All Courses
This combination of beginner, intermediate, and advanced courses is in high demand. They instill in trainees a mix of skills and knowledge that are considered attractive to employers.
[{"courseid":"CTA002","coursename":"CompTIA A+ (1102)","description":"The CompTIA A+ 1102 (220-1102) course will build on existing knowledge from the CompTIA A+ 1101 course. This course will provide fundamental level skills and theoretical concepts to prepare you for real-world experiences on the job as a technician.\n\n\nThis course is for individuals who have basic computer skills, are interested in obtaining a job as an entry-level IT technician, and also for students who are seeking the CompTIA A+ certification who want to prepare for the CompTIA A+ 220-1102 Certification Exam. For success in this course, you should have basic computer user skills, be able to search, browse, and access information on the internet, complete basic tasks in Microsoft Windows environment, and know basic computing concepts.","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Carbon%20Black%20Protection%20Certified%20Associate%20Analyst-live/advanced/banner/83WaZmWjbcgPENeOsqHUPSTI7tcS0nAePYDHEqy8d0wQzfhwo-.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=EelfvH%2FOfqwQJ%2FmcmlHciJHJku2NoNVXKcyS5%2FO%2BCvN1yQAjHDrElRuyTcQMDZtFXw5csE7xB%2Fs1s1PKJaKXptGbjBzPCGlreSLnw%2BO%2FebjZvy3N%2FNzcsQxKkQfuif448raN2IhF%2BBljUjyM0y6rllMyjN1rt6DIpkejOrmAIW9lumbGfXo%2BdYOpO8c8OuGURWL3EN1Jbk32pmGMYJjmOozUFfSumCtb3PwXV9zEuKJO2KGD8YSScGu5KPHgQY0Ul8KbauSvqf6DpXaaMEvqchaOsw8Hhc87Nqqiy5tp9CPzjtPjcVLhHgGZkqK2crsfhPa8r2hA5DY2eK4Z%2BmQJkA%3D%3D","imagename":null,"category":"Intermediate","classification":"Technical","duration":null,"status":null,"deliverytype":"Live","relatedcourses":"[\"CTN001\",\"CTS001\",\"CTA001\"]","trainerid":null,"created":"2024-02-02T00:31:03.102Z","courseobjective":"[\"Supporting Operating Systems\",\"Installing, Configuring and Maintaining Operating Systems\",\"Maintaining and Troubleshooting Microsoft Windows\",\"Configuring and Troubleshooting Networks\",\"Managing Users, Workstations, and Shared Resources\",\"Security Concepts and Best Practices\",\"Securing Workstations Security Issues\",\"Supporting and Troubleshooting Mobile Devices\",\"Implementing Operational Procedures\",\"Microsoft Command Line Tools\",\"macOS and Linux Tools, Features, and Functionalities\",\"Implementing Physical Security Measures\",\"Defining Logical Security Concepts\",\"Introduction to Basic Scripting Techniques\",\"Implementing Remote Access Technologies\"]","prerequisites":"For success you should complete CompTIA A+ 1101. You should have basic computer user skills, be able to search, browse, access information on the internet, complete tasks in Microsoft Windows environment and know basic computing concepts.","examsandcerts":"[\"CompTIA A+ 1101\",\"CompTIA A+ 1102\"]","targetaudience":"[\"Individuals with basic computer user skills interested in obtaining a job as an entry-level IT technician.\",\" Also students seeking the CompTIA A+ Certification who want to prepare for the CompTIA A+ 220-1102 Certification Exam.\"]","deliveryformat":"Live","careerpath":"[]","coursebundleselectable":false,"providerid":"CertNexus","trial":false,"vimeofolder":null},{"courseid":"OT(SA527","coursename":"Operational Technology (OT) Security Architect.","description":"The Operational Technology (OT) Security Architect Training is designed to equip cybersecurity professionals with the knowledge and skills required to secure and protect critical infrastructure and industrial control systems. This comprehensive training program focuses on the unique challenges and considerations associated with securing OT environments, including the integration of IT and OT systems, network segmentation, threat modeling, and risk assessment.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FApp.%20Sec.%20Fundamental%20copy%202.svg?alt=media&token=110db3e0-4ce4-4ac7-83ee-016c3a9a3932","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[\"ItOTS528\",\"PaVM156\",\"VMfOoS645\"]","trainerid":null,"created":"2023-07-03T04:02:22.549Z","courseobjective":"[\"Understand Operational Technology (OT) and its unique security challenges.\",\"Learn about the key components of an OT security architecture.\",\"Gain knowledge of industrial control systems (ICS) and their vulnerabilities.\",\"Explore methods for securing OT networks and systems.\",\"Develop skills in network segmentation and access control in OT environments.\",\"Learn threat modeling techniques specific to OT security.\",\"Understand risk assessment methodologies for identifying and mitigating OT security risks.\",\"Explore incident response and recovery strategies for OT environments.\",\"Learn about emerging trends and best practices in OT security architecture\"]","prerequisites":"Basic understanding of networking concepts, Familiarity with cybersecurity principles, Knowledge of industrial control systems (ICS) and SCADA systems","examsandcerts":"[\"None\"]","targetaudience":"[\"IT professionals with a focus on cybersecurity\",\"Industrial control system engineers\",\"SCADA system administrators\",\"Network administrators\",\"Security professionals interested in OT security architecture\"]","deliveryformat":"live","careerpath":"[\"SCADA Security Manager\",\"ICS/OT Cybersecurity Engineer\",\"OT Cybersecurity Engineer\",\"Cyber Security Advisory Lead – ICS/SCADA/OT\",\"OT/Enterprise IoT Security Analyst\"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"ItOTS528","coursename":"Introduction to Operational Technology Security","description":"The Introduction to Operational Technology (OT) Training is designed to provide participants with a comprehensive understanding of the fundamental concepts and principles of OT systems. Operational Technology refers to the use of hardware and software systems to monitor and control physical processes in industries such as manufacturing, energy, transportation, and infrastructure.\nThis course will equip participants with the knowledge and skills necessary to navigate the world of OT, including the underlying technologies, architectures, and protocols used in OT systems. Participants will gain a solid foundation in the core components of OT and develop an understanding of their importance in critical infrastructure sectors.","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Introduction%20to%20Operational%20Technology%20Security-live/beginner/banner/TIIOVhUxXVuM2Nl9ZRHAabkAylM-xJWksGGTTqNwhKfK6TucoO.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=R8OCQ02RFlPZ%2BEWBFcIKLuZW18Qt6T0tzXwedmNPbVxxESg1gsMNFYzt5QQmQTHoW41L7SofuzqDxTIbNrq5aTlOTZDms5y3UOiLMZD6lgcSPhkH9jCof3kuMrBYi0d%2FMYgepghHwLoAVgxwsr9akOJ2q0Ogfc%2FBKEJfjF1SRJg8l13y9veMEwugfAZBFQgaMSrH5e4qm7AtWF0wpqOfHCUssxezoqG0FwMeUsfv8yp5iJKHC%2FuU7KWKGwZve%2FJn95carJprpuKZmCcFYRsxoImwoAkkfjHFclzrc8%2FQoplo9Quubsk55ZyA5shwwc9E67lb7GiDNKC%2B42UYUd9Atg%3D%3D","imagename":"TIIOVhUxXVuM2Nl9ZRHAabkAylM-xJWksGGTTqNwhKfK6TucoO.svg","category":"Beginner","classification":null,"duration":"","status":null,"deliverytype":"Live","relatedcourses":"[\"EONS014\",\"CSRM423\",\"II2902\",\"PaVM156\"]","trainerid":120,"created":"2023-03-07T23:47:47.085Z","courseobjective":"[\"Understand the basics of Operational Technology (OT) and its applications in various industries.\",\n\"Explore the key components and architecture of OT systems.\",\n\"Gain familiarity with common OT protocols and their significance.\",\n\"Learn about the cybersecurity challenges and best practices in OT environments.\",\n\"Develop an understanding of the integration between IT (Information Technology) and OT systems.\",\n\"Identify the potential risks and vulnerabilities in OT systems and strategies to mitigate them.\",\n\"Explore real-world case studies and examples of OT implementations.\",\n\"Gain hands-on experience with OT tools and technologies through practical exercises.\"]\n","prerequisites":"There are no specific prerequisites for this course. However, a basic understanding of Industrial control systems (ICS), SCADA & industrial internet of things (IIoT), and cybersecurity concepts will be beneficial.\n","examsandcerts":"[\"Global Industrial Cyber Security Professional Certification (GICSP)\"]","targetaudience":"[\"IT professionals looking to expand their knowledge into the field of Operational Technology\",\"Engineers, technicians, and supervisors working in industries with OT systems\",\"Security professionals interested in understanding the unique challenges of OT cybersecurity\",\"Managers and decision-makers involved in the deployment and management of OT systems\"]","deliveryformat":"recording","careerpath":"[\"OT Cybersecurity Analyst\",\n\"OT Security Engineer\",\n\"OT Cyber Security Architect\",\n\"Junior OT Security Specialist\"] ","coursebundleselectable":false,"providerid":"Smartlearning","trial":true,"vimeofolder":null},{"courseid":"CD&A182","coursename":"Cloud Design & Architecture","description":"Welcome to the Cloud Design & Architecture Training! In this comprehensive course, you will dive into the world of cloud computing, learning the principles, strategies, and best practices for designing and architecting scalable, reliable, and efficient cloud-based solutions. This training is designed to equip you with the knowledge and skills required to leverage cloud technologies effectively and make informed decisions when designing cloud architectures.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FCloud%20Governance%20copy.svg?alt=media&token=c74e83f3-ec23-461d-965b-ae3945d3184d","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[]","trainerid":null,"created":"2023-08-22T01:29:37.759Z","courseobjective":"[\"Understand the fundamental concepts of cloud computing, including service models (IaaS, PaaS, SaaS), deployment models (public, private, hybrid, multi-cloud), and cloud benefits and challenges.\",\"Learn the principles of cloud design and architecture, including scalability, availability, security, performance, and cost optimization.\",\"Gain insights into various cloud providers (e.g., AWS, Azure, Google Cloud) and their offerings, allowing you to make informed decisions based on specific project requirements.\",\"Explore the key components of cloud architecture, such as virtualization, containers, microservices, serverless computing, and software-defined networking.\",\"Develop skills to design highly available and fault-tolerant applications in the cloud by leveraging techniques like redundancy, load balancing, and distributed data storage.\",\"Discover security best practices for cloud environments, including identity and access management, encryption, compliance, and monitoring.\",\"Master strategies for optimizing costs in the cloud, including resource allocation, scaling strategies, reserved instances, and cost monitoring.\",\"Gain hands-on experience through practical exercises and case studies that simulate real-world cloud design and architecture challenges.\",\"Learn about cloud migration strategies and techniques to smoothly transition existing on-premises applications to the cloud.\",\"Explore emerging trends in cloud computing, such as edge computing, AI/ML integration, and serverless architecture patterns.\"]","prerequisites":"Basic understanding of networking and IT concepts, Familiarity with general software development principles","examsandcerts":"[]","targetaudience":"[\"IT professionals and architects interested in cloud technologies\",\"Solution architects and system designers\",\"Developers aiming to build applications in the cloud\",\"Project managers overseeing cloud migration initiatives\"]","deliveryformat":"live","careerpath":"[]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"VMfOoS645","coursename":"Vulnerability Management with SCADA","description":"The Vulnerability Management in SCADA (Supervisory Control and Data Acquisition) Training is designed to equip participants with the knowledge and skills necessary to effectively manage vulnerabilities in SCADA systems. SCADA systems are widely used in industries such as energy, manufacturing, and transportation, and securing these systems against potential vulnerabilities is of utmost importance to ensure operational integrity and prevent potential cyber threats.","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Vulnerability%20Management%20for%20OT%20or%20Scada-live/intermediate/banner/hRMWUzh99uEFNjDZ7v3F92_G05yPn45977zmvpQ02tgMQnfptz.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=NgZOJ1994AgTmDDtJeQ3zNdQEkEtQtDA72ZxyGdUH9gUl%2BMAt4pZjOyHjRFalXL7374uu8JSrA%2BAWvi1%2FokVw5c%2F8Yk9tULiNXOq5wKexMcXDLx6aRW5T6X8H7Lf33lLPXFdghQZk35y9GNgCYhhfbKtxEFRfosghJAJejIIH1PetIN6OF6C7Mv7vRO9Fa4nCQUUsERKpyTz2TtMPtnVQBnchwpkG8R1SWxHXI%2FK97W3utrqg1nsRMd2GHC6yMlR5d5BixXZHQJhG6TYyID4AlRM3WR3U%2BZRbdKoIRpk3fYKVbrC2kafD3XcPK%2BVKuocZ6YSokTemVoF2KgDEkzQlQ%3D%3D","imagename":"hRMWUzh99uEFNjDZ7v3F92_G05yPn45977zmvpQ02tgMQnfptz.svg","category":"Intermediate","classification":null,"duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[\"ItOTS528\",\"PaVM156\"]","trainerid":120,"created":"2023-03-07T23:47:47.085Z","courseobjective":"[\"Understand SCADA systems: Participants will gain a comprehensive understanding of SCADA systems, including their architecture, components, and operational principles. This knowledge will provide a foundation for understanding the vulnerabilities associated with SCADA systems.\",\n\"Identify SCADA vulnerabilities: Participants will learn various techniques and tools used to identify vulnerabilities in SCADA systems. They will explore common vulnerabilities and weaknesses that can be exploited by malicious actors, including those related to network infrastructure, software, and human factors.\",\n\"Perform vulnerability assessments: Participants will learn how to conduct vulnerability assessments specifically tailored to SCADA systems. They will understand the importance of asset identification, risk prioritization, and vulnerability scanning techniques. Additionally, participants will explore methodologies for evaluating the impact and likelihood of exploitation.\",\n\"Implement vulnerability management strategies: Participants will gain practical knowledge on developing and implementing effective vulnerability management strategies for SCADA systems. They will learn about risk mitigation techniques, including patch management, system hardening, and secure configuration practices.\",\n\"Respond to vulnerabilities: Participants will learn how to respond promptly and effectively to identified vulnerabilities. They will explore incident response procedures, including containment, eradication, and recovery techniques. Additionally, participants will understand the importance of communication and collaboration with relevant stakeholders during the vulnerability response process.\",\n\"Develop a vulnerability management program: Participants will acquire the skills needed to develop a comprehensive vulnerability management program for SCADA systems. They will learn how to establish policies, procedures, and guidelines that facilitate ongoing vulnerability assessment, risk mitigation, and continuous improvement.\"]","prerequisites":"Participants are expected to have a basic understanding of SCADA systems, networking concepts, and cybersecurity principles. Familiarity with common vulnerability assessment techniques and tools would be beneficial but not mandatory.","examsandcerts":"[\"None\"]","targetaudience":"[\"SCADA system administrators\",\n\"IT and cybersecurity professionals\",\n\"Industrial control system (ICS) engineers\",\n\"Network engineers\",\n\"Risk and compliance managers\",\n\"System architects and designers\"]","deliveryformat":"live","careerpath":"[\"SCADA Security Manager\",\n\"ICS/OT Cybersecurity Engineer\",\n\"OT Cybersecurity Engineer\",\n\"Cyber Security Advisory Lead – ICS/SCADA/OT\",\n\"OT/Enterprise IoT Security Analyst\"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"CCSP(541","coursename":"Certified Cloud Security Professional (CCSP)","description":"Nam inventore ut quia voluptate nemo. Nulla tenetur sed accusamus ex possimus provident eligendi ut nihil Nam inventore ut quia voluptate nemo. Nulla tenetur sed accusamus ex possimus provident eligendi ut nihil Nulla tenetur sed accusamus ex possimus nihil","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Certified%20Cloud%20Security%20Professional%20%28CCSP%29-live/advanced/banner/hnvX9pIxqgewX3cM_fGxAssrRfMDAW0BJfpBE-AOPWEBiABDwt.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=k7ZMMPFavQfDK9C66CmDB5LNPFW0hXKvJrwlf6mUCDZzQhZROhRhkOW1uYHyHUOj5MGWidRJbmIhatu8JUXvoaiNhHUNebVuKmm6ihS6yqHwkeo6yb8gLrTf46bfzwhD1Poo7xus4RFR0aBcPzZUuikwz2D3OsMFBhikSw2wUjXDGA8h%2BSzP1dlKVGpH%2FdqwwTAmCq0oNqcuFeVOhjnInRzZmSIDXV%2F2vfG0c9Btx9uwe8D1VyVAKB%2BhutrHl%2BnS4PkxC7rPcfGZeQXIvMqYymiY0S4QetkBjWzvt4hg6ljYjrtlu1KRfLyY7%2BDfl%2FrzpN4xWFbLDUT5UKxa6TfnoQ%3D%3D","imagename":"hnvX9pIxqgewX3cM_fGxAssrRfMDAW0BJfpBE-AOPWEBiABDwt.svg","category":"Advance","classification":null,"duration":"","status":null,"deliverytype":"Live","relatedcourses":"[]","trainerid":120,"created":"2023-03-07T23:47:47.085Z","courseobjective":"[]","prerequisites":null,"examsandcerts":null,"targetaudience":null,"deliveryformat":"live","careerpath":null,"coursebundleselectable":false,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"ItCS771","coursename":"Introduction to Cyber Security","description":"The Introduction to Cybersecurity training is designed to provide participants with a foundational understanding of the key concepts, principles, and practices within the field of cybersecurity. As technology continues to evolve, the need to secure digital assets and information becomes paramount. This course aims to equip participants with the essential knowledge and skills to recognize, prevent, and mitigate cybersecurity threats.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FIntro%20to%20computer%20security%20copy.svg?alt=media&token=0cd59726-69b5-45fa-8b87-a5ad0be706c2","imagename":"MJJyZdMexnNK0IeZey4UkkyHNny8-lxIzjb-9oepTNnsgCqDF2.svg","category":"Beginner","classification":"Technical","duration":"17:40","status":null,"deliverytype":"Live","relatedcourses":"[\"PaVM156\",\"CSRM423\",\"EONS014\",\"ItPT367\"]","trainerid":120,"created":"2023-03-07T23:47:47.085Z","courseobjective":"[\"Define and understand fundamental cybersecurity terminology, concepts, and principles.\",\"Identify common cybersecurity threats, vulnerabilities, and attack vectors.\",\"Explain the importance of various security measures and strategies to protect digital assets.\",\"Analyse and assess risks associated with cybersecurity breaches and incidents.\",\"Recognize the role of compliance and legal considerations in cybersecurity practices.\",\"Apply basic techniques to secure networks, systems, and applications.\",\"Understand the principles of encryption and its role in data protection.\",\"Gain insight into security best practices for personal and organizational cybersecurity.\"]","prerequisites":"There are no specific prerequisites for this course. However, a basic understanding of system and network security and operations would be beneficial.\n","examsandcerts":"[\"CompTIA Security+\",\"Certified Information Systems Security Professional (CISSP) by ISC²\",\"Certified Information Systems Auditor (CISA) by ISACA\",\"Certified Information Security Manager (CISM) by ISACA\"]\n","targetaudience":"[\"Career in Cyber Security\",\"Individuals with limited or no prior experience in cybersecurity\",\"Students, Professionals from various fields, and anyone interested in understanding the basics of cybersecurity and how to protect digital assets.\"]","deliveryformat":"recording","careerpath":"[\"Information Security analyst\",\"Vulnerability Management Analyst\",\"Cyber Security Engineer\",\"Information Security Risk Analyst\"]\n","coursebundleselectable":false,"providerid":"Smartlearning","trial":true,"vimeofolder":null},{"courseid":"ItSPM140","coursename":"Introduction to System Patch Management","description":"This course provides comprehensive insights into effective system patch management practices. Students will learn the importance of keeping software up-to-date and secure, understand the risks associated with unpatched systems, and acquire practical skills for planning, testing, and implementing patch management strategies.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FThird%20party%20managemnt%20copy%205.png?alt=media&token=752c0580-a9fe-486c-9398-ede10b382f42","imagename":"","category":"Beginner","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[]","trainerid":null,"created":"2023-08-23T20:38:29.197Z","courseobjective":"[]","prerequisites":"Basic understanding of operating systems, networking, and cybersecurity concepts.","examsandcerts":"[]","targetaudience":"[]","deliveryformat":"recording","careerpath":"[]","coursebundleselectable":false,"providerid":"Smartlearning","trial":true,"vimeofolder":null},{"courseid":"NSDaI244","coursename":"Network Security Design and Implementation","description":"This training program is designed to provide participants with the knowledge and skills necessary to design and implement robust network security solutions. The course will cover various aspects of network security, including threat analysis, risk assessment, security policies, and the implementation of security measures.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FNetwork%20access%20and%20risk%20%20copy.svg?alt=media&token=9ae31216-cb58-48af-b80b-4f7538835093","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Live","relatedcourses":"[]","trainerid":null,"created":"2023-09-04T14:42:48.928Z","courseobjective":"[\"Gain a solid understanding of the fundamental principles of network security.\",\"Identify common network security threats and vulnerabilities.\",\"Explore network design principles with a focus on security considerations.\",\"Learn how to design, configure, and manage firewalls to protect networks.\",\"Understand VPN technologies and their role in securing data in transit.\",\"Learn how to configure and manage VPN solutions for secure remote access.\",\"Explore authentication methods, including multi-factor authentication (MFA).\",\"Learn about access control mechanisms and the principle of least privilege.\",\"Learn secure communication protocols like HTTPS, SSH, and IPsec and how Implement and configure these protocols for secure data transfer.\",\"Develop and document network security policies and procedures.\",\"Implement network monitoring tools to detect suspicious activities.\",\"Understand the role of audit logs and how to review them for security purposes.\",\"Design secure network architectures that protect against various attack vectors.\",\"Implement encryption for data at rest and in transit.\",\"Understand encryption algorithms, key management, and data protection mechanisms.\"]","prerequisites":"Participants should have a basic understanding of networking concepts and protocols. Familiarity with operating systems and general IT knowledge is recommended.","examsandcerts":"[]","targetaudience":"[\"IT professionals\",\"Network administrators\",\"System architects\",\"Security practitioners who wish to enhance their expertise in network security design and implementation\"]","deliveryformat":"live","careerpath":"[\"System Architects\",\"Network administrators\"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"ItGaG716","coursename":"Introduction to Git and GitHub","description":"The 'Introduction to Git and GitHub' training course is designed to provide participants with a comprehensive understanding of version control concepts using Git and collaborative software development using GitHub. This course is suitable for beginners with little to no experience in version control or collaborative coding. Through a combination of theory, hands-on exercises, and real-world examples, participants will gain the skills and knowledge necessary to effectively utilize Git and GitHub in their software development projects.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FProg.%20and%20Scripting%20copy%202.svg?alt=media&token=2808b97c-cc36-45da-b1ce-8ff2a1206f55","imagename":"","category":"Beginner","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[]","trainerid":null,"created":"2023-08-22T02:52:59.626Z","courseobjective":"[\"Hands-on Exercises: Participants will engage in practical exercises to reinforce their understanding of Git and GitHub concepts. These exercises will involve creating repositories, making changes, branching, merging, and collaborating on GitHub.\",\"Real-world Examples: The course will incorporate real-world scenarios to demonstrate the application of Git and GitHub in actual software development projects. This will help participants understand how these tools are used in professional environments.\",\"Interactive Discussions: Regular discussions and Q&A sessions will be held to address participants' questions, concerns, and clarifications regarding the material covered.