BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//CharityNZ - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:CharityNZ
X-ORIGINAL-URL:https://charitynz.org
X-WR-CALDESC:Events for CharityNZ
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20210101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=UTC:20240622T160000
DTEND;TZID=UTC:20240622T180000
DTSTAMP:20260430T164633
CREATED:20240518T100918Z
LAST-MODIFIED:20240518T205720Z
UID:17884-1719072000-1719079200@charitynz.org
SUMMARY:Basics of Cyber Security - 4
DESCRIPTION:This is a series of 4 weekly sessions starting from very basics and going towards intermediate. Ideal for people with zero knowledge\, females are highly encouraged. \nPlease note that these series of sessions are tagged as “Technology Courses Adults”\, so the start age limit is at least 25\, as these sessions might be advance level concepts for others. However\, parents could register their youth in sessions with like “Youth courses” \nSession 1 \nWhat is Information Security \nWhat is Cyber Security \nDifferent domains of Cyber Security and how to choose career path \nDevSec OPS \nBasic Principles of Cyber Security \nConfidentiality\, Integrity\, Availability\, Authentication\, Authorization and non-repudiation \nIAAAA – Identification\, Authentication\, Authorization\, Accountability\, Auditing \nDAD – Disclosure\, Alteration and destruction \nSecurity on different OSI layers \nSecure and Insecure protocols \nLine of defense model \nFirewall and Perimeter Security – DMZ\, Bastion Host\, Screen Subnets \n  \nSession 2 \nData classification \nData Security Controls – Data in use\, Data at rest and Data in motion \nDefense in depth and Zero trust \nDifference between Confidentiality and Privacy \nDifference between Privacy\, Anonymity and Pseudonymity \nVulnerability\, threat and risk \nThreat Identification Models – STRIDE\, DREAD and MART \nSession 3 \nCryptography and Goals – PAIN Privacy\, Authentication\, Integrity and Non-repudiation \nEncryption – Asymmetric and Symmetric \nDifference between coding\, hashing and encryption \nKey exchange and DHG \nAuthentication Protocols \nCipher suits \nDifference between SSL and TLS \nSession 4 \nBCP\, DR – RTOs\, RPOs and their importance in Cyber Security \nSecurity Policies\, Standard\, guidelines \nFrameworks\, what is the need and how to choose among different frameworks \nISO27000 \nNIST \nPCI DSS \nSABSA \n===== \nFor Registration – https://forms.gle/Gu2mXPECsFkSLxS78 \n  \n  \n  \n 
URL:https://charitynz.org/event/basics-of-cyber-security-4/
CATEGORIES:Technology Training Adults
ATTACH;FMTTYPE=image/png:https://charitynz.org/wp-content/uploads/2024/05/Updated-Basics-of-Cyber-Security.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20240615T160000
DTEND;TZID=UTC:20240615T180000
DTSTAMP:20260430T164633
CREATED:20240518T100734Z
LAST-MODIFIED:20240518T205415Z
UID:17882-1718467200-1718474400@charitynz.org
SUMMARY:Basics of Cyber Security - 3
DESCRIPTION:This is a series of 4 weekly sessions starting from very basics and going towards intermediate. Ideal for people with zero knowledge\, females are highly encouraged. \nPlease note that these series of sessions are tagged as “Technology Courses Adults”\, so the start age limit is at least 25\, as these sessions might be advance level concepts for others. However\, parents could register their youth in sessions with like “Youth courses” \nSession 1 \nWhat is Information Security \nWhat is Cyber Security \nDifferent domains of Cyber Security and how to choose career path \nDevSec OPS \nBasic Principles of Cyber Security \nConfidentiality\, Integrity\, Availability\, Authentication\, Authorization and non-repudiation \nIAAAA – Identification\, Authentication\, Authorization\, Accountability\, Auditing \nDAD – Disclosure\, Alteration and destruction \nSecurity on different OSI layers \nSecure and Insecure protocols \nLine of defense model \nFirewall and Perimeter Security – DMZ\, Bastion Host\, Screen Subnets \n  \nSession 2 \nData classification \nData Security Controls – Data in use\, Data at rest and Data in motion \nDefense in depth and Zero trust \nDifference between