• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

25 Privacy courses in Birmingham

Certified Artificial Intelligence Practitioner

By Mpi Learning - Professional Learning And Development Provider

This course shows you how to apply various approaches and algorithms to solve business problems through AI and ML, follow a methodical workflow to develop sound solutions, use open-source, off-the-shelf tools to develop, test, and deploy those solutions, and ensure that they protect the privacy of users. This course includes hands-on activities for each topic area.

Certified Artificial Intelligence Practitioner
Delivered in-person, on-request, onlineDelivered Online & In-Person in Loughborough
£595

This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects.

Cyber Secure Coder
Delivered in-person, on-request, onlineDelivered Online & In-Person in Loughborough
£350

Security+

5.0(3)

By Systems & Network Training

SECURITY+ TRAINING COURSE DESCRIPTION A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. WHAT WILL YOU LEARN * Explain general security concepts. * Describe the security concepts in communications. * Describe how to secure an infrastructure. * Recognise the role of cryptography. * Describe operational/organisational security. SECURITY+ TRAINING COURSE DETAILS * Who will benefit: Those wishing to pass the Security+ exam. * Prerequisites: TCP/IP foundation for engineers * Duration 5 days SECURITY+ TRAINING COURSE CONTENTS * General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. * Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. * Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. * Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. * Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2797

Essential WiMax

5.0(3)

By Systems & Network Training

WIMAX TRAINING COURSE DESCRIPTION Broadband wireless access is an emerging technology area. This course looks at WiMAX, where it can be used, how it works and the alternative technologies. WHAT WILL YOU LEARN * Describe WiMAX. * Explain how WiMAX works. * Compare and contrast WiMAX with alternative broadband wireless access technologies. WIMAX TRAINING COURSE DETAILS * Who will benefit: Anyone wishing to know more about WiMAX. * Prerequisites: None. * Duration 2 days WIMAX TRAINING COURSE CONTENTS * Introduction What is WiMAX? WiMAX applications, The Internet, Internet access choices, wireless broadband access, WiMAX benefits. * WiMAX overview Spectrums, LOS vs. non-LOS, bit rates, modulation, mobility, channel bandwidth, cell radius. * WiMAX standards The WiMAX forum, IEEE, ETSI, HIPERACCESS, HIPERMAN, 802.16, 802.16-2004, 802.16a, 802.16e, 802.16f. * WiMAX architecture Subscriber Stations (SS), Indoors, outdoors, antennas, Radio Base Stations (BS), LOS, Non LOS BackHaul, Point to multipoint, mesh support. * Physical layer 10 - 66GHz, TDMA, TDD, FDD, 2 -11 GHz, SC2, OFDM, OFDMA, QPSK, QAM, Radio Link Control (RLC), uplink, downlink. * MAC layer Traffic types (continuous, bursty), QoS, service types. MAC operations, connection oriented, frame structure, addressing. Convergence sublayers, service specific, common part, profiles (IP, ATM). Bandwidth request-grant, ARQ, Management messages. * Security MAC privacy sublayer, network access authentication, AAA, 802.1x, key exchange and privacy. * WiMAX alternatives WiMAX vs. 3G, WiMAX vs. 802.20.

Essential WiMax
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1727

Essential Lawful Intercept

5.0(3)

