• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3445 Associate courses

Complete Cisco Bundle with 6 Exams

By Hudson

This course bundle is ideal for anyone looking to establish their Cisco networking career. It consists of one Cisco Certified Network Associate (CCNA) certification, one Cisco Certified DevNet Associate (CCDA) certification, and four Cisco Certified Networking Professional (CCNP) certifications. Although there are no formal prerequisites to enrol on the CCNA, CCDA, or CCNP certification courses and sit the exams, learners should have a good foundation knowledge in networking. The newly retooled CCNA covers a breadth of topics, including: Network fundamentals Network access IP connectivity IP services Security fundamentals Automation and programmability Achieving CCNA certification is the first step in preparing for a career in networking technologies. To earn your CCNA certification, you only need to pass one exam – which covers a broad range of fundamentals for IT careers, based on the latest networking technologies. The Cisco Certified DevNet Associate certification validates your skills and knowledge in understanding and using APIs, Cisco platforms and development, application development and security, and infrastructure and automation. Ideally, DevNet Associates candidates also have one or more years of experience with software development including Python programming. The CCNP is the next level from the CCNA and CCDA. As with the CCNA, there are no formal prerequisites to enrol on the CCNP certification course and sit for the exams. Learners taking a CCNP course generally have an in-depth knowledge of networking, as well as a good understanding of Cisco technologies. The typical certification path for most learners would begin with either the CCDA or CCNA, then progress onto the CCNP. Learners need to pass two exams (one core exam and one concentration exam) in order to gain one CCNP certification. This course bundle includes the core exam and three concentration exams. Once a learner has passed the core exam, they can choose to specialise in one or all three of the CCNP concentration areas listed in this course. The core exam’s focus is based around implementing and operating Cisco enterprise network core technologies.

Complete Cisco Bundle with 6 Exams
Delivered Online On Demand
£1,595

Interpersonal Skills

By OnlineCoursesLearning.com

Relational Skills Relational abilities are social abilities that permit you to connect and speak with individuals around you. They shape what our identity is and how others see us in our day by day lives. These capacities are gained from the encounters you have had all through life. While this range of abilities can come effectively to numerous individuals, a few group think that its more troublesome associating in the working environment, home and somewhere else. As we are each of the a result of our current circumstance, everybody is distinctive by they way they figured out how to associate with others. Discovering manners by which to better ourselves is and consistently has been achievable. In this course, we will talk about the significance that these abilities play in driving an effective and satisfying life. You will find that there are manners by which to prepare yourself to utilize your learned practices, to advance and improve any circumstance where you may get yourself. The outcome is a more sure form of yourself that can survey and beat issues and issues. It requires some investment, however the excellence of relational abilities is that they can generally be educated and relearned when required. Dealing with these practices every day can prompt a seriously compensating life and profession. What You Will Learn: How crucial relational abilities are in the work environment, home, and different conditions How you can improve your range of abilities through training and different techniques That you don't need to continue to utilize the very practices that you have done previously How a solid range of abilities gives you certainty and harmony in any circumstance The Benefits of Taking This Course: You can grow better abilities to use at work and at home You can improve how you associate with others You can distinguish what you need to fix with regards to your learned practices You will actually want to enter any friendly circumstance with certainty

Interpersonal Skills
Delivered Online On Demand
£50

Spring Series 2025 - Organisation & Relationship Systems Coaching Training

By CRR UK

CRRUK equips professionals with the concepts, skills and tools to build conscious, intentional relationships, and to coach relationship systems of any size.

Spring Series 2025 - Organisation & Relationship Systems Coaching Training
Delivered Online + more
£4,920

Handstitch a mini quilt at Big Penny Social

By cheekyhandmades

Join me at the Big Penny Social for a special evening of hand stitching. Make a mini quilt with me, using my fabric, threads, tools and techniques. Everyone will come away with a cool hand made piece of quilting that may just be the start of your quilting journey! Modern quilting is absolutely nothing like the beige and fussy textile we often associate with the word. Using monochrome or brightly coloured fabric, interesting patterns, oversized shapes, negative space, modern quilting is fun and funky and joyous. The class is two hours long and everything you need is included.