\",\"Practical Project: Participants will work on a simple collaborative project throughout the course, applying their newfound Git and GitHub skills to simulate a real-world development environment.\",\"Course Materials: Participants will receive electronic copies of presentation slides, supplementary materials, and resources for further self-study.\",\"Certification: Upon successful completion of the course, participants will receive a certificate of completion, validating their understanding of Git and GitHub fundamentals.\"]","prerequisites":"","examsandcerts":"[]","targetaudience":"[\"Software developers, programmers, and coders who want to learn version control and collaborative coding practices.\",\"Project managers and team leads who need to understand how version control tools can enhance team productivity and project management.\"]","deliveryformat":"recording","careerpath":"[]","coursebundleselectable":false,"providerid":"Smartlearning","trial":true,"vimeofolder":null},{"courseid":"SIEM016","coursename":"Introduction to SIEM","description":"The Introduction to Security Information Event Management (SIEM) Training is designed to provide participants with a comprehensive understanding of SIEM concepts, tools, and techniques. This course aims to equip individuals with the necessary skills to effectively manage and respond to security events and incidents within an organization.\nThroughout the training, participants will delve into the core principles of SIEM and explore its vital role in modern cybersecurity operations. They will learn about various SIEM components, including log collection, event correlation, threat intelligence integration, and incident response. Practical hands-on exercises and real-world examples will be utilized to reinforce theoretical knowledge and enhance practical skills.","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Introduction%20to%20SIEM-live/beginner/banner/sHsHdJgT1QwOIIgN9miw4bTdK5m1INPB3QEAj3kCEljmproGJu.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=cZKFp9dJtqFM7Ahw7VEZZletnJbgQR04Yh9thWd0%2Fhl36VVLYwzGWb3NxJ5TeNnKXpv4oAlk7Enwrrz5h4vJXWILX1Gck%2FdApciLwWFmhcA%2Fh81tqVBgf8RjbIutjv7savrgDI7wZuNqZVa5GvFXgT5qg7S1m2x6eJPm4bXiCRth9nzGwGvLcaAnptZUtx2LIOHV2WwLcR4xANdzcpA7T4XvSHFO0h1Ff7g10iQYTeuRqODaZQBa9MWxL6jE0a6cFAHYh5%2F6hM2vGI75kE2Kprklzy0dVFRcrJM7eaAZlHMsm6XorEYpV5itxQ6vx%2BBzETdRuQdhAKASm8s3Bp%2B7tg%3D%3D","imagename":"Te8vyq1ikC5IkD7QW3JPOSEct49i3A0_6s-G1CX0WMCEzw8GZf.svg","category":"Beginner","classification":null,"duration":null,"status":null,"deliverytype":"Live","relatedcourses":"[\"EONS014\",\"ItCS771\",\"EOVM017\",\"PaVM156\"]","trainerid":null,"created":null,"courseobjective":"[\"Understand the fundamentals of Security Information Event Management (SIEM) and its importance in cybersecurity operations.\",\n\"Identify key components of a SIEM system and their functions, including log management, event correlation, and incident response.\",\n\"Gain knowledge of various SIEM tools and technologies available in the market and their features.\",\n\"Learn how to effectively collect, analyze, and interpret security logs from diverse sources.\",\n\"Explore techniques for event correlation and threat intelligence integration to identify and prioritize security incidents.\",\n\"Develop skills to configure and customize SIEM solutions to meet specific organizational requirements.\",\n\"Understand the incident response process and how SIEM can aid in incident detection, analysis, and remediation.\",\n\"Familiarize themselves with best practices for implementing and maintaining a SIEM system.\",\n\" Enhance their ability to detect and respond to common security incidents, such as malware infections, insider threats, and unauthorized access attempts.\",\n\"Gain insights into compliance requirements and regulatory standards related to SIEM implementation.\"]","prerequisites":"There are no specific prerequisites for this course. However, a basic understanding of security monitoring concepts and familiarity with system log types, security incident and events would be beneficial. \n","examsandcerts":"[\"SIEM Engineer\", \n\"SoC Analyst\",\n\"Cybersecurity Analyst\",\n\"SIEM Architect\"]","targetaudience":"[\"IT professionals responsible for security operations and incident response.\",\n\"Cybersecurity analysts and engineers seeking to enhance their SIEM skills.\",\n\"System administrators interested in implementing and managing SI\"]","deliveryformat":"recording","careerpath":"[\"SIEM Engineer\", \n\"SoC Analyst\",\n\"Cybersecurity Analyst\",\n\"SIEM Architect\"]","coursebundleselectable":false,"providerid":"Smartlearning","trial":true,"vimeofolder":null},{"courseid":"EoDO995","coursename":"Essentials of DevSecOps","description":"DevSecOps is an approach that integrates security practices into the software development process from the very beginning. This training course is designed to provide participants with a comprehensive understanding of DevSecOps principles, methodologies, and tools. The course emphasizes the importance of security throughout the software development lifecycle (SDLC) and provides practical techniques for identifying and mitigating security risks in modern software development environments.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FDevOps%20Sec%20copy.png?alt=media&token=334e8980-3d64-44e6-936b-cb428dfd6364","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[\"ItCA429\",\"EoCS785\",\"ItSP430\",\"ItAS118\"]","trainerid":null,"created":"2023-05-04T15:59:30.821Z","courseobjective":"[\"Understand the fundamentals of DevSecOps and its role in modern software development.\",\n\"Comprehend the security challenges faced by development teams and how to address them.\",\n\"Gain knowledge of various security testing techniques and tools used in DevSecOps.\",\n\"Learn how to integrate security practices into the software development process.\",\n\"Explore best practices for secure software configuration and deployment.\",\n\"Understand the importance of continuous security monitoring and incident response.\",\n\"Gain hands on experience with popular DevSecOps tools and technologies.\"]","prerequisites":"Basic knowledge of software development concepts and practices, Familiarity with DevOps principles and workflows and Understanding of fundamental security concepts\n","examsandcerts":"[\"DevOps Institute DevSecOps Foundation\",\n\"DevSecOps Practitioner\",\n\"EXIN DevSecOps Manager\",\n\"GSDC Certified DevSecOps Engineer Certification\",\n\"Practical DevSecOps Certified DevSecOps Professional (CDP)\"]","targetaudience":"[\"Software developers\",\n\"DevOps engineers\",\n\"Security professionals\",\n\"System administrators\",\n\"Anyone involved in the software development process who wants to enhance their knowledge of integrating security practices into their workflows.\"]","deliveryformat":"live","careerpath":"[\"Cybersecurity analyst\",\n\"Software Testing /QA\",\n\"Penetration testing\",\n\"Vulnerability Management analyst\",\n\"DeveSecOps Engineer\"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"SFAaI723","coursename":"Security Frameworks: Analysis and Implementation","description":"This Security Frameworks course covers NIST, ISF, SABSA, ISO 27001, and COBIT. ","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FApp.%20Sec.%20Fundamental%20copy%202.svg?alt=media&token=110db3e0-4ce4-4ac7-83ee-016c3a9a3932","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[]","trainerid":null,"created":"2023-08-22T12:02:49.568Z","courseobjective":"[]","prerequisites":"","examsandcerts":"[]","targetaudience":"[]","deliveryformat":"live","careerpath":"[]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"ESA595","coursename":"Enterprise Security Architecture","description":"Enterprise Security Architecture Training is a comprehensive program designed to equip professionals with the knowledge and skills necessary to develop and implement robust security architectures within large organizations. The course focuses on the fundamental principles, methodologies, and best practices related to securing enterprise systems and networks.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FEnterprise%20security%20architecture%20copy.png?alt=media&token=709e78a4-a61d-4f83-9929-70331574e4b6","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[\"EONS014\"]","trainerid":null,"created":"2023-05-04T17:28:45.833Z","courseobjective":"[\"Understand the concepts and principles of enterprise security architecture.\",\n\"Identify the key components of a comprehensive security architecture.\",\n\"Analyze the security requirements and challenges specific to enterprise environments.\",\n\"Evaluate and select appropriate security technologies and solutions.\",\n\"Design and implement a robust security architecture that aligns with business objectives.\",\n\"Apply risk assessment and management methodologies to enterprise security.\",\n\"Establish security policies, standards, and procedures for an organization.\",\n\"Plan and execute security audits and assessments.\",\n\"Implement security controls and measures to protect critical assets and data.\",\n\"Monitor, analyze, and respond to security incidents and threats.\",\n\"Develop incident response and disaster recovery plans.\",\n\"Stay updated with emerging security trends, technologies, and regulations.\"]","prerequisites":"Participants should have a basic understanding of network and system security design principles and practices. Familiarity with network and system component and frameworks is beneficial but not mandatory.","examsandcerts":"[\"CREST Registered Technical Security Architecture (CRTSA)\",\n\"EC-Council’s Certified Network Defense Architect (CNDA)\", \n\"GIAC®️ Defensible Security Architecture (GDSA)\",\n\"Infosec Institute’s Certified SCADA Security Architect (CSSA)\",\n\"(ISC)²’s CISSP – ISSAP (Information Systems Security Architecture Professional)\"]","targetaudience":"[\"Security architects\",\"IT managers\",\"Network administrators\",\"Cybersecurity professionals\",\"Individuals responsible for designing, implementing, and managing security solutions in an enterprise environment\"]","deliveryformat":"live","careerpath":"[\"Security Solution Architect\",\n\"Security Engineer\"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"ItCA429","coursename":"Introduction to Cloud Architecture","description":"Cloud computing has revolutionized the IT industry, enabling businesses to leverage scalable and cost-effective solutions. Cloud architecture plays a crucial role in designing, deploying, and managing applications and services in the cloud. This comprehensive training program provides a deep understanding of cloud architecture principles, best practices, and technologies, empowering participants to design and implement scalable and resilient cloud solutions.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FSOC%20Analyst%20copy%202.svg?alt=media&token=ef93031d-5ae9-4539-bd7b-b470cdf44c8d","imagename":"","category":"Beginner","classification":"Technical","duration":"","status":null,"deliverytype":"Live","relatedcourses":"[\"ESA595\",\"EONS014\"]","trainerid":null,"created":"2023-07-01T19:09:57.602Z","courseobjective":"[\"Understand the fundamentals of cloud computing and its impact on modern IT infrastructure.\",\"Explore different cloud service models (IaaS, PaaS, SaaS) and deployment models (public, private, hybrid).\",\"Learn cloud architecture design principles and patterns for scalability, fault tolerance, and high availability.\",\"Gain expertise in cloud storage, database, networking, and security services.\",\"Master the use of infrastructure as code (IaC) tools for provisioning and managing cloud resources.\",\"Develop skills to optimize cloud resource allocation and cost management.\",\"Acquire knowledge of containerization and orchestration technologies for cloud-native applications.\",\"Understand the importance of monitoring, logging, and performance optimization in the cloud.\",\"Learn about cloud migration strategies and considerations for legacy applications.\",\"Explore emerging trends in cloud architecture, such as serverless computing and edge computing.\"]","prerequisites":"Basic understanding of networking and virtualization concepts and Familiarity with at least one major cloud provider (AWS, Azure, Google Cloud)","examsandcerts":"[\"CompTIA Cloud+\",\"EXIN Cloud Computing Foundation\",\"Microsoft MCSA: Cloud Platform\",\"Cisco Certified Network Administrator Cloud\",\"Cisco Certified Network Professional Cloud\",\"Microsoft Azure Certified Solutions Architect\",\"AWS Certified Solutions Architect – Associate\",\"Google Professional Cloud Architect\",\"IBM Certified Cloud Solution Architect V2\"]","targetaudience":"[\"IT professionals interested in expanding their knowledge of cloud architecture\",\"Solution architects and system administrators involved in cloud infrastructure design and management\",\"Developers and engineers looking to deploy scalable and resilient applications in the cloud\"]","deliveryformat":"recording","careerpath":"[\"Cloud Architect\",\"Cloud Engineer\",\"Solution Architect\",\"Cloud Infrastructure Engineer\"]","coursebundleselectable":false,"providerid":"Smartlearning","trial":true,"vimeofolder":null},{"courseid":"EoCM628","coursename":"Essentials of CyberThreat Modelling","description":"Welcome to the Intermediate-Level Cyber Threat Modelling Training! In this course, you will build upon your foundational knowledge of cyber threat modelling and dive deeper into advanced concepts and techniques. Cyber threat modelling is a crucial practice for identifying, assessing, and mitigating potential security risks within systems and applications. This course will equip you with the skills to create more comprehensive threat models and enhance your ability to protect digital assets from a wide range of cyber threats.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FCyber%20threat%20mgt%20copy.svg?alt=media&token=41eea5aa-0d0c-4a33-95e2-670c4bbf2503","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[]","trainerid":null,"created":"2023-08-23T22:45:41.277Z","courseobjective":"[\"Understand Threat Modelling Concepts: Participants will be introduced to the fundamental concepts and principles of threat modelling, including threat types, attack vectors, risk assessment, and threat modeling methodologies.\",\"Explore Threat Modelling Frameworks: Participants will explore different threat modelling frameworks such as STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege), DREAD (Damage,Reproducibility, Exploitability, Affected Users, Discoverability), and others.\",\"They will learn how to leverage these frameworks to identify potential threats and vulnerabilities.\",\"Identify Threats and Attack Surfaces: Participants will learn how to identify potential threats and attack surfaces within a system or application. They will examine various attack vectors, including network-based attacks, application vulnerabilities, social engineering, and insider threats.\",\"Assess Risk and Impact: Participants will gain practical experience in assessing the risks associated with identified threats and vulnerabilities. They will learn how to evaluate the potential impact of an attack and prioritize the identified risks based on severity and likelihood.\",\"Develop Mitigation Strategies: Participants will understand the importance of developing effective mitigation strategies to address identified threats. They will learn about common security controls and countermeasures that can be implemented to protect against specific threats.\",\"Apply Threat Modelling Techniques: Participants will have hands-on experience applying threat modelling techniques to real-world scenarios. They will work on practical exercises and case studies to identify threats, assess risks, and develop mitigation strategies.\",\"Integration into the Development Lifecycle: Participants will learn how to integrate threat modelling into the software development lifecycle and other relevant processes. They will explore ways to effectively communicate threat modelling findings to stakeholders and ensure security considerations are incorporated from the early stages of development.\",\"Best Practices and Continuous Improvement: Participants will be exposed to industry best practices and emerging trends in threat modelling. They will understand the importance of continuous improvement, ongoing monitoring, and adapting threat modelling strategies to evolving threats.\"]","prerequisites":"Basic understanding of cybersecurity concepts and principles, Familiarity with fundamental threat modelling concepts, Experience with system architecture and design","examsandcerts":"[\"Certified Threat Modeling Professional (CTMP)\"]","targetaudience":"[\"Information Security Analysts\",\"System Administrators\",\"Software Developers\",\"Security Engineers\",\"IT Managers\",\"Risk Management Professionals\",\"Security Consultants\",\"Ethical Hackers\"]","deliveryformat":"live","careerpath":"[\"Application Security Engineer\"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"ItJP946","coursename":"Introduction to Java Programming","description":"The Introduction to Java Programming course is designed to provide beginners with a solid foundation in the fundamentals of Java programming. Whether you have no prior programming experience or come from a different programming language background, this course will equip you with the essential skills needed to write Java code effectively. Throughout the 12-week duration, you will be introduced to the key concepts and syntax of the Java programming language. The course follows a hands-on approach, combining theoretical lessons with practical coding exercises to reinforce your understanding of Java programming principles.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FSOC%20Analyst%20copy%202.svg?alt=media&token=ef93031d-5ae9-4539-bd7b-b470cdf44c8d","imagename":"","category":"Beginner","classification":"Technical","duration":"","status":null,"deliverytype":"Live","relatedcourses":"[\"ItSP430\"]","trainerid":null,"created":"2023-07-01T20:49:07.583Z","courseobjective":"[\"Understand the basic principles and concepts of Java programming.\",\"Familiarize yourself with the syntax and structure of the Java language.\",\"Learn how to write and execute Java programs using an integrated development environment (IDE).\",\"Gain proficiency in fundamental programming constructs such as variables, data types, operators, control statements, and loops.\",\"Explore object-oriented programming (OOP) concepts, including classes, objects, inheritance, and polymorphism.\",\"Develop skills in handling exceptions and error handling in Java.\",\"Gain knowledge of input/output operations and file handling in Java.\",\"Understand the basics of Java collections and generics.\",\"Learn how to create graphical user interfaces (GUIs) using Java's Swing library.\",\"Acquire best practices for code documentation, debugging, and testing.\"]","prerequisites":"Basic understanding of programming concepts Target Audience: Beginners interested in learning Java programming","examsandcerts":"[\"Oracle Certified Associate, Java SE 8 Programmer Certification\",\"Oracle Certified Professional Java Programmer (OCPJP) [Java SE 8 Programmer II]\",\"Oracle Certified Professional: Java SE 11 Developer\",\"Oracle Certified Professional, Java EE 7 Application Developer Certification\",\"Oracle Certified Foundations Associate, Java Certification\",\"Oracle Certified Professional: Java SE 17 Developer Certification\"]","targetaudience":"[\"Software Programmer\",\"Application Security Engineer\",\"Anyone seeking to enhance their knowledge and skills in Java programming.\"]","deliveryformat":"recording","careerpath":"[\"Java Developer\",\"Cloud Application Java Developer Analyst\",\"Application Security Engineer\"]","coursebundleselectable":false,"providerid":"Smartlearning","trial":true,"vimeofolder":null},{"courseid":"ICG286","coursename":"Introduction to Cloud Governance","description":"The Introduction to Cloud Governance Training is designed to provide participants with a comprehensive understanding of cloud governance principles, practices, and strategies. As organizations increasingly adopt cloud computing, it becomes crucial to establish effective governance frameworks to ensure compliance, security, and optimal resource utilization. This course equips participants with the knowledge and skills to implement and manage cloud governance in their organizations, enabling them to harness the full potential of cloud technologies while mitigating risks.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FCloud%20Governance%20copy.svg?alt=media&token=c74e83f3-ec23-461d-965b-ae3945d3184d","imagename":"","category":"Beginner","classification":"Technical","duration":"","status":null,"deliverytype":"Live","relatedcourses":"[\"CSRM423\"]","trainerid":null,"created":"2023-07-01T01:42:21.999Z","courseobjective":"[\"Understand the fundamentals of cloud computing and its benefits for organizations.\",\"Explain the importance of cloud governance and its role in ensuring compliance, security, and cost optimization.\",\"Identify the key stakeholders involved in cloud governance and understand their responsibilities.\",\"Develop and implement a cloud governance framework tailored to their organization's needs.\",\"Define policies and procedures to ensure proper management and oversight of cloud resources.\",\"Implement security measures and controls to protect data and ensure privacy in the cloud.\",\"Monitor and audit cloud usage to ensure compliance with organizational policies and regulatory requirements.\",\"Optimize cloud resource utilization to achieve cost efficiencies without sacrificing performance.\",\"Understand the legal and regulatory considerations associated with cloud governance.\",\"Stay updated with emerging trends and best practices in cloud governance.\"]","prerequisites":"There are no strict prerequisites for this course. However, a basic understanding of cloud computing concepts and resource management will be beneficial but not mandatory \n","examsandcerts":"[\"Certificate of Cloud Auditing Knowledge (CCAK) by ISACA\",\"Certified Cloud Governance Specialist by Arcitura Education\"]","targetaudience":"[\"IT professionals\",\" Cloud architects\",\"Security officers\",\"Compliance managers\",\"Individuals involved in managing or governing cloud\"]","deliveryformat":"recording","careerpath":"[\"Cloud Engineer\",\"Cloud & Platform Manager\",\"Cloud Risk Manager\",\"Business Analyst – Cloud, Risk & Control\"]","coursebundleselectable":false,"providerid":"Smartlearning","trial":true,"vimeofolder":null},{"courseid":"TPRM026","coursename":"Introduction to Third-Party Risk Management","description":"Welcome to the Introduction to Third-Party Risk Management Training! This course is designed to provide you with a comprehensive understanding of third-party risk management and its importance in today's business environment. Whether you are a risk management professional, a vendor manager, or an executive responsible for overseeing third-party relationships, this course will equip you with the necessary knowledge and skills to effectively manage and mitigate risks associated with third-party engagements.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FThird%20party%20managemnt%20copy%205.png?alt=media&token=752c0580-a9fe-486c-9398-ede10b382f42","imagename":"Te8vyq1ikC5IkD7QW3JPOSEct49i3A0_6s-G1CX0WMCEzw8GZf.svg","category":"Beginner","classification":"Technical","duration":null,"status":null,"deliverytype":"Recording","relatedcourses":"[\"EOVM017\",\"TMOD027\",\"VAPM028\"]","trainerid":null,"created":null,"courseobjective":"[\"Understand the concept of third-party risk management and its significance in the modern business environment.\",\n\"Gain insight into the various types of third-party risks and their potential impact on organizational objectives.\",\n\"Acquire knowledge of the regulatory and compliance landscape governing third-party engagements.\",\n\"Learn how to develop a robust third-party risk management framework tailored to their organization's unique needs.\",\n\"Discover effective techniques for identifying, assessing, and prioritizing third-party risks.\",\n\"Explore strategies for conducting due diligence on potential third-party partners.\",\n\"Learn how to establish appropriate risk mitigation measures and controls.\",\n\"Understand the importance of continuous monitoring and oversight of third-party relationships.\",\n\"Familiarize themselves with emerging trends and technologies in third-party risk management.\",\n\"Learn how to effectively communicate third-party risk management practices and findings to stakeholders.\"]\n","prerequisites":"There are no specific prerequisites for this course. However, a basic understanding of risk assessment and management concepts would be beneficial.