Confidentiality and Privacy \nDifference between Privacy\, Anonymity and Pseudonymity \nVulnerability\, threat and risk \nThreat Identification Models – STRIDE\, DREAD and MART \nSession 3 \nCryptography and Goals – PAIN Privacy\, Authentication\, Integrity and Non-repudiation \nEncryption – Asymmetric and Symmetric \nDifference between coding\, hashing and encryption \nKey exchange and DHG \nAuthentication Protocols \nCipher suits \nDifference between SSL and TLS \nSession 4 \nBCP\, DR – RTOs\, RPOs and their importance in Cyber Security \nSecurity Policies\, Standard\, guidelines \nFrameworks\, what is the need and how to choose among different frameworks \nISO27000 \nNIST \nPCI DSS \nSABSA \n===== \nFor Registration – https://forms.gle/Gu2mXPECsFkSLxS78 \n  \n  \n  \n 
URL:https://charitynz.org/event/17882/
CATEGORIES:Technology Training Adults
ATTACH;FMTTYPE=image/png:https://charitynz.org/wp-content/uploads/2024/05/Updated-Basics-of-Cyber-Security.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20240608T160000
DTEND;TZID=UTC:20240608T180000
DTSTAMP:20260430T164633
CREATED:20240518T100425Z
LAST-MODIFIED:20240518T205314Z
UID:17880-1717862400-1717869600@charitynz.org
SUMMARY:Basics of Cyber Security - 2
DESCRIPTION:This is a series of 4 weekly sessions starting from very basics and going towards intermediate. Ideal for people with zero knowledge\, females are highly encouraged. \nPlease note that these series of sessions are tagged as “Technology Courses Adults”\, so the start age limit is at least 25\, as these sessions might be advance level concepts for others. However\, parents could register their youth in sessions with like “Youth courses” \nSession 1 \nWhat is Information Security \nWhat is Cyber Security \nDifferent domains of Cyber Security and how to choose career path \nDevSec OPS \nBasic Principles of Cyber Security \nConfidentiality\, Integrity\, Availability\, Authentication\, Authorization and non-repudiation \nIAAAA – Identification\, Authentication\, Authorization\, Accountability\, Auditing \nDAD – Disclosure\, Alteration and destruction \nSecurity on different OSI layers \nSecure and Insecure protocols \nLine of defense model \nFirewall and Perimeter Security – DMZ\, Bastion Host\, Screen Subnets \n  \nSession 2 \nData classification \nData Security Controls – Data in use\, Data at rest and Data in motion \nDefense in depth and Zero trust \nDifference between Confidentiality and Privacy \nDifference between Privacy\, Anonymity and Pseudonymity \nVulnerability\, threat and risk \nThreat Identification Models – STRIDE\, DREAD and MART \nSession 3 \nCryptography and Goals – PAIN Privacy\, Authentication\, Integrity and Non-repudiation \nEncryption – Asymmetric and Symmetric \nDifference between coding\, hashing and encryption \nKey exchange and DHG \nAuthentication Protocols \nCipher suits \nDifference between SSL and TLS \nSession 4 \nBCP\, DR – RTOs\, RPOs and their importance in Cyber Security \nSecurity Policies\, Standard\, guidelines \nFrameworks\, what is the need and how to choose among different frameworks \nISO27000 \nNIST \nPCI DSS \nSABSA \n===== \nFor Registration – https://forms.gle/Gu2mXPECsFkSLxS78 \n  \n  \n  \n 
URL:https://charitynz.org/event/basics-of-cyber-security-2/
CATEGORIES:Technology Training Adults
ATTACH;FMTTYPE=image/png:https://charitynz.org/wp-content/uploads/2024/05/Updated-Basics-of-Cyber-Security.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20240601T160000
DTEND;TZID=UTC:20240601T180000
DTSTAMP:20260430T164633
CREATED:20240518T095826Z
LAST-MODIFIED:20240518T205221Z
UID:17876-1717257600-1717264800@charitynz.org
SUMMARY:Basics of Cyber Security - 1