Handstitch a mini quilt at Big Penny Social
Delivered In-PersonFlexible Dates
£25

Affiliate Marketing

By OnlineCoursesLearning.com

Affiliate Marketing Certification Member advertising is getting progressively famous as an intriguing method to acquire income. Offshoot showcasing alludes to exchanging different items on your site, blog or video, and so on and getting paid a commission for it. There are numerous approaches to procure income through associate showcasing, and, despite the fact that you can acquire a great many pounds, you should be aware of a few elements. The seminar on offshoot advertising clarifies how you can advance without any preparation in the field of associate showcasing and ultimately become effective. What's Covered in the Course? Some significant points canvassed in the seminar on partner advertising include: Instructions to pick the right specialty for offshoot showcasing, and the variables that you ought to consider; The most effective method to advance your subsidiary items on your site or off your site, utilizing aggregator locales; The most effective method to compose articles and item audits, and so on that help increment positioning; The various sorts of offshoot showcasing offers, including pay per call/click, membership, ordinary buy and repeating commissions; Instructions to utilize the AIDA guideline, to compose fascinating 'How to' articles and surveys, etc'; How aggregator locales use treats, to follow buyer conduct; The most ideal approaches to move toward organizations straightforwardly, in case you're keen on their offshoot items; The advantages and burdens of Amazon as an offshoot accomplice; An outline and examination of other partner sites, including CjDotCom, Sharecare, Clickbank, etc, and how to utilize their highlights for your potential benefit; Instructions to amplify traffic and deals, by utilizing uncommon techniques. This video course offers the accompanying advantages Advantages of examining the seminar on offshoot showcasing include: You will see how to pick a partner specialty that turns out best for you; You will actually want to explore different avenues regarding diverse advertising procedures, while, simultaneously, arranging a decent subsidiary offer; You acquire a decent comprehension of the relative multitude of components that effect offshoot promoting. The tips, stunts and techniques clarified in this course will assist you with keeping away from traps and stay on target.

Affiliate Marketing
Delivered Online On Demand
£50

ONE SPACE LEFT! 6th December Thérèse Coen #Agent121. Looking for: MG, YA, ADULT FICTION, NON-FICTION

5.0(1)

By I Am In Print

LOOKING FOR: MG, YA, ADULT FICTION, NON-FICTION Thérèse is a Literary and Rights Agent at Susanna Lea Associates, @SLALondon. Born and raised in Belgium, on a diet of frites and Tintin she moved to England in her late teens with her family, then stayed in London to do a History degree and Masters at University College London. Having been brought up bilingual, translation rights seemed like her logical next step. She started off in the rights department at Bloomsbury Publishing, before hopping across the square to Ed Victor’s agency, and found experiencing both the publishing and agency side of publishing incredibly valuable. She has been building her own list of authors alongside selling translation rights since early 2016, which she has hugely enjoyed; working with authors right from the book’s conception, while also experiencing the thrill of selling her own authors’ works in the UK and US as well as in translation to publishers across the globe. In terms of adult fiction, Thérèse has a huge soft spot for historical fiction, having read Early Modern History at university, but is also very much on the hunt for crime/thrillers, bookclub, high-concept love stories and literary fiction. She loves strong female characters, in particular when they go through an evolution or journey as the story progresses and gradually find that inner strength. On the children’s fiction front, Thérèse is all about finding a fresh, new voice. She loves all things funny, fantasy and adventure – across lands, time and space, and involving strong friendships and strong lead characters - and wants to be transported straight away when reading a manuscript. She likes very vivid, well-crafted and imaginative worlds, such as stories set in a toy factory or in an underwater world. Thérèse would love some more adventures set in space, mysteries, quirky characters, explorers and imaginary friends. And last, but not least, in non-fiction, history features heavily in her interests, but Thérèse would also love to see books about big ideas, culture, sociology, science, anthropology and memoir. Anything that helps expand the mind and questions or informs the way in which we view ourselves, the world and how we fit into it, all written in an engaging and accessible manner. Thérèse would like you to submit a covering letter, 1 page synopsis and the first three chapters or 5,000 words of your manuscript in a single word document. (In addition to the paid sessions, Thérèse is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Tuesday 26 November 2024

