• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3098 Associate courses in Congleton delivered Online

Cost Management Certification Course

4.3(43)

By John Academy

Course Overview Explore the techniques to keep your project on budget with this Cost Management Certification course. This course educates you on project budgeting methods and strategies. Project Managers are responsible for managing projects with the given budget. The value of a Project manager rises with the number of projects he can deliver within the budget. Through this valuable Cost Management Certification course, you will gain an in-depth understanding of project cost estimation, project budget determination and cost control techniques to keep a project budget under control. The comprehensive program has exceptional components that will enhance your knowledge of direct and indirect costs, cost estimates and basic estimates, and funding estimates. You will learn how to control project costs using earned value management techniques to stay on budget and deliver your project successfully.  Learning Outcomes: Familiarize with project cost estimating tools and techniques Learn how to determine project budget Be able to control project costs Learn about funding formulas Deepen your understanding of Earned Value Management techniques Learn about cost baseline and project budget Who is this course for? Anyone interested in keeping a project budget under control and delivering the maximum number of projects within the given budget can take this Cost Management Certification Course course. Entry Requirement This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Certification After you have successfully completed the course, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry-leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path The Cost Management Certification Course provides useful skills to control project budget and would be beneficial for any related profession or industry such as: Project Manager Cost Management Accountant Cost Consultant Unit 01: Introduction Module 01: Introduction 00:01:00 Unit 02: Theoritical Part Module 01: What is Cost Management? 00:03:00 Module 02: Direct and Indirect Costs 00:03:00 Module 03: Analogous Estimating 00:03:00 Module 04: Parametric Estimation 00:04:00 Module 05: Three-Point Estimating 00:02:00 Module 06: Reserve Analysis 00:10:00 Module 07: Cost Estimates and Basis of Estimates 00:03:00 Module 08: Cost Baseline 00:06:00 Module 09: Funding Requirements 00:04:00 Module 10: Earned Value Formulas 00:07:00 Module 11: Project Status 00:06:00 Module 12: Earned Value Example 00:08:00 Module 13: Forecasting Three Scenarios 00:16:00 Module 14: Forecasting Example 00:03:00 Module 15: To-Complete-Performance-Index TCPI 00:06:00 Module 16: Performance Reviews 00:03:00 Module 17: Recap 00:06:00 Unit 03: Project Simulation and Detailed Example Module 01: Direct and Indirect Costs 00:05:00 Module 02: Cost Estimates and Reserve Analysis 00:20:00 Module 03: Cost Baseline and Project Budget 00:03:00 Module 04: Basis of Estimate 00:02:00 Module 05: Funding Requirements 00:07:00 Module 06: Earned Value Calculation 00:15:00 Module 07: Forecasting 00:09:00 Module 08: TCPI 00:05:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Cost Management Certification Course
Delivered Online On Demand2 hours 40 minutes
£18