DESCRIPTION:This is a series of 4 weekly sessions starting from very basics and going towards intermediate. Ideal for people with zero knowledge\, females are highly encouraged. \nPlease note that these series of sessions are tagged as “Technology Courses Adults”\, so the start age limit is at least 25\, as these sessions might be advance level concepts for others. However\, parents could register their youth in sessions with like “Youth courses” \nSeries of all session details is given below \nSession 1 \nWhat is Information Security \nWhat is Cyber Security \nDifferent domains of Cyber Security and how to choose career path \nDevSec OPS \nBasic Principles of Cyber Security \nConfidentiality\, Integrity\, Availability\, Authentication\, Authorization and non-repudiation \nIAAAA – Identification\, Authentication\, Authorization\, Accountability\, Auditing \nDAD – Disclosure\, Alteration and destruction \nSecurity on different OSI layers \nSecure and Insecure protocols \nLine of defense model \nFirewall and Perimeter Security – DMZ\, Bastion Host\, Screen Subnets \n  \nSession 2 \nData classification \nData Security Controls – Data in use\, Data at rest and Data in motion \nDefense in depth and Zero trust \nDifference between Confidentiality and Privacy \nDifference between Privacy\, Anonymity and Pseudonymity \nVulnerability\, threat and risk \nThreat Identification Models – STRIDE\, DREAD and MART \nSession 3 \nCryptography and Goals – PAIN Privacy\, Authentication\, Integrity and Non-repudiation \nEncryption – Asymmetric and Symmetric \nDifference between coding\, hashing and encryption \nKey exchange and DHG \nAuthentication Protocols \nCipher suits \nDifference between SSL and TLS \nSession 4 \nBCP\, DR – RTOs\, RPOs and their importance in Cyber Security \nSecurity Policies\, Standard\, guidelines \nFrameworks\, what is the need and how to choose among different frameworks \nISO27000 \nNIST \nPCI DSS \nSABSA \n  \n  \n  \n 
URL:https://charitynz.org/event/basics-of-cyber-security-1/
CATEGORIES:Technology Training Adults
ATTACH;FMTTYPE=image/png:https://charitynz.org/wp-content/uploads/2024/05/Updated-Basics-of-Cyber-Security.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20240424T180000
DTEND;TZID=UTC:20240424T200000
DTSTAMP:20260430T164633
CREATED:20240416T093603Z
LAST-MODIFIED:20240419T224952Z
UID:17856-1713981600-1713988800@charitynz.org
SUMMARY:Career Counseling Seminar
DESCRIPTION:This session is focused on following agenda \n\nHow to prepare your meaningful resume\nHow to prepare your cover letter\nAdvice from Recruitment Industry SME\, Mr Gareth Smith from Hays Recruitment\nHow to remain focused and find dream job\nBreakout sessions for different industry domains (Networks\, Security\, Cloud\, Data Engineering and management\, Project Management\, Power and Energy Sector etc)\nAdvice from respective industries Senior experts\nSuccess stories from professionals who secured their jobs within first few weeks\nIntroducing mentorship program\, assigning mentors from respective domains\nQ&A\n\nSecond phase of this career counseling Seminar is Mentoring – This mentoring program brings experienced professionals together with others looking to develop their skills or careers. It’s a reciprocal relationship of sharing knowledge\, advice and reflection while supporting each other and promoting growth. \nMentors and mentees can set their own schedule of meetups\, but we encourage you to meet (either in person or virtually) at least once a month across the duration of the program. \nPlease note\, this seminar is for people having valid work VISA. VISA advice is out of scope so avoid asking questions if you are attending from overseas. \nRegister yourself – https://charitynz.org/donations/technology-program-training-and-workshops-for-adults/ \nhttps://forms.gle/vRVsLEczd6RmcnP1A \n  \n================= \nSome of the Frequently asked questions \nQ. can anyone from overseas attend this (who is waiting for his decision on JSV) and the one who are in the process of applying JSV? \nAns: YES but avoid asking question regarding VISA process\, timelines etc \nQ. Can women attend this session?\nAns: Yes\, we highly encourage female to attend not only this session but other Technology courses as well. \n 
URL:https://charitynz.org/event/career-counseling-seminar/
CATEGORIES:Career Counseling Seminar,Technology Training Adults
ATTACH;FMTTYPE=image/jpeg:https://charitynz.org/wp-content/uploads/2024/04/WhatsApp-Image-2024-04-19-at-22.15.34.jpeg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20231028T160000
DTEND;TZID=UTC:20231028T170000
DTSTAMP:20260430T164633
CREATED:20230927T053313Z
LAST-MODIFIED:20230927T071406Z