By Systems & Network Training

LAWFUL INTERCEPT TRAINING COURSE DESCRIPTION Packet based networks require a different approach to Lawful Intercept (LI) than that used in circuit switched networks. This course focuses on what Lawful Interception and Data Retention (DR) means to communications service providers in the IP and NGN areas. The course assumes a basic knowledge of IP networking (i.e. DNS, TCP/UDP, IP, RTP) and the building of services on an IP platform (e.g. SIP, SDP, FTP, HTTP). The course first looks at the regulatory context for LI and DR and how this is translated to a practical architecture. WHAT WILL YOU LEARN * Recognise the legal and regulatory obligations to provide LI and DR. * Identify the components of the handover architecture for each of LI and DR. * Identify the preferred location of points of interception and points of retention in the IP network. * Map intercepted material to handover protocols. * Understand the data mapping defined in the available standards for both LI and DR. LAWFUL INTERCEPT TRAINING COURSE DETAILS * Who will benefit: Technical and managerial staff needing to implement public networks. * Prerequisites: TCP/IP Foundation * Duration 1 day LAWFUL INTERCEPT TRAINING COURSE CONTENTS * What is meant by LI and DR? Review of regulation: Data protection Directive; Data Retention Directive; RIPA. * LI architectures Handover and Interception: ETSI standards ES 201 671 and TS 102 232. * LI handover protocol IRI and CC handover; correlation; manual interfaces. * DR architectures Handover of query results; points of retention. * DR query command set Retrieval of retained records. * Security concerns Operation privacy; target privacy; storage and transmission integrity. * Implementation Identifying PoI and PoR for provided services. * LI and DR wrap up Interaction with other services, storage obligations (volume, time, availability).

Essential Lawful Intercept
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1397

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

PENETRATION TESTING TRAINING COURSE DESCRIPTION An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. WHAT WILL YOU LEARN * Perform penetration tests. * Explain the technical workings of various penetration tests. * Produce reports on results of penetration tests. * Defend against hackers. PENETRATION TESTING TRAINING COURSE DETAILS * Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. * Prerequisites: IP Security IP VPNs * Duration 5 days PENETRATION TESTING TRAINING COURSE CONTENTS * Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. * Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering * Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. * Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. * Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. * Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. * Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. * Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. * DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. * SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. * Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. * Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. * Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Session Border Controllers for engineers

5.0(3)

By Systems & Network Training

SESSION BORDER CONTROLLERS COURSE DESCRIPTION A hands on course covering Session Border Controllers with a focus on the technical workings of features commonly found in Session Border Controllers. Hands on practicals follow each major theory session. WHAT WILL YOU LEARN * Explain how Session Border Controllers work. * Explain the SIP call flow using a SBC. * Deploy Session Border Controllers * Describe the features found in Session Border Controllers. SESSION BORDER CONTROLLERS COURSE DETAILS * Who will benefit: Technical staff working with SIP. * Prerequisites: Definitive SIP for engineers * Duration 2 days SESSION BORDER CONTROLLERS COURSE CONTENTS * SIP review Signalling, media, RTP, SIP, peer to peer, SIP proxies, SIP call flows. Hands on: SIP packet analysis. * Session Border Controllers What is a SBC? SBC features, peering scenario, access scenario, NNI SBC, UNI SBC, enterprise SBC. Hands on: SBC call flows * SBC topology hiding Header privacy, B2BUA. Hands on: Header analysis. * Session control Call admissions, QoS, statistics and billing, redundancy and scalability. Hands on: SBC session control * SBC and NAT NAT traversal, STUN, ICE, NAT and SIP, NAT and RTP. Hands on: SBC and NAT traversal. * SBC and security DoS, access control, encryption, authentication, toll fraud, regulatory issues, lawful intercept. Hands on: Security. * Interoperability mediation Manipulating SIP headers, IMS, IETF, TISPAN, SIP-I. SBC interworking.

Session Border Controllers for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2477

Definitive Kerberos for engineers

5.0(3)

