• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1488 Privacy courses

Dignity & Privacy Course Online

By Lead Academy

This Course at a Glance * Define dignity and privacy within the healthcare sector * Understand how dignity and privacy are linked or interdependent * Know how to achieve the 10-Point Challenge * Understand dignity and privacy from the service user's point of view * Identify the needs and wants of the service users * Demonstrate the importance of the service user's choice in terms of dignity and privacy * Learn how to help service users in making informed choices * Know how to set up the right working relationship with the service users * Recognise the steps that require to be taken to increase the service user's sense of dignity * Know how to establish effective communication with service users * Understand the importance of proper pain management * Know how the eating habits and nutritional needs are linked with dignity and privacy * Understand how to maintain equality and diversity in a care setting * Demonstrate the simple ways to protect the privacy and recognise the risk of self-neglect * Know how to overcome the barriers to dignity and privacy DIGNITY & PRIVACY COURSE OVERVIEW When working with people in a caring setting, the two most important attributes to have are dignity and privacy, both of which should be respected at all times. Additionally, medical practitioners in the United Kingdom are required to follow the General Medical Council's 'Good Medical Practice' guidelines, which mandate that they must 'treat patients as individuals and respect their dignity and privacy.' This Privacy and Dignity in Care course is designed to assist healthcare professionals to promote and protect the dignity and privacy of those in their care. This course covers the definition of dignity and privacy in the healthcare industry, as well as an explanation of how the two are frequently intertwined. It also includes a number of professional tips on how to develop positive working relationships with your service users, as well as an explanation of how to overcome hurdles to dignity and privacy in a care setting. Poor or uneven standards of dignity and respect are experienced by 23% of patients in the UK which approximates about 2.8 million people per year. Moreover, people tend to seek medical help at a very vulnerable and fragile time in their lives. Therefore, taking care of people as individuals and treating them with the respect they deserve is vital as it helps them feel supported and safe, resulting in high patient satisfaction. Upon successful completion of this Privacy and Dignity in Care course, you will be able to promote and uphold the dignity and privacy rights of the people under your care. WHO SHOULD TAKE THIS COURSE? This Privacy and Dignity in Care course is suitable for: * Nurse * Care workers * Healthcare assistants (HCAs), * Support workers * Care assistants * Community services * Social care workers * Volunteers Although this course on Privacy and Dignity in Care is primarily designed for Care and Support Workers who work in a social care context; it may also be useful to a broader audience of persons interested in learning more about dignity and privacy legislation, as well as how to build effective working relationships with those in need. ENTRY REQUIREMENTS * There are no academic entry requirements for this Dignity & Privacy Course Online course, and it is open to students of all academic backgrounds. * However, you are required to have a laptop/desktop/tablet or smartphone and a good internet connection. ASSESSMENT METHOD This Privacy and Dignity in Care Course assesses learners through multiple-choice questions (MCQs). Upon successful completion of each module, learners must answer MCQs to step into the next module. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 75%. COURSE CURRICULUM Module 1: Overview of the Course Module 2: Understanding the Principles Module 3: Dignity - Good Practice Part 1 Module 4: Dignity - Good Practice Part 2 Module 5: Privacy - Good Practice Module 6: Self-care Module 7: Overcoming Barriers to Dignity and Privacy RECOGNISED ACCREDITATION CPD CERTIFICATION SERVICE This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Many organisations look for employees with CPD requirements, which means, that by doing this course, you would be a potential candidate in your respective field. QUALITY LICENCE SCHEME ENDORSED The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. It will give you a competitive advantage in your career, making you stand out from all other applicants and employees.     CERTIFICATE OF ACHIEVEMENT ENDORSED CERTIFICATE FROM QUALITY LICENCE SCHEME After successfully passing the MCQ exam you will be eligible to order the Endorsed Certificate by Quality Licence Scheme. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. It will give you a competitive advantage in your career, making you stand out from all other applicants and employees. There is a Quality Licence Scheme endorsement fee to obtain an endorsed certificate which is £65. CERTIFICATE OF ACHIEVEMENT FROM LEAD ACADEMY After successfully passing the MCQ exam you will be eligible to order your certificate of achievement as proof of your new skill. The certificate of achievement is an official credential that confirms that you successfully finished a course with Lead Academy. Certificate can be obtained in PDF version at a cost of £12, and there is an additional fee to obtain a printed copy certificate which is £35.   FAQS IS CPD A RECOGNISED QUALIFICATION IN THE UK? CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD-certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. ARE QLS COURSES RECOGNISED? Although QLS courses are not subject to Ofqual regulation, they must adhere to an extremely high level that is set and regulated independently across the globe. A course that has been approved by the Quality Licence Scheme simply indicates that it has been examined and evaluated in terms of quality and fulfils the predetermined quality standards. WHEN WILL I RECEIVE MY CERTIFICATE? For CPD accredited PDF certificate it will take 24 hours, however for the hardcopy CPD certificate takes 5-7 business days and for the Quality License Scheme certificate it will take 7-9 business days. CAN I PAY BY INVOICE? Yes, you can pay via Invoice or Purchase Order, please contact us at info@lead-academy.org for invoice payment. CAN I PAY VIA INSTALMENT? Yes, you can pay via instalments at checkout. HOW TO TAKE ONLINE CLASSES FROM HOME? Our platform provides easy and comfortable access for all learners; all you need is a stable internet connection and a device such as a laptop, desktop PC, tablet, or mobile phone. The learning site is accessible 24/7, allowing you to take the course at your own pace while relaxing in the privacy of your home or workplace. DOES AGE MATTER IN ONLINE LEARNING? No, there is no age limit for online learning. Online learning is accessible to people of all ages and requires no age-specific criteria to pursue a course of interest. As opposed to degrees pursued at university, online courses are designed to break the barriers of age limitation that aim to limit the learner's ability to learn new things, diversify their skills, and expand their horizons. WHEN I WILL GET THE LOGIN DETAILS FOR MY COURSE? After successfully purchasing the course, you will receive an email within 24 hours with the login details of your course. Kindly check your inbox, junk or spam folder, or you can contact our client success team via info@lead-academy.org