UID:17840-1698508800-1698512400@charitynz.org
SUMMARY:Microsoft Dynamics 365 CRM Configuration Setup and Demo
DESCRIPTION:Fundamentals of Microsoft dynamics D365 CRM \nConfigurations \nDemo \nPresenter – Anish John (Industry Expert for Microsoft Azure and Dynamics CRM) \nFor Registration – https://forms.gle/CtK58QMSPtpiPACP9
URL:https://charitynz.org/event/microsoft-dynamics-365-crm-configuration-setup-and-demo/
CATEGORIES:Technology Training Adults
ATTACH;FMTTYPE=image/png:https://charitynz.org/wp-content/uploads/2023/09/Sales-Cycle-Diagram-Infographic-Instagram-Post-2.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20221001T100000
DTEND;TZID=UTC:20221001T233000
DTSTAMP:20260430T164633
CREATED:20220912T103646Z
LAST-MODIFIED:20220912T103646Z
UID:17720-1664618400-1664667000@charitynz.org
SUMMARY:Power BI Workshop
DESCRIPTION:High Level Agenda \n\nIntroduction\n\nPower BI environment\nExplanation of resources for demo\n\n\n Querying and Transforming Data\n\n\nData Transformation\nTable Creation\n\n\n Data Modelling\n\n\nStar Schema\n\n\n DAX Calculations\n\n\nWhat is DAX?\nSimple Measures\nMeasure Branching\nAdvanced DAX\n\n\n\nSession Pre-request is to install Power BI\, Its freely available. \n  \nFor registration – https://forms.gle/bbDHmQw977MAsgw8A
URL:https://charitynz.org/event/power-bi-workshop/
CATEGORIES:Power BI
ATTACH;FMTTYPE=image/jpeg:https://charitynz.org/wp-content/uploads/2022/09/Power-BI-Workshop.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20220827T180000
DTEND;TZID=UTC:20220827T200000
DTSTAMP:20260430T164633
CREATED:20220729T100440Z
LAST-MODIFIED:20220730T203130Z
UID:17711-1661623200-1661630400@charitynz.org
SUMMARY:Basics of cloud computing and Microsoft Azure Fundamentals leading to AZ900 Certification
DESCRIPTION:Charity New Zealand Offered training program for \nBasics of cloud computing and Microsoft Azure Fundamentals\nleading towards AZ900 certification \nWhen: Saturday August 27\, 2022\nWhere: Physical at Wellington and online through remote link \nAgenda: Describe cloud concepts\nDescribe core Azure services\nDescribe core solutions and management tools on Azure\nDescribe general security and network security features \nGet register yourself – https://forms.gle/yPDBhyXDf56g6sH19
URL:https://charitynz.org/event/basics-of-cloud-computing-and-microsoft-azure-fundamentals-leading-to-az900-certification/
CATEGORIES:Cloud Technology Fundamentals & Microsoft Azure Core Services
ATTACH;FMTTYPE=image/jpeg:https://charitynz.org/wp-content/uploads/2022/07/MS-Azure-Fundamentals.jpeg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20220722T190000
DTEND;TZID=UTC:20220722T210000
DTSTAMP:20260430T164633
CREATED:20220311T235516Z
LAST-MODIFIED:20220628T061303Z
UID:17680-1658516400-1658523600@charitynz.org
SUMMARY:Terraform in Action with Azure
DESCRIPTION:Introduction to Infrastructure as a code\nIntroduction of Terraform\nIntroduction of Repository\nTerraform stages\nTerraform state\nDeploying Azure Resources through Terraform\nLAB Exercise\n\n \nRegister – https://forms.gle/RUKFzv6xMdhoJoMr8
URL:https://charitynz.org/event/terraform-in-action-with-azure/
CATEGORIES:Technology Training Adults
ATTACH;FMTTYPE=image/png:https://charitynz.org/wp-content/uploads/2022/03/Untitled-design2.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20220219T180000
DTEND;TZID=UTC:20220219T200000
DTSTAMP:20260430T164633
CREATED:20220209T221154Z
LAST-MODIFIED:20220209T224814Z
UID:17610-1645293600-1645300800@charitynz.org
SUMMARY:MITRE ATT&CK\, D3FEND Framework
DESCRIPTION:MITRE ATT&CK and D3FEND framework is a globally accessible knowledge base that provides a common language for systematically categorizing adversary’s attack life cycle and countermeasure techniques respectively. \nBelow is the higher level walk-through of the session: \nATT&CK and D3FEND framework overview\nATT&CK tactics and techniques\nD3FEND countermeasures\nATT&CK Navigator overview\nATT&CK Navigator demo \nRegister yourself – https://forms.gle/v9qzLKaBHN5xK9JZ7https://forms.gle/v9qzLKaBHN5xK9JZ7
URL:https://charitynz.org/event/mitre-attck-d3fend-framework/
CATEGORIES:Technology Training Adults
END:VEVENT
END:VCALENDAR