By Systems & Network Training

KERBEROS FOR ENGINEERS TRAINING COURSE DESCRIPTION This hands on course covers the details of Kerberos, from installation and administration through to how it all works including the protocols. WHAT WILL YOU LEARN * Describe what Kerberos is. * Explain how Kerberos works. * Install Kerberos. * Configure Kerberos. * Troubleshoot Kerberos. KERBEROS FOR ENGINEERS TRAINING COURSE DETAILS * Who will benefit: Engineers interested in security. * Prerequisites: TCP/IP foundation for engineers * Duration 2 days KERBEROS FOR ENGINEERS TRAINING COURSE CONTENTS * What is Kerberos? Single Sign On, The protocol, the standard, history, v4, v5, RFCs, Linux, Windows. * Kerberos concepts and technology AAA, Authentication, Authorization, Accounting. Kerberos vs LDAP and directories. Privacy, integrity. Kerberos realms, principles, instances. Keys, salts, passwords. Key Distribution Centre, Authentication server, ticket granting server. Tickets. * Installation and administration of Kerberos Installing Kerberos, creating realms, testing. DNS and Kerberos, Kerberos clients. Hands on Windows and Linux Kerberos. * Kerberos protocols The Needham-Schroeder protocol, Kerberos v4. Authentication server, ticket granting server, Kerberos v5, encryption options, ticket options, other protocol features and extensions. Related protocols: GSSAPI, SPNEGO. Hands on Using Wireshark to 'see' Kerberos. * Troubleshooting Kerberos Approach, debugging tools, errors and solutions. Hands on Kerberos troubleshooting. * Kerberos security concerns Kerberos attacks, protocol security issues. Dictionary attacks, brute force attacks, replay attacks, MITM attacks, security solutions, protecting the KDC, firewalls, NAT and Kerberos. Hands on Kerberos logging. * Software which uses Kerberos Kerberos logins, Kerberos and web based applications, Directory services. * Advanced Kerberos issues Cross realm authentication, Windows issues, Windows and UNIX interoperability, Hands on Using a Windows DC for UNIX clients.

Definitive Kerberos for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2477

Definitive H.323 for engineers

5.0(3)

By Systems & Network Training

H.323 TRAINING COURSE DESCRIPTION A hands on course covering IP telephony with H.323. The course starts with a brief review of knowledge students should already possess including RTP and RTCP. The main focus is on H.323 protocols though, progressing from what H.323 is through signalling, call processing and architectures, moving onto more advanced issues including security, multimedia, conferencing, and interoperability. Hands on practicals follow each major theory session. WHAT WILL YOU LEARN * Explain how H.323 works. * Analyse H.323 packets. * Deploy H.323 IP telephony solutions. * Integrate H.323 with other telephony solutions. H.323 TRAINING COURSE DETAILS * Who will benefit: Technical staff working with H.323 * Prerequisites: Voice Over IP * Duration 2 days H.323 TRAINING COURSE CONTENTS * VoIP review Brief review of VoIP, IP, telephones and voice. RTP, RTCP, mixers and translators. * What is H.323? The framework, Why H.323, history, H.323 standards and the ITU, H.323 versions 1,2,3,4, and 5, Annexes and Appendices, capabilities, services, How H.323 works, a basic call. * H.323 protocol stack The overall framework, Audio codecs (H.7xx), Video codecs (H.26x), T.120 data conferencing. * H.323 Architecture Endpoints: Terminals, MCUs, gateways. Gatekeepers, border and peer elements, design issues, signalling with and without gatekeepers. * H.225 Packet format, ASN.1, Information elements, Call setup, Call control. * Gatekeepers Gatekeeper features, admissions, address translation, bandwidth management, call routing, zones, administrative domains, gatekeeper discovery, call establishment, fast connect. RAS packet formats, RAS signalling. Alternate gatekeepers. * H.245 Purpose, call control channel, relationship with H.225, message format, tunnelling. * H.323 Supplementary services Conferencing: point to point, multipoint, hybrid, broadcast, H.332. H.450.x. Call transfer, diversion, hold and waiting. Remote device control (H.282, H.283). Capability exchange, Video. * Security H.235. Authentication, privacy, transport layer level security. * Interoperability Gateways, Inter working with PSTN, SIP and H323. H.246. * Annexes and Appendices An overview.

