Online or onsite, instructor-led live BCS training courses.
BCS certified training courses are available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live BCS trainings in Sheffield can be carried out locally on customer premises or in NobleProg corporate training centers.
NobleProg -- Your Local Training Provider
Sheffield
The Chimney House, 4 Kelham Island, Sheffield, united kingdom, S3 8RY
The Chimney House is a creative and innovative space in the centre of Sheffield – the biggest feedback we receive from comp...
The Chimney House is a creative and innovative space in the centre of Sheffield – the biggest feedback we receive from companies that use us is that they noticeably observe higher levels of performance and interaction from teams and individuals.
The building is formed on the ethos of the truest form of recycling – 85% of furnitures, fittings and décor has been created from reclaim and salvage and matched with a ultra modern outlook.
We host meetings, trainings, brainstorming sessions, workshops, away days and conferences as well as product launches, interviews, filming and photoshoots on a daily basis. Light, airy with plenty of table space, multiple power sources, hidden screen, wireless projector, state of the art audio system and full building high speed wi-fi. Need to break out? We can help, with a choice of 2 additional rooms for hire.
We're famed for our lunches that are brim full of Yorkshire fresh produce. Sourced from the 7 hills of Sheffield and supporting local and independent makers and bakers, our lunches are tip top tasty with cake to die for!
There are multiple car parks within a few minutes walk. We can provide a handy 'How to Guide' to recommend the easiest way to arrive by road, rail, bicycle, foot and tram.
We are also home to Supper Society, a secret dining society that meets sporadically, hosted by guest chefs. The only time an individual seat at The Chimney House table can be acquired.
Who is it for:
People involved in or implementing the DevOps process, including roles such as DevOps evangelist; automation architect; cloud infrastructure engineer; software developer; software tester; security engineer; database administrator and product owners. Read the syllabus below for a more complete list of roles.
What will I learn:
By the end of this training, participants will be able to demonstrate knowledge, understanding and some basic application of the following aspects of DevOps:
Origins
Benefits
Culture and teams
Automation
Lean
Measurement
Sharing
Common roles
Practices and techniques
Methods and approaches for teams
Format of the Course:
Interactive lecture and discussion.
Lots of exercises and practice.
Hands-on implementation in a live-lab environment.
This course is for anyone who needs to understand data protection and GDPR in particular.
At the end of the course candidates should be able to:
Hold a recognised qualification in data protection.
Gain an understanding of the key changes that the GDPR and the Data Protection Act (2018) bring to data protection.
Gain an understanding of the new rights available to data subjects and the implications of those rights with the GDPR and Data Protection Act (2018).
Gain an understanding of individual and organisational responsibilities under the GDPR and the Data Protection Act (2018), particularly the need for effectiveness record keeping.
Gain an understanding of the increased obligations faced by data controllers and data processors as a result of the GDPR coming into force and the Data Protection Act (2018) being enacted.
Be better placed to support their organisation in processing customer data in compliance with the GDPR and the Data Protection Act (2018).
Anyone who has some existing responsibility for data protection within their organisation.
It’s also useful for those who want to broaden their basic understanding in this area and fully understand the practical applications of data protection laws.
Whilst this certificate is written to the UK Data Protection Act, many other jurisdictions have enacted broadly similar data protection laws, so international candidates may also find this useful.
What will I learn:
Candidates will be able to:
Gain an understanding of the key changes and the associated implications that the GDPR and the UK Data Protection Act 2018 introduce to data protection.
Gain an understanding of individual and organisational responsibilities under the GDPR and the UK Data Protection Act, particularly the need for effective record keeping.
Be able to apply the new rights available to data subjects and understand the implications of those rights.
Be able to demonstrate an understanding of the designation, position and role / tasks of a data protection officer.
Be able to prepare organisations to manage and handle personal data in compliance with the GDPR and the UK Data Protection Act.
Who is it for:
Anyone with an interest in information security, whether as a career or for general business knowledge.