Dignity & Privacy Course Online
Delivered Online On Demand
£20

Cybersecurity Law And Digital Privacy Course

By Elearncollege

DESCRIPTION Cybersecurity Law and Digital Privacy Diploma   As the importance of technology increases and digitisation progresses, the necessity to continuously evaluate their IT infrastructure and the technological safeguards in place to protect their most valuable information assets and data is essential. It is necessary to implement cutting-edge cybersecurity solutions to combat emerging threats. Nonetheless, this is not sufficient to assure compliance with cybersecurity rules. Implementing a cybersecurity policy that sufficiently defends against would-be attackers and guarantees compliance with applicable regulations is one of the most significant problems for firms. This is more complicated since there is no one 'cybersecurity legislation' in the United Kingdom. Some regulations impose cybersecurity requirements on all firms and legislation that applies to businesses within certain industries and meets specified conditions.   Where the law in the United Kingdom does establish cybersecurity duties, firms often have the latitude and discretion to determine how to comply. This adaptability is crucial since the risks offered by potential attackers are continually and swiftly growing. Businesses are typically static targets, which benefits potential attackers. Therefore, businesses must use their limited resources to guarantee that their defence strategies and technologies remain appropriate and guard against the largest risks and vulnerabilities detected. The measures must also be appropriate for each firm, considering its conditions, risk level, technological status, and implementation expense.   Although the legislation does not penalise organisations for falling victim to cyberattacks, fines will be levied for failing to establish steps to protect systems and data from potential attackers and poor responses to assaults. This Cybersecurity Law and Digital Privacy Diploma course is designed for professionals who wish to succeed in their respective fields. This course covers all the skills and information required to become an expert in this profession. This Cybersecurity Law and Digital Privacy Diploma course will provide you with practical knowledge and insight from industry leaders and practitioners.   The Cybersecurity Law and Digital Privacy Diploma course introduces Cyber Security Law and develops to disseminate professional information. This course will offer a comprehensive overview of Cyber Security Law, covering key ideas, application tactics, and in-depth knowledge.   With Cybersecurity Law and Digital Privacy Diploma course, you may develop your professional knowledge and acquire new skills while working at home at your own pace. Cyber security Law has been expertly designed for distance e-learning so that you may acquire a professional degree without ever leaving your house!   After this course, you will have acquired thorough knowledge and practical competencies. The course also has an E-certificate, which may help you stand out on the job market by enhancing your résumé.   By completing this thorough Cybersecurity Law and Digital Privacy Diploma course, you may achieve your goals and prepare for your dream career. Cyber security Law provides students with an in-depth learning experience that may be completed at leisure to develop their professions. The Cybersecurity Law and Digital Privacy Diploma course will teach you everything necessary to progress in your chosen profession.   The Cybersecurity Law and Digital Privacy Diploma course is structured into numerous parts to provide you with the most convenient and comprehensive education. Upon completing the Cybersecurity Law and Digital Privacy Diploma course, you will receive an immediate e-certificate confirming your skill growth and ability. What you will learn 1: Introduction to Cybersecurity 2: Legal Foundations 3: Legal Governance 4: Privacy and Property 5: Cybersecurity and Crime 6: National and International Considerations in Cybersecurity 7: Cyber Laws across Common Law Nations 8: Digital Marketplace and Consumer Rights 9: DarkNet and Cryptocurrency 10: Challenges of Cybersecurity COURSE OUTCOMES After completing the course, you will receive a diploma certificate and an academic transcript from Elearn college. ASSESSMENT Each unit concludes with a multiple-choice examination. This exercise will help you recall the major aspects covered in the unit and help you ensure that you have not missed anything important in the unit. The results are readily available, which will help you see your mistakes and look at the topic once again. If the result is satisfactory, it is a green light for you to proceed to the next chapter. ACCREDITATION Elearn College is a registered Ed-tech company under the UK Register of Learning( Ref No:10062668). After completing a course, you will be able to download the certificate and the transcript of the course from the website. For the learners who require a hard copy of the certificate and transcript, we will post it for them for an additional charge.

Cybersecurity Law And Digital Privacy Course
Delivered Online On Demand
£99

GDPR and Data Privacy Training

4.7(160)