Definitive H.323 for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2477

Certified Internet of Things Practitioner

By Mpi Learning - Professional Learning And Development Provider

In this course, students will learn general strategies for planning, designing, developing, implementing, and maintaining an IoT system through various case studies and by assembling and configuring an IoT device to work in a sensor network.

Certified Internet of Things Practitioner
Delivered in-person, on-request, onlineDelivered Online & In-Person in Loughborough
£350

Educators matching "Privacy"

Show all 4
Mid-View Healthcare Ltd

mid-view healthcare ltd

England

At Mid-View Healthcare we treat our clients and their service users like our family, because they are!. We are a nursing agency that provide temporary staffing to care homes and private hospitals across England. Aside from our commitment to providing professional care, our unique modern approach to care delivery leads to a relationship-oriented care experience for both our clients and their service users. At Mid-View Healthcare, we are always on the lookout for passionate and committed individuals to join our team. We are a highly efficient care agency, who prides themselves on offering an excellent service to our clients. We aim to deliver an outstanding and evolving recruitment process that is relevant and suitable to the interest of the industry. We understand that not one care plan fits all. Our daily services can include anything from meal preparation, hygiene, cleaning, and supervision or specific tasks discussed with our clients. We offer skilled care support for Residential and Nursing homes that may need additional support. In other that, their service users achieve their optimum state of health and well-being. We treat all people supported by us and all people who work here with respect at all times. We uphold the human and citizenship rights of all who work for us. We support individual choice and personal decision-making as the right of all Service Users. We respect and encourage the right of independence of all Service Users. We recognise the individual uniqueness of Service Users, staff and visitors, and treat them with dignity and respect at all times. We respect individual requirements for privacy at all times and treat all information relating to individuals in a confidential manner. We will listen to your concerns and work with you to find a resolution on any complaints in a timely manner. We recognise the individual need for personal fulfilment and offer individualised programmes of meaningful activity to satisfy the need of our clients and staff.

Af Academy

af academy

Tamworth

Private support of the Air Force Academy provides so much more than a margin of excellence, a higher education phrase used to describe the role of private philanthropy. Your impact is, in fact, immeasurable. Our focus on “More than a Margin” is a celebration of the generous individuals who make our mission possible. It more adequately describes the true impact of private support. We believe strongly, as many do, that our Academy is a vital national resource — one that is deserving of our emotional and financial support. The Academy's mission is simply too important to leave to the vagaries of federal funding alone. As a result, the Air Force Academy Foundation (formerly the USAFA Endowment) will work actively to identify and to cultivate key relationships with current and potential Academy donors to support the superintendent's strategic priorities. We also believe that a foundation, singularly charged with the abiding stewardship of donated funds and constituted in such a way as to ensure the permanency and efficacy of the gift, is the most effective structure for providing this support to the Academy. As a result, the founders of the Air Force Academy Foundation chose to establish a new type of foundation and to memorialize a number of unique Founding Principles into the organizational bylaws. Founding Principles Our board of directors is stable and independent. The structure of the Air Force Academy Foundation is such that donors can have confidence that their gifts will be stewarded carefully and consistently over time by other donors. We are committed to a positive and supportive approach. The singular role of the Air Force Academy Foundation is to provide financial support for vital Academy programs. We will not make any public pronouncements on the policy decisions of the Academy or the Air Force. We are fully transparent. Our operations have complete audit and donor visibility annually. Annual reports are provided to each donor — both for the Air Force Academy Foundation as a whole, and for each donor's individual gift. Our Commitment to Donors We hold donor service first and foremost. We commit to integrity and transparency in all our dealings. We will recognize our donors' contributions while respecting donor-requested privacy. We seek perfection in every written communication and report we produce. We under-promise, over-prepare, and over-deliver. We get the job done regardless of who gets the credit. We welcome constructive criticism. We seek continuous improvement in every aspect of our operation. Cooperation and respect characterize our interactions with each other and the outside world. Quality preempts quantity. Execution supersedes intention.