ICM-SA-CT-Installing and Configuring Meraki MS Switch Appliances

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: IT Staff and Managers Network and systems personnel and engineers Small to mid-sized organizations that require fundamental knowledge on networking terms/concepts and configuration guidance for Meraki equipment. This also includes organizations looking to implement remote sites, provide a guest wireless solution, and collect user analytics. Overview Following completion of this course, students will understand, Install, Configure, Monitor, and Troubleshoot the following: Navigate and Configure the dashboard Add MX/MS devices to the Dashboard Understand and Configure Configuration Templates Understand and Configure Group Policies Manage/Configure/Integrate Users and Radius Policies Configure, Monitor, and Troubleshoot MS Switches Troubleshoot devices and Connectivity This 3-day Cisco course provide students with the skills to configure, optimize, and troubleshoot a Cisco Meraki solution. Students will learn how to install and optimize Meraki MS Switches. Students will also learn how to configure the Meraki Dashboard. Student will troubleshoot and configure the Meraki environment and learn how to diagnose and resolve user and Network issues that may arise. Introduction to Meraki The Meraki Mission Cisco Meraki: Bringing the Cloud to Enterprise Networks Cloud-Managed Networking Architecture Benefits of a Cloud-Based Solution The Meraki Full Stack: New and Unique Value Proposition Meraki Deployment ? How it works Why Customers Choose Meraki Meraki MS Switches Overview Meraki API Overview Meraki Licensing Enterprise Support Cisco Meraki Documentation Cloud Management with the Meraki Dashboard The Meraki Dashboard Dashboard: Organizational Structure Out-of-band Cloud Management Loss of Connectivity to the Cisco Meraki Cloud Meraki Dashboard Logins Create Dashboard Accounts and Organization MSP Logins - Manage Multiple Organizations Modify an Organization View Organizations Health Meraki Dashboard Best Practices Dashboard Search Meraki Help Organizational Wide Settings Configure Monitor Create and Manage Configuration Templates Network-Wide Settings Configure Meraki Switching MS Switch Platforms and Features MS Feature: Multi-gigabit Ethernet Cisco Meraki MS Access Switches Cisco Meraki MS Aggregation Switches Using Tags to search, monitor and configure Meraki Switches Meraki Switch Configuration Port Configuration Meraki Switch Monitoring Troubleshooting Tools Managing Firmware Upgrades

ICM-SA-CT-Installing and Configuring Meraki MS Switch Appliances
Delivered OnlineFlexible Dates
Price on Enquiry

Communication Skills in Health and Social Care

4.9(27)

By Apex Learning

Overview This comprehensive course on Project Management will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Project Management  comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast-track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Project Management. It is available to all students, of all academic backgrounds. Requirements Our Project Management is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 12 sections • 12 lectures • 05:33:00 total length •Module 1: Introduction to Health and Social Care: 00:19:00 •Module 2: Communication and its Relevance: 00:42:00 •Module 3: Importance of Communication in Healthcare: 00:33:00 •Module 4: Professional Communication and Behaviour: 00:19:00 •Module 5: Interviewing Techniques: 00:32:00 •Module 06: Adapting Communication to a Patient's Ability to Understand: 00:19:00 •Module 7: Confidentiality in a Medical Environment: 00:17:00 •Module 8: Human Body Vocabulary with Pictures: 00:47:00 •Module 9: Equipment, Instruments and Lab Tests: 00:19:00 •Module 10: Legal aspects and Ethics: 00:22:00 •Module 11: Medical Jargon and Terminology: 00:28:00 •Module 12: Acronyms and Abbreviation: 00:36:00

Communication Skills in Health and Social Care
Delivered Online On Demand5 hours 33 minutes
£12

CCTA Check Point Troubleshooting Administration

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for security administrators and Check Point resellers who need to manage and monitor issues that may occur within their Security Management environment. Overview Understand how to use Check Point resources for support. Understand how to perform packet captures using tcmdump and FW Monitor command tools. Understand the basic process of kernel debugging, and how debug commands are structured. Recognize how to use various Linux commands for troubleshooting system issues. Recognize communication issues that may occur between SmartConsole and the SMS and how to resolve them. Understand how to troubleshoot SmartConsole login and authentication issues. Understand how to prevent and resolve licensing and contract issues. Understand how to troubleshoot issues that may occur during policy installation. Understand communication issues that may occur when collecting logs and how to resolve them. Recall various tools to use when analyzing issues with logs. Understand how to restore interrupted communications during heavy logging. Understand how NAT works and how to troubleshoot issues. Understand Client Side and Server Side NAT. Understand how the Access Control Policy functions and how the access control applications work together. Understand how to troubleshoot issues that may occur with Application Control and URL Filtering. Understand how the HTTPS Inspection process works and how to resolve issues that may occur during the process. Understand how to troubleshoot Content Awareness issues. Recognize how to troubleshoot VPN-related issues. Understand how to monitor cluster status and work with critical devices. Recognize how to troubleshoot State Synchronization. Understand how to troubleshoot communication issues between Identity Sources and Security Gateways. Understand how to troubleshoot and debug issues with internal Identity Awareness processes. The goal of this course is to provide an understanding of the concepts and skills necessary to troubleshoot issues which may occur when managing the Check Point Security Management architecture and Security Gateways. Course Outline An Introduction to Troubleshooting SmartConsole and Policy Management Troubleshooting Monitoring Logging Activity Troubleshooting Issues with NAT Understanding the Unified Access Control Policy Basic VPN Troubleshooting Monitoring ClusterXL Connections Understanding Identity Awareness Additional course details: Nexus Humans CCTA Check Point Troubleshooting Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCTA Check Point Troubleshooting Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CCTA Check Point Troubleshooting Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Python 3: Project-based Python, Algorithms, Data Structures