\n","examsandcerts":"[\"CTPRP certification by Shared Assessments Program\",\n\"CTPRA certification by Shared Assessments Program\",\n\"Third-Party Risk Management Expert certification by OneTrust\",\n\"Third Party Risk Association (TPRA)\"]\n","targetaudience":"[\"Professionals involved in information security management, risk assessment, compliance, audit, and governance roles within organizations.\", \n\"Individuals aspiring to become GRC Analyst or enhance their knowledge in information security risk assessment.\"] ","deliveryformat":"recording","careerpath":"[\"Third Party Risk Analyst\",\"Information Security analyst -GRC\",\"IT Security & Risk Analyst\",\"Information Security Risk Analyst\"]","coursebundleselectable":false,"providerid":"Smartlearning","trial":true,"vimeofolder":null},{"courseid":"I2LI957","coursename":"ISO/IEC 27001 Lead Implementer","description":"Nam inventore ut quia voluptate nemo. Nulla tenetur sed accusamus ex possimus provident eligendi ut nihil Nam inventore ut quia voluptate nemo. Nulla tenetur sed accusamus ex possimus provident eligendi ut nihil Nulla tenetur sed accusamus ex possimus nihil","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/ISO/IEC%2027001%20Lead%20Implementer-live/advanced/banner/g9ub5Kfw30Gi-2hQscApC6bvWq9Z6kl_TDthC3mZMdO65wGS3w.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=Gezx%2FqBv4s6ImixUa%2BLOPz09T9%2Fhd5QFAsoSERodpq2lSn3OaAwTlei54pfta270zFNHX%2FKvMcNxK7LnfysINuGNYQbP4EIThwJhXu0CsyLQrOafBdlF53dzxp%2Flin1Lc1eMef9e0LOgnNRmtn6NkmphNqZRIsNcCfDb8lPShvT%2BRpGoTqfEl6W2Et%2BTrjwywR9a02E%2Flv8NPJOCKVhqo3LnowJXT2%2Bhw7J0L2gTnWg9Be8X52xRENERl%2BcjNmwc2TBEkwLQ9Cc4JOomefwpOTAMdlds7nu3pH7%2B6pr6XP8oRHSmDdZogmamlc2IRFX0W0mUKjLaqCrCr%2FlUSz5R4w%3D%3D","imagename":"g9ub5Kfw30Gi-2hQscApC6bvWq9Z6kl_TDthC3mZMdO65wGS3w.svg","category":"Advance","classification":null,"duration":"","status":null,"deliverytype":"Live","relatedcourses":"[]","trainerid":120,"created":"2023-03-07T23:47:47.085Z","courseobjective":"[]","prerequisites":null,"examsandcerts":null,"targetaudience":null,"deliveryformat":"live","careerpath":null,"coursebundleselectable":false,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"EoDLP521","coursename":"Introduction to Data Loss Prevention","description":"The Introduction to Data Loss Prevention Training is designed to provide participants with a comprehensive understanding of data loss prevention strategies, technologies, and best practices. This course aims to equip individuals and organizations with the necessary knowledge and skills to safeguard sensitive data, protect against data breaches, and ensure compliance with data protection regulations.","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Essentials%20of%20Data%20Loss%20Prevention-live/intermediate/banner/LWiywy84_gAlTjV1q-cqLix4RO8HCiyQpNQdiLLP7TFdoOIJks.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=lHii%2BzboqWdu93%2B%2Fu%2FkGD3u3QSfFMew3E0yTKHUBTZALVmnqen%2BfVWGR%2FBYppyBo8pPJoGHROk8cO5R5xVmFKWTB%2FUEYYJm%2Bc40AJeU17Qn7H%2BHGvklEidT87KrNI9PrJ927nF8ylxKi3NRQAt1Gz6%2Bag%2F9ZoXbN80jdBSyU3R9av8TD0zeKaFwGfzCJHq1XFeoOfm5zDAtrfHAe9xu4Ob6KscXx%2BPpux3TMmXtqrOC9zIqH2865d%2FnT697puaxpqlYEklYXQr9gNnfD%2BouIrtDXB0vh85DXo9kmltDWYDnmG7ZVmISTaAGHDnK7cCHyCTGXLslMdVE9FVbSAN8VGw%3D%3D","imagename":"LWiywy84_gAlTjV1q-cqLix4RO8HCiyQpNQdiLLP7TFdoOIJks.svg","category":"Beginner","classification":"Technical","duration":"","status":null,"deliverytype":"Live","relatedcourses":"[\"G&DPR193\",\"EPAM009\",\"ItIAM454\",\"EONS014\"]","trainerid":120,"created":"2023-03-07T23:47:47.085Z","courseobjective":"[\"Understand the fundamentals of data loss prevention (DLP) and its significance in protecting sensitive information.\",\n\"Identify various types of sensitive data and recognize the potential risks and consequences associated with data breaches.\",\n\"Comprehend the legal and regulatory requirements related to data protection, including GDPR, HIPAA, and other relevant standards.\",\n\"Acquire knowledge of the different data loss prevention technologies, tools, and solutions available in the market.\",\n\"Learn how to implement effective data loss prevention policies, procedures, and controls within an organization.\",\n\"Gain insights into data classification methodologies and techniques for labeling and tagging sensitive data.\",\n\"Develop an understanding of the detection and monitoring mechanisms used to identify data leakage and unauthorized access attempts.\",\n\"Learn about incident response and mitigation strategies to minimize the impact of data breaches.\",\n\"Explore real-world case studies and examples to understand the practical application of data loss prevention strategies.\",\n\"Stay up to date with emerging trends and challenges in the field of data loss prevention.\"]","prerequisites":"Participants should have a basic understanding of computer networks, operating systems, and general IT concepts. Basic knowledge of dt classification or informtion labeling. Familiarity with dt protection law such s GDPR and basic data security protection controls such encryption will be beneficial but not mandatory.","examsandcerts":"[\"Exam SC-400: Microsoft Information Protection Administrator.\"]","targetaudience":"[\"IT professionals responsible for data security and protection\",\n\"Information security officers\",\n\"Data protection officers\",\n\"Compliance officers\",\n\"System administrators\",\n\"Risk management professionals\",\n\"Privacy advocates\",\n\"Managers and decision-makers involved in data governance\"]","deliveryformat":"recording","careerpath":"[\"Cybersecurity analyst\",\n\"Identity access management (IAM) analyst\",\n\"Data Loss Prevention (DLP) analyst\",\n\"Privilege Access Management (PAM) analyst\"]","coursebundleselectable":false,"providerid":"Smartlearning","trial":true,"vimeofolder":null},{"courseid":"CISM(571","coursename":"Certified Information Security Manager (CISM)","description":"Nam inventore ut quia voluptate nemo. Nulla tenetur sed accusamus ex possimus provident eligendi ut nihil Nam inventore ut quia voluptate nemo. Nulla tenetur sed accusamus ex possimus provident eligendi ut nihil Nulla tenetur sed accusamus ex possimus nihil","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Certified%20Information%20Security%20Manager%20%28CISM%29-live/advanced/banner/w9Bwlv3nhrEFe8aCcxqgDsL0ZR7c5t6GKAEFjnmYgeQhbTIBwL.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=X9A0aHdNwe%2Fe0jWOEevZE9%2BrJ%2FnRATcTzHoMhf7iPQHtuZJ3Fd06B5cLGg0lpqPOO1Qi%2BRUGBXyw0EH5OI0%2BswB63KXFyUmpIzekjzORAFE24GqRWb5liTsZdMHYD%2FWOkmkHKSnW2ZPHppoguL1KRx2BZD8%2FgJkAGLcuTyftxRkvvQSPTgdMinw%2BQwOhrJYLOxuAPprS46fZKMNGln1iAlcPgZA%2FalB8XTC31A9WloXQYu9VNbhcVr9BRKjxMPz2vQ3Rok0rU93D1ECwOu43yE3e975RKEJntsmvllDY4nYdcGF2PSjBrC81G6GViSc0rP2YsZ0eaOsltNyJmI2Ieg%3D%3D","imagename":"w9Bwlv3nhrEFe8aCcxqgDsL0ZR7c5t6GKAEFjnmYgeQhbTIBwL.svg","category":"Advance","classification":null,"duration":"","status":null,"deliverytype":"Live","relatedcourses":"[]","trainerid":120,"created":"2023-03-07T23:47:47.085Z","courseobjective":"[]","prerequisites":null,"examsandcerts":null,"targetaudience":null,"deliveryformat":"live","careerpath":null,"coursebundleselectable":false,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"DS&M849","coursename":"Database Security and Management","description":"This course provides comprehensive coverage of database security and management principles and practices. Participants will learn how to design, implement, and maintain secure and efficient database systems while addressing security concerns, compliance, and best practices.","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Essentials%20of%20Data%20Loss%20Prevention-live/intermediate/banner/LWiywy84_gAlTjV1q-cqLix4RO8HCiyQpNQdiLLP7TFdoOIJks.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=lHii%2BzboqWdu93%2B%2Fu%2FkGD3u3QSfFMew3E0yTKHUBTZALVmnqen%2BfVWGR%2FBYppyBo8pPJoGHROk8cO5R5xVmFKWTB%2FUEYYJm%2Bc40AJeU17Qn7H%2BHGvklEidT87KrNI9PrJ927nF8ylxKi3NRQAt1Gz6%2Bag%2F9ZoXbN80jdBSyU3R9av8TD0zeKaFwGfzCJHq1XFeoOfm5zDAtrfHAe9xu4Ob6KscXx%2BPpux3TMmXtqrOC9zIqH2865d%2FnT697puaxpqlYEklYXQr9gNnfD%2BouIrtDXB0vh85DXo9kmltDWYDnmG7ZVmISTaAGHDnK7cCHyCTGXLslMdVE9FVbSAN8VGw%3D%3D","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Live","relatedcourses":"[]","trainerid":null,"created":"2023-09-04T13:56:39.104Z","courseobjective":"[\"Explore the concepts and principles of databases, including data models, normalization, and relational database management systems (RDBMS).\",\"Learn about the various security threats and vulnerabilities that databases face.\",\"Implement security measures such as access controls, authentication, authorization, and encryption.\",\"Develop strategies for protecting sensitive data and ensuring compliance with data privacy regulations (e.g., GDPR, HIPAA)\",\"Gain hands-on experience in database creation, maintenance, and optimization.\",\"Explore database design best practices to improve efficiency and performance.\",\"Master backup and recovery techniques to prevent data loss.\",\"Implement database monitoring and auditing tools and techniques.\",\"Identify and respond to abnormal database activities and potential security breaches.\",\"Learn strategies for ensuring high availability of databases through redundancy and failover mechanisms.\",\"Develop disaster recovery plans to minimize downtime and data loss in case of emergencies.\",\"Understand the challenges and benefits of managing databases in cloud environments.\",\"Explore popular cloud-based database services and their security considerations.\",\"Optimize database performance through indexing, query optimization, and resource management.\"]","prerequisites":"Participants should have a basic understanding of database technology. Familiarity with operating systems and general IT knowledge is recommended.","examsandcerts":"[]","targetaudience":"[\"IT Professionals\",\"Database Administrators\"]","deliveryformat":"live","careerpath":"[\"Database Architect\"]","coursebundleselectable":null,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"CDPP960","coursename":"Certified Data Privacy Practitioner","description":"This comprehensive course aims to empower participants to become proficient in safeguarding sensitive information, mitigating data privacy risks, and ensuring compliance with relevant laws and standards.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FProg.%20and%20Scripting%20copy%202.svg?alt=media&token=2808b97c-cc36-45da-b1ce-8ff2a1206f55","imagename":"","category":"Advance","classification":"Technical","duration":"","status":null,"deliverytype":"Live","relatedcourses":"[\"CDPO(348\",\"CCSP(541\"]","trainerid":null,"created":"2024-02-28T23:49:06.203Z","courseobjective":"[]","prerequisites":"Basic Understanding of Data Privacy Concepts, Familiarity with Information Technology, Legal and Regulatory Awareness, Commitment to Continuous Learning","examsandcerts":"[\"ISO 27001 Lead Implementer and Lead Auditor\",\"CISA\", \"CISM\",\"CISSP\"]","targetaudience":"[]","deliveryformat":"live","careerpath":"[\"Data Protection Officer\",\"Information Governance Specialist\",\"Data Privacy Consultant\",\"Chief Data Officer\"]","coursebundleselectable":false,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"EoCG156","coursename":"Essentials of Cloud Governance","description":"This intermediate-level course is designed to provide participants with a deeper understanding of cloud governance principles, strategies, and best practices. Building upon the foundational knowledge, this course delves into more advanced topics to help participants effectively manage and optimize their cloud resources while ensuring security, compliance, and cost-efficiency.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FCloud%20Governance%20copy.svg?alt=media&token=c74e83f3-ec23-461d-965b-ae3945d3184d","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[]","trainerid":null,"created":"2023-08-23T21:55:14.724Z","courseobjective":"[\"Understand the fundamentals of cloud computing and its benefits for organizations.\",\"Explain the importance of cloud governance and its role in ensuring compliance, security, and cost optimization.\",\"Identify the key stakeholders involved in cloud governance and understand their responsibilities.\",\"Develop and implement a cloud governance framework tailored to their organization's needs.\",\"Define policies and procedures to ensure proper management and oversight of cloud resources.\",\"Implement security measures and controls to protect data and ensure privacy in the cloud.\",\"Monitor and audit cloud usage to ensure compliance with organizational policies and regulatory requirements.\",\"Optimize cloud resource utilization to achieve cost efficiencies without sacrificing performance.\",\"Understand the legal and regulatory considerations associated with cloud governance.\",\"Stay updated with emerging trends and best practices in cloud governance.\"]","prerequisites":"Completion of a foundational cloud governance course or equivalent experience, Basic understanding of cloud computing concepts and services, Familiarity with a major cloud platform (e.g., AWS, Azure, Google Cloud)","examsandcerts":"[\"Certificate of Cloud Auditing Knowledge (CCAK) by ISACA\",\"Certified Cloud Governance Specialist by Arcitura Education\"]","targetaudience":"[\"Cloud Architects and Engineers\",\"IT Managers and Directors\",\"Compliance Officers and Legal Professionals\",\"Operations and DevOps Teams\",\"Anyone responsible for cloud resource management and governance\"]","deliveryformat":"live","careerpath":"[\"Cloud Engineer\",\"Cloud & Platform Manager\",\"Cloud Risk Manager\",\"Business Analyst – Cloud, Risk & Control\"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"EoDLP901","coursename":"Essentials of Data Loss Prevention(DLP)","description":"Welcome to the Intermediate Data Loss Prevention (DLP) Training! In this course, you will build upon your foundational knowledge of DLP and delve deeper into the concepts, strategies, and techniques necessary to protect sensitive data within your organization. This intermediate-level training is designed for professionals who have a basic understanding of DLP and are looking to expand their expertise in implementing effective data protection strategies.","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Essentials%20of%20Data%20Loss%20Prevention-live/intermediate/banner/LWiywy84_gAlTjV1q-cqLix4RO8HCiyQpNQdiLLP7TFdoOIJks.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=lHii%2BzboqWdu93%2B%2Fu%2FkGD3u3QSfFMew3E0yTKHUBTZALVmnqen%2BfVWGR%2FBYppyBo8pPJoGHROk8cO5R5xVmFKWTB%2FUEYYJm%2Bc40AJeU17Qn7H%2BHGvklEidT87KrNI9PrJ927nF8ylxKi3NRQAt1Gz6%2Bag%2F9ZoXbN80jdBSyU3R9av8TD0zeKaFwGfzCJHq1XFeoOfm5zDAtrfHAe9xu4Ob6KscXx%2BPpux3TMmXtqrOC9zIqH2865d%2FnT697puaxpqlYEklYXQr9gNnfD%2BouIrtDXB0vh85DXo9kmltDWYDnmG7ZVmISTaAGHDnK7cCHyCTGXLslMdVE9FVbSAN8VGw%3D%3D","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[]","trainerid":null,"created":"2023-08-23T18:28:48.247Z","courseobjective":"[\"Analyze and assess data loss risks within an organization's environment.\",\"Design and implement more advanced DLP policies to address specific data protection needs.\",\"Utilize DLP solutions to monitor, detect, and prevent data breaches and leaks.\",\"Develop incident response strategies for DLP incidents.\",\"Collaborate with cross-functional teams to integrate DLP into broader cybersecurity frameworks.\",\"Stay updated on the latest trends and developments in DLP technologies and best practices.\"]","prerequisites":"Participants should have a basic understanding of computer networks, operating systems, and general IT concepts. Basic knowledge of dt classification or informtion labeling. Familiarity with dt protection law such as GDPR and basic data security protection controls such encryption will be beneficial but not mandatory.","examsandcerts":"[\"Exam SC-400: Microsoft Information Protection Administrator.\"]","targetaudience":"[\"IT professionals responsible for data security and protection\",\"Information security officers\",\"Data protection officers\",\"Compliance officers\",\"System administrators\",\"Risk management professionals\",\"Privacy advocates\",\"Managers and decision-makers involved in data governance\"]","deliveryformat":"live","careerpath":"[\"Cybersecurity analyst\",\"Identity access management (IAM) analyst\",\"Data Loss Prevention (DLP) analyst\",\"Privilege Access Management (PAM) analyst\"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"EONS014","coursename":"Introduction to Network Security","description":"Introduction to Network Security is a comprehensive training program designed to provide participants with a solid foundation in the fundamentals of network security. This course aims to equip individuals with the knowledge and skills necessary to protect computer networks and their resources from unauthorized access, breaches, and other security threats.\nThroughout this training, participants will explore the key concepts, principles, and technologies associated with network security. They will gain a deeper understanding of various security threats and vulnerabilities that can compromise the integrity, confidentiality, and availability of networked systems. By examining real-world scenarios and case studies, participants will develop practical skills to identify, prevent, and respond to security incidents effectively.","price":"200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FNetwork%20access%20and%20risk%20%20copy.svg?alt=media&token=9ae31216-cb58-48af-b80b-4f7538835093","imagename":"Te8vyq1ikC5IkD7QW3JPOSEct49i3A0_6s-G1CX0WMCEzw8GZf.svg","category":"Beginner","classification":null,"duration":null,"status":null,"deliverytype":"Live","relatedcourses":"[\"ItCS771\",\"EoCS785\",\"EOVM017\",\"PaVM156\"]","trainerid":null,"created":null,"courseobjective":"[\"Understand the fundamentals of network security, including its importance, principles, and goals.\",\n\"Identify different types of network threats, vulnerabilities, and attack vectors.\",\n\"Gain knowledge about common network security protocols, such as TCP/IP, SSL/TLS, and IPsec.\",\n\"Explore various authentication mechanisms and access control methods used in network security.\",\n\"Learn about network encryption techniques and cryptographic algorithms.\",\n\"Develop an understanding of network security devices, including firewalls, intrusion detection systems, and virtual private networks (VPNs).\",\"Examine network security best practices and guidelines for secure configuration and management.\",\n\"Acquire skills to detect and respond to network security incidents effectively.\",\n\"Understand the importance of network monitoring and logging for security analysis and incident investigation.\",\n\"Learn about emerging trends and technologies in network security, such as cloud security, IoT security, and mobile device security.\"]","prerequisites":"No specific prerequisites are required for this course. However, a basic understanding of computer networks, security concepts, and system administration will be beneficial.","examsandcerts":"[\"CompTIA Security+\",\n\"CCNA Security\",\n\"CCNP Security\",\n\"CCIE Security\",\n\"Certified Network Security Practitioner (CNSP)\",\n\"Certified Network Defender (CND)\",\n\"CISSP - Certified Information Systems Security Professional\"]","targetaudience":"[\"IT professionals\",\n\"System administrators\", \n\"Security analysts\",\n\"Anyone involved in the design, implementation, or management of network systems within their organizations.\",\n\"Beginners seeking an introduction to network securty\",\n\"Experienced professionals looking to enhance their knowledge and skills in this domain.\"]","deliveryformat":"recording","careerpath":"[\"Network Security Engineer\",\n\"Cybersecurity Engineer\",\n\"Network Security Architect\",\n\"Cybersecurity Architect\"]","coursebundleselectable":false,"providerid":"Smartlearning","trial":true,"vimeofolder":null},{"courseid":"SA728","coursename":"SOX Audit","description":"The SOX Audit Fundamentals course provides participants with a comprehensive understanding of the Sarbanes-Oxley Act (SOX) and its impact on financial reporting and internal controls. The course covers the key principles, requirements, and best practices associated with conducting effective SOX audits. Participants will learn how to assess and test internal controls, identify control deficiencies, and develop recommendations for remediation. The course also explores the roles and responsibilities of auditors, management, and audit committees in ensuring compliance with SOX regulations","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FApp.%20Sec.%20Fundamental%20copy%202.svg?alt=media&token=110db3e0-4ce4-4ac7-83ee-016c3a9a3932","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[\"ItIA312\",\"CSRM423\",\"II2902\"]","trainerid":null,"created":"2023-07-03T03:25:41.328Z","courseobjective":"[\"Understand the purpose and significance of the Sarbanes-Oxley Act.\",\"Familiarize participants with the key sections and requirements of SOX legislation.\",\"Gain insight into the roles and responsibilities of auditors and other stakeholders in the SOX audit process.\",\"Develop a systematic approach to planning and scoping a SOX audit.\",\"Learn techniques for assessing and testing internal controls to ensure compliance.\",\"Explore methods for documenting audit procedures and workpapers effectively.\",\"Understand the reporting requirements and the creation of audit reports for management and external stakeholders.\",\"Recognize common challenges and issues encountered during SOX audits and strategies to address them.\",\"Stay up-to-date with recent developments and changes in SOX regulations and their impact on auditing practices.\"]","prerequisites":"Participants should have a basic understanding of IT auditing concepts. ","examsandcerts":"[\"IT Audit Fundamentals by ISACA\",\"CISA - Certified Information Systems Auditor\"]","targetaudience":"[\"IT Audtor\",\"IT professionals interested in learning SOX \",\"Anyone seeking to enhance their knowledge and skills in regulatory complaince.\"]","deliveryformat":"live","careerpath":"[\"Information Security GRC Analyst\",\"IT Auditing\",\"Cybersecurity Risk Analyst\"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"MA238","coursename":"Malware Analysis","description":"Malware analysis is a crucial skill for cybersecurity professionals to understand the inner workings of malicious software and effectively combat cyber threats. This comprehensive training course is designed to equip participants with the necessary knowledge and practical skills to analyze, identify, and mitigate various types of malware. Through a combination of theoretical instruction, hands-on exercises, and real-world case studies, participants will gain a deep understanding of malware behavior, techniques, and countermeasures.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FMalware%20Analysis%20copy.svg?alt=media&token=0e2d6dba-3f10-45af-ba1e-7ac28774084c","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[\"EONS014\",\"EoCS785\"]","trainerid":null,"created":"2023-07-03T02:39:36.881Z","courseobjective":"[\"Understand the fundamentals of malware analysis, including its importance in cybersecurity.\",\"Gain knowledge of different types of malware, such as viruses, worms, Trojans, ransomware, and more.\",\"Explore various malware distribution methods and infection vectors.\",\"Learn static and dynamic analysis techniques to analyze and dissect malicious code.\",\"Acquire proficiency in using industry-standard tools and technologies for malware analysis.\",\"Develop skills to identify malware signatures and behavior patterns.\",\"Investigate common evasion techniques used by malware to avoid detection.\",\"Learn how to extract and analyze malware artifacts, such as network traffic, memory dumps, and file system data.\",\"Understand the techniques used by malware to exploit vulnerabilities and propagate across systems.\",\"Master reverse engineering techniques to understand the inner workings of malware and uncover its functionalities.\",\"Gain insights into anti-analysis and anti-debugging techniques employed by malware authors.\",\"Learn effective strategies for malware detection, containment, and eradication.\",\"Explore advanced topics, including advanced persistent threats (APTs), rootkits, botnets, and mobile malware.\",\"Apply learned concepts to real-world scenarios through hands-on labs and practical exercises.\",\"Develop skills to write detailed malware analysis reports and communicate findings to stakeholders.\"]","prerequisites":"Basic knowledge of virus, malware, endpoint security and network concept.","examsandcerts":"[\"GIAC Reverse Engineering Malware Certification (GREM)\"]","targetaudience":"[\"IT professional individuals interested in learning Malware analysis.