• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1 Educators providing Accounts courses in Sheffield

Millhouses Accountancy Training & Development Ltd

millhouses accountancy training & development ltd

Sheffield

Xero is the global leader in online cloud accounting with over 300,000 existing customers in over 100 countries. This software is hosted in the cloud and customers can access it anywhere with the help of an internet connection, an email address and a password. It also has a mobile app for your mobile device allowing you to access your accounts on your mobile phone. It is designed to save you time in performing routine bookkeeping tasks on a day to day basis. Xero has a number of very useful features including the following: A dashboard allowing you to see at a glance the financial health of your business. Connect Xero to your bank accounts by bank feeds which upload transactions from your bank accounts into Xero allowing you to track cashflow and avoid the need to manually input transactions into Xero from your statements. Perform bank reconciliations with a few clicks of a button. Send invoices to customers online through Xero with online payment options. Reduce the time to get paid by including a pay now button. Chase outstanding payments with automatic reminders. Set up repeating invoice templates and have these automatically sent to your customers. Set up repeating bills (for repetitive monthly bills). Reducing data entry. Send statements to customers. Record your expenses. Run your payroll through Xero. File your Vat return with HMRC through Xero. File your statutory accounts and company tax return through Xero tax

Courses matching "Accounts"

Show all 42

Accounts for Non Account Manager

5.0(10)

By GBA Corporate

Overview This course will provide you with the skills and knowledge required by Non-Accounts Managers to understand Finance and Accounting processes they face in their daily work schedule. The main objective of this course is to highlight accounting, understand the framework of accounting, and stages of accounts and also to elaborate rules and principles of accounting. With a lot of Case studies and open discussions with live examples, participants will gain detailed knowledge to understand their company from a financial perspective and also to help manage financial matters. At the end of the course, you will learn how to apply financial techniques, understand financial reports and annual reports, the relationship between accounting and finance thereby gaining knowledge of the use of debits and credits and last but not least to identify limitations of financial statements.  At the end of this training course, participants will: Be able to Record Transactions in the Accounting System Understand the Format and Contents of Financial Statements Use Accounting Information to Interpret and Evaluate a Business Make Efficient and Profitable Decisions, based on Cost Information Apply Budgetary Control Techniques to ensure that Targets are Achieved

Accounts for Non Account Manager
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Auditing and Internal Control

5.0(10)

By GBA Corporate

Overview Internal control, as defined by accounting and auditing, is a process for assuring an organization's objectives in operational effectiveness and efficiency, reliable financial reporting, and compliance with laws, regulations and policies. It is very important for the organisation to have a smooth flow of accounting as it plays a very important role in the development of the organisation. Financial Managers or any person who deals with Accounts need to see that the company accounts are very updated and are free from any risks that can become a problem during the time of Auditing.  This course will feed you with all the skills required to have a good Internal Management process it is important to analyse Risk Management to see if the process is working efficiently and measures the effectiveness of controls put in place to alleviate risks. 

Auditing and Internal Control
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Accounting for Grants and Projects

5.0(10)

By GBA Corporate

Overview Understanding the grants coming in and their monitoring, spending and many other factors are directly proportionate to effecting Grant Accounting and Grant Management. Many different funding entities give grants to so many companies, the government sector, and private sectors with the aim to encourage growth and employment and economic viability. It is important to recognise the government grants in the profit and loss account, so at the end, it can match the costs to which they relate. Considering these grants efficiently in the accounts is very important, as many entities (including the grant-making body) may closely monitor the accounts; and any errors will reflect badly on the accountant. Many development projects are funded through grants from donors. Therefore, it becomes the responsibility of the project management team to safeguard that the limited resources are used efficiently to achieve maximum impact.  This course is planned to train the participants with best practices and essential skills in effective grants management.

Accounting for Grants and Projects
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Analysing Financial Statement and Annual Reports

5.0(10)

By GBA Corporate

Overview The most significant network between the organisation and their investors is Financial Statements and annual reports. It is very important to understand the role of these factors to have better communication channels. This course will give you intense knowledge to prepare financial statements according to International Financial Reporting Standards. IFRS regulates financial reporting standards and according to it the company's financial reporting should be transparent. Thus, if it is as per IFRS rules, its credibility can be trusted. It will also help to analyse the financial statement and annual reports. It will enable you to evaluate corporate accounts and make strong decisions and judgements about the company's status.

Analysing Financial Statement and Annual Reports
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Client Relationship Management

5.0(10)

By GBA Corporate

Overview By the end of the course, delegates will have:   Identify and prioritise key accounts Increasing business revenue through effective CRM The importance of client care in the business environment Contribution of Customer care towards to quality service Understand the benefits of high-level CRM and the part it plays in client retention Understanding the service excellence and its strengths Necessary attitudes for inspiring customer service Develop the important skills necessary for an effective Customer Relationship Manager Building rapport and creating strong working relationships Effective Communication between the clients Understanding the importance of interpersonal contact and behaviour

Client Relationship Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Client Relationship Management

5.0(10)