By Packt

Learn to program with Python 3, visualize algorithms and data structures, and implement them in Python projects

Python 3: Project-based Python, Algorithms, Data Structures
Delivered Online On Demand14 hours 29 minutes
£135.99

Compliance Manager Diploma

4.3(43)

By John Academy

Description This Compliance Manager Diploma is designed for all organizations that wish to improve Compliance Management, which is the core element of a functioning management system. Being able not only to monitor but to manage compliance in your organisation constitutes one of the building blocks to guarantee an effective implementation of a management system as required regulations for any aviation organization. The Compliance Manager Diploma will provide you with a deep understanding of aviation related requirements for a Compliance Management System including requirements related to documentation, audit techniques, reporting and management of records. Furthermore it will provide you with guidance on how to ensure your Compliance Management will cooperate with your SMS and how to verify the functionality and regulatory compliance of your SMS. Through the course you will receive both the theoretical background and the tools and practical knowledge needed to successfully implement and operate Compliance Management to strengthen your Management System. Assessment: This course does not involve any MCQ test. Students need to answer assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Once the answers are submitted, the instructor will check and assess the work. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Compliance Manager Diploma is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Compliance Manager Diploma is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Module: 01 Compliance Manager 00:30:00 Compliance Management System 00:30:00 The Compliance House 00:30:00 Compliance and Auditing 00:30:00 Compliance and Ethics 00:30:00 Module: 02 Understanding Risk 00:30:00 Risk Management Activities 00:05:00 Assessing Risk 00:15:00 Responding to Risks 00:15:00 Resourcing Controls 00:05:00 Reaction Planning 00:15:00 Reporting and Monitoring 00:15:00 Module: 03 Information Security Risk Management 00:30:00 Risk Management 00:30:00 Risk Reporting and Communication 00:30:00 External and Internal Factors 00:30:00 Strategic Risk Management 00:15:00 Risk Analysis and Assessment 00:45:00 Enterprise Risk Management (ERM) 00:45:00 Module: 04 The Role And Responsibilities of a Security Officer 00:30:00 Security Management Governance 00:15:00 The Basics Of Security Management 00:15:00 Security Management Planning And Implementing 00:15:00 How to Build a Security Management Team 00:15:00 Assessment Assignment - Compliance Manager Diploma 00:00:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Compliance Manager Diploma
Delivered Online On Demand9 hours 25 minutes
£25

Autism and Safeguarding Child - Endorsed Training

4.7(47)