ONE SPACE LEFT! 6th December Thérèse Coen #Agent121. Looking for: MG, YA, ADULT FICTION, NON-FICTION
Delivered Online + more
£72

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered OnlineFlexible Dates
£2,380

Certified Data Analyst Pathway with Career Guarantee

By NuYew Ltd

Accelerate Your Data Analyst Career: Fast-Track Program with Exams, TOTUM Card & 5-Year Support. Enrol Today! Study methodOnline Duration9 months · Self-paced Access to content5 years CertificationsCompTIA IT Fundamentals CertificationCertified Data Analysis ProfessionalMicrosoft Azure Data FundamentalsPearson IT Specialist PythonPearson IT Specialist AI (Artificial Intelligence)Pearson IT Specialist DatabasesMicrosoft Office Specialist Excel CertificationMicrosoft Power BI Data Analyst Associate (PL-300)Certificates Official CompTIA Certification - Free Additional info Exam(s) / assessment(s) is included in price Tutor is available to students TOTUM card included in price Job guarantee programme is included in this course Overview Learn the most in-demand digital skills in the world today with the Nuyew Tech Academy A Data and Business Intelligence Analyst gathers, cleans, and studies data sets to help solve problems. Gain the job-ready skills for an entry-level Data and Business Intelligence Analyst role and position yourself competitively in the thriving job market for data and business analysts, which will see a 20% growth until 2028 and beyond. Certifications CompTIA IT Fundamentals Certification Certified Data Analysis Professional Awarded by CompTIA Microsoft Azure Data Fundamentals Microsoft Office Specialist Excel Certification Microsoft Power BI Data Analyst Associate (PL-300) Awarded by Microsoft Pearson IT Specialist Python Pearson IT Specialist AI (Artificial Intelligence) Pearson IT Specialist Databases Awarded by Pearson Description With a national shortage of Data and Business Intelligence Analysts, starting salaries of up to £25,000 per annum (average UK Salary £60,000) and amazing future employed and self-employed career prospects, take the next step today with our Fast Track Data and Business Intelligence Analyst Programme. What you can expect from our Fast Track Programme: World Class Education Energetic and unlimited 24/7 Student Support Real, tangible Career Outcomes 5 Years Career Support What our programme includes: Industry Recognised Qualifications CompTIA ITF+ (IT Fundamentals) CompTIA A+ CompTIA Network+ CompTIA Security+ CompTIA Data+ Exams Includes all Exams and Unlimited Re-Sits 5 Years Career Support Guarantee As part of our unique Support Guarantee, our Career Support Team will assist you with: CV writing Expert careers advice Interview preparation Identifying and applying for the best opportunities in your area As a student in the Nuyew Tech Academy you will also be given exclusive access to our Career Skills Academy which includes advanced courses on Employability, CV Preparation, Interview Skills and Technique and everything else you need to get ready for your new Career. Who is this course for? This course is open to anyone interested in pursuing a Career in Data Analytics and Business Intelligence. Our Foundation Level provides the flexibility for us to accommodate students with any level of previous knowledge and experience. Requirements This course is open to all and has no pre-requisites All you need is a passion for technology and a strong desire to succeed. Career path Our programme is designed to enable you to achieve an Entry Level/Helpdesk role during training (£18k-£24K) ensuring that you also have the vital work experience required to enter the Tech Industry at a higher level (Av Salary £60K).