By Janets

Follow your dreams by enrolling on the GDPR and Data Privacy Training course today and develop the experience, skills and knowledge you need to enhance your professional development. GDPR and Data Privacy Training will help you arm yourself with the qualities you need to work towards your dream job. Study the GDPR and Data Privacy Training training course online with Janets through our online learning platform and take the first steps towards a successful long-term career. The GDPR and Data Privacy Training course will allow you to enhance your CV, impress potential employers, and stand out from the crowd.  This GDPR and Data Privacy Training course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Study the GDPR and Data Privacy Training course through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the GDPR and Data Privacy Training course, to ensure you are supported every step of the way. Get a digital certificate as proof of your GDPR and Data Privacy Training course completion. Janets is one of the top online training course providers in the UK, and we want to make education accessible to everyone! Learn the essential skills you need to succeed and build a better future for yourself with the GDPR and Data Privacy Training course. The GDPR and Data Privacy Training course is designed by industry experts and is tailored to help you learn new skills with ease.  The GDPR and Data Privacy Training is incredibly great value and allows you to study at your own pace. With full course access for one year, you can complete the GDPR and Data Privacy Training when it suits you. Access the GDPR and Data Privacy Training course modules from any internet-enabled device, including computers, tablets, and smartphones. The GDPR and Data Privacy Training course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the GDPR and Data Privacy Training now and start learning instantly! What You Get Out Of Studying GDPR and Data Privacy Training With Janets: * Receive a digital Certificate upon successful completion of the GDPR and Data Privacy Training course * Get taught by experienced, professional instructors * Study at a time and pace that suits your learning style * Get instant feedback on assessments  * 24/7 help and advice via email or live chat * Get full tutor support on weekdays (Monday to Friday) Description The GDPR and Data Privacy Training training course is delivered through Janets' online learning platform. Access the GDPR and Data Privacy Training content from any internet-enabled device whenever or wherever you want to. The GDPR and Data Privacy Training course has no formal teaching deadlines, meaning you are free to complete the course at your own pace. Method of Assessment  To successfully complete the GDPR and Data Privacy Training course, students will have to take an automated multiple-choice exam. This exam will be online and you will need to score 60% or above to pass the GDPR and Data Privacy Training course. After successfully passing the GDPR and Data Privacy Training course exam, you will be able to apply for a CPD-accredited certificate as proof of your GDPR and Data Privacy Training qualification. Certification All students who successfully complete the GDPR and Data Privacy Training course can instantly download their digital certificate. You can also purchase a hard copy of the GDPR and Data Privacy Training course certificate, which will be delivered by post for £9.99. Who Is This Course For: The GDPR and Data Privacy Training is ideal for those who already work in this sector or are an aspiring professional. This GDPR and Data Privacy Training course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The GDPR and Data Privacy Training is open to all students and has no formal entry requirements. To study the GDPR and Data Privacy Training course, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Career Path: The GDPR and Data Privacy Training is ideal for anyone who wants to pursue their dream career in a relevant industry. Learn the skills you need to boost your CV and go after the job you want. Complete the GDPR and Data Privacy Training and gain an industry-recognised qualification that will help you excel in finding your ideal job. COURSE CONTENT Module 01 Course Overview 00:10:00 Writing a Data Privacy Plan 00:15:00 Privacy Awareness 00:30:00 Data Mapping 00:10:00 Information Request Procedure 00:15:00 Internal Data Procedures 00:10:00 Module 02 Data Security Policy 00:10:00 Personal Data Protection Policy 00:15:00 Client Privacy Policy 00:10:00 Data Breach Procedure 00:10:00 Training 00:10:00 Other Necessary Pieces 00:15:00 Mock Exam Mock Exam - GDPR and Data Privacy Training 00:20:00 Final Exam Final Exam - GDPR and Data Privacy Training 00:20:00 FREQUENTLY ASKED QUESTIONS Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

GDPR and Data Privacy Training
Delivered Online On Demand
£25

Information Governance Course: Data Protection & Privacy Masterclass

4.3(43)

By John Academy

Master the art of Information Governance with our comprehensive course – explore Data Protection, Privacy Management, Records & Data Governance, Cybersecurity, Compliance, and more. Acquire the skills to navigate the complex landscape of information, ensuring ethical data use and compliance with global regulations. Join us for a transformative learning experience

Information Governance Course: Data Protection & Privacy Masterclass
Delivered Online On Demand
£24.99

Privacy Electronic Communications Regulation (PECR)

By Study Academy

Welcome to this comprehensive course on Privacy and Electronic Communications Regulation (PECR). This programme equips you with a deep understanding of privacy and electronic communications. By course completion, you'll grasp the intricacies of personal data, comprehend the nuances of direct marketing, and master the lawful processing of personal data. You will explore the intricacies of consent time limits, understand how PECR complements the General Data Protection Regulation (GDPR), and delve into electronic, postal, telephone, and third-party marketing. Differentiating service messages from marketing messages, addressing data sharing, data subject rights, and evaluating risks.

Privacy Electronic Communications Regulation (PECR)
Delivered Online On Demand
£30

Data Privacy and Protection

By NextGen Learning

The digital age has brought about remarkable opportunities for growth, innovation, and communication. However, it has also introduced new challenges in the form of cyber threats, privacy breaches, and online fraud. Our Data Privacy and Protection course offers a comprehensive understanding of cyber law, cyber security, and the legal aspects of protecting online information. By learning about cyber crime, cyber ethics, and the role of legislation, you'll be better equipped to navigate this complex landscape. The Cyber Security Law course covers topics such as threat factors, cyberterrorism, the deep web, fraud, and jurisdiction. As a result, you'll gain valuable insights into the legal challenges and opportunities in the cyber security law industry. With a growing demand for experts in this field, now is the perfect time to expand your knowledge and seize the opportunity to make a real impact in the digital world. So Enrol today and begin your journey towards a fulfilling career in cyber security law. Learning Outcomes: * Grasp fundamental concepts of cyber law and cyber ethics. * Investigate online gambling and its legal implications. * Explore cyber crime, cyber security, and trust in cyberspace. * Examine various computer-based threats and threat actors. * Assess cyber security risks from criminals and hacktivists. * Understand jurisdiction complexities in cyber law enforcement. Course Curriculum: * Module 01: Learn the basics of cyber law, its history, and the significance of legislation in the digital realm. * Module 02: Discover the importance of cyber ethics and the legal aspects of online gambling. * Module 03: Delve into cyber crime, cyber security, and the role of trust in the online environment. * Module 04: Examine the threats targeting computers and the various factors contributing to them. * Module 05: Understand the dangers posed by criminals and organised crime in the cyber security landscape. * Module 06: Explore the threats from hacktivists and nation-states and the role of cyber warfare. * Module 07: Study cyberterrorism, its motives, and its impact on global security. * Module 08: Uncover the evolving threat of the deep web and its influence on cyber security. * Module 09: Learn about different types of fraud and their legal consequences. * Module 10: Understand the complexities of jurisdiction in cyber law and its implementation. Certification Upon completion of the course, learners can obtain a certificate as proof of their achievement. You can receive a £4.99 PDF Certificate sent via email, a £9.99 Printed Hardcopy Certificate for delivery in the UK, or a £19.99 Printed Hardcopy Certificate for international delivery. Each option depends on individual preferences and locations. CPD 10 CPD hours / points Accredited by CPD Quality Standards WHO IS THIS COURSE FOR? This Cyber Security Law course is designed for individuals interested in learning about data privacy, protection, and cyber security law. It is suitable for law students, legal professionals, IT specialists, and anyone seeking to understand the legal aspects of cyber security. By taking this Cyber Security Law course, participants will gain a solid foundation in cyber law, learn about various cyber threats, and understand the role of legislation in protecting against cyber attacks. The knowledge acquired in this Cyber Security Law course can be applied in various professional settings, including legal practice, IT consulting, or working within corporate cybersecurity teams. CAREER PATH * Cyber Security Analyst - £35,000 to £60,000/year * Data Privacy Officer - £40,000 to £70,000/year * Cyber Security Consultant - £45,000 to £80,000/year * Cyber Law Attorney - £60,000 to £100,000/year * Cyber Security Policy Advisor - £50,000 to £80,000/year * IT Compliance Analyst - £35,000 to £55,000/year

Data Privacy and Protection
Delivered Online On Demand
£15

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - INTRODUCTION TO ZERO TRUST AND BEST PRACTICE FRAMEWORKS * Zero Trust initiatives * Zero Trust technology pillars part 1 * Zero Trust technology pillars part 2 2 - DESIGN SOLUTIONS THAT ALIGN WITH THE CLOUD ADOPTION FRAMEWORK (CAF) AND WELL-ARCHITECTED FRAMEWORK (WAF) * Define a security strategy * Cloud Adoption Framework secure methodology * Design security with Azure Landing Zones * The Well-Architected Framework security pillar 3 - DESIGN SOLUTIONS THAT ALIGN WITH THE MICROSOFT CYBERSECURITY REFERENCE ARCHITECTURE (MCRA) AND MICROSOFT CLOUD SECURITY BENCHMARK (MCSB) * Design solutions with best practices for capabilities and controls * Design solutions with best practices for attack protection 4 - DESIGN A RESILIENCY STRATEGY FOR COMMON CYBERTHREATS LIKE RANSOMWARE * Common cyberthreats and attack patterns * Support business resiliency * Ransomware protection * Configurations for secure backup and restore * Security updates 5 - CASE STUDY: DESIGN SOLUTIONS THAT ALIGN WITH SECURITY BEST PRACTICES AND PRIORITIES * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough 6 - DESIGN SOLUTIONS FOR REGULATORY COMPLIANCE * Translate compliance requirements into a security solution * Address compliance requirements with Microsoft Purview * Address privacy requirements with Microsoft Priva * Address security and compliance requirements with Azure policy * Evaluate infrastructure compliance with Defender for Cloud 7 - DESIGN SOLUTIONS FOR IDENTITY AND ACCESS MANAGEMENT * Design cloud, hybrid and multicloud access strategies (including Azure AD) * Design a solution for external identities * Design modern authentication and authorization strategies * Align conditional access and Zero Trust * Specify requirements to secure Active Directory Domain Services (AD DS) * Design a solution to manage secrets, keys, and certificates 8 - DESIGN SOLUTIONS FOR SECURING PRIVILEGED ACCESS * The enterprise access model * Design identity governance solutions * Design a solution to secure tenant administration * Design a solution for cloud infrastructure entitlement management (CIEM) * Design a solution for privileged access workstations and bastion services 9 - DESIGN SOLUTIONS FOR SECURITY OPERATIONS * Design security operations capabilities in hybrid and multicloud environments * Design centralized logging and auditing * Design security information and event management (SIEM) solutions * Design solutions for detection and response * Design a solution for security orchestration, automation, and response (SOAR) * Design security workflows * Design threat detection coverage 10 - CASE STUDY: DESIGN SECURITY OPERATIONS, IDENTITY AND COMPLIANCE CAPABILITIES * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough 11 - DESIGN SOLUTIONS FOR SECURING MICROSOFT 365 * Evaluate security posture for collaboration and productivity workloads * Design a Microsoft 365 Defender solution * Design configurations and operational practices for Microsoft 365 12 - DESIGN SOLUTIONS FOR SECURING APPLICATIONS * Design and implement standards to secure application development * Evaluate security posture of existing application portfolios * Evaluate application threats with threat modeling * Design security lifecycle strategy for applications * Secure access for workload identities * Design a solution for API management and security * Design a solution for secure access to applications 13 - DESIGN SOLUTIONS FOR SECURING AN ORGANIZATION'S DATA * Design a solution for data discovery and classification using Microsoft Purview * Design a solution for data protection * Design data security for Azure workloads * Design security for Azure Storage * Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - CASE STUDY: DESIGN SECURITY SOLUTIONS FOR APPLICATIONS AND DATA * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough 15 - SPECIFY REQUIREMENTS FOR SECURING SAAS, PAAS, AND IAAS SERVICES * Specify security baselines for SaaS, PaaS, and IaaS services * Specify security requirements for web workloads * Specify security requirements for containers and container orchestration 16 - DESIGN SOLUTIONS FOR SECURITY POSTURE MANAGEMENT IN HYBRID AND MULTICLOUD ENVIRONMENTS * Evaluate security posture by using Microsoft Cloud Security Benchmark * Design integrated posture management and workload protection * Evaluate security posture by using Microsoft Defender for Cloud * Posture evaluation with Microsoft Defender for Cloud secure score * Design cloud workload protection with Microsoft Defender for Cloud * Integrate hybrid and multicloud environments with Azure Arc * Design a solution for external attack surface management 17 - DESIGN SOLUTIONS FOR SECURING SERVER AND CLIENT ENDPOINTS * Specify server security requirements * Specify requirements for mobile devices and clients * Specify internet of things (IoT) and embedded device security requirements * Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT * Specify security baselines for server and client endpoints * Design a solution for secure remote access 18 - DESIGN SOLUTIONS FOR NETWORK SECURITY * Design solutions for network segmentation * Design solutions for traffic filtering with network security groups * Design solutions for network posture management * Design solutions for network monitoring 19 - CASE STUDY: DESIGN SECURITY SOLUTIONS FOR INFRASTRUCTURE * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough ADDITIONAL COURSE DETAILS: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered Online5 days, Jul 29th, 13:00 + 1 more
£2380

Certified Information Privacy Technologist (CIPT)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialist Anyone who builds and develops IT systems Overview Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to preempt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal The Principles of Privacy in Technology training is the how to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. The training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Technologist (CIPT) certification program. FUNDAMENTALS OF INFORMATION PRIVACY * Reviewing the modern history of privacy * Foundational privacy concepts * Data protection roles and fair information practices * Exploring the impacts of privacy and data protection regulations on information management PRIVACY IN THE IT ENVIRONMENT * Compliance requirements * IT risks * Stakeholder privacy expectations * Differentiating between privacy and security CORE PRIVACY CONCEPTS * Foundational elements for embedding privacy in IT * Common privacy principles * Data protection by design and default PRIVACY CONSIDERATIONS IN THE INFORMATION LIFE CYCLE * Privacy considerations throughout the stages of the information life cycle PRIVACY IN SYSTEMS AND APPLICATIONS * Examining the risks inherent in the IT environment and options for addressing them * Identity and access management * Credit card information and processing * Remote access * BYOD and telecommuting * Data encryption * Additional privacy-enhancing technologies in the enterprise environment PRIVACY TECHNIQUES * Strengths and weaknesses of authentication techniques * Using identifiers * Privacy by design ONLINE PRIVACY ISSUES * Unique challenges that come from online privacy issues * Laws and regulations * Online threats * Social media * E-commerce * Tracking technologies * Web security protocols TECHNOLOGIES WITH PRIVACY CONSIDERATIONS * Privacy considerations associated with a variety of technologies * Cloud computing * Wireless IDs * Location-based services * ?Smart? technologies * Video/data/audio surveillance * Biometric recognition

Certified Information Privacy Technologist (CIPT)
Delivered on-request, onlineDelivered Online
Price on Enquiry

KYC, AML, and Data Privacy Regulations Course

4.3(43)

By John Academy

COURSE OVERVIEW The success of a product or service can be amplified or ruined based on the demand of that product. Learn how you can understand what your customers want from this KYC, AML, and Data Privacy Regulations Course.  This KYC, AML, and Data Privacy Regulations Course will give you a clear understanding of customer demand and needs. You will also learn the importance of data privacy. This course will prepare you to handle money laundering cases and protect you from fraud. This course is for everyone. You don't need any prior knowledge or certification to understand this course. The course lessons are designed so that you can understand the topics easily. This course is especially helpful for those who come into contact with the customers for their work and need to understand them. LEARNING OUTCOMES * Get to know about KYC principles * Learn about the customer due diligence  * Familiarize with anti-money laundering and AML procedures  * Know the data privacy regulations for business operations in the United Kingdom  * Be able to maintain these regulations in your industry  * Learn different methods for carrying out KYC and AML * Get a clear understanding of the future of KYC compliance WHO IS THIS COURSE FOR? This KYC, AML, and Data Privacy Regulations Course is ideal for those who want to understand the customers requirement and establish their business. You will get a clear idea about customer requirements and data privacy from this course. ENTRY REQUIREMENT * This course is available to all learners, of all academic backgrounds. * Learners should be aged 16 or over to undertake the qualification. * Good understanding of English language, numeracy and ICT are required to attend this course. CERTIFICATION * After you have successfully completed the course, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24. * PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. WHY CHOOSE US? * Affordable, engaging & high-quality e-learning study materials; * Tutorial videos/materials from the industry-leading experts; * Study in a user-friendly, advanced online learning platform; * Efficient exam systems for the assessment and instant result; * The UK & internationally recognized accredited qualification; * Access to course content on mobile, tablet or desktop from anywhere anytime; * The benefit of career advancement opportunities; * 24/7 student support via email. CAREER PATH KYC, AML, and Data Privacy Regulations Course is a useful qualification to possess and would be beneficial for any related profession or industry such as: * Data Security Professionals * Sales Executives * Managers * Managing Directors * Business Owners * Entrepreneurs  * Marketing Executives * Product Designers Module 01: Introduction to KYC Introduction to KYC 00:33:00 Module 02: Customer Due Diligence Customer Due Diligence 00:23:00 Module 03: AML (Anti-Money Laundering) AML (Anti-Money Laundering) 00:31:00 Module 04: KYC, AML, and Data Privacy Regulations for Businesses Operations in the United Kingdom KYC, AML, and Data Privacy Regulations for Businesses Operations in the United Kingdom 00:23:00 Module 05: Regulations to be Complied by Industries Regulations to be Complied by Industries 00:22:00 Module 06: Methods for carrying out KYC and AML and the Future of KYC Compliance Methods for carrying out KYC and AML and the Future of KYC Compliance 00:15:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

KYC, AML, and Data Privacy Regulations Course
Delivered Online On Demand
£18

Certified Information Privacy Manager (CIPM)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programmes Overview Principles of Privacy Program Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organization through process and technology?regardless of jurisdiction or industry. The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Manager (CIPM) certification program. Founded in 2000, the IAPP is the world?s largest and most comprehensive privacy resource with a mission to define, support and improve the Privacy profession globally. Every organization has data protection needs. Every day, we access, share and manage data across companies, continents and the globe. Knowing how to implement a privacy program is an invaluable skill that will help you protect your organization?s data?and take your career to the next level. Our Principles of Privacy Program Management training is the premier course on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a privacy team. INTRODUCTION TO PRIVACY PROGRAM MANAGEMENT * Privacy program management responsibilities * Accountability in privacy program management PRIVACY GOVERNANCE * Considerations for developing and implementing a privacy program * Position of the privacy function within an organization * Role of the DPO * Program scope and charter * Privacy strategy * Support and ongoing involvement of key functions and privacy frameworks APPLICABLE LAWS AND REGULATIONS * The regulatory environment * Common elements across jurisdictions * Strategies for aligning compliance with organizational strategy DATA ASSESSMENTS * Practical processes for creating and using data inventories/maps * Generating and applying gap analyses * Privacy assessments * Privacy impact assessments/data protection impact assessments * Vendor assessments POLICIES * Common types of privacy-related policies * Policy components * Strategies for implementation DATA SUBJECT RIGHTS * Operational considerations for communicating and ensuring data subject rights * Privacy notice * Choice and consent * Access and rectification * Data portability * Erasure TRAINING AND AWARENESS * Developing privacy training and awareness programs * Implementing privacy training and awareness programs PROTECTING PERSONAL INFORMATION * Holistic approach to protecting personal information * Privacy by design DATA BREACH INCIDENT PLANS * Planning for a data security incident or breach * Responding to a data security incident or breach MONITORING AND AUDITING PROGRAM PERFORMANCE * Common practices for monitoring privacy program performance * Measuring, analyzing and auditing privacy programs ADDITIONAL COURSE DETAILS: Nexus Humans Certified Information Privacy Manager (CIPM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Manager (CIPM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Information Privacy Manager (CIPM)
Delivered on-request, onlineDelivered Online
Price on Enquiry