By Academy for Health and Fitness

Unlock the keys to the world of Autism and Safeguarding Children with this compelling course bundle! We are excited to bring you two QLS-endorsed courses: "Autism" and "Child Protection & Safeguarding." As an added bonus, we've included five additional relevant CPD QS accredited courses to further enrich your knowledge: "Children's Mental Health," "Learning Disability Nursing," "Diabetes," "Dementia Awareness," and "Child Language Disorder (CLD)." What makes this Autism and Safeguarding Children bundle unique is its emphasis on theoretical understanding. Our QLS-endorsed courses don't just offer top-tier learning material but also equip you with a hardcopy certificate upon completion, validating your dedication and expertise. Alongside, you will delve into a spectrum of critical topics through our five CPD QS accredited courses, each a specialised area with immense societal relevance. This bundle is a goldmine of knowledge for anyone keen on understanding Autism and the complexity of safeguarding children. As you navigate through these courses, you'll discover the layers of mental health, learning disabilities, and disease awareness. Your journey will culminate in mastering Child Language Disorders, empowering you to make significant contributions in the field of Autism and Safeguarding Children. Take your first step towards mastering Autism and Safeguarding Child studies. Immerse yourself in this all-inclusive course bundle today and enjoy a fulfilling learning experience like no other! This bundle comprises the following courses: QLS Endorsed Courses: Course 01: Diploma in Autism and Dyslexia Awareness at QLS Level 5 Course 02: Diploma in Child Protection & Safeguarding Children at QLS Level 5 CPD QS Accredited Courses: Course 03: Children's Mental Health Course 04: Learning Disability Nursing Course 05: Diabetes Course 06: Dementia Awareness Course 07: Child Language Disorder (CLD) Learning Outcomes By the end of this Autism and Safeguarding Children bundle course, learners will be able to: Gain a comprehensive understanding of Autism and child safeguarding measures. Develop an understanding of children's mental health and associated challenges. Enhance your knowledge of learning disability nursing. Learn about diabetes, its effects, and management strategies. Acquire insights into Dementia, its types, symptoms, and care. Understand Child Language Disorder and the techniques to handle it. Become well-versed with child protection and safeguarding protocols. Earn QLS-endorsed hardcopy certificates for Autism and Child Protection & Safeguarding courses. This course bundle is meticulously crafted to provide learners with a broad theoretical understanding of Autism and child safeguarding. The QLS-endorsed courses offer an in-depth study of Autism and the measures necessary for Child Protection & Safeguarding. These topics are of paramount importance and are highly relevant in today's society. The other five courses in the bundle will walk you through topics such as Children's Mental Health, Learning Disability Nursing, Diabetes, Dementia Awareness, and Child Language Disorder. Each course is designed to equip learners with comprehensive knowledge of the respective subjects. By understanding these essential aspects, you can significantly contribute to safeguarding children's health and well-being. CPD 300 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Autism and Safeguarding Children course ideal for: Parents seeking a deeper understanding of their child's development and health. Teachers and school administrators keen on safeguarding students' welfare. Health and social care professionals aiming to enhance their knowledge base. Anyone interested in the fields of Autism and Child Safeguarding. Career path Autism Support Specialist: Salary range £21,000 - £30,000. Child Protection Officer: Salary range £27,000 - £35,000. Children's Mental Health Counselor: Salary range £23,000 - £37,000. Learning Disability Nurse: Salary range £24,000 - £37,000. Dementia Care Specialist: Salary range £20,000 - £33,000. Certificates Digital certificate Digital certificate - Included Hard copy certificate Hard copy certificate - Included

Autism and Safeguarding Child - Endorsed Training
Delivered Online On Demand27 hours
£149

CompTIA Pentest+ (Ethical Hacking) Course and Practice Exam

By Packt

In this course, you will dive deep into the 5 domains of the CompTIA Pentest+ exam and learn each topic in a succinct manner. You will learn the structure of the exam and create your own pentest lab, and have the confidence to ace the exam, whenever you decide to attempt it.

