• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

652 Awareness courses in Cardiff delivered Live Online

Manual Handling, Rigging and Lifting & Safety in the Workplace

By NextGen Learning

Course Overview This comprehensive course offers essential knowledge for anyone involved in manual handling, lifting operations, and workplace safety. Combining critical modules such as LOLER training, working at height, and confined space awareness, this course equips learners with the expertise to identify potential hazards, assess risk, and follow safety protocols effectively. Whether you're looking to enhance your understanding of lifting procedures or ensure compliance with UK health and safety standards, this course provides structured learning designed to support a safer working environment. Upon completion, learners will be able to demonstrate awareness of regulations, apply risk assessment principles, and contribute to maintaining safety standards across various industries. This is an ideal course for those responsible for managing workplace operations, lifting tasks, and site-based safety procedures. Course Description The "Manual Handling, Rigging and Lifting & Safety in the Workplace" course covers a broad range of safety-related topics tailored to warehousing, construction, manufacturing, and logistics settings. Learners will explore core areas such as load lifting techniques, height safety, forklift operations, and compliance with the Lifting Operations and Lifting Equipment Regulations (LOLER). The course also addresses the risks associated with working in confined spaces and warehouse environments, promoting a thorough understanding of safe working procedures and legal obligations. Through a structured, self-paced online platform, learners will develop a strong foundation in identifying risks, following safety protocols, and adhering to health and safety legislation. Whether enhancing existing skills or exploring a new career path, this course provides a well-rounded approach to workplace safety and equipment handling in accordance with UK regulatory standards. Course Modules: Module 01: Manual Handling Training Course Module 02: Work At Height Training Module 03: Warehouse Operative Module 04: Forklift Training - Online Course Module 05: Rigging and Lifting Module 06: Working in Confined Spaces Module 07: LOLER Training Module 08: Level 2 Health and Safety in the Workplace (See full curriculum) Who is this course for? Individuals seeking to improve their knowledge of workplace safety and equipment regulations. Professionals aiming to develop or formalise their understanding of lifting operations and manual handling. Beginners with an interest in occupational safety, logistics, or industrial environments. Employers and supervisors looking to ensure their team meets regulatory safety standards. Career Path Warehouse Operative Health and Safety Officer Logistics Coordinator Site Supervisor Forklift or Lifting Equipment Operator Facilities or Operations Manager Construction or Manufacturing Support Staff

Manual Handling, Rigging and Lifting & Safety in the Workplace
Delivered OnlineFlexible Dates
£9.99

Computer Maintenance, PAT & Cyber Security

By NextGen Learning

Course Overview The Computer Maintenance, PAT & Cyber Security course offers a comprehensive introduction to the essential components of modern IT systems, combining core knowledge in hardware setup, system troubleshooting, and security protocols. Designed to build foundational understanding as well as introduce advanced cybersecurity concepts, this course equips learners with the confidence to navigate today’s digital infrastructure. From building a computer to understanding network vulnerabilities, learners will explore a variety of modules that address both traditional and emerging technologies, including IoT and encryption. By the end of the course, students will have developed the skills to identify risks, support device performance, and understand secure systems architecture—essential for any role in technology-focused sectors. Course Description This course blends key topics across computer hardware maintenance, PAT (Portable Appliance Testing), and cyber security to prepare learners for a well-rounded understanding of IT system management. The curriculum begins with assembling and configuring computers, progressing into network security and advanced Windows troubleshooting. Learners are introduced to essential software tools and coding applications like C++ with OpenCV, and gain insights into the Internet of Things and encryption principles. Additionally, the course includes training in cyber security awareness, addressing the latest threats and preventative frameworks. With clear instructional guidance and structured content delivery, the course is suitable for learners aiming to understand technical environments and the protocols behind secure computing. It is ideal for those seeking career progression or looking to explore new opportunities in IT security, maintenance, or systems analysis. Course Modules: Module 01: Building Your Own Computer Module 02: Computer Networks Security from Scratch to Advanced Module 03: Computer Vision By Using C++ and OpenCV with GPU support Module 04: Advance Windows 10 Troubleshooting for IT HelpDesk Module 05: Portable Appliance Testing (PAT) Module 06: Internet of Things Module 07: Cyber Security Awareness Training Module 08: Encryption (See full curriculum) Who is this course for? Individuals seeking to understand IT maintenance and cybersecurity principles. Professionals aiming to broaden their knowledge of system configuration and data protection. Beginners with an interest in computer technology and digital safety. Employers looking to upskill their IT or facilities staff in security and device compliance. Career Path IT Support Specialist Systems Administrator Network Security Analyst Cyber Security Consultant Electrical Safety Compliance Officer Technical Services Coordinator

Computer Maintenance, PAT & Cyber Security
Delivered OnlineFlexible Dates
£9.99

ADHD, SEN, Autism & Child Care

By NextGen Learning

Course Overview The “ADHD, SEN, Autism & Child Care” course bundle provides a comprehensive foundation in child psychology, special educational needs, and behavioural development, equipping learners with the theoretical knowledge needed to support children with diverse learning profiles. Through in-depth exploration of ADHD, autism, SEN coordination, and cognitive development, this course delivers a solid understanding of how to promote inclusive, supportive learning environments. Learners will gain insight into developmental psychology, behavioural management strategies, and therapeutic practices such as play therapy and CBT. Designed for those aspiring to work in educational or care-based settings, this course helps develop confidence in navigating neurodiversity and child-centred support frameworks. On successful completion, learners will be better positioned to contribute meaningfully in child care, education support, or mental health-focused roles. Course Description This course bundle covers a wide range of topics essential for understanding and supporting children with additional needs. Learners will begin with ADHD awareness and expand into SEN coordination, gaining a clear picture of how to support children with learning difficulties in educational environments. Autism training and SEN teaching assistant modules explore common challenges and support methods, while the Child Psychology and Child Development modules deepen the understanding of emotional, cognitive, and social growth. The course also includes specialised training in CBT and play therapy, providing psychological frameworks for child-focused support. Each module is designed to enhance your theoretical understanding, helping you recognise behavioural patterns, develop care strategies, and work within inclusive educational or care frameworks. This course is suitable for aspiring professionals and those already working in education, childcare, or youth support roles who want to expand their expertise in SEN and child psychology. Course Modules: Module 01: ADHD Awareness Module 02: SENCO - Special Educational Needs Coordination Course Module 03: Autism Training Module 04: SEN Teaching Assistant Module 05: Child Psychology Diploma Module 06: Child Development and Care Module 07: Cognitive Behavioural Therapy (CBT) Practitioner Certificate Course Module 08: Play Therapy (See full curriculum) Who is this course for? Individuals seeking to understand and support children with additional needs. Professionals aiming to advance their skills in educational or childcare settings. Beginners with an interest in child psychology, SEN, or developmental support. Teaching assistants, youth workers, and child care practitioners seeking career development. Career Path SEN Teaching Assistant Child Care Worker Youth Support Worker