\"]","deliveryformat":"live","careerpath":"[\"System Engineer & Malware Analyst\",\"IT Security Analyst\"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"EPAM009","coursename":"Introduction to Privilege Access Management","description":"Introduction to Privileged Access Management (PAM) is a comprehensive training program designed to provide participants with a solid foundation and practical understanding of privilege access management within modern organizational environments. This course aims to equip learners with the knowledge and skills necessary to implement effective PAM strategies, mitigate security risks, and enhance overall data protection.","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Introduction%20to%20Azure%20Cloud%20Computing-live/beginner/banner/Te8vyq1ikC5IkD7QW3JPOSEct49i3A0_6s-G1CX0WMCEzw8GZf.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=jKk3ZW2RUHpxGZoUB4cBxicPegsWkN9cYW4lvvBImIZvj78kyi%2FMMlpTB%2FAyUpqAxDa2uurNVoPFjUY%2B4QOsdvvDZWbPbCoWMDTGZYtJROG6LhMx6IWMzGm4y97zgx1TvasnG6T4hnTOQyw8tSv71uAPh3zhjcnZ2uHN%2FpxkVP1d7D1p2xH1OVjcccPFeogq5OOGd6nuEszE1GQ46DjhrvIP9UwMThCULviHCzGwLSw3gKyU1CDMvlU0pSLIy5yr%2Ft0ka1gkyir1iWWxofhMSZszBtNRovN88KPpEnHqkFq9kNVrYo2o%2B9aHjQc5nmrl1hZYBTbNc%2B1tZ%2BkEDnBiaw%3D%3D","imagename":"Te8vyq1ikC5IkD7QW3JPOSEct49i3A0_6s-G1CX0WMCEzw8GZf.svg","category":"Beginner","classification":null,"duration":null,"status":null,"deliverytype":"Live","relatedcourses":"[\"CSRM423\",\"EONS014\",\"II2902\",\"PaVM156\"]","trainerid":null,"created":null,"courseobjective":"[\"Understand Privileged Access Management (PAM): Gain a clear understanding of PAM concepts, its importance in cybersecurity, and how it relates to overall risk management strategies.\",\"Identify Privileged Accounts and Users: Learn how to identify privileged accounts and users within an organization's IT infrastructure, including administrators, superusers, and service accounts.\",\"Explore PAM Frameworks and Best Practices: Study different PAM frameworks, industry standards, and best practices, such as the Principle of Least Privilege (PoLP) and Just-in-Time (JIT) access, to develop effective PAM strategies.\",\"Implement Privileged Access Controls: Discover various access control mechanisms and technologies used in PAM, such as password vaults, session management, multi-factor authentication (MFA), and secure remote access.\",\"Understand Privileged Session Monitoring: Learn about the importance of monitoring and auditing privileged sessions, including session recording, session isolation, and real-time alerts to detect anomalous activities.\"]","prerequisites":"There are no specific prerequisites for this course. However, a general understanding of cybersecurity concepts and basic knowledge of identity and access management (IAM) will be beneficial.","examsandcerts":"[\"CyberArk CDE certifications for PAM and EPM.\",\"CyberArk Defender PAM & EPM\",\"CyberArk Sentry PAM-SEN\",\"CyberArk Guardian\"]\n","targetaudience":"[\"IT professionals involved in cybersecurity and identity management\",\"Security architects and administrators\",\"System administrators and network engineers\",\"Compliance officers and auditors\",\"IT managers and decision-makers responsible for security\"]\n","deliveryformat":"recording","careerpath":"[\"Cybersecurity analyst\",\"Identity access management (IAM) analyst\",\"Data Loss Prevention (DLP) analyst\",\"Privilege Access Management (PAM) analyst\"]","coursebundleselectable":false,"providerid":"Smartlearning","trial":true,"vimeofolder":null},{"courseid":"ItSaOC2C491","coursename":"Introduction to System and Organizational Control (SOC 2) Compliance","description":"The Introduction to System and Organizational Control (SOC 2) Compliance Training is designed to provide participants with a comprehensive understanding of SOC 2 compliance requirements and best practices. SOC 2 is a widely recognized standard for evaluating the effectiveness of an organization's controls over its systems and the protection of customer data. This course will cover the fundamental concepts, principles, and implementation strategies necessary for achieving SOC 2 compliance.","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Essentials%20of%20SOC%202%20Compliance-live/intermediate/banner/GO_Zy5LfOrfF8Ho1Cd34Op6KtRjGcaa5VKRNETmUbykPI9GEEu.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=k0YEwz0gtKphj%2BsfMHGUMauO93fNqHViLnNzFmToIpTbeJO4lBCKtbdGjtpt8Y3TTykueZLFC0xEHeybBWsMJwKP3ATs%2BMoMUxuRVKM96jT%2Fwy6O0keslMk0IhJHjpBT2daH%2BhtLRLr5nmwophRVv%2BVvJVYVKBJMC2VCPWvYmmzX9O8rsG8OmPHXex5pEPmUHSYvKhOuZSk9hcQNXbURMFqfeMPWXZUUJv%2BGuzFLtjFwfz1k0%2FmSF3WpursnIvFo%2BR1I5he%2B3o02n1WBDMRkIXG9jSYIzwCqHWtKc8SQtYSKwz%2FQ8cIZPQArG0CoWxhfzOENajlmYZIYufUNySBdhg%3D%3D","imagename":"","category":"Beginner","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[]","trainerid":null,"created":"2023-08-17T23:15:54.795Z","courseobjective":"[\"Understand the fundamentals of SOC 2 compliance: Participants will gain a solid understanding of the key concepts, principles, and terminology related to SOC 2 compliance. They will learn about the different Trust Services Criteria (TSC) and how they are applied to assess an organization's controls.\",\"Identify the scope and applicability of SOC 2 compliance: Participants will learn how to determine if their organization needs to comply with SOC 2 and identify the scope of their compliance efforts. They will understand the various industry-specific requirements and how to align them with their organization's goals.\",\"Comprehend the SOC 2 framework: Participants will become familiar with the SOC 2 framework and its five trust service categories: Security, Availability, Processing Integrity, Confidentiality, and Privacy. They will learn about the criteria for each category and how to develop controls that address them effectively.\",\"Learn the implementation process: Participants will be guided through the step-by-step process of implementing SOC 2 compliance within their organization. They will learn how to conduct a gap analysis, develop a remediation plan, and establish policies, procedures, and controls to meet SOC 2 requirements.\",\"Gain insights into risk assessment and management: Participants will understand the importance of conducting risk assessments and developing risk management strategies as part of SOC 2 compliance. They will learn how to identify and assess risks, prioritize remediation efforts, and establish monitoring and reporting mechanisms.\",\"Explore auditing and reporting considerations: Participants will learn about the SOC 2 audit process, including the roles and responsibilities of auditors and the organization being audited. They will gain insights into preparing for and undergoing a SOC 2 audit, as well as the reporting options available.\",\"Address emerging trends and challenges: Participants will be introduced to the latest trends, emerging technologies, and challenges in SOC 2 compliance.\",\"They will explore topics such as cloud computing, third-party risk management, and evolving privacy regulations, and learn how to adapt their compliance strategies accordingly.\"]","prerequisites":"There are no specific prerequisites for this course. However, a basic understanding of information security concepts, risk management principles, and organizational governance would be beneficial.","examsandcerts":"[\"Certified Information Security Auditor (CISA)\",\"ISO 27001 Lead Auditor\"]","targetaudience":"[\"Individuals involved in IT governance, risk management, compliance, security management, audit, and anyone responsible for ensuring the confidentiality, integrity, and availability of customer data within their organization.\",\"Professionals seeking to gain a foundational understanding of SOC 2 compliance and those planning to pursue SOC 2 certification.\"]","deliveryformat":"recording","careerpath":"[\"Information Security GRC Analyst\",\"Information Security Analyst\",\"IT Security Auditor\",\"IT Compliance Officer\"]","coursebundleselectable":false,"providerid":"Smartlearning","trial":true,"vimeofolder":null},{"courseid":"I2C398","coursename":"ISO 27001 Consultant","description":"The ISO 27001 Consultant Training is a comprehensive and intensive program designed to equip aspiring professionals with the knowledge, skills, and expertise required to become competent ISO 27001 consultants. This course focuses on the International Organization for Standardization (ISO) 27001 standard, which is a globally recognized framework for establishing, implementing, maintaining, and continuously improving information security management systems (ISMS).","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Essentials%20of%20ISO/IEC%2027001-live/intermediate/banner/SHSNh_Qwdw8h-fjE22NRZR43EuDsdlcdFfp7vnFVLInQlQy5in.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=EMi2Bpwg9U5jfZW%2BIiBj%2FCIMFk0jL8h12NHDsYH6zlpYfSV9YhKSOrWQWdtHUWyOtpg28L4x%2B4o90eG1RgHw6t%2FQmKsiMZbKNLA6MyPCdDdXzBDpK1VrbxFCeHmWS2a%2FNHe%2BJVbqfwdQ0Ka%2Fa66hv3nhXGgSmDmJaYquBnAQnLs%2FqMQkpzTbDLhRTf3yJGuT%2FFS1VBIswFQSPbKQu0C50MAO4KObSJd2akB8%2BoqYhqcMzFI8nNM%2BDiHFKFS73mN74gyiqNzeSRaaCUQ8q50V4Pvzj%2BAT2rUo261dGLQURx%2FJWpPWpaSd20W362qC1QYXm1KfZPbRVcypoUCBCdp0kQ%3D%3D","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[]","trainerid":null,"created":"2023-08-17T22:47:55.079Z","courseobjective":"[\"Understand ISO 27001: Gain a comprehensive understanding of the ISO 27001 standard, its purpose, structure, and requirements, as well as the benefits it brings to organizations.\",\"ISMS Fundamentals: Explore the fundamentals of information security management systems (ISMS) and their importance in protecting sensitive information.\",\"ISO 27001 Implementation: Learn the step-by-step process of implementing ISO 27001 within an organization, including risk assessment, gap analysis, and creating an effective security framework.\",\"Risk Management: Develop skills in identifying, assessing, and managing information security risks to ensure the confidentiality, integrity, and availability of critical data.\",\"Documentation and Controls: Understand the documentation requirements of ISO 27001 and learn how to establish and maintain necessary controls to meet compliance.\",\"Internal Auditing: Learn how to conduct internal audits to assess the effectiveness of an organization's ISMS and identify areas for improvement.\",\"Compliance and Certification: Familiarize with the ISO 27001 certification process, requirements, and audit procedures to guide organizations towards successful certification.\",\"Security Awareness: Acquire the expertise to conduct security awareness training for employees and stakeholders to promote a culture of security within the organization.\",\"Continuous Improvement: Understand the importance of continuous improvement in maintaining an effective ISMS and identify ways to monitor, measure, and enhance security practices.\"]","prerequisites":"To maximize the benefits of this training program, participants should have a basic understanding of information security concepts and familiarity with ISO standards. While prior experience in consulting is not mandatory, individuals with relevant backgrounds will find the course content more accessible.","examsandcerts":"[\"ISO 27001 Lead Auditor\",\"ISO 27001 Lead Implementer\"]","targetaudience":"[\"Individuals seeking to pursue a career as ISO 27001 consultants \",\"Existing professionals in the fields of information security, risk management, IT governance, and audit who wish to enhance their expertise in ISO 27001 implementation and consulting.\"]","deliveryformat":"live","careerpath":"[\"IT Security Consultant\",\"Information Security Consultant\",\"Information Security, GRC Analyst\",\"ISMS Auditor \"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"PD848","coursename":"PCI DSS","description":"The PCI DSS (Payment Card Industry Data Security Standard) is a globally recognized standard for protecting payment card data and ensuring the security of cardholder information. This comprehensive training course provides participants with an in-depth understanding of the PCI DSS requirements and equips them with the knowledge and skills to implement effective security measures within their organizations.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FApp.%20Sec.%20Fundamental%20copy%202.svg?alt=media&token=110db3e0-4ce4-4ac7-83ee-016c3a9a3932","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[\"EONS014\"]","trainerid":null,"created":"2023-07-03T02:51:01.963Z","courseobjective":"[\"Understand the importance of PCI DSS compliance and its impact on businesses that handle payment card data.\",\"Gain a detailed knowledge of the PCI DSS requirements and the intent behind each requirement.\",\"Learn how to assess and identify vulnerabilities in payment card systems and networks.\",\"Develop strategies and best practices for implementing effective security controls and measures.\",\"Understand the scope of PCI DSS compliance and its applicability to different types of organizations.\",\"Learn how to perform risk assessments and implement risk management strategies.\",\"Acquire knowledge of incident response and breach notification procedures in the event of a security breach.\",\"Understand the role of compliance audits and the process of achieving and maintaining PCI DSS compliance.\"]","prerequisites":"There are no strict prerequisites for this course. However, a basic understanding of IT infrastructure and security concepts would be beneficial.","examsandcerts":"[\"Qualified Security Assessor\"]","targetaudience":"[\"IT managers and administrators\",\"Security professionals and auditors\",\"Compliance officers\",\"Payment card system administrators\",\"Any individual responsible for payment card data security within an organization\"]","deliveryformat":"live","careerpath":"[\"PCI DSS compliance Officer.\",\"Network Security Engineer\",\"Network Security Manager\",\"GRC Analyst\"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"EoPAM118","coursename":"Essentials of Privileged Access Management(PAM)","description":"Welcome to the Intermediate-level Priviledge Access Management (PAM) Training course! In this comprehensive training program, you will delve deeper into the world of PAM, building upon your foundational knowledge and skills to become a proficient PAM practitioner. This course is designed to equip you with the necessary tools and insights to effectively manage user priviledges, access privileges, and security within modern IT infrastructures.","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Introduction%20to%20Azure%20Cloud%20Computing-live/beginner/banner/Te8vyq1ikC5IkD7QW3JPOSEct49i3A0_6s-G1CX0WMCEzw8GZf.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=jKk3ZW2RUHpxGZoUB4cBxicPegsWkN9cYW4lvvBImIZvj78kyi%2FMMlpTB%2FAyUpqAxDa2uurNVoPFjUY%2B4QOsdvvDZWbPbCoWMDTGZYtJROG6LhMx6IWMzGm4y97zgx1TvasnG6T4hnTOQyw8tSv71uAPh3zhjcnZ2uHN%2FpxkVP1d7D1p2xH1OVjcccPFeogq5OOGd6nuEszE1GQ46DjhrvIP9UwMThCULviHCzGwLSw3gKyU1CDMvlU0pSLIy5yr%2Ft0ka1gkyir1iWWxofhMSZszBtNRovN88KPpEnHqkFq9kNVrYo2o%2B9aHjQc5nmrl1hZYBTbNc%2B1tZ%2BkEDnBiaw%3D%3D","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[]","trainerid":null,"created":"2023-08-23T16:26:46.933Z","courseobjective":"[\"Gain a comprehensive understanding of Privileged Access Management concepts and strategies.\",\"Learn to design and implement role-based access control (RBAC) and just-in-time (JIT) access.\",\"Explore advanced topics like Zero Trust integration and PAM for cloud environments.\",\"Acquire practical skills through hands-on workshops and exercises.\",\"Understand how to monitor and audit privileged sessions for security and compliance.\",\"Learn from real-world case studies and best practices for successful PAM implementation.\",\"Enhance your ability to secure privileged identities and mitigate security risks effectively.\"]","prerequisites":"Basic understanding of cybersecurity concepts and identity management.,Familiarity with basic Privileged Access Management principles is recommended but not mandatory.","examsandcerts":"[\"CyberArk CDE certifications for PAM and EPM.\",\"CyberArk Defender PAM & EPM\",\"CyberArk Sentry PAM-SEN\",\"CyberArk Guardian\"]","targetaudience":"[\"IT and Security Professionals responsible for managing privileged access.\",\"System Administrators and Network Engineers looking to enhance their PAM knowledge.\",\"Compliance Officers and Auditors dealing with security and compliance requirements.\",\"Anyone interested in strengthening their understanding of Privileged Access Management at an intermediate level.\"]","deliveryformat":"live","careerpath":"[\"Cybersecurity analyst\",\"Identity access management (IAM) analyst\",\"Data Loss Prevention (DLP) analyst\",\"Privilege Access Management (PAM) analyst\"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"CDPO(348","coursename":"Certified Data Protection Officer (cDPO)","description":"Nam inventore ut quia voluptate nemo. Nulla tenetur sed accusamus ex possimus provident eligendi ut nihil Nam inventore ut quia voluptate nemo. Nulla tenetur sed accusamus ex possimus provident eligendi ut nihil Nulla tenetur sed accusamus ex possimus nihil","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Certified%20Data%20Protection%20Officer%20%28cDPO%29-live/advanced/banner/xtYEW6TN-srgOzzmhXDbq5H_qcCDxy2l0PDc6o1ySrlFKCKZOu.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=riglygCTldTQ0X94GOZmE%2BB3vinXATMx8LHNSF2UalI1GNJjCOwwsRC2%2FoEJtNSMfZS3FbtzObCjUVeM1dt6o3%2FZEuxpNdft8ocm3Lt1Ikd8M159v5MDEG7qu4ZiC2DMRqNOfw87PSfm3R5Vjpq%2BsGST5pwCK4lFj2NWV%2BzgDKWp%2FV90vDBm6nrVGONhiNj5rMEua2eRQB9MC7gPeO%2F0sCcqY2Et0%2F%2BezxwSyGRLI8lrDxeB5Gu%2FA1lewZXZCgkwVFjOAsym5qVfbCAkIgbg7Em%2F8XRIV7gOJ4F8pVDS2PyRqTh9tctdolh5LpMZe%2FIO4yWVH8f0JbyCpMnPoftisw%3D%3D","imagename":"xtYEW6TN-srgOzzmhXDbq5H_qcCDxy2l0PDc6o1ySrlFKCKZOu.svg","category":"Advance","classification":null,"duration":"","status":null,"deliverytype":"Live","relatedcourses":"[]","trainerid":120,"created":"2023-03-07T23:47:47.085Z","courseobjective":"[]","prerequisites":null,"examsandcerts":null,"targetaudience":null,"deliveryformat":"live","careerpath":null,"coursebundleselectable":false,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"ItIAM454","coursename":"Introduction to Identity Access Management","description":"The Introduction to Identity Access Management (IAM) training course is designed to provide participants with a comprehensive understanding of the fundamental concepts, principles, and best practices related to IAM. IAM plays a crucial role in securing digital resources and ensuring proper access controls within organizations. This course aims to equip learners with the necessary knowledge and skills to implement and manage IAM solutions effectively.","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Identity%20Access%20Management%20Architecture-live/intermediate/banner/JvCbv6Iqsa1CErPgzPhabpMAl8hLE3Ef-oLlI6h7jzEJn1GzCJ.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=nbNIRSI89eWsL%2FJjFs9P30Y2sm5mzn2HDk3e0S2%2FwT9ujJFPn9tcx%2FFZdt1bhdEC3OpYqGCaXRPrFKv0M%2BuQkhJm6EKNk%2FEakrvQ%2FQrQrfUw3pVnLAhypVg61tuynGZ9A%2BuZkhzGWVPm4PcvVvi3RPCR9Na1mXxn7UmUk6IQc2RgBLsqvYYJaV2ZCtqggFcbp7rV4FnjoD7S0ZcNwzbL68jgQJeRK6DSnglHiTTYHE%2Be1ZV3OO5fKa8jiEVdTPBFNPlVuBPXp9C%2Forl3wJsgIwz0SX0niAbmZ7S%2FS5K5EY8ptu1OolkveVaIplacQMeBxAw2ffEV%2B9Q829x5uHr66g%3D%3D","imagename":"","category":"Beginner","classification":"Technical","duration":"","status":null,"deliverytype":"Live","relatedcourses":"[\"EoDLP521\",\"EPAM009\",\"EONS014\",\"EoCS785\"]","trainerid":null,"created":"2023-05-06T01:52:52.620Z","courseobjective":"[\"Understand the core concepts and terminologies associated with Identity Access Management.\",\n\"Gain insights into the importance of IAM in safeguarding digital assets and protecting against unauthorized access.\",\n\"Learn about the various components and building blocks of an IAM system.\",\n\"Explore different IAM methodologies, including role-based access control (RBAC), attribute-based access control (ABAC), and more.\",\n\"Acquire knowledge about identity lifecycle management, including user provisioning, deprovisioning, and access request workflows.\",\n\"Learn about authentication and authorization mechanisms, such as multi-factor authentication (MFA), single sign-on (SSO), and privileged access management (PAM).\",\n\"Understand the significance of identity federation and its role in enabling secure collaboration across organizational boundaries.\",\n\"Familiarize themselves with IAM implementation strategies, including cloud-based IAM solutions and hybrid environments.\",\n\"Gain practical experience through hands-on exercises and real-world case studies.\",\n\"Develop an awareness of IAM-related compliance and regulatory requirements.\"]\n","prerequisites":"No specific prerequisites are required for this course. However, a basic understanding of computer networks, security concepts, and system administration will be beneficial.\n","examsandcerts":"[\"Microsoft Identity and Access Administrator\",\n\"Microsoft Certified: Identity and Access Administrator Associate\",\n\"Certified Access Management Specialist (CAMS)\",\n\"Certified Identity and Access Manager (CIAM)\",\n\"Certified Identity Governance Expert (CIGE)\",\n\"Certified Identity Management Professional (CIMP)\",\n\"Certified Identity Protection Advisor (CIPA)\",\n\"Certified Identity and Security Technologist (CIST).\",\n\"Certified Red Flag Specialist (CRFS).\"]","targetaudience":"[\"IT professionals\", \n\"System administrators\", \n\"Security analysts\",\n\"Anyone involved in the design, implementation, or management of IAM systems within their organizations.\",\n\"Beginners seeking an introduction to IAM \",\n\"Experienced professionals looking to enhance their knowledge and skills in this domain.\"]\n","deliveryformat":"recording","careerpath":"[\"Identity Access Management (IAM) Consultant\",\n\"Identity Access Management (IAM) Specialist \",\n\"Identity Access Management (IAM) Analyst\", \n\"Technical Architect Identity Access Management\"]","coursebundleselectable":false,"providerid":"Smartlearning","trial":true,"vimeofolder":null},{"courseid":"II2902","coursename":"Introduction to ISO/IEC 27001","description":"The Introduction to ISO/IEC 27001 Training is designed to provide participants with a comprehensive understanding of the ISO/IEC 27001 standard, which is widely recognized as the international benchmark for information security management systems (ISMS). This course offers a practical and hands-on approach to learning, equipping individuals with the knowledge and skills needed to effectively implement and manage an ISMS based on ISO/IEC 27001.","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Essentials%20of%20ISO/IEC%2027001-live/intermediate/banner/SHSNh_Qwdw8h-fjE22NRZR43EuDsdlcdFfp7vnFVLInQlQy5in.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=EMi2Bpwg9U5jfZW%2BIiBj%2FCIMFk0jL8h12NHDsYH6zlpYfSV9YhKSOrWQWdtHUWyOtpg28L4x%2B4o90eG1RgHw6t%2FQmKsiMZbKNLA6MyPCdDdXzBDpK1VrbxFCeHmWS2a%2FNHe%2BJVbqfwdQ0Ka%2Fa66hv3nhXGgSmDmJaYquBnAQnLs%2FqMQkpzTbDLhRTf3yJGuT%2FFS1VBIswFQSPbKQu0C50MAO4KObSJd2akB8%2BoqYhqcMzFI8nNM%2BDiHFKFS73mN74gyiqNzeSRaaCUQ8q50V4Pvzj%2BAT2rUo261dGLQURx%2FJWpPWpaSd20W362qC1QYXm1KfZPbRVcypoUCBCdp0kQ%3D%3D","imagename":"","category":"Beginner","classification":"Technical","duration":"","status":null,"deliverytype":"Live","relatedcourses":"[\"TPRM026\",\"CSRM423\",\"GRAC018\",\"II2902\"]","trainerid":null,"created":"2023-05-06T01:46:06.278Z","courseobjective":"[\"Understand the fundamentals of information security management systems and the importance of ISO/IEC 27001.\",\n\"Gain insights into the key concepts, principles, and requirements of ISO/IEC 27001.\",\n\"Learn how to interpret and apply the ISO/IEC 27001 standard to their organization's specific context.\",\n\"Develop the skills to conduct an effective risk assessment and implement appropriate risk management practices.\",\n\"Acquire knowledge on establishing and maintaining a robust framework for information security controls.\",\n\"Familiarize themselves with the process of certification and continual improvement of an ISMS.\"]","prerequisites":"There are no specific prerequisites for this course. However, a basic understanding of information security concepts and familiarity with organizational processes would be beneficial.\n","examsandcerts":"[\"ISO27001 Foundation\",\n\"ISO27001 Lead Auditor\",\n\"ISO27001 Lead Implementer\"]\n","targetaudience":"[\"Professionals seeking to enhance their understanding of information security management systems.\",\n\"IT and security managers responsible for implementing and maintaining ISMS.\",\n\"Compliance officers and auditors involved in information security.\",\n\"Individuals interested in pursuing a career in information security and seeking a foundational understanding of ISO/IEC 27001.