By GBA Corporate

Overview By the end of the course, delegates will have:   Identify and prioritise key accounts Increasing business revenue through effective CRM The importance of client care in the business environment Contribution of Customer care towards to quality service Understand the benefits of high-level CRM and the part it plays in client retention Understanding the service excellence and its strengths Necessary attitudes for inspiring customer service Develop the important skills necessary for an effective Customer Relationship Manager Building rapport and creating strong working relationships Effective Communication between the clients Understanding the importance of interpersonal contact and behaviour

Client Relationship Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Microsoft Active Directory

5.0(3)

By Systems & Network Training

Microsoft Active Directory course description A thorough understanding of this system is essential for anyone managing enterprise MS networks. Essential theory is complimented with a high level of hands on practice allowing delegates to observe the idiosyncrasies of Active Directory and Group Policy at first hand. Delegates learn the fundamental theory of AD and progress onto building a multi-domain network in the classroom. The course includes troubleshooting methods, and essential maintenance procedures. This course is designed to teach you the skills needed for day to day management of these technologies. What will you learn Install AD on multiple PCs. Use the tools to create and manage objects. Create appropriate group policies to restrict selected user's desktops and network access. Install DNS to support Active Directory without loosing Internet Connectivity. Maintain and troubleshoot AD problems Backup Active Directory. Microsoft Active Directory course details Who will benefit: Technical staff working with AD based networks. Prerequisites: Supporting Windows server. Duration 3 days Microsoft Active Directory course contents Introduction to Active Directory Network authentication methods, Active Directory defined, AD naming conventions, network management with AD, AD structures: Domains, Organisational Units, Forests & Trees, Sites, The Global Catalogue. Windows 2003 new features, installing AD. Hands on Installing an AD network. Windows overview Management methods Server management tools, installing the additional tools, Terminal Server: Administration mode, Administrator accounts in AD, Local Security Policy. Hands on Install the management tools, Management using Terminal Services. Creating & Managing Objects (a quick look) AD management tools, AD users and computers, Creating & managing OUs, User Accounts and groups, controlling access to AD objects, moving objects, Publishing resources, locating objects in AD, delegating authority. Hands on Creating a control OU structure and delegating authority. Introduction to Group Policies What are Group Policies? Where Group Policy data is stored, security, Group Policy flow. Hands on Implementing Group Policies Working with Group Policies Local security templates, administrative templates, scripts, folder redirection, software deployment. Hands on Scripts, redirecting the start menu, creating a secure, robust desktop environment. Implementing DNS DNS basics, troubleshooting, implementing DNS zones. Hands on Building a unified DNS solution. Maintaining and managing the AD database AD support tools, database internal structure, replication, replication tools, Single Operations Masters, tools for maintenance, maintenance techniques, Backing up AD, Directory Services restore mode, NTDSUtil, Authoritative & non-authoritative restoration, rebuilding. Hands on NTDSUtil.

Microsoft Active Directory
Delivered in Internationally or OnlineFlexible Dates
£1,877

Securing UNIX systems

5.0(3)

By Systems & Network Training

Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in Internationally or OnlineFlexible Dates
£4,997

Securing Linux systems

5.0(3)

By Systems & Network Training

Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing Linux systems
Delivered in Internationally or OnlineFlexible Dates
£3,697

Biofuels and Alternative Fuel Sources

By EnergyEdge - Training for a Sustainable Energy Future

About this Training The expanding human population and industrialisation are increasing the demand for energy worldwide. This has resulted in numerous challenges such as environmental pollution, reliable supply of fossil fuels, and increased demand of electricity supply, which must be overcome. To fulfil the energy demands and overcome these challenges, numerous projects and funds are involved in finding an adequate solution. Transport accounts for around one-fifth of global carbon dioxide (CO2) emissions and road travel accounts for three-quarters of transport emissions. Most of this comes from passenger vehicles. Emission limits are increasingly stringent, and the fuel industry must change its approach to product formulation to meet the challenge. Training Objectives Upon completion of this course, participants will be able to: Get a clear overview of the different types of bio and alternative fuels Understand how different bio and alternative fuels are produced Have an overview of feedstock utilised for biofuels production Realize how the biofuels production could be integrated in modern refinery Understand how bio and alternative fuels function as single and blended fuels Understand what impact bio and alternative fuels have on car engine Get an overview of the environmental impact of bio and alternative fuels Get the overview of regulation related to bio and alternative fuel Target Audience The course is intended for individuals who are interested in or developing in the field of bio and alternative fuels. The following personnel will benefit from the knowledge shared in this course: Refinery Technical Personnel Trading and blending personnel Sales, marketing, and product trading personnel Laboratory supervisors and technical personnel Policymakers Professionals who are interested in or developing in the field of bio and alternative fuels Process, project, and consultant engineers involved in bioenergy, petrochemical and chemical industries Course Level Basic or Foundation Trainer Your expert course leader is an experienced manager with more than 25 years of operational experience in the downstream Oil & Gas industry. She is a recognised expert in conventional, biofuels and alternative fuels with extensive experience in the crude selection process and formulation of finished products including product portfolio strategy, product quality road mapping and benchmarking. She is a long-time laboratory manager with comprehensive experience in laboratory processes, including financing, benchmarking, efficiency improvement and total quality management processes. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Biofuels and Alternative Fuel Sources
Delivered in Internationally or OnlineFlexible Dates
£2,321 to £2,699