Certified Data Analyst Pathway with Career Guarantee
Delivered Online On Demand1 hour
£3,196

Cisco Administering Cisco Contact Center Enterprise (CCEA)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Account and project managers Contact Center Enterprise (CCE) administrators Deployment engineers Technical sales Overview After taking this course, you should be able to: Navigate CCE configuration and scripting tools Configure a dialed number, call type, and media routing domain Build a basic Cisco Intelligent Contact Management (ICM) script Configure agents and skill groups Configure basic Interactive Voice Response (IVR) functionality Implement attributes and precision queues Configure Ring-No-Answer (RONA) using CCE configuration tools Configure and populate an agent team and primary supervisor Improve agent efficiency through finesse enhancements Build and test a basic Voice XML (VXML) application Implement roles, departments, and business hours Run Cisco Unified Intelligence Center (CUIC) reports using the Reporting tool The Administering Cisco Contact Center Enterprise (CCEA) v1.0 course teaches you the contextual information around call flow between components in the Cisco© Unified Contact Center Enterprise (UCCE) solution including intelligent contact routing, call treatment, network-to-desktop Computer Telephony Integration (CTI), and multichannel contact management over an IP infrastructure. You receive hands-on practice using administrative tools to perform routine adds, moves, and changes in an inbound contact center environment. Cisco Unified Contact Center Review Contact Center Basics Components and Architecture Deploying Basic Call Settings Associate Basic Call Settings Explore Media Routing Domains Building a Basic Cisco Unified Contact Center Enterprise Script Introduce Script Editor Use Script Editor Nodes Configuring Basic Agent Functionality Introduce Agent Functionality Configure Agent Desk Settings Configuring Basic Call Treatment and Queuing Explore Media Server and Files Introduce Microapps Implementing Precision Routing Introduce Precision Routing Basics Examine the Migration Path Configuring RONA Support Introduce RONA Functionality Identify RONA Timeout Considerations Configuring Agent Teams and Supervisors Configuring Teams and Supervisors Explore Agent Roles Administering the Cisco Finesse Desktop Administering Cisco Finesse Desktop Introduce Cisco Finesse Administration Implementing Voice XML Applications Introduce VXML Build a Basic Call Studio Project Configuring Roles, Departments, and Business Hours Examine Post-Call Survey Functionality Configure Post-Call Survey Running Unified CC Enterprise Reports with Unified Intelligence Center (IC) Configure Unified CC Enterprise Administrators Configure Departments

Cisco Administering Cisco Contact Center Enterprise (CCEA)
Delivered OnlineFlexible Dates
Price on Enquiry

Change Management Practitioner

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for CxO?s IT Managers/ Directors Senior Project Officers Project & Program Coordinator/Managers Operations Managers Quality Managers Business Analysts Engineering Managers IT Infrastructure Managers Internal Consultants Professional Consultants Overview The purpose of the Practitioner certification is to confirm whether the candidate has achieved sufficient know-how to apply and tailor Change Management guidance in a given organizational change situation. A successful Practitioner candidate should, with suitable direction, be able to start applying the Change Management approaches and techniques to a real change initiative - but may not be sufficiently skilled to do this appropriately for all situations. Their individual Change Management expertise, complexity of the change initiative and the support provided for the use of Change Management approaches in their work environment will all be factors that impact what the Practitioner can achieve. Successful candidates will have fulfilled the knowledge requirements for Change Management Institute accreditation. Dealing with change and more importantly, the impact of change is a high priority for all organizations. The Change Management Certification has been developed by APMG in partnership with the Change Management Institute (CMI), an independent, global professional association of change managers. Together they have developed a professional ?body of knowledge? for the discipline of change management. This body of knowledge now provides an independent benchmark for the professional knowledge expected of an effective change manager. APMG?s refreshed Change Management certification is fully aligned with the change management body of knowledge. Prerequisites The change management foundation certificate is required to sit the practitioner level exam. 1 - Change Impact Levers for change Levels of adoptions and critical mass Reinforcing systems 2 - Exam Preparation Change Management Practitioner exam preparation Change Management Practitioner exam

Change Management Practitioner
Delivered Online
£1,500