This certificate is relevant to anyone requiring an understanding of Information Security Management Principles as well as those with an interest in information security either as a potential career or as an additional part of their general business knowledge. It is very much a firm foundation on which other qualifications can be built or which provides a thorough general understanding to enable organisations to begin to ensure their information is protected appropriately.
What will I learn:
Candidates should be able to demonstrate:
Knowledge of the concepts relating to information security management.
Understanding of current national legislation and regulations which impact upon information security management.
Awareness of current national and international standards, frameworks and organisations which facilitate the management of information security.
Understanding of the current business and common technical environments in which information security management must operate.
Knowledge of the categorisation, operation and effectiveness of controls of different types and characteristics.
Note: This is the four day course which adds one additional day to the standard delivery to provide more time for exam preparation and practice exercises.
Who is it for:
Anyone with an interest in information security, whether as a career or for general business knowledge.
This certificate is relevant to anyone requiring an understanding of Information Security Management Principles as well as those with an interest in information security either as a potential career or as an additional part of their general business knowledge. It is very much a firm foundation on which other qualifications can be built or which provides a thorough general understanding to enable organisations to begin to ensure their information is protected appropriately.
What will I learn:
Candidates should be able to demonstrate:
Knowledge of the concepts relating to information security management.
Understanding of current national legislation and regulations which impact upon information security management.
Awareness of current national and international standards, frameworks and organisations which facilitate the management of information security.
Understanding of the current business and common technical environments in which information security management must operate.
Knowledge of the categorisation, operation and effectiveness of controls of different types and characteristics.
Who is it for:
Security professionals looking to understand the technical and business aspects of the profession or anyone looking to work in the field of security architecture.
System Administrators who wish to become security architects
Technical architects looking to move into the field of security architecture
This certificate also offers a complimentary certification for those awarded or looking to achieve CCP status in IA.
What will I learn:
Candidates should be able to:
Describe the business environment and the information risks that apply to the systems.
Describe and apply security design principles.
Identify information risks that arise from potential solution architectures.
Design alternate architectures or countermeasures to mitigate identified information risks.
Ensure that proposed architectures and countermeasures adequately mitigate identified information risks.
Apply ‘standard’ security techniques and architectures to mitigate security risks.
Develop new architectures that mitigate the risks posed by new technologies and business practices.
Provide consultancy and advice to explain Information Assurance and architectural problems.
Security configure ICT systems in compliance with their approved security architectures.
Who is it for:
Anyone who is involved in the areas of information security and information assurance.
The certificate is relevant to anyone requiring an understanding of Business Continuity Management as well as those who are involved in the areas of information security and information assurance.
What will I learn:
Candidates should be able to demonstrate:
The function of and need for business continuity management within an organisation
The business continuity management life cycle
The main components of a business continuity management programme
The need for risk assessment within business continuity management
The options for development of a business continuity management strategy
How to prepare and develop plans for business continuity management response
The need for exercising, maintenance and review of plans
The need for embedding business continuity management awareness within the organisation
Who is it for:
Anyone who is involved in the areas of information security and information assurance.
What will I learn:
Candidates should be able to demonstrate:
How the management of information risk will bring about significant business benefits.
How to explain and make full use of information risk management terminology.
How to conduct threat and vulnerability assessments, business impact analyses and risk assessments.
The principles of controls and risk treatment.
How to present the results in a format which will form the basis of a risk treatment plan.
Online BCS training in Sheffield, BCS training courses in Sheffield, Weekend BCS courses in Sheffield, Evening BCS training in Sheffield, BCS instructor-led in Sheffield, BCS classes in Sheffield, BCS instructor in Sheffield, BCS private courses in Sheffield, Weekend BCS training in Sheffield, Evening BCS courses in Sheffield, BCS one on one training in Sheffield, BCS on-site in Sheffield, BCS boot camp in Sheffield, BCS coaching in Sheffield, Online BCS training in Sheffield, BCS trainer in Sheffield, BCS instructor-led in Sheffield