiry

C)ISRM - Certified Information System Risk Manager Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Information Systems Risk Manager students will be prepared to pass the CISRM exam.  Certified Information Systems Risk Manager, CISRM, course is made for IT and IS professionals who are involved with all aspects of risk management. Requests for this particular area of certification is growing fast in the employment sector. Recent high-profile breaches in both the public and private sectors have increased awareness for the need for Risk Management professionals. Mile2?s CISRM certification exam will test your knowledge in all areas of risk management. If you would like some training and test preparation before taking the Certified Information System Risk Manager Exam we offer the CISRM course as both a live class and a self-study combo. First, you will learn to assess a system, then implement risk controls. Finally, you will be able to monitor and maintain risk procedures. With this training, you will be able to identify risks associated with specific industries. After course completion, you will be able to design, implement, monitor and maintain risk-based, efficient and effective IS controls. Knowledge of all of these areas will be required to pass the CISRM exam. COURSE OUTLINE * The Big Picture * Domain 1 ? Risk Identification Assessment and Evaluation * Domain 2 ? Risk Response * Domain 3 ? Risk Monitoring * Domain 4 ? IS Control Design and Implementation

C)ISRM - Certified Information System Risk Manager Mile 2
Delivered on-request, onlineDelivered Online
Price on Enquiry

C)TIA - Certified Threat Intelligence Analyst Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Threat Intelligence Analyst students will be able to proactively collect threat data and implement strategies to limit exposure to those threats. Additionally, they will be prepared to take the C)TIA exam Everywhere you turn today, you hear about the need for threat intelligence analysis! However, in some cases, it is just a buzzword, while in other cases, threat intelligence is being touted as the remedy toward advanced persistent threats. The real question is, how do we leverage threat intelligence to reduce network vulnerabilities without wasting time and money? The answer is simple, Mile2?s Certified Threat Intelligence Analyst course. Mile2?s CTIA course will help security professionals learn how to make good use of the many sources of threat intelligence. It will aid an individual to understand what threat sources are helpful, which specific threats are targeted and which ones may need minor adjustments to monitor within your organization. Mile2?s CTIA course focuses heavily on hands-on labs, concentrating on discerning and interpreting threats and responding to them.ÿ The CTIA course focuses overall on current significant threats, threat actors, and identification procedures so that cyber-security professionals can implement the best policies and procures for their organizational security posture. Once complete, the student will be competent toward improving a company?s existing security infrastructure. Policies and methodologies learned in the CTIA will allow the student to use threat intelligence concepts to decrease overall company risk. COURSE OUTLINE * Threat Intelligence Basics * Cyber Threats * Threat Actors * Case Studies * Threat Identification * Proactive Approach

C)TIA - Certified Threat Intelligence Analyst Mile 2
Delivered on-request, onlineDelivered Online
Price on Enquiry