\"]","deliveryformat":"recording","careerpath":"[\"Third Party Risk Management Analyst\", \n\"Information Security Analyst \",\n\"Information Security GRC Analyst\",\n\"Information Security Risk Analyst\"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":true,"vimeofolder":null},{"courseid":"GRAC018","coursename":"Governance, Risk & Compliance","description":"The Governance, Risk, and Compliance (GRC) Training is designed to provide participants with a comprehensive understanding of the principles, frameworks, and practices necessary for effective governance, risk management, and compliance within organizations. This course offers practical insights and tools to help professionals enhance their GRC capabilities and ensure the integrity, transparency, and legal compliance of their operations.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FGRC%20copy.svg?alt=media&token=b3abc1f1-5fbe-4143-adba-11cabfc555ff","imagename":"Te8vyq1ikC5IkD7QW3JPOSEct49i3A0_6s-G1CX0WMCEzw8GZf.svg","category":"Intermediate","classification":null,"duration":null,"status":null,"deliverytype":"Recording","relatedcourses":"[\"CSRM423\",\"ItS2A121\",\"TPRM026\",\"G&DPR193\",\"II2902\"]","trainerid":null,"created":null,"courseobjective":"[\"Understand the fundamental concepts and principles of governance, risk management, and compliance.\",\n\"Identify the key components of an effective governance framework and its role in organizational success.\",\n\"Gain insights into risk management methodologies and develop skills to identify, assess, and mitigate risks.\",\n\"Learn about compliance requirements and regulations relevant to different industries and sectors.\",\n\"Explore best practices for establishing and maintaining effective internal controls.\",\n\"Develop a risk-based approach to compliance and understand the importance of compliance audits and monitoring.\",\n\"Acquire knowledge of emerging trends and technologies shaping the field of GRC.\",\n\"Enhance decision-making capabilities by integrating GRC considerations into business strategies.\",\n\"Cultivate a culture of ethical behavior and accountability within the organization.\",\n\"Develop practical skills through case studies, exercises, and interactive discussions.\"]","prerequisites":"There are no specific prerequisites for this course. However, a basic understanding of organizational management and operations would be beneficial.","examsandcerts":"[\"GRC professional (GRCP) certification by oceg\",\n\"Certified in Governance, Risk and Compliance (CGRC) by ISC2\",\n\"Certified in Risk and Information Systems Control (CRISC) Certification by ISC\",\n\"Certified in the Governance of Enterprise IT (CGEIT) Certification\",\n\"GRC professional by OneTrust\"]","targetaudience":"[\"Professionals working in governance, risk management, and compliance roles\",\n\"Executives and managers responsible for establishing and maintaining effective GRC practices\",\n\"Auditors, internal control specialists, and compliance officers\",\n\"Individuals seeking to enhance their knowledge and skills in GRC\"]","deliveryformat":"live","careerpath":"[\"Information Security analyst\",\n\"Information Security -GRC analyst\",\n\"Third Party Risk Management Analyst\",\n\"Information Security Risk Analyst\"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"EoIAM955","coursename":"Essentials of Identity Access Management(IAM)","description":"Welcome to the Intermediate-level Identity Access Management (IAM) Training course! In this comprehensive training program, you will delve deeper into the world of IAM, building upon your foundational knowledge and skills to become a proficient IAM practitioner. This course is designed to equip you with the necessary tools and insights to effectively manage user identities, access privileges, and security within modern IT infrastructures.","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Identity%20Access%20Management%20Architecture-live/intermediate/banner/JvCbv6Iqsa1CErPgzPhabpMAl8hLE3Ef-oLlI6h7jzEJn1GzCJ.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=nbNIRSI89eWsL%2FJjFs9P30Y2sm5mzn2HDk3e0S2%2FwT9ujJFPn9tcx%2FFZdt1bhdEC3OpYqGCaXRPrFKv0M%2BuQkhJm6EKNk%2FEakrvQ%2FQrQrfUw3pVnLAhypVg61tuynGZ9A%2BuZkhzGWVPm4PcvVvi3RPCR9Na1mXxn7UmUk6IQc2RgBLsqvYYJaV2ZCtqggFcbp7rV4FnjoD7S0ZcNwzbL68jgQJeRK6DSnglHiTTYHE%2Be1ZV3OO5fKa8jiEVdTPBFNPlVuBPXp9C%2Forl3wJsgIwz0SX0niAbmZ7S%2FS5K5EY8ptu1OolkveVaIplacQMeBxAw2ffEV%2B9Q829x5uHr66g%3D%3D","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[]","trainerid":null,"created":"2023-08-23T15:47:24.130Z","courseobjective":"[]","prerequisites":"Basic understanding of Identity Access Management concepts, Familiarity with fundamental cybersecurity principles, Proficiency in navigating common IT systems and platforms","examsandcerts":"[\"Microsoft Identity and Access Administrator\",\"Microsoft Certified: Identity and Access Administrator Associate\",\"Certified Access Management Specialist (CAMS)\",\"Certified Identity and Access Manager (CIAM)\",\"Certified Identity Governance Expert (CIGE)\",\"Certified Identity Management Professional (CIMP)\",\"Certified Identity Protection Advisor (CIPA)\",\"Certified Identity and Security Technologist (CIST).\",\"Certified Red Flag Specialist (CRFS).\"]","targetaudience":"[\"IT professionals\",\"System administrators\",\"Security analysts\",\"Anyone involved in the design, implementation, or management of IAM systems within their organizations.\",\"Beginners seeking an introduction to IAM \",\"Experienced professionals looking to enhance their knowledge and skills in this domain.\"]","deliveryformat":"live","careerpath":"[\"Identity Access Management (IAM) Consultant\",\"Identity Access Management (IAM) Specialist \",\"Identity Access Management (IAM) Analyst\",\"Technical Architect Identity Access Management\"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"PaVM156","coursename":"Essentials of Vulnerability and Patch Management","description":"The Vulnerability and Patch Management Training Course is designed to provide participants with a comprehensive understanding of vulnerability assessment, prioritization, and remediation processes, as well as the essential skills to effectively manage software and system patching. This course aims to equip individuals with the knowledge and tools necessary to protect critical systems and networks from potential security breaches caused by vulnerabilities.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FVulnerability%20MGT%20copy%202.svg?alt=media&token=69cab74f-e862-40b6-a1f0-ff3759621a07","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[\"EONS014\",\"EOVM017\",\"ItPT367\"]","trainerid":649,"created":"2023-05-04T17:06:12.428Z","courseobjective":"[\"Understand the fundamentals of vulnerability and patch management.\",\n\"Conduct vulnerability assessments and prioritize vulnerabilities based on risk.\",\n\"Develop effective vulnerability management strategies.\",\n\"Implement vulnerability remediation processes and best practices.\",\n\"Understand the importance of patch management in maintaining system security.\",\n\"Evaluate and select appropriate patch management tools and technologies.\",\n\"Design and implement patch management processes and workflows.\",\n\"Monitor and validate the effectiveness of patch deployments.\",\n\"Develop incident response plans for addressing vulnerabilities and patch failures.\",\n\"Stay updated on emerging threats and security vulnerabilities.\"]","prerequisites":"While there are no strict prerequisites for this course, a basic understanding of networking, system administration, and cybersecurity concepts would be beneficial.","examsandcerts":"[\"Qualys - Vulnerability Management Foundation\",\n\"Qualys - Vulnerability Management\",\n\"Qualys - Vulnerability Management Detecttion, and Response\",\n\"Tenable Vulnerability Management Introduction\",\n\"Tenable Vulnerability Management Specialist\",\n\"Tenable Vulnerability Management Expert\",\n\"Tenable Security Center Specialist\"]","targetaudience":"[\"IT professionals responsible for system administration, network security, or cybersecurity operations\",\n\"Security analysts and incident response team members\",\n\"System administrators and network engineers\",\n\"Risk management professionals\"]","deliveryformat":"live","careerpath":"[\"Vulnerability Management Analyst\",\n\"Cybersecurity Analyst\",\n\"Information Secuity GRC Analyst\"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"DPIA663","coursename":"Data Protection Impact Assessment ","description":"The Data Protection Impact Assessment (DPIA) is a critical tool for organizations to ensure compliance with data protection regulations and safeguard the privacy of individuals. This comprehensive training course is designed to equip participants with the necessary knowledge and skills to effectively conduct DPIAs within their organizations.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FCloud%20Governance%20copy.svg?alt=media&token=c74e83f3-ec23-461d-965b-ae3945d3184d","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[\"G&DPR193\",\"CSRM423\",\"GRAC018\",\"II2902\"]","trainerid":null,"created":"2023-07-03T02:02:24.880Z","courseobjective":"[\"Understand the concept and importance of Data Protection Impact Assessments (DPIAs).\",\"Gain knowledge of relevant data protection regulations, such as the General Data Protection Regulation (GDPR) and other regional or industry-specific requirements.\",\"Learn the key principles, steps, and methodologies involved in conducting a DPIA.\",\"Identify and assess potential privacy risks and impacts associated with data processing activities.\",\"Explore strategies and best practices for mitigating risks and ensuring compliance.\",\"Understand the role of stakeholders and their involvement in the DPIA process.\",\"Learn how to document and report the results of a DPIA effectively.\",\"Explore real-world case studies and practical examples to enhance understanding and application of DPIA concepts.\"]","prerequisites":"There are no specific prerequisites for this course. However, a basic understanding of data protection and privacy concepts would be beneficial.","examsandcerts":"[\"BCS Foundation Certificate in Data Protection\",\"GDPR - Certified Data Protection Officer by PECB\",\"CIPP Certification by iapp\",\"CIPM Certification by iapp\",\"CIPT Certification by iapp\",\"Certified Data Privacy Solutions Engineer™ (CDPSE®)\"]","targetaudience":"[\"Privacy officers\",\"Data protection officers\",\"Information security managers\",\"Compliance managers\",\"Individuals responsible for conducting DPIAs within their organizations.\",\"Legal professionals, consultants, and auditors seeking to enhance their knowledge of DPIA principles and practices.\"]","deliveryformat":"live","careerpath":"[\"Data Protection Analyst /Specialist\",\"Data Protection Officer\",\"Compliance Manager\",\"Data Privacy Officer\"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"TSLP-itj712","coursename":"introduction to javascript","description":"all about the basics, of javascript","price":"££200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses-TeachOnSLP/introduction%20to%20javascript/icon.png?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=13599360000&Signature=sLgTlSJMY1Lx7O%2FVgMb9cPVPBtsEsyYI0AjT0ekSw%2F0AXqQlHkGnM1XbUlRQ0pKpqA5aUVGrx2phwCesV67u74wY4KL1GxCQCbW2GmEcobu9wVvg2z46i2ze0x9b4LjhxeodSFZgSnwFBN16Kleyqehnh0LNuZEZwjFUO4Y70EEc6O3TGFxd5fOwwcW3l1ROQl20wn0L3qprvwJjmwLtv%2BcIekbJ5nezlLICeyR%2B%2FB0%2FHXuRoaZQGRU7u%2BIhMcGCQ1MoVf%2FUaPrpNyxPAImO2pq4m1fTsdkzH39g73iM0wpLRAiSQSuVMYMTYfC7QI83rimIsY0lyPGU38E%2FJtV%2Frg%3D%3D","imagename":"icon.png","category":"Intermediate","classification":"Non-Technical","duration":"15:23","status":null,"deliverytype":"Recording","relatedcourses":"\"CD&A182\"","trainerid":649,"created":"2024-06-13T14:21:34.065Z","courseobjective":"\"to grant full understanding of javascript\"","prerequisites":null,"examsandcerts":null,"targetaudience":null,"deliveryformat":"Recording","careerpath":null,"coursebundleselectable":false,"providerid":null,"trial":false,"vimeofolder":"/users/103583935/projects/21172522"},{"courseid":"CIP&R349","coursename":"Cybersecurity Incident Planning & Response","description":"The Cybersecurity Incident Response & Planning Training is a comprehensive program designed to equip participants with the knowledge and skills necessary to develop and implement effective incident response frameworks within their organizations. This course focuses on the key principles, strategies, and methodologies involved in designing incident response frameworks that are capable of effectively detecting, mitigating, and recovering from cyber threats and security breaches.","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Cybersecurity%20Incident%20Planning%20%26%20Response-live/intermediate/banner/2fGPFeEHXUbhqPtk_M5uXOVinyQw_2XWfqrxpBMtyVYGY2FndP.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=T%2FAFIq32clissnky%2BsTGoRFlxhN%2BqDO7CdXh7eL5n95ZEAQB8f4B2UqmIeJFru1mZU6wXJTpHDXVfVhX8ENM11GasviFtztk%2BOAxGYk33RLkCQw%2FuQldJaoD9vlDzgTQfdqeE4YQpsmsiazp041TBPQ7ijSyJKJ6%2Bp2TZ7e%2FSNx5NydvPLPD5vN8nWbZf08uIiQGjLi9YNu13f8q0UNOVY2stddjBmg%2BPNlfjIm4nmjQzhRsxWEUW6zZm4bm5RuqDYFvnY9YL444Y1GODGTH9lWkHQj%2FVcpSmYHBjs9L911LgQRpAGRDFWoy0Lxxv3EpRxsBo92sr%2B0p3zk0CJ71RA%3D%3D","imagename":"2fGPFeEHXUbhqPtk_M5uXOVinyQw_2XWfqrxpBMtyVYGY2FndP.svg","category":"Intermediate","classification":null,"duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[\"SIEM016\",\"CSRM423\"]","trainerid":120,"created":"2023-03-07T23:47:47.085Z","courseobjective":"[\"Understand the fundamentals of cybersecurity incident response and its importance in modern organizations.\",\n\"Gain insight into the key components and best practices for designing an incident response framework.\",\n\"Learn how to assess organizational risks and develop incident response strategies that align with business objectives.\",\n\"Acquire the skills to create an incident response plan that outlines roles, responsibilities, and communication channels during a security incident.\",\n\"Explore different incident classification and prioritization techniques to enable efficient resource allocation.\",\n\"Understand the role of threat intelligence in incident response and learn how to integrate it into the framework.\",\n\"Learn how to effectively detect, analyze, and contain security incidents through the use of monitoring tools and technologies.\",\n\"Develop the skills necessary to coordinate and execute a comprehensive incident response process, including investigation, containment, eradication, and recovery.\",\n\"Understand the importance of post-incident analysis and the lessons learned process for continuous improvement.\",\n\"Explore legal and regulatory considerations in incident response, including incident reporting and compliance requirements.\"]","prerequisites":"Participants should have a basic understanding of cybersecurity principles and practices. Familiarity with incident response concepts and frameworks is beneficial but not mandatory.","examsandcerts":"[\"GIAC Certified Incident Handler Certification (GCIH)\",\n\"CREST Certified Incident Manager\",\n\"(ISC)² Incident Management: Preparation and Response Certificate\",\n\"EC-Council Certified Incident Handler | ECIH Certification\"]","targetaudience":"[\"Cybersecurity professionals\",\n\"IT managers and administrators\",\n\"Incident response team members\",\n\"Risk and compliance professionals\",\n\"Security analysts and engineers\",\n\"Network administrators\"]","deliveryformat":"live","careerpath":"[\"Cyber Security Incident Manager\",\"Cyber Security Manager\",\"Information Security Manager\",\"SOC Analyst\"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"CISSP(727","coursename":"Certified Information System Security Professional (CISSP)","description":"Nam inventore ut quia voluptate nemo. Nulla tenetur sed accusamus ex possimus provident eligendi ut nihil Nam inventore ut quia voluptate nemo. Nulla tenetur sed accusamus ex possimus provident eligendi ut nihil Nulla tenetur sed accusamus ex possimus nihil","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Certified%20Information%20System%20Security%20Professional%20%28CISSP%29-live/advanced/banner/PDNjQ6Hn4mOykHl2ybC4mh05SJv-m5BAT0dEWvi8XS3WA_TGhQ.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=cYSqqXFAb0DgXfh575wAgsDS5yj9YsJhO35ZA901Zt4E8U1Qtq4SEJlRRrh%2FJVkB%2BoQhCEK6XLSGXl4nJqmlj85O4Ek00ZngP95ATXFl5j1eezdbMCmfQIAPy3y%2BVwawPnVgJxKTGQt6hQIi9PvCpqKz8SilrWWCtKSTzAS5n1LTukmPNfR8zXxPQaenBb%2BMh9yCItvAgMedPgYz22TjbXh4RyOoFFqT8PpehNUymGuiWCjA3AFLYghSZ1dsCNtkF71WZ60imQ1XUPKnaa4TgU1Gty3iWuy5DTAL3R%2FueWwZ4shVnq%2FhgQjaWrXZl3p2bGWV8dpI2dxwPpqvh5JXgQ%3D%3D","imagename":"PDNjQ6Hn4mOykHl2ybC4mh05SJv-m5BAT0dEWvi8XS3WA_TGhQ.svg","category":"Advance","classification":null,"duration":"","status":null,"deliverytype":"Live","relatedcourses":"[]","trainerid":120,"created":"2023-03-07T23:47:47.085Z","courseobjective":"[]","prerequisites":null,"examsandcerts":null,"targetaudience":null,"deliveryformat":"live","careerpath":null,"coursebundleselectable":false,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"EoNS906","coursename":"Essentials of Network Security","description":"This training is designed to provide participants with a deeper understanding of network security concepts and techniques. It covers advanced topics in network security, including secure network design, advanced firewall configurations, intrusion detection and prevention, secure wireless networks, and more.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FNetwork%20access%20and%20risk%20%20copy.svg?alt=media&token=9ae31216-cb58-48af-b80b-4f7538835093","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[]","trainerid":null,"created":"2023-08-22T22:58:07.348Z","courseobjective":"[\"Understand Advanced Threats: Deepen your understanding of modern cyber threats, including malware, advanced persistent threats (APTs), and insider attacks, and learn how to counteract them.\",\"Implement Secure Network Architectures: Design and implement secure network architectures using principles such as network segmentation, defense-in-depth, and zero trust.\",\"Advanced Firewall Management: Gain proficiency in configuring and managing advanced firewall rules, intrusion detection and prevention systems (IDPS), and application-layer filtering.\",\"Encryption and Secure Protocols: Explore the intricacies of encryption algorithms, digital certificates, and secure communication protocols, including TLS/SSL, IPsec, and SSH.\",\"Vulnerability Assessment and Penetration Testing: Learn how to conduct thorough vulnerability assessments and penetration tests to identify weaknesses in networks and applications, and develop strategies to mitigate them.\",\"Network Monitoring and Incident Response: Develop skills to monitor network traffic effectively, detect potential security breaches, and implement incident response plans to mitigate and recover from security incidents.\",\"Wireless Network Security: Understand the unique security challenges posed by wireless networks and master techniques to secure Wi-Fi networks and protect against unauthorized access.\",\"Authentication and Authorization: Explore advanced authentication mechanisms, multi-factor authentication (MFA), role-based access control (RBAC), and identity management systems.\",\"Security in Cloud and Virtualized Environments: Learn how to secure networks in cloud and virtualized environments, including best practices for securing virtual machines, containers, and cloud services.\",\"Security Compliance and Regulations: Understand the regulatory landscape and compliance requirements for network security, including GDPR, HIPAA, and industry-specific standards.\"]","prerequisites":"Participants should have a solid understanding of basic network security concepts, including firewalls, encryption, and intrusion detection. Familiarity with networking protocols and basic command-line interfaces is also recommended.","examsandcerts":"[]","targetaudience":"[\"Network administrators and engineers\",\"Security analysts and engineers\",\"IT managers and professionals responsible for network security\",\"System administrators interested in enhancing their network security skills\"]","deliveryformat":"live","careerpath":"[]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"SD&I861","coursename":"SIEM Design & Implementation","description":"Nam inventore ut quia voluptate nemo. Nulla tenetur sed accusamus ex possimus provident eligendi ut nihil Nam inventore ut quia voluptate nemo. Nulla tenetur sed accusamus ex possimus provident eligendi ut nihil Nulla tenetur sed accusamus ex possimus nihil","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/SIEM%20Design%20%26%20Implementation-live/advanced/banner/YC7LyAOMVE2jL43Qk54K_mO_kkFRIrAVlvuSPx5h-8DYxHe7k6.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=dLvvbgNSAomORU67HKCpxDvDP0EJGKtpvKdWMsEU93axE8kdUJhymCRN9V%2FEPOKTG4moY1kSd3Cb40EnM1DmHMJiuLnq90x0Fp7nYal%2FyWoGNfmqAc%2BoYfHCLn4XZdQgeX85gBdWBENsmQE4NFveHv%2Fg84VfQhxb2BRigJ4en4a0QfjRW09j4yht6ZHgOdaGvaJGLYs4Si6ODQ5TuecRweTAqZGBoKYngDaDn%2Fzvhv1s1hjaK3KaAHwLcitmqaWTXP9Xa696PqYUnq0pgeUQeyyDwqR9xApCZk%2FzU2yBfMyF4GY2s2VBa%2BsbfL2CvJ4hZmNFkE2ZWhk3jIPcqwVKog%3D%3D","imagename":"YC7LyAOMVE2jL43Qk54K_mO_kkFRIrAVlvuSPx5h-8DYxHe7k6.svg","category":"Advance","classification":null,"duration":"","status":null,"deliverytype":"Live","relatedcourses":"[]","trainerid":120,"created":"2023-03-07T23:47:47.085Z","courseobjective":"[]","prerequisites":null,"examsandcerts":null,"targetaudience":null,"deliveryformat":"live","careerpath":null,"coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"HC425","coursename":"HIPAA Compliance","description":"The HIPAA Compliance Training course is designed to provide a comprehensive understanding of the Health Insurance Portability and Accountability Act (HIPAA) regulations and guidelines. This course aims to educate healthcare professionals and individuals working in healthcare organizations about the importance of protecting patient privacy and maintaining data security.By taking this course, participants will gain a solid foundation in HIPAA regulations, privacy rules, and security standards. They will learn how to apply these guidelines in their daily work to ensure compliance and protect sensitive patient information.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FSOC%20Analyst%20copy%202.svg?alt=media&token=ef93031d-5ae9-4539-bd7b-b470cdf44c8d","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[\"ItIA312\",\"CSRM423\",\"II2902\"]","trainerid":null,"created":"2023-07-03T01:24:08.504Z","courseobjective":"[\"Understand the purpose and significance of HIPAA regulations in healthcare settings.\",\"Identify the key provisions and components of HIPAA, including Privacy Rule, Security Rule, and Breach Notification Rule.\",\"Recognize the rights of patients under HIPAA and the importance of obtaining and managing their consent for the use and disclosure of protected health information (PHI).\",\"Comprehend the security measures required to protect electronic PHI (ePHI) and the role of technology in maintaining data security.\",\"Learn how to develop and implement HIPAA-compliant policies and procedures within healthcare organizations.\",\"Understand the consequences of non-compliance and the potential penalties associated with HIPAA violations.\",\"Gain practical knowledge and best practices for safeguarding patient privacy and security in various healthcare scenarios.\",\"Learn about recent updates and changes in HIPAA regulations, staying up-to-date with the latest requirements.\"]","prerequisites":"There are no specific prerequisites for this course. However, a basic understanding of data protection princples, hitrust certification requirements, information technology and cybersecurity concepts would be beneficial.","examsandcerts":"[\"HIPAA for Business Associates \",\"IT Audit Fundamentals by ISACA \",\"CISA - Certified Information Systems Auditor\"]","targetaudience":"[\"Auditors seeking to expand their knowledge and skills in HIPAA Compliance\",\"Risk and compliance professionals involved in evaluating the effectiveness of controls.\",\"Information security managers seeking to understand HIPAA compliance requirements.\",\"Consultants and advisors working with organizations undergoing HIPAA compliance.\",\"Individuals interested in pursuing a career in IT & Regultory compliance\"]","deliveryformat":"live","careerpath":"[\"IT Auditor \",\"Information Security GRC Analyst\",\"Compliance Manager\",\"IT Security and Compliance Specialist \"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"ItIA312","coursename":"Introduction to Information Technology Audit","description":"The Introduction to Information Technology Audit Training is designed to provide participants with a comprehensive understanding of the fundamental concepts and principles of IT auditing. The course focuses on equipping individuals with the knowledge and skills necessary to conduct effective IT audits, assess risks, and evaluate the controls and security measures in an organization's IT infrastructure. Through a combination of theoretical learning and practical exercises, participants will gain insights into the key components of IT audit planning, execution, and reporting.