CompTIA Pentest+ (Ethical Hacking) Course and Practice Exam
Delivered Online On Demand8 hours 8 minutes
£137.99

Cisco Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security engineer Network engineer Network designer Network administrator Systems engineer Consulting systems engineer Technical solutions architect Network manager Cisco integrators and partners Overview After taking this course, you should be able to: Describe information security concepts and strategies within the network Describe common TCP/IP, network application, and endpoint attacks Describe how various network security technologies work together to guard against attacks Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance Describe and implement web content security features and functions provided by Cisco Web Security Appliance Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console Introduce VPNs and describe cryptography solutions and algorithms Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco Internetwork Operating System (Cisco IOS) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall (NGFW) Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and Extensible Authentication Protocol (EAP) authentication Provide basic understanding of endpoint security and describe Advanced Malware Protection (AMP) for Endpoints architecture and basic features Examine various defenses on Cisco devices that protect the control and management plane Configure and verify Cisco IOS software Layer 2 and Layer 3 data plane controls Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions Describe basics of cloud computing and common cloud attacks and how to secure cloud environment The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco© CCNP© Security and CCIE© Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. You will get extensive hands-on experience deploying Cisco Firepower© Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch© Enterprise and Cisco Stealthwatch Cloud threat detection features. This course, including the self-paced material, helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR), which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications. Describing Information Security Concepts* Information Security Overview Assets, Vulnerabilities, and Countermeasures Managing Risk Vulnerability Assessment Understanding Common Vulnerability Scoring System (CVSS) Describing Common TCP/IP Attacks* Legacy TCP/IP Vulnerabilities IP Vulnerabilities Internet Control Message Protocol (ICMP) Vulnerabilities TCP Vulnerabilities User Datagram Protocol (UDP) Vulnerabilities Attack Surface and Attack Vectors Reconnaissance Attacks Access Attacks Man-in-the-Middle Attacks Denial of Service and Distributed Denial of Service Attacks Reflection and Amplification Attacks Spoofing Attacks Dynamic Host Configuration Protocol (DHCP) Attacks Describing Common Network Application Attacks* Password Attacks Domain Name System (DNS)-Based Attacks DNS Tunneling Web-Based Attacks HTTP 302 Cushioning Command Injections SQL Injections Cross-Site Scripting and Request Forgery Email-Based Attacks Describing Common Endpoint Attacks* Buffer Overflow Malware Reconnaissance Attack Gaining Access and Control Gaining Access via Social Engineering Gaining Access via Web-Based Attacks Exploit Kits and Rootkits Privilege Escalation Post-Exploitation Phase Angler Exploit Kit Describing Network Security Technologies Defense-in-Depth Strategy Defending Across the Attack Continuum Network Segmentation and Virtualization Overview Stateful Firewall Overview Security Intelligence Overview Threat Information Standardization Network-Based Malware Protection Overview Intrusion Prevention System (IPS) Overview Next Generation Firewall Overview Email Content Security Overview Web Content Security Overview Threat Analytic Systems Overview DNS Security Overview Authentication, Authorization, and Accounting Overview Identity and Access Management Overview Virtual Private Network Technology Overview Network Security Device Form Factors Overview Deploying Cisco ASA Firewall Cisco ASA Deployment Types Cisco ASA Interface Security Levels Cisco ASA Objects and Object Groups Network Address Translation Cisco ASA Interface Access Control Lists (ACLs) Cisco ASA Global ACLs Cisco ASA Advanced Access Policies Cisco ASA High Availability Overview Deploying Cisco Firepower Next-Generation Firewall Cisco Firepower NGFW Deployments Cisco Firepower NGFW Packet Processing and Policies Cisco Firepower NGFW Objects Cisco Firepower NGFW Network Address Translation (NAT) Cisco Firepower NGFW Prefilter Policies Cisco Firepower NGFW Access Control Policies Cisco Firepower NGFW Security Intelligence Cisco Firepower NGFW Discovery Policies Cisco Firepower NGFW IPS Policies Cisco Firepower NGFW Malware and File Policies Deploying Email Content Security Cisco Email Content Security Overview Simple Mail Transfer Protocol (SMTP) Overview Email Pipeline Overview Public and Private Listeners Host Access Table Overview Recipient Access Table Overview Mail Policies Overview Protection Against Spam and Graymail Anti-virus and Anti-malware Protection Outbreak Filters Content Filters Data Loss Prevention Email Encryption Deploying Web Content Security Cisco Web Security Appliance (WSA) Overview Deployment Options Network Users Authentication Secure HTTP (HTTPS) Traffic Decryption Access Policies and Identification Profiles Acceptable Use Controls Settings Anti-Malware Protection Deploying Cisco Umbrella* Cisco Umbrella Architecture Deploying Cisco Umbrella Cisco Umbrella Roaming Client Managing Cisco Umbrella Cisco Umbrella Investigate Overview and Concepts Explaining VPN Technologies and Cryptography VPN Definition VPN Types Secure Communication and Cryptographic Services Keys in Cryptography Public Key Infrastructure Introducing Cisco Secure Site-to-Site VPN Solutions Site-to-Site VPN Topologies IPsec VPN Overview IPsec Static Crypto Maps IPsec Static Virtual Tunnel Interface Dynamic Multipoint VPN Cisco IOS FlexVPN Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs Cisco IOS VTIs Static VTI Point-to-Point IPsec Internet Key Exchange (IKE) v2 VPN Configuration Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW Cisco ASA Point-to-Point VPN Configuration Cisco Firepower NGFW Point-to-Point VPN Configuration Introducing Cisco Secure Remote Access VPN Solutions Remote Access VPN Components Remote Access VPN Technologies Secure Sockets Layer (SSL) Overview Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW Remote Access Configuration Concepts Connection Profiles Group Policies Cisco ASA Remote Access VPN Configuration Cisco Firepower NGFW Remote Access VPN Configuration Explaining Cisco Secure Network Access Solutions Cisco Secure Network Access Cisco Secure Network Access Components AAA Role in Cisco Secure Network Access Solution Cisco Identity Services Engine Cisco TrustSec Describing 802.1X Authentication 802.1X and Extensible Authentication Protocol (EAP) EAP Methods Role of Remote Authentication Dial-in User Service (RADIUS) in 802.1X Communications RADIUS Change of Authorization Configuring 802.1X Authentication Cisco Catalyst© Switch 802.1X Configuration Cisco Wireless LAN Controller (WLC) 802.1X Configuration Cisco Identity Services Engine (ISE) 802.1X Configuration Supplicant 802.1x Configuration Cisco Central Web Authentication Describing Endpoint Security Technologies* Host-Based Personal Firewall Host-Based Anti-Virus Host-Based Intrusion Prevention System Application Whitelists and Blacklists Host-Based Malware Protection Sandboxing Overview File Integrity Checking Deploying Cisco Advanced Malware Protection (AMP) for Endpoints* Cisco AMP for Endpoints Architecture Cisco AMP for Endpoints Engines Retrospective Security with Cisco AMP Cisco AMP Device and File Trajectory Managing Cisco AMP for Endpoints Introducing Network Infrastructure Protection* Identifying Network Device Planes Control Plane Security Controls Management Plane Security Controls Network Telemetry Layer 2 Data Plane Security Controls Layer 3 Data Plane Security Controls Deploying Control Plane Security Controls* Infrastructure ACLs Control Plane Policing Control Plane Protection Routing Protocol Security Deploying Layer 2 Data Plane Security Controls* Overview of Layer 2 Data Plane Security Controls Virtual LAN (VLAN)-Based Attacks Mitigation Sp

Cisco Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR)
Delivered OnlineFlexible Dates
Price on Enquiry

Woman's wellbeing workshop weekend

5.0(22)

By The Northern College Of Clinical Hypnotherapy

Join our eLearning program with live Zoom training on December 7th and 8th, 2025, to explore how hypnotherapy supports women's health. This workshop focuses on natural fertility, menopause management, and menstrual cycle relief. Learn techniques to reduce anxiety, alleviate symptoms like hot flashes and insomnia, and promote emotional well-being. Empower yourself with holistic tools for enhanced vitality at every stage of life.

Woman's wellbeing workshop weekend
Delivered Online On Demand14 hours
£150 to £200