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FIT%20AUDITor%20copy%202.svg?alt=media&token=75352275-6f8a-41c6-9200-557ef76ec209","imagename":"TIIOVhUxXVuM2Nl9ZRHAabkAylM-xJWksGGTTqNwhKfK6TucoO.svg","category":"Beginner","classification":null,"duration":"21:00","status":null,"deliverytype":"Live","relatedcourses":"[\"GRAC018\",\"TPRM026\",\"EoCS785\",\"CSRM423\"]","trainerid":120,"created":"2023-04-21T18:24:42.918Z","courseobjective":"[\"Understand the fundamentals of information technology auditing.\",\n\"Identify the role and importance of IT audits in organizational governance and risk management.\",\n\"Explore the legal, regulatory, and compliance requirements applicable to IT audits.\",\n\"Develop an understanding of the IT audit lifecycle and the key phases involved.\",\n\"Learn how to identify and assess IT risks in an organization.\",\n\"Gain knowledge of the various IT controls and security measures implemented in an organization's IT systems.\",\n\"Acquire skills to plan and execute IT audits effectively.\",\n\"Learn how to evaluate the adequacy and effectiveness of IT controls.\",\n\"Understand the process of reporting and communicating IT audit findings.\",\n\"Gain insights into emerging trends and technologies in the field of IT auditing.\"]","prerequisites":"There are no specific prerequisites for this course. However, a basic understanding of information technology and auditing concepts would be beneficial.","examsandcerts":"[\"CISA - Certified Information Systems Auditor\"]","targetaudience":"[\"IT professionals interested in expanding their knowledge of IT auditing\",\n\"Internal auditors seeking to specialize in IT audits\",\n\"Compliance officers and risk managers responsible for IT controls\",\n\"IT managers and executives involved in IT governance\",\n\"Individuals pursuing a career in IT auditing\"]","deliveryformat":"recording","careerpath":"[\"IT Security Auditor\", \n\"Security Auditor Consultant\", \n\"Information Security analyst -GRC\", \n\"Cybersecurity Auditor\"] ","coursebundleselectable":true,"providerid":"Smartlearning","trial":true,"vimeofolder":null},{"courseid":"CSSPP&L563","coursename":"Cyber Security Strategic Planning, Policy & Leadership","description":"Nam inventore ut quia voluptate nemo. Nulla tenetur sed accusamus ex possimus provident eligendi ut nihil Nam inventore ut quia voluptate nemo. Nulla tenetur sed accusamus ex possimus provident eligendi ut nihil Nulla tenetur sed accusamus ex possimus nihil","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Cyber%20Security%20Strategic%20Planning%2C%20Policy%20%26%20Leadership-live/advanced/banner/fn1J2PRwO51QsLLZmZarRJ9_wNWG8Hz2GJpSAorVNIPsRfQ39J.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=OZ0iJitAzzxOJPeOMRB1KDhGylxI103bwZbiIq5TCft96IwRUEpTCiECNqwooPmJHIlm6T0xJiPQMMt25zAYimU2BQSfZg7LAwhLNF4ZGm1twJD3sBEq60%2FdlMzTOjAGdsUCgD37fb2OPRtyZgkoi0yPkG5DkGtJcKBD9omDeDZt%2BQ2E31TqUHFxKj8%2B4jTaJT2QFDwF9O%2BbUnADlP76SBJISIaC6xkoS9KVkek984ocCXkpGrqoI31mqP0pN5uE9xqQWLmJwj%2BCQYZIThtZIBb8SHXzeOEP7xDLuiWO5r4l4QiOMGkNsnxUJlGPQzYvVahJ7zAYYeVQGyDGeAvCaQ%3D%3D","imagename":"fn1J2PRwO51QsLLZmZarRJ9_wNWG8Hz2GJpSAorVNIPsRfQ39J.svg","category":"Advance","classification":null,"duration":"","status":null,"deliverytype":"Live","relatedcourses":"[]","trainerid":120,"created":"2023-03-07T23:47:47.085Z","courseobjective":"[]","prerequisites":null,"examsandcerts":null,"targetaudience":null,"deliveryformat":"live","careerpath":null,"coursebundleselectable":false,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"ISGRaC302","coursename":"Information Security Governance Risk and Compliance","description":"The Information Security Governance, Risk, and Compliance (GRC) Analyst Training is a comprehensive program designed to provide participants with the necessary skills and knowledge to effectively manage information security governance, assess risks, and ensure compliance within an organization. This training course focuses on developing the fundamental competencies required to become a successful GRC analyst, including governance frameworks, risk management methodologies, regulatory compliance, and security auditing.","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/GDPR%20%26%20Data%20Protection%20Regulation-live/intermediate/banner/88M_RZdVhJ3Uv26ohXmsS3E-70NfJRXnI-cXVrmqc6WAF7MWSQ.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=D36YTz6yuAlP7BkNmWhS4wVr07HUVLEDrJfz%2B2EPxuQVJw%2BL7ZXp0yNVbGHd9ISTtcLIqiB1CyFu6j5woXPSws9sIMXmkPt6R95siTsj0fMyWppA42o46K80Rs8ctbuZvvEbTd86HuzNOEK5trTGmAwkXqD%2Bl%2BoBOmzgxwo86aopcKEefQuXVCu8%2FMAYmIl7XPqcvhbL6DMFf%2FCihwCJw6PTHoqqVMIMfuBy4YlgZhhOd2w4K%2B0w8BQPp%2BS8Dxc1DRRy21naEmOzpf57iW7JIRuBxBQ30FiXGmo%2FMCQ1TXa0Nb2fwzECG0rWiOFCWZKWNJQYT4Rauc3GoBXPQT2oVw%3D%3D","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Live","relatedcourses":"[\"TPRM026\",\"II2902\",\"CSRM423\",\"G&DPR193\",\"ItS2A121\"]","trainerid":null,"created":"2023-05-04T14:48:06.365Z","courseobjective":"[\"Understand the fundamentals of information security governance, risk management, and compliance within the context of cybersecurity.\",\"Gain knowledge of relevant governance frameworks, standards, and best practices, such as ISO 27001, NIST Cybersecurity Framework, and COBIT.\",\"Learn how to conduct risk assessments and develop risk management strategies to mitigate information security risks effectively.\",\"Understand the regulatory landscape and compliance requirements relevant to information security, including GDPR, HIPAA, PCI-DSS, and other industry-specific regulations.\",\"Familiarize yourself with security auditing and control frameworks, including internal and external audits, control testing, and compliance monitoring.\",\"Develop skills in developing and implementing information security policies, procedures, and standards to align with organizational goals and compliance requirements.\",\"Acquire knowledge of incident response and incident handling procedures to effectively manage and respond to security incidents.\",\"Learn how to create and deliver effective security awareness and training programs to promote a culture of security within the organization.\",\"Enhance your communication and reporting skills to effectively communicate complex security concepts and compliance requirements to stakeholders.\",\"Participate in practical exercises and case studies to apply learned concepts and develop practical skills in information security GRC.\"]","prerequisites":"Participants should have a basic understanding of information security concepts and frameworks. Familiarity with relevant regulations and standards, such as ISO 27001 and NIST Cybersecurity Framework, would be beneficial but not mandatory.","examsandcerts":"[\"GRC professional (GRCP) certification by oceg\",\n\"Certified in Governance, Risk and Compliance (CGRC) by ISC2\",\n\"Certified in Risk and Information Systems Control (CRISC) Certification by ISC\",\n\"Certified in the Governance of Enterprise IT (CGEIT) Certification\",\n\"GRC professional by OneTrust\"]","targetaudience":"[\"Information security management, Risk assessment, compliance, audit, and governance roles within organizations.\",\n\"IT managers\", \n\"Security officers\", \n\"Risk managers\", \n\"Individuals aspiring to enhance their knowledge and skills in information security GRC.\"]","deliveryformat":"live","careerpath":"[\"Information Security analyst\", \n\"Information Security -GRC analyst\",\n\"Third Party Risk Management Analyst\",\n\"Information Security Risk Analyst\"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"ItPT367","coursename":"Introduction to Penetration Testing","description":"Introduction to Penetration Testing is a comprehensive training program designed to equip students with the foundational knowledge and practical skills necessary to assess and secure computer systems, networks, and applications against potential security threats. This course serves as an entry point into the field of cybersecurity and provides an essential understanding of penetration testing methodologies and techniques.","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Introduction%20to%20Penetration%20Testing-live/beginner/banner/MqKKKwdaF5K2gO5SLm7jBrrrqmWwg53XokkIL_PwJg-rkmQFpR.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=VfqC09llB8PzwVRZidQaR1jvyombGzRQ9FHyRpRmzPCHMWVhNnIaeJzC775wDs9aCHH6a0CMtchsnoiq363TecckvdfWYBBwuAwery3rcSfdHA2a0%2BUze%2FEoAUORdEvXZ3HEFrE1NI2x6AE0EPsVghLIv4v%2FKPvXWzopGQti8DDqNCgIxJW%2B%2BSUqDXDUoaLRru5kMbWMO8xjRdc64dq7M9oe3iOyUb3%2BjqIOIoISU2PtCRi2U9h84pOvDKbPiohIgmmtw4ojWq0cs%2BilQSVhsnLYapltVLC1wJ2i%2F2pnlUbT1oc%2BPH41zuV5hNGEV9qY6%2FlyyQuznLmD%2BaYlNfSoxQ%3D%3D","imagename":"MqKKKwdaF5K2gO5SLm7jBrrrqmWwg53XokkIL_PwJg-rkmQFpR.svg","category":"Beginner","classification":null,"duration":"21:00","status":null,"deliverytype":"Live","relatedcourses":"[\"PaVM156\",\"CSRM423\",\"EONS014\"]","trainerid":120,"created":"2023-03-07T23:47:47.085Z","courseobjective":"[\"Understand the fundamentals of penetration testing and its role in ensuring the security of computer systems and networks.\",\n\"Familiarize yourself with the legal and ethical considerations surrounding penetration testing.\",\n\"Gain hands-on experience with various penetration testing tools and technologies.\",\n\"Learn how to perform reconnaissance and information gathering to identify potential vulnerabilities in target systems.\",\n\"Develop the skills to conduct vulnerability assessments and penetration tests on both web-based and network-based applications.\",\n\"Learn the techniques for exploiting vulnerabilities and gaining unauthorized access to systems and networks.\",\n\"Understand the concept of privilege escalation and how to exploit it effectively.\",\n\"Master the art of post-exploitation techniques, including maintaining persistence and covering tracks.\",\n\"Explore different types of penetration testing, such as black box, white box, and gray box testing.\",\n\"Learn how to document and communicate penetration testing findings effectively to stakeholders.\"]\n","prerequisites":"Basic knowledge of networking and operating systems and Familiarity with common cybersecurity concepts and terminology\n","examsandcerts":"[\"OSCP Certification\",\n\"CompTIA PenTest+\",\n\"EC-Council Certified Ethical Hacker (CEH)\",\n\"EC-Council Licensed Penetration Tester (LPT) Master\",\n\"Infosec Institute Certified Penetration Tester (CPT)\",\n\"Certified Expert Penetration Tester (CEPT)\",\n\"Certified Mobile and Web Application Penetration Tester (CMWAPT)\"]\n","targetaudience":"[\"IT professionals responsible for vulnerability management.\",\n\"Cybersecurity analysts and engineers seeking to enhance their skill in security testing.\",\n\"System engineer interested in security testing\"]\n","deliveryformat":"recording","careerpath":"[\"Information Security analyst\",\n\"Vulnerability Management Analyst\",\n\"Cybersecurity Engineer\",\n\"Cybersecurity Analyst\"]","coursebundleselectable":false,"providerid":"Smartlearning","trial":true,"vimeofolder":null},{"courseid":"I2LA796","coursename":"ISO/IEC 27001 Lead Auditor","description":"Nam inventore ut quia voluptate nemo. Nulla tenetur sed accusamus ex possimus provident eligendi ut nihil Nam inventore ut quia voluptate nemo. Nulla tenetur sed accusamus ex possimus provident eligendi ut nihil Nulla tenetur sed accusamus ex possimus nihil","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/ISO/IEC%2027001%20Lead%20Auditor-live/advanced/banner/MLXnj-21GSxq39ClPAX8b8eSr_e5uw_NypN1pSDLjQShZTVbCb.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=aPi81dgAdwKWX9jbeQvjxbuWAsBzaYGdkbP4HsHISU8pRxBAXpPBH%2FZ6hnOKIl%2FrPECghgBrHN2oyEyiklnMo5JxZY7hgZinpLQyzsUqCx2Vs3jpY0iBMcqgilClZdSPP1xGNOI3RnnPU%2F9ESD1%2FcreTuw4Z%2F3KAmTcgBKvhtVm8d8TIA4j6JWeIfTV5p440jTZckgR1xrkrSaHNffpF68SRF8uzZ1cwtQlKwXIIUImVOAeWiNapDaeAiTvQAqcHkEx3%2BLsCwKnixd7WvsRpRABDq3dlQ%2BXqQdZNPz%2Ba7AWqIW%2F71NH7fQhOb5QEy2FsAs4ba7udNHr7cE9kHs1LFw%3D%3D","imagename":"MLXnj-21GSxq39ClPAX8b8eSr_e5uw_NypN1pSDLjQShZTVbCb.svg","category":"Advance","classification":null,"duration":"","status":null,"deliverytype":"Live","relatedcourses":"[]","trainerid":120,"created":"2023-03-07T23:47:47.085Z","courseobjective":"[]","prerequisites":null,"examsandcerts":null,"targetaudience":null,"deliveryformat":"live","careerpath":null,"coursebundleselectable":false,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"G&DPR193","coursename":"GDPR and Information Regulation","description":"The General Data Protection Regulation (GDPR) is a comprehensive set of data protection rules and regulations that came into effect in the European Union (EU) in May 2018. This training course provides a detailed overview of the GDPR and its implications for organizations that handle personal data of EU citizens. Participants will gain a comprehensive understanding of the key principles, requirements, and best practices outlined in the GDPR, enabling them to effectively implement data protection measures and ensure compliance.","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/GDPR%20%26%20Data%20Protection%20Regulation-live/intermediate/banner/88M_RZdVhJ3Uv26ohXmsS3E-70NfJRXnI-cXVrmqc6WAF7MWSQ.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=D36YTz6yuAlP7BkNmWhS4wVr07HUVLEDrJfz%2B2EPxuQVJw%2BL7ZXp0yNVbGHd9ISTtcLIqiB1CyFu6j5woXPSws9sIMXmkPt6R95siTsj0fMyWppA42o46K80Rs8ctbuZvvEbTd86HuzNOEK5trTGmAwkXqD%2Bl%2BoBOmzgxwo86aopcKEefQuXVCu8%2FMAYmIl7XPqcvhbL6DMFf%2FCihwCJw6PTHoqqVMIMfuBy4YlgZhhOd2w4K%2B0w8BQPp%2BS8Dxc1DRRy21naEmOzpf57iW7JIRuBxBQ30FiXGmo%2FMCQ1TXa0Nb2fwzECG0rWiOFCWZKWNJQYT4Rauc3GoBXPQT2oVw%3D%3D","imagename":"88M_RZdVhJ3Uv26ohXmsS3E-70NfJRXnI-cXVrmqc6WAF7MWSQ.svg","category":"Intermediate","classification":null,"duration":"","status":null,"deliverytype":"Live","relatedcourses":"[\"TPRM026\",\"CSRM423\",\"GRAC018\",\"II2902\"]","trainerid":120,"created":"2023-03-07T23:47:47.085Z","courseobjective":"[\"Understand the fundamental concepts and principles of the GDPR.\",\n\"Identify the rights and responsibilities of data controllers and processors.\",\n\"Comprehend the lawful bases for processing personal data.\",\n\"Implement appropriate technical and organizational measures to ensure data protection.\",\n\"Develop procedures for handling data breaches and incident response.\",\n\"Conduct data protection impact assessments (DPIAs) and understand their importance.\",\n\"Establish compliant data transfer mechanisms to countries outside the EU.\",\n\"Recognize the role and responsibilities of the data protection officer (DPO).\",\n\"Familiarize themselves with the enforcement and sanctions under the GDPR.\",\n\"Create an action plan to ensure ongoing compliance with the GDPR.\"]","prerequisites":"There are no specific prerequisites for this course. However, a basic understanding of data protection concepts and familiarity with organizational data handling practices would be beneficial.","examsandcerts":"[\"BCS Foundation Certificate in Data Protection\",\n\"GDPR - Certified Data Protection Officer by PECB\",\n\"CIPP Certification by iapp\",\n\"CIPM Certification by iapp\",\n\"CIPT Certification by iapp\",\n\"Certified Data Privacy Solutions Engineer™ (CDPSE®)\"]","targetaudience":"[\"Professionals and organizations that handle personal data and need to ensure compliance with the GDPR\",\n\"Data protection officers\", \n\"Privacy officers\", \n\"Information security professionals\", \n\"Legal advisors\", \n\"Compliance managers\",\n\"Individuals involved in data protection and privacy within their organizations.\"]","deliveryformat":"live","careerpath":"[\"Data Protection Analyst\",\n\"Data Protection Officer\",\n\"Information Security Analyst\",\n\"Information Security GRC Analyst\",\n\"Information Security Risk Analyst\"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"PSaA787","coursename":"Python Scripting and Automation","description":"The Python Scripting and Automation course is designed to provide participants with comprehensive knowledge and practical skills in utilizing the Python programming language for automating tasks, improving workflow efficiency, and enhancing productivity. Through a combination of theoretical instruction and hands-on exercises, this course equips students with the ability to create powerful scripts and automated processes that can significantly streamline various aspects of their work.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FProg.%20and%20Scripting%20copy%202.svg?alt=media&token=2808b97c-cc36-45da-b1ce-8ff2a1206f55","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[]","trainerid":null,"created":"2023-08-22T02:24:16.786Z","courseobjective":"[]","prerequisites":"Basic understanding of programming concepts. and Familiarity with Python syntax (recommended but not mandatory).","examsandcerts":"[]","targetaudience":"[\"Professionals from various industries seeking to automate repetitive tasks and enhance their work efficiency.\",\"Software developers and programmers looking to expand their skill set to include automation using Python.\",\"System administrators and IT personnel interested in automating system management and maintenance tasks.\",\"Anyone interested in harnessing the capabilities of Python for automating daily activities.\"]","deliveryformat":"live","careerpath":"[]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"EOVM017","coursename":"Introduction to Vulnerability Management","description":"The Introduction to Vulnerability Management Training is designed to provide participants with a comprehensive understanding of vulnerability management principles, tools, and best practices. In this course, participants will learn how to effectively identify, assess, prioritize, and mitigate vulnerabilities in an organization's systems and networks.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FVulnerability%20MGT%20copy%202.svg?alt=media&token=69cab74f-e862-40b6-a1f0-ff3759621a07","imagename":"Te8vyq1ikC5IkD7QW3JPOSEct49i3A0_6s-G1CX0WMCEzw8GZf.svg","category":"Beginner","classification":null,"duration":null,"status":null,"deliverytype":"Live","relatedcourses":"[\"ItPT367\",\"EONS014\",\"CSRM423\"]","trainerid":null,"created":null,"courseobjective":"[\"Understand the fundamentals of vulnerability management and its importance in securing digital systems\",\n\"Gain knowledge of vulnerability assessment techniques and tools\",\n\"Develop skills to prioritize and remediate vulnerabilities effectively\",\n\"Learn how to create comprehensive vulnerability reports and communicate them to stakeholders\",\n\"Acquire best practices for establishing and maintaining a vulnerability management program\",\n\"Explore industry standards and frameworks related to vulnerability management\"]\n","prerequisites":"There are no strict prerequisites for this course. However, a basic understanding of networking concepts and familiarity with cybersecurity principles will be beneficial for participants.\n","examsandcerts":"[\"Qualys Vulnerability Management\",\n\"Tenable Vulnerability Management Introduction\",\n\"Tenable Vulnerability Management Specialist\",\n\"Tenable Vulnerability Management Expert\",\n\"GIAC Enterprise Vulnerability Assessor Certification (GEVA)\"]","targetaudience":"[\"IT professionals responsible for managing the security of digital systems and networks\",\n\"System administrators and network engineers\",\n\"Security analysts and incident response team members\",\n\"Risk and compliance officers\",\n\"Individuals interested in pursuing a career in cybersecurity\"]\n","deliveryformat":"recording","careerpath":"[\"Penetration Tester\", \n\"Cybersecurity Analyst\", \n\"Information Security Analyst\"]\n","coursebundleselectable":false,"providerid":"Smartlearning","trial":true,"vimeofolder":null},{"courseid":"EoTPRM224","coursename":"Essentials of Third Party Risk Management","description":"The Intermediate-Level Third Party Risk Management Training is designed to provide participants with a deeper understanding of the key concepts, strategies, and best practices in managing risks associated with third-party relationships. Building on the foundational knowledge of third-party risk management, this course delves into more advanced topics to equip participants with the skills necessary to effectively assess, monitor, and mitigate risks within their organization's vendor ecosystem.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FThird%20party%20managemnt%20copy%205.png?alt=media&token=752c0580-a9fe-486c-9398-ede10b382f42","imagename":"Third Party Management","category":"Intermediate","classification":"Technical","duration":null,"status":null,"deliverytype":"Recording","relatedcourses":"[]","trainerid":null,"created":"2024-06-13T22:38:48.717Z","courseobjective":"[\"Advanced Third Party Risk Assessment: Participants will learn how to conduct thorough assessments of third-party relationships, including evaluating financial stability, regulatory compliance, cybersecurity practices, and operational resilience.\",\"Risk Mitigation Strategies: This module covers advanced risk mitigation techniques, exploring strategies such as contract negotiation, risk transfer mechanisms, and contingency planning to effectively minimize potential third-party risks.\",\"Advanced Due Diligence: Participants will deepen their understanding of due diligence processes, including gathering comprehensive information, performing background checks, and assessing the reputational risks associated with potential third-party partners.\",\"Vendor Performance Monitoring: This module focuses on establishing robust monitoring processes to continually assess third-party performance and risk exposure, ensuring ongoing compliance with established standards.\",\"Regulatory Compliance and Legal Considerations: Participants will explore the complex landscape of regulatory requirements, legal considerations, and international standards that impact third-party relationships. This includes understanding data protection laws, anti-corruption regulations, and cross-border considerations.\",\"Technology and Cybersecurity in Third Party Risk Management: This module delves into the technological aspects of third-party risk management, covering cybersecurity assessments, data privacy safeguards, and the integration of risk management tools and platforms.\",\"Emerging Trends and Case Studies: Participants will engage with real-world case studies and analyze emerging trends in third-party risk management, learning from both successful strategies and instances of failure.\",\"Stakeholder Communication: Effective communication is key to third-party risk management success. Participants will learn how to engage with internal and external stakeholders, presenting risk assessment findings, mitigation plans, and ongoing performance reports.\",\"Ethical Considerations: This module explores the ethical dimensions of third-party risk management, including issues related to transparency, conflicts of interest, and maintaining a responsible supply chain.\",\"Practical Exercises and Simulations: Throughout the course, participants will engage in hands-on exercises and simulations that replicate real-world third-party risk scenarios, allowing them to apply theoretical knowledge in a practical context.\"]","prerequisites":"","examsandcerts":"[]","targetaudience":"[\"Risk management professionals\",\"Compliance officers\",\"Procurement specialists\",\"Vendor managers\",\"Anyone involved in managing third-party relationships within organizations.\"]","deliveryformat":"Recording","careerpath":"[]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"ItCTM137","coursename":"Introduction to Cybersecurity Threat Modelling","description":"Introduction to Cybersecurity Threat Modelling Training is designed to provide participants with a comprehensive understanding of threat modelling principles, methodologies, and best practices. This course equips individuals with the knowledge and skills necessary to identify potential security threats, assess their impact, and develop effective countermeasures to protect digital assets.Throughout this training, participants will gain insights into various threat modelling frameworks, tools, and techniques commonly used in the cybersecurity industry. They will learn how to systematically analyze system vulnerabilities, anticipate potential attack vectors, and develop robust mitigation strategies.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FCyber%20threat%20mgt%20copy.svg?alt=media&token=41eea5aa-0d0c-4a33-95e2-670c4bbf2503","imagename":"","category":"Beginner","classification":"Technical","duration":"","status":null,"deliverytype":"Live","relatedcourses":"[\"ItSP430\"]","trainerid":null,"created":"2023-07-01T19:53:36.641Z","courseobjective":"[\"Understand Threat Modelling Concepts: Participants will be introduced to the fundamental concepts and principles of threat modelling, including threat types, attack vectors, risk assessment, and threat modeling methodologies.\",\"Explore Threat Modelling Frameworks: Participants will explore different threat modelling frameworks such as STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege), DREAD (Damage,Reproducibility, Exploitability, Affected Users, Discoverability), and others.\",\"They will learn how to leverage these frameworks to identify potential threats and vulnerabilities.\",\"Identify Threats and Attack Surfaces: Participants will learn how to identify potential threats and attack surfaces within a system or application. They will examine various attack vectors, including network-based attacks, application vulnerabilities, social engineering, and insider threats.\",\"Assess Risk and Impact: Participants will gain practical experience in assessing the risks associated with identified threats and vulnerabilities. They will learn how to evaluate the potential impact of an attack and prioritize the identified risks based on severity and likelihood.\",\"Develop Mitigation Strategies: Participants will understand the importance of developing effective mitigation strategies to address identified threats. They will learn about common security controls and countermeasures that can be implemented to protect against specific threats.\",\"Apply Threat Modelling Techniques: Participants will have hands-on experience applying threat modelling techniques to real-world scenarios. They will work on practical exercises and case studies to identify threats, assess risks, and develop mitigation strategies.\",\"Integration into the Development Lifecycle: Participants will learn how to integrate threat modelling into the software development lifecycle and other relevant processes. They will explore ways to effectively communicate threat modelling findings to stakeholders and ensure security considerations are incorporated from the early stages of development.\",\"Best Practices and Continuous Improvement: Participants will be exposed to industry best practices and emerging trends in threat modelling. They will understand the importance of continuous improvement, ongoing monitoring, and adapting threat modelling strategies to evolving threats.\"]","prerequisites":"No specific prerequisites are required to enroll in this course. However, a basic understanding of cybersecurity concepts and familiarity with software development practices would be beneficial.","examsandcerts":"[\"Certified Threat Modeling Professional (CTMP)\"]","targetaudience":"[\"Information Security Analysts\",\"System Administrators\",\"Software Developers\",\"Security Engineers\",\"IT Managers\",\"Risk Management Professionals\",\"Security Consultants\",\"Ethical Hackers\"]","deliveryformat":"recording","careerpath":"[\"Application Security Engineer\"]","coursebundleselectable":false,"providerid":"Smartlearning","trial":true,"vimeofolder":null},{"courseid":"SSD138","coursename":"Secure Software Development","description":"The Secure Software Development Training is a comprehensive program designed to equip participants with the essential knowledge and skills to develop secure software applications. In today's digital landscape, where security breaches and cyber threats are on the rise, it is crucial for software developers to understand and implement robust security measures throughout the development lifecycle. This training course aims to provide participants with a solid foundation in secure software development principles, best practices, and industry-standard tools and techniques.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FSecure%20Web%20App%20copy%202.svg?alt=media&token=a45ce555-f9ea-4da3-afb9-46e6113666d3","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[\"ItAS118\",\"ItPT367\",\"PaVM156\",\"EoCS785\"]","trainerid":null,"created":"2023-07-02T19:22:23.909Z","courseobjective":"[\"Understand the fundamental concepts and principles of secure software development.\",\"Identify common security vulnerabilities and threats in software applications.\",\"Learn secure coding practices to mitigate vulnerabilities and enhance application security.\",\"Implement secure authentication and authorization mechanisms.\",\"Apply secure communication protocols to protect data in transit.\",\"Explore techniques for secure data storage and encryption.\",\"Understand the importance of input validation and output encoding.\",\"Learn about secure software development frameworks and libraries.\",\"Gain knowledge of secure software development methodologies and processes.\",\"Apply security testing techniques to identify and remediate vulnerabilities.\"]","prerequisites":"Participants should have a basic understanding of software development concepts and programming languages. Familiarity with web application development and networking concepts would be beneficial but not mandatory.","examsandcerts":"[\"CSSLP – Certified Secure Software Lifecycle Professional\"]","targetaudience":"[\"Software developers\",\"Software engineers\",\"System architects\",\"Security professionals\",\"Project managers\"]","deliveryformat":"live","careerpath":"[\"Software Engineer\",\"Security Software Engineer\",\"Software Security Architect\",\"Front & Backend Software Developer\"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"TSLP-itj361","coursename":"introduction to javascript","description":"coure can be edited already","price":"££200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses-TeachOnSLP/introduction%20to%20javascript/icon.png?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=13599360000&Signature=sLgTlSJMY1Lx7O%2FVgMb9cPVPBtsEsyYI0AjT0ekSw%2F0AXqQlHkGnM1XbUlRQ0pKpqA5aUVGrx2phwCesV67u74wY4KL1GxCQCbW2GmEcobu9wVvg2z46i2ze0x9b4LjhxeodSFZgSnwFBN16Kleyqehnh0LNuZEZwjFUO4Y70EEc6O3TGFxd5fOwwcW3l1ROQl20wn0L3qprvwJjmwLtv%2BcIekbJ5nezlLICeyR%2B%2FB0%2FHXuRoaZQGRU7u%2BIhMcGCQ1MoVf%2FUaPrpNyxPAImO2pq4m1fTsdkzH39g73iM0wpLRAiSQSuVMYMTYfC7QI83rimIsY0lyPGU38E%2FJtV%2Frg%3D%3D","imagename":"icon.png","category":"Intermediate","classification":"Technical","duration":"00:05","status":null,"deliverytype":"Recording","relatedcourses":"\"ItOTS528,ICG286\"","trainerid":649,"created":"2024-06-13T23:02:12.390Z","courseobjective":null,"prerequisites":null,"examsandcerts":null,"targetaudience":null,"deliveryformat":"Recording","careerpath":null,"coursebundleselectable":false,"providerid":null,"trial":false,"vimeofolder":"/users/103583935/projects/21179890"},{"courseid":"ItAS118","coursename":"Introduction to Application Security","description":"The Introduction to Application Security Training is designed to provide participants with a comprehensive understanding of the fundamental principles, concepts, and best practices in application security. This course equips learners with the necessary knowledge and skills to identify and mitigate potential security vulnerabilities in applications, ensuring the protection of sensitive data and the overall integrity of software systems.","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Introduction%20to%20Application%20Security-live/beginner/banner/1pPHnJDNqqfaYYg6jfLMS35OsXH-VHXweZ5GZQa3Ik5GHBxabH.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=NkjiaPTDBz1lx6QZD80AzB6YEkbXHznR8ofN8inMHhNXJYn15GZEju1hU43ADBo3K2fJTxxqbI9Us5dkEvCQzjPtB3o1mpXs5OFxYNpSUasSWdtFy5%2BNSZ%2BMNaOMj8fW12TZ4SmOpPr1ewPa0AlELIi%2BxqBPANO%2FJmdrkoLBAZ3gV%2FnmK7P8yEddCF1RBEDpwHtjqQa282FnCTYmRpQqnuQ2duCmYV%2FoiMzYX5GJ2AtQ3ibNAMsPcGlTmxeTflymTiBpQqu70o4mZAADhb%2Bqx5IeJPvkKo%2FtH%2FZpp7esT%2BGCCIAvjQlD6OVKGOSa%2FRmjAPx2tcHMNjilrZGdeE%2FGBg%3D%3D","imagename":"1pPHnJDNqqfaYYg6jfLMS35OsXH-VHXweZ5GZQa3Ik5GHBxabH.svg","category":"Beginner","classification":null,"duration":"22:00","status":null,"deliverytype":"Live","relatedcourses":"[\"SSD138\",\"EOVM017\",\"ItPT367\",\"PaVM156\"]","trainerid":121,"created":"2023-03-07T23:47:47.085Z","courseobjective":"[\"Understand the importance of application security and its role in protecting sensitive data.\",\"Identify common security threats and vulnerabilities present in applications.\",\"Learn essential security concepts and principles, including authentication, authorization, encryption, and secure coding practices.\",\"Explore different types of attacks and techniques used by malicious actors to exploit vulnerabilities.\",\"Acquire knowledge of various security testing methodologies to assess the robustness of applications.\",\"Gain hands-on experience in using security tools and techniques to identify and remediate vulnerabilities.\",\"Develop an understanding of secure software development lifecycle (SDLC) practices.\",\"Learn about security considerations in different application frameworks and platforms.\",\"Understand the importance of secure coding practices and the significance of developer awareness in preventing security breaches.\",\"Explore emerging trends and challenges in application security.\"]","prerequisites":"There are no strict prerequisites for this course. However, a basic understanding of programming concepts and web technologies will be beneficial.","examsandcerts":"[\"Certified Application Security Engineers(.NET) by EC-Council\",\"Certified Application Security Engineer (JAVA) by EC-Council\",\"Web Application Hacking and Security by EC-Council\"]","targetaudience":"[\"Application Security Engineer\",\"DevSecOPS Engineer\",\"Front-End Application Security Architect\",\"IT Security Engineer\"]","deliveryformat":"recording","careerpath":"[\"Application Security Engineer\",\"DevSecOPS Engineer\",\"Front-End Application Security Architect\",\"IT Security Engineer\"] ","coursebundleselectable":false,"providerid":"Smartlearning","trial":true,"vimeofolder":null},{"courseid":"CTA001","coursename":"CompTIA A+ (1101)","description":"This course is for individuals who have basic computer skills, are interested in obtaining a job as an entry-level IT technician, and also for students who are seeking the CompTIA A+ certification who want to prepare for the CompTIA A+ Core 2 220-1101 Certification Exam. For success in this course, you should have basic computer user skills, be able to search, browse, and access information on the internet, complete basic tasks in Microsoft Windows environment, and know basic computing concepts.","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Carbon%20Black%20Protection%20Certified%20Associate%20Analyst-live/advanced/banner/83WaZmWjbcgPENeOsqHUPSTI7tcS0nAePYDHEqy8d0wQzfhwo-.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=EelfvH%2FOfqwQJ%2FmcmlHciJHJku2NoNVXKcyS5%2FO%2BCvN1yQAjHDrElRuyTcQMDZtFXw5csE7xB%2Fs1s1PKJaKXptGbjBzPCGlreSLnw%2BO%2FebjZvy3N%2FNzcsQxKkQfuif448raN2IhF%2BBljUjyM0y6rllMyjN1rt6DIpkejOrmAIW9lumbGfXo%2BdYOpO8c8OuGURWL3EN1Jbk32pmGMYJjmOozUFfSumCtb3PwXV9zEuKJO2KGD8YSScGu5KPHgQY0Ul8KbauSvqf6DpXaaMEvqchaOsw8Hhc87Nqqiy5tp9CPzjtPjcVLhHgGZkqK2crsfhPa8r2hA5DY2eK4Z%2BmQJkA%3D%3D","imagename":null,"category":"Intermediate","classification":"Technical","duration":null,"status":null,"deliverytype":"Live","relatedcourses":"[\"CTN001\",\"CTS001\",\"CTA002\"]","trainerid":null,"created":"2024-02-02T00:31:03.102Z","courseobjective":"[\"Equipment and Personal Safety\",\"CompTIA Troubleshooting Model\",\"Motherboards and Form Factors\",\"System Cooling and Components\",\"Cable Connection Types\",\"Computer Peripheral Devices, Displays, and Custom PC Builds\",\"Computer Network Models\",\"Virtualization and Cloud Computing\",\"Mobile Device Communications Technologies\",\"Configuring and Troubleshooting Networks\"]","prerequisites":"For success you should complete CompTIA A+ 1001. You should have basic computer user skills, be able to search, browse, access information on the internet, complete tasks in Microsoft Windows environment and know basic computing concepts.","examsandcerts":"[\"CompTIA A+ 1101\",\"CompTIA A+ 1102\"]","targetaudience":"[\"Individuals with basic computer user skills interested in obtaining a job as an entry-level IT technician\",\"Also students seeking the CompTIA A+ Certification who want to prepare for the CompTIA A+ 220-1101 Certification Exam.\"]","deliveryformat":"Live","careerpath":"[]","coursebundleselectable":false,"providerid":"CertNexus","trial":false,"vimeofolder":null},{"courseid":"ItS2A121","coursename":"Introduction to SOC 2 Audit","description":"The Introduction to SOC 2 Audit Training is designed to provide participants with a comprehensive understanding of the SOC 2 framework and the auditing process. This course will cover the fundamental concepts, principles, and best practices related to conducting SOC 2 audits. Participants will gain practical knowledge and skills necessary to assess an organization's controls and ensure compliance with SOC 2 standards. The training will include case studies, interactive discussions, and real-world examples to enhance learning and application.","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Introduction%20to%20Penetration%20Testing-live/beginner/banner/MqKKKwdaF5K2gO5SLm7jBrrrqmWwg53XokkIL_PwJg-rkmQFpR.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=VfqC09llB8PzwVRZidQaR1jvyombGzRQ9FHyRpRmzPCHMWVhNnIaeJzC775wDs9aCHH6a0CMtchsnoiq363TecckvdfWYBBwuAwery3rcSfdHA2a0%2BUze%2FEoAUORdEvXZ3HEFrE1NI2x6AE0EPsVghLIv4v%2FKPvXWzopGQti8DDqNCgIxJW%2B%2BSUqDXDUoaLRru5kMbWMO8xjRdc64dq7M9oe3iOyUb3%2BjqIOIoISU2PtCRi2U9h84pOvDKbPiohIgmmtw4ojWq0cs%2BilQSVhsnLYapltVLC1wJ2i%2F2pnlUbT1oc%2BPH41zuV5hNGEV9qY6%2FlyyQuznLmD%2BaYlNfSoxQ%3D%3D","imagename":"","category":"Beginner","classification":"Technical","duration":"","status":null,"deliverytype":"Live","relatedcourses":"[\"ItIA312\",\"CSRM423\",\"II2902\"]","trainerid":null,"created":"2023-07-01T18:42:43.010Z","courseobjective":"[\"Understand the fundamentals of SOC audits, including their purpose, scope, and relevance in today's business environment.\",\"Gain knowledge of the various SOC frameworks and standards, such as SOC 1, SOC 2, and SOC 3, and their applicability to different organizational scenarios.\",\"Learn the key concepts and principles of internal controls and their importance in ensuring the reliability and security of information systems.\",\"Develop a comprehensive understanding of the SOC audit process, including planning, scoping, fieldwork, and reporting.\",\"Acquire the skills to assess and evaluate controls related to security, availability, processing integrity, confidentiality, and privacy in accordance with SOC requirements.\",\"Learn techniques for conducting interviews, testing controls, and gathering evidence during the SOC audit engagement.\",\"Understand the importance of risk assessment and risk management in SOC audits, and learn how to identify, assess, and address risks effectively.\",\"Gain insights into emerging trends and best practices in SOC audits, including considerations for cloud computing, third-party vendors, and cybersecurity.\",\"Develop effective communication skills to report findings and recommendations to management and stakeholders accurately.\",\"Prepare for the challenges and responsibilities of being a SOC auditor, including maintaining independence, professional ethics, and ongoing professional development.\"]","prerequisites":"There are no specific prerequisites for this course. However, a basic understanding of auditing principles, internal controls, and information systems will be beneficial.","examsandcerts":"[\"IT Audit Fundamentals by ISACA\",\"CISA - Certified Information Systems Auditor\"]","targetaudience":"[\"Auditors seeking to expand their knowledge and skills in SOC audits.\",\"IT professionals responsible for implementing and maintaining internal controls.\",\"Risk and compliance professionals involved in evaluating the effectiveness of controls.\",\"Information security managers seeking to understand SOC audit requirements.\",\"Consultants and advisors working with organizations undergoing SOC audits.\",\"Individuals interested in pursuing a career in SOC auditing.\"]","deliveryformat":"recording","careerpath":"[\"IT Auditor\",\"ISO 27001 Auditor\",\"Information Security Analyst -GRC\"]","coursebundleselectable":false,"providerid":"Smartlearning","trial":true,"vimeofolder":null},{"courseid":"CTN001","coursename":"CompTIA Network+","description":"This course covers major networking technologies and systems of modern networks. You will learn how to troubleshoot, configure, and manage common network devices; establish basic network connectivity; maintain network documentation; identify network limitations and weaknesses; and implement network security, standards, and protocols. Also cloud and virtualization technologies and build on existing user-level knowledge with personal computer operating systems to master the fundamental skills and concepts for any type of networking career.","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Carbon%20Black%20Protection%20Certified%20Associate%20Analyst-live/advanced/banner/83WaZmWjbcgPENeOsqHUPSTI7tcS0nAePYDHEqy8d0wQzfhwo-.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=EelfvH%2FOfqwQJ%2FmcmlHciJHJku2NoNVXKcyS5%2FO%2BCvN1yQAjHDrElRuyTcQMDZtFXw5csE7xB%2Fs1s1PKJaKXptGbjBzPCGlreSLnw%2BO%2FebjZvy3N%2FNzcsQxKkQfuif448raN2IhF%2BBljUjyM0y6rllMyjN1rt6DIpkejOrmAIW9lumbGfXo%2BdYOpO8c8OuGURWL3EN1Jbk32pmGMYJjmOozUFfSumCtb3PwXV9zEuKJO2KGD8YSScGu5KPHgQY0Ul8KbauSvqf6DpXaaMEvqchaOsw8Hhc87Nqqiy5tp9CPzjtPjcVLhHgGZkqK2crsfhPa8r2hA5DY2eK4Z%2BmQJkA%3D%3D","imagename":null,"category":"Intermediate","classification":"Technical","duration":null,"status":null,"deliverytype":"Live","relatedcourses":"[\"CTS001\",\"CTA001\",\"CTA002\"]","trainerid":null,"created":"2024-02-02T00:31:03.102Z","courseobjective":"[\"Identify Basic Network Theory Concepts and Major Network Communications Methods\",\"Describe Bounded Network Media\",\"Identify Unbounded Network Media\",\"Identify the Major Types of Network Implementations\",\"Identify TCP/IP Addressing and Data Delivery Methods\",\"Implement Routing Technologies\",\"Identify the Major Services Deployed on TCP/IP Networks\",\"Identify the Infrastructure of a WAN Implementation\",\"Identify the Components Used in Cloud Computing and Virtualization\",\"Describe Basic Concepts Related to Network Security\",\"Prevent Security Breaches\",\"Respond to Security Incidents\",\"Identify the Components of a Remote Network Implementation\",\"Identify the Tools, Methods, and Techniques Used in Managing a Network\",\"Describe Troubleshooting of Issues on a Network\"]","prerequisites":"Complete CompTIA A+, basic computer skills, able to search, browse, access information on the internet, complete tasks in Windows, know basic computing concepts. Basic Windows® and Linux® user skills and fundamental understanding of networking concepts.","examsandcerts":"[\"CompTIA Network+\"]","targetaudience":"[\"Entry-level support professionals with basic knowledge of hardware, software, and operating systems who want to learn about networking, get skills for careers in network support/administration or prepare for CompTIA Network+ certification.\"]","deliveryformat":"Live","careerpath":"[]","coursebundleselectable":false,"providerid":"CertNexus","trial":false,"vimeofolder":null},{"courseid":"CRISC(506","coursename":"Certified Risk Information Systems Control (CRISC)","description":"Nam inventore ut quia voluptate nemo. Nulla tenetur sed accusamus ex possimus provident eligendi ut nihil Nam inventore ut quia voluptate nemo. Nulla tenetur sed accusamus ex possimus provident eligendi ut nihil Nulla tenetur sed accusamus ex possimus nihil","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Certified%20Risk%20Information%20Systems%20Control%20%28CRISC%29-live/advanced/banner/danK8kyDltHfeR9qawqyvmgrGRMlTgeAS3m1OMarYcUuca00rw.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=t5lc5Znln3w6x7ewbsdsXAzeWRcZ0aY2fcOTBYQXtpmwu9230Zb82RZVEhKstqo0TUqRXRX5kmOydpSsnvvc6URIC0fF1m9cQFfjfd2e%2FeyOVvCzRkyEvIxGy1Mdo0bBQdPDShK95fXpavzM%2FilB%2BHS45mY9K6T2c607RsBa0pVKgj1nzkU8PESL6%2F5Se5qShgGbdQoKNchM%2Fcc0hZ%2FSc403DtZifveah4m2DNVMTrVt%2BvjZChzkZKGjYzZtPyNxiFUOoVPVSRTWsFDTm1pL%2BTMGievuUIKZK6J%2Bj8hNI1okT1HBO925eWrmM5SrNxituOuiLEU51Ou4gwfuq7hgWA%3D%3D","imagename":"danK8kyDltHfeR9qawqyvmgrGRMlTgeAS3m1OMarYcUuca00rw.svg","category":"Advance","classification":null,"duration":"","status":null,"deliverytype":"Live","relatedcourses":"[]","trainerid":120,"created":"2023-03-07T23:47:47.085Z","courseobjective":"[]","prerequisites":null,"examsandcerts":null,"targetaudience":null,"deliveryformat":"live","careerpath":null,"coursebundleselectable":false,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"CTS001","coursename":"CompTIA Security+","description":"In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network. This course solidifies knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Carbon%20Black%20Protection%20Certified%20Associate%20Analyst-live/advanced/banner/83WaZmWjbcgPENeOsqHUPSTI7tcS0nAePYDHEqy8d0wQzfhwo-.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=EelfvH%2FOfqwQJ%2FmcmlHciJHJku2NoNVXKcyS5%2FO%2BCvN1yQAjHDrElRuyTcQMDZtFXw5csE7xB%2Fs1s1PKJaKXptGbjBzPCGlreSLnw%2BO%2FebjZvy3N%2FNzcsQxKkQfuif448raN2IhF%2BBljUjyM0y6rllMyjN1rt6DIpkejOrmAIW9lumbGfXo%2BdYOpO8c8OuGURWL3EN1Jbk32pmGMYJjmOozUFfSumCtb3PwXV9zEuKJO2KGD8YSScGu5KPHgQY0Ul8KbauSvqf6DpXaaMEvqchaOsw8Hhc87Nqqiy5tp9CPzjtPjcVLhHgGZkqK2crsfhPa8r2hA5DY2eK4Z%2BmQJkA%3D%3D","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Live","relatedcourses":"[\"CTN001\",\"CTA001\",\"CTA002\"]","trainerid":null,"created":"2024-02-02T00:31:03.102Z","courseobjective":"[\"Compare and Contrast Attacks\",\"Compare and Contrast Security Controls\",\"Use Security Assessment Tools\",\"Explain Basic Cryptography Concepts\",\"Implement a Public Key Infrastructure\",\"Implement Identity and Access Management Controls\",\"Manage Access Services and Accounts\",\"Install and Configure Security Appliances\",\"Install and Configure Wireless and Physical Access Security\",\"Deploy Secure Host, Mobile and Embedded Systems\",\"Implement Secure Network Access Protocols\",\"Implement Secure Network Applications\",\"Explain Risk Management and Disaster Recovery Concepts\",\"Describe Secure Application Development Concepts\",\"Explain Organizational Security Concepts\"]","prerequisites":"Basic Windows user skills and understanding of computer and networking concepts. Completion of CompTIA A+, Network+ courses and certifications, or equivalent knowledge in networking, and configuring security parameters strongly recommended.","examsandcerts":"[\"CompTIA Security+\",\"Certified Information Systems Security Professional (CISSP) by ISC²\",\"Certified Information Systems Auditor (CISA) by ISACA\",\"Certified Information Security Manager (CISM) by ISACA\"]\n","targetaudience":"[\"IT professionals with networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks\",\"Familiarity with other operating systems, such as macOS®, Unix®, or Linux®; to further an IT career.\"]","deliveryformat":"Live","careerpath":"[]","coursebundleselectable":true,"providerid":"CertNexus","trial":false,"vimeofolder":null},{"courseid":"CBS151","coursename":"Comprehensive Bash Scripting","description":"Welcome to the Comprehensive Bash Scripting Training! This course is designed to equip participants with the essential skills and knowledge required to become proficient in Bash scripting, a powerful tool for automating tasks, managing system resources, and streamlining workflows in the Unix-like operating system environment.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FProg.%20and%20Scripting%20copy%202.svg?alt=media&token=2808b97c-cc36-45da-b1ce-8ff2a1206f55","imagename":"","category":"Beginner","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[]","trainerid":null,"created":"2023-08-22T10:54:39.326Z","courseobjective":"[\"Understand the fundamentals of the Bash scripting language and its role in the Unix-like operating system.\",\"Write, execute, and debug Bash scripts to automate routine tasks and improve efficiency.\",\"Utilize variables, data types, and operators to manipulate data within scripts.\",\"Implement control structures such as conditionals and loops to create flexible and dynamic scripts.\",\"Access and process command-line arguments to enhance script versatility.\",\"Create and manipulate files and directories programmatically using Bash scripting.\",\"Harness the power of regular expressions for advanced text processing tasks.\",\"Interact with system processes, environment variables, and system commands through scripting.\",\"Develop error handling and reporting mechanisms to build robust scripts.\",\"Explore best practices for script organization, readability, and maintainability.\",\"Integrate external tools and utilities into Bash scripts for extended functionality.\",\"Collaborate and share scripts effectively within a team or community.\"]","prerequisites":"","examsandcerts":"[]","targetaudience":"[]","deliveryformat":"recording","careerpath":"[]","coursebundleselectable":false,"providerid":"Smartlearning","trial":true,"vimeofolder":null},{"courseid":"CISA(408","coursename":"Certified Information Security Auditor (CISA)","description":"Nam inventore ut quia voluptate nemo. Nulla tenetur sed accusamus ex possimus provident eligendi ut nihil Nam inventore ut quia voluptate nemo. Nulla tenetur sed accusamus ex possimus provident eligendi ut nihil Nulla tenetur sed accusamus ex possimus nihil","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Certified%20Information%20Security%20Auditor%20%28CISA%29-live/advanced/banner/8r2Vkiq5US-yEbK4fRx-XqjcdhtjjcfDIAw7wTzLLdeVVb7cLM.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=V4dOW1HRQNse2zby3OC3VD%2BOJGlNYNVvsTtmkBGBHUzyIRGP2Q%2B9zOyseHgAMs7XODY4Yl1sfHubtGdjRrKxxM%2Fpkdj2jr9enumufGs2AnEC%2FLF5Sjl1rLpAxEuvkcvO2CQTwAzEe2jzsmFDWfUfhWEJ124sEwhkIWK75RVldIxmFt4OZxGdYMM4yM8O7%2BvY3wDJLZgcBpcFi9whfJkiGzxzGcOH41V7M8MzpFLWXa1gv3ODMez7E0Pyfi2KAT0lnmFGsqh8WK%2BROzm8EDYfmsVraBbP%2Fu6PjTL%2FQ4KJa0MYlPz1sq7iCBx4foh1jFDrD3k3Fh2iSAaiMqYP0jHCKg%3D%3D","imagename":"8r2Vkiq5US-yEbK4fRx-XqjcdhtjjcfDIAw7wTzLLdeVVb7cLM.svg","category":"Advance","classification":null,"duration":"","status":null,"deliverytype":"Live","relatedcourses":"[]","trainerid":120,"created":"2023-03-07T23:47:47.085Z","courseobjective":"[]","prerequisites":null,"examsandcerts":null,"targetaudience":null,"deliveryformat":"live","careerpath":null,"coursebundleselectable":false,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"CSTH489","coursename":"Cybersecurity Threat Hunting","description":"The Introduction to Cybersecurity Threat Hunting Training is designed to equip participants with the fundamental knowledge and skills required to effectively detect and respond to advanced cyber threats. In this course, you will learn the techniques and methodologies employed by cybersecurity professionals to proactively hunt for potential threats within an organization's network.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FThreat%20Hunting%20copy%202.svg?alt=media&token=a2b0e205-3235-4867-8571-c166f67d4f7d","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[\"EoCS785\",\"CTI719\",\"CIP&R349\"]","trainerid":null,"created":"2023-05-04T17:01:14.289Z","courseobjective":"[\"Identify potential threats and vulnerabilities within an organization's network\",\n\"Apply proactive threat hunting techniques to detect and respond to advanced cyber attacks\",\n\"Understand threat actor motivations and attack vectors\",\n\"Utilize threat intelligence and security logs for enhanced threat detection\",\n\"Collaborate effectively with incident response teams for timely and efficient incident resolution\"]","prerequisites":"Basic knowledge of cybersecurity concepts and networking","examsandcerts":"[\"eCTHPv2 Certification\"]","targetaudience":"[\"Cybersecurity professionals seeking to enhance their threat hunting skills\",\n\"IT administrators and network engineers responsible for network security\",\n\"Incident response teams and security analysts looking to improve their detection capabilities\",\n\"Individuals interested in pursuing a career in cybersecurity threat hunting\"]","deliveryformat":"live","careerpath":"[\"Cyber Incident Response and Threat Hunting Lead\",\n\"Threat Hunter & Incident Responder\",\n\"Security Operations Analyst (SOC) Analyst\",\n\"Cyber Forensic and Threat Hunter\"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"CSRM423","coursename":"Cybersecurity Risk Management","description":"The Introduction to Cyber Security Risk Management Training is designed to provide participants with a comprehensive understanding of the fundamentals of cyber security risk management. In today's interconnected world, organizations face numerous threats to their information systems and data. This course equips individuals with the knowledge and skills necessary to identify, assess, and mitigate these risks effectively.","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Introduction%20to%20Cyber%20Security-live/beginner/banner/MJJyZdMexnNK0IeZey4UkkyHNny8-lxIzjb-9oepTNnsgCqDF2.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=lp9DPvhawxsDPNs9Ll9%2BdmuXyRPhwjSQHFFQZAB%2BZPVsrT1%2Bf3TAeIKnwIQUjMyp%2FfTqLDMGBA1KiHrheBt%2FuKj10cB6Sl04KNRww7VzE4LFRyusAss2BiYiKSJdEH7ywvA23Rj7W8YPgEHjawmdvTWIrKSf6gCfvoonOILUUqytFgU2C74Y%2FkXZVWrfkOvflAyJ5fHMreQ7FKljUsG6UHDykjS7%2Fccdbt0uCv2SkB3gA1UTiSmAIEjK9m2Tu1D%2ByI9TN2qbtzE97YCalCEL0l9VaHq3GFP94kIFkvtdXxusKm0MPJJtGbE2OJblA%2FU6MykmSCFCAVB8BoXWklut3g%3D%3D","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[\"TPRM026\",\"ItPT367\",\"CSTH489\"]","trainerid":null,"created":"2023-05-04T14:27:14.331Z","courseobjective":"[\"Understand the concepts and principles of cyber security risk management.\",\n\"Identify and assess cyber security risks within an organization.\",\n\"Implement risk management frameworks and methodologies.\",\n\"Develop strategies to mitigate cyber security risks.\",\n\"Establish incident response and disaster recovery plans.\",\n\"Apply best practices for managing third-party risks.\",\n\"Gain insights into regulatory and compliance requirements related to cyber security risk management.\",\n\"Enhance their understanding of emerging trends and technologies in the field of cyber security risk management.\"]","prerequisites":"There are no specific prerequisites for this course. However, a basic understanding of information technology and cybersecurity concepts would be beneficial.","examsandcerts":"[\"A Certified in Risk and Information Systems Control® (CRISC®) certification\",\"(ISC)² Risk Management Practitioner Certificates\"]","targetaudience":"[\"IT professionals\",\n\"Cybersecurity analysts\",\n\"Risk managers\",\n\"Information security officers\",\n\"Security consultants\",\n\"System administrators\",\n\"Network administrators\",\n\"Anyone interested in learning about cyber security risk management\"]","deliveryformat":"live","careerpath":"[\"Cyber Security Risk Analyst\",\n\"Information Security Risk Analyst\",\n\"Third Party Cyber Security Analyst\",\n\"Information Security GRC Analyst\"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"EoCS785","coursename":"Essentials of Cybersecurity","description":"Cybersecurity Essentials Training is a comprehensive program designed to equip participants with fundamental knowledge and practical skills required to protect organizations from cyber threats. This course goes beyond the basics of cybersecurity and delves into advanced concepts and techniques to fortify systems and networks against sophisticated attacks. Participants will gain hands-on experience in implementing security measures, analyzing vulnerabilities, and responding to security incidents.","price":"£200","imageurl":"https://storage.googleapis.com/smartlearningportal-5569f.appspot.com/Courses/Introduction%20to%20Cyber%20Security-live/beginner/banner/MJJyZdMexnNK0IeZey4UkkyHNny8-lxIzjb-9oepTNnsgCqDF2.svg?GoogleAccessId=firebase-adminsdk-ii18u%40smartlearningportal-5569f.iam.gserviceaccount.com&Expires=2557094400&Signature=lp9DPvhawxsDPNs9Ll9%2BdmuXyRPhwjSQHFFQZAB%2BZPVsrT1%2Bf3TAeIKnwIQUjMyp%2FfTqLDMGBA1KiHrheBt%2FuKj10cB6Sl04KNRww7VzE4LFRyusAss2BiYiKSJdEH7ywvA23Rj7W8YPgEHjawmdvTWIrKSf6gCfvoonOILUUqytFgU2C74Y%2FkXZVWrfkOvflAyJ5fHMreQ7FKljUsG6UHDykjS7%2Fccdbt0uCv2SkB3gA1UTiSmAIEjK9m2Tu1D%2ByI9TN2qbtzE97YCalCEL0l9VaHq3GFP94kIFkvtdXxusKm0MPJJtGbE2OJblA%2FU6MykmSCFCAVB8BoXWklut3g%3D%3D","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Live","relatedcourses":"[\"CSRM423\",\"PaVM156\",\"EoDLP521\",\"ItIAM454\",\"EPAM009\",\"ItOTS528\",\"VMfOoS645\"]","trainerid":null,"created":"2023-05-04T14:16:57.471Z","courseobjective":"[\"Understand the Fundamentals of Cybersecurity: Gain a solid foundation in cybersecurity principles, concepts, and terminology, including threat landscape analysis, security frameworks, risk assessment, and compliance.\",\n\"Explore Network Security: Learn about network architecture, protocols, and devices, and acquire the skills to design secure networks, configure firewalls, detect and mitigate network intrusions, and establish secure wireless communication.\",\n\"Master Secure Systems and Application Development: Discover best practices for developing secure software applications and systems, including secure coding principles, secure SDLC (Software Development Life Cycle), and techniques to identify and mitigate common software vulnerabilities.\",\n\"Strengthen Identity and Access Management: Learn techniques to implement effective identity and access management controls, including user authentication, authorization, and access control mechanisms. Understand the importance of strong password policies and multi-factor authentication.\",\n\"Enhance Threat Intelligence and Incident Response: Develop skills in monitoring and detecting security incidents, performing incident response, and analyzing security logs. Learn how to create effective incident response plans and manage security incidents in a systematic and timely manner.\",\n\"Secure Cloud Computing: Understand the security challenges and best practices associated with cloud computing. Explore secure cloud architectures, data protection techniques, and strategies for ensuring the privacy and integrity of data in cloud environments.\",\n\"Explore Cryptography and Public Key Infrastructure (PKI): Gain knowledge of cryptographic algorithms, encryption techniques, digital signatures, and secure communication protocols. Learn how to implement and manage a Public Key Infrastructure (PKI) to secure communication channels.\",\"Establish Security Awareness and Training Programs: Understand the importance of cybersecurity awareness and develop strategies to create a security-conscious organizational culture. Learn effective techniques for educating employees about security risks and promoting responsible behavior.\",\"Prepare for Cybersecurity Certification: This course provides a solid foundation for various cybersecurity certifications, including but not limited to CompTIA Security+, Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), and Certified Information Security Manager (CISM).\"]","prerequisites":"Participants should have a basic understanding of computer networks, operating systems, and general IT concepts. Familiarity with basic security principles will be beneficial but not mandatory.","examsandcerts":"[\"CompTIA Security+\",\n\"GIAC Information Security Fundamentals (GISF)\",\n\"(ISC)2 Systems Security Certified Practitioner (SSCP)\",\n\"Microsoft Certified: Security, Compliance, and Identity Fundamentals\",\n\"ISACA Cybersecurity Fundamentals\"]","targetaudience":"[\"IT professionals interested in expanding their knowledge of cybersecurity\",\n\"Network administrators, system administrators, and IT support personnel\",\n\"Security analysts and incident response teams\",\n\"Anyone involved in the design, implementation, or management of cybersecurity measures\"]","deliveryformat":"live","careerpath":"[\"Information security analyst\",\n\"Vulnerability management specialist\",\n\"Security operation centre (SoC) analyst\"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"DCRMF629","coursename":"Designing Cybersecurity Risk Management Framework","description":"The Designing Cybersecurity Risk Management Framework training is a comprehensive program aimed at equipping individuals with the knowledge and skills necessary to develop effective risk management frameworks in the field of cybersecurity. This course is designed for professionals working in cybersecurity roles, risk managers, IT professionals, and anyone interested in understanding and implementing robust cybersecurity risk management practices.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FCyber%20threat%20mgt%20copy.svg?alt=media&token=41eea5aa-0d0c-4a33-95e2-670c4bbf2503","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[\"TPRM026\",\"ItPT367\",\"CSTH489\"]","trainerid":null,"created":"2023-07-03T02:13:46.859Z","courseobjective":"[\"Understand the fundamentals of cybersecurity risk management and its importance in protecting organizational assets.\",\"Gain insights into the different components of a cybersecurity risk management framework.\",\"Learn how to identify, assess, and prioritize cybersecurity risks.\",\"Explore various methodologies for risk analysis and risk assessment in cybersecurity.\",\"Understand the principles of risk mitigation and develop strategies to manage and reduce cyber risks.\",\"Learn about the legal, regulatory, and compliance aspects associated with cybersecurity risk management.\",\"Explore the role of governance and organizational structures in implementing effective risk management frameworks.\",\"Understand the importance of continuous monitoring, incident response, and recovery in managing cybersecurity risks.\",\"Learn how to communicate and present cybersecurity risks to stakeholders effectively.\",\"Develop the skills to design and implement a comprehensive cybersecurity risk management framework tailored to organizational needs\"]","prerequisites":"Basic knowledge of cybersecurity concepts and familiarity with risk management principles would be beneficial, but not mandatory.","examsandcerts":"[\"A Certified in Risk and Information Systems Control® (CRISC®) certification\",\"(ISC)² Risk Management Practitioner Certificates\"]","targetaudience":"[\"Cybersecurity professionals and practitioners\",\"Cybersecurity Risk managers and analysts\",\"IT professionals involved in risk management\",\"Compliance officers\",\"Security consultants\",\"Business executives involved in decision-making processes related to cybersecurity\"]","deliveryformat":"live","careerpath":"[\"Cyber Security Risk Analyst\",\"Information Security Risk Analyst\",\"Third Party Cyber Security Analyst\",\"Information Security GRC Analyst\"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"ES584","coursename":"EndPoint Security ","description":"End Point Security Training is designed to equip participants with the knowledge and skills necessary to protect and secure end points in a network environment. This comprehensive training program covers a wide range of topics related to end point security, including threat landscape, vulnerabilities, attack vectors, and mitigation strategies. Participants will learn practical techniques and best practices to effectively safeguard end points from various security threats, ensuring the integrity and confidentiality of data and systems","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FApp.%20Sec.%20Fundamental%20copy%202.svg?alt=media&token=110db3e0-4ce4-4ac7-83ee-016c3a9a3932","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[\"EOVM017\",\"PaVM156\",\"ItPT367\"]","trainerid":null,"created":"2023-07-03T04:12:26.839Z","courseobjective":"[\"Understand the importance of end point security and its role in overall network security.\",\"Gain knowledge of common threats and attack vectors targeting end points.\",\"Learn about different types of end point vulnerabilities and their potential impact.\",\"Explore various techniques used by attackers to compromise end points.\",\"Understand the principles and methodologies of end point security assessment.\",\"Acquire hands-on experience in implementing and configuring end point security solutions.\",\"Learn how to identify and respond to end point security incidents.\",\"Develop the skills to mitigate risks and protect end points from unauthorized access, malware, and data breaches.\",\"Stay updated with emerging trends and technologies in the field of end point security.\"]","prerequisites":"Participants should have a basic understanding of networking concepts and general knowledge of information security principles. Familiarity with operating systems and network protocols is recommended","examsandcerts":"[\"OPSWAT Endpoint Security Certification\",\"Endpoint Detection and Response (EDR) Foundation by Qualys\"]","targetaudience":"[\"IT professionals\",\"Network administrators\",\"System administrators\",\"Security analysts\",\"Anyone involved in securing end points within an organizational network\"]","deliveryformat":"live","careerpath":"[\"EndPoint Security Engineer\",\"Identity & EndPoint Security Engineer\",\"Principal Engineer - Malware & Antivirus\",\"Cybersecurity Engineer \"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"CTI719","coursename":"Cybersecurity Threat Intelligence","description":"Cybersecurity Threat Intelligence Training is a comprehensive course designed to equip participants with the knowledge and skills required to effectively gather, analyze, and respond to cyber threats. In this course, you will learn about the fundamental principles of threat intelligence, various data collection methods, analysis techniques, and how to apply threat intelligence to enhance cybersecurity defenses.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FCyber%20threat%20mgt%20copy.svg?alt=media&token=41eea5aa-0d0c-4a33-95e2-670c4bbf2503","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[\"CIP&R349\",\"PaVM156\"]","trainerid":null,"created":"2023-07-03T01:40:46.833Z","courseobjective":"[\"Understand the fundamentals of threat intelligence: Participants will gain a solid understanding of threat intelligence concepts, including threat actors, attack vectors, indicators of compromise (IOCs), and the intelligence lifecycle.\",\"Learn data collection methods: You will explore different sources of threat intelligence data, including open-source intelligence (OSINT), dark web monitoring, honeypots, and security logs. You will learn how to effectively gather and validate intelligence data.\",\"Analyze threat intelligence data: Participants will develop skills in analyzing threat intelligence data to identify patterns, trends, and potential risks. Various analysis techniques such as data visualization, statistical analysis, and machine learning will be covered.\",\"Conduct adversary profiling: You will learn how to conduct detailed profiling of threat actors and understand their motivations, techniques, and capabilities. This knowledge will help in developing proactive defense strategies.\",\"Apply threat intelligence to security operations: Participants will learn how to integrate threat intelligence into security operations, including incident response, vulnerability management, and security monitoring. You will understand how to leverage threat intelligence to detect, mitigate, and prevent cyber threats.\",\"Collaborate and share intelligence: Effective collaboration and sharing of threat intelligence within the cybersecurity community is crucial. This course will cover the protocols, tools, and platforms used for sharing threat intelligence with trusted partners and organizations.\",\"Develop threat intelligence reports: You will gain hands-on experience in creating clear and concise threat intelligence reports. These reports will be tailored to various stakeholders, such as senior management, security teams, and law enforcement agencies.\"]","prerequisites":"Basic knowledge of cybersecurity concepts and networking.","examsandcerts":"[\"Threat Intelligence Training | CTIA Certification\",\"GIAC Cyber Threat Intelligence (GCTI)\"]","targetaudience":"[\"IT professionals interested in expanding their knowledge of Cybersecurity Threat Intelligence\",\"Vulnerability Management Analyst & SoC Analyst involved in security monitoring nd operations\"]","deliveryformat":"live","careerpath":"[\"Threat Intelligence Analyst \",\"Cyber Security Incident Manager\",\"Vulnerability Management Specialist \",\"Security Operation Centre (SOC) Analyst \"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null},{"courseid":"AT668","coursename":"API Testing","description":"APIs (Application Programming Interfaces) play a crucial role in modern software development, enabling communication and interaction between different software systems. API testing ensures that APIs function correctly, provide accurate responses, and maintain the expected behavior. This comprehensive training course is designed to equip participants with the knowledge and skills required to effectively test APIs and validate their functionality, reliability, and security.","price":"£200","imageurl":"https://firebasestorage.googleapis.com/v0/b/smartlearningportal-5569f.appspot.com/o/Icons%2FSOC%20Analyst%20copy%202.svg?alt=media&token=ef93031d-5ae9-4539-bd7b-b470cdf44c8d","imagename":"","category":"Intermediate","classification":"Technical","duration":"","status":null,"deliverytype":"Recording","relatedcourses":"[\"SIEM016\",\"CSRM423\"]","trainerid":null,"created":"2023-07-03T00:05:25.512Z","courseobjective":"[\"Understand the fundamentals of API testing: Participants will gain a solid understanding of the basics of API testing, including its importance, key concepts, and industry best practices.\",\"Explore different types of APIs: The course will cover various types of APIs, such as RESTful APIs, SOAP APIs, and GraphQL APIs. Participants will learn how to interact with different API protocols and understand their unique testing requirements.\",\"Set up testing environments: Participants will learn how to set up testing environments and tools necessary for API testing. This includes configuring test environments, installing required software, and utilizing popular API testing frameworks.\",\"Create effective API test cases: Participants will learn how to design and develop robust API test cases. They will gain hands-on experience in writing test scripts, defining test data, and incorporating assertions to validate API responses.\",\"Execute API tests: The course will cover the execution of API tests using various tools and frameworks. Participants will learn how to run automated API tests, analyze test results, and report defects.\",\"Handle authentication and security: Participants will understand the importance of API security and learn techniques to handle authentication, authorization, and encryption in API testing. They will also explore common security vulnerabilities and strategies to mitigate risks.\",\"Test API performance: The course will provide insights into API performance testing, including load testing, stress testing, and scalability testing. Participants will learn how to measure API performance and analyze response times.\",\"Integrate API testing into the development process: Participants will understand how API testing fits into the software development lifecycle (SDLC) and DevOps practices. They will explore strategies for incorporating API testing in continuous integration and continuous delivery (CI/CD) pipelines.\",\"Explore advanced topics: The training will delve into advanced topics in API testing, such as handling complex scenarios, testing edge cases, mocking dependencies, and versioning. Participants will gain a deep understanding of handling real-world challenges in API testing.\",\"Hands-on practical exercises and projects: Throughout the course, participants will engage in hands-on exercises, coding assignments, and real-world projects to reinforce their learning and gain practical experience in API testing.\"]","prerequisites":"Basic knowledge of software testing concepts., Familiarity with programming languages and concepts (e.g., Java, Python, or similar)., Understanding of web technologies (e.g., HTTP, REST).","examsandcerts":"[\"Advanced Level Test Analyst\",\"Advanced Level Test Automation Engineer\",\"Advanced Level Test Manager\",\"Foundation Level Agile Tester Certification\",\"Certified Agile Software Test Professional (CASTP)\",\"Certified Associate In Software Testing (CAST)\",\"Certified Software Test Automation Architect\",\"Certified Software Test Automation Specialist\",\"Certified Software Test Engineer (CSTE)\"]","targetaudience":"[\"Software testers and QA professionals interested in expanding their skill set to include API testing.\",\"Software developers and engineers involved in API development and integration.\",\"Technical professionals seeking to enhance their understanding of API testing principles and practices.\"]","deliveryformat":"live","careerpath":"[\"Software Testing\",\"QA Automation Engineer / API Tester\",\"API Tester\",\"Vulnerability Management Analyst\",\"Penetration Tester\"]","coursebundleselectable":true,"providerid":"Smartlearning","trial":false,"vimeofolder":null}]
Introduction courses are intended for beginners with little to no prior knowledge of cybersecurity. They provide a broad overview of the fundamental concepts, principles, and practices in cybersecurity
Advanced courses are designed for experienced professionals or individuals who already possess intermediate-level knowledge and skills in cybersecurity. These courses explore advanced topics and cutting-edge techniques in areas such as penetration testing, digital forensics, malware analysis, secure coding, cloud security, or secure system administration
Featured Courses
Our cybersecurity training course bundle covers a wide range of cybersecurity topics, ensuring that learners acquire a well-rounded understanding of the field with practical skills development, industry relevance, career advancement opportunities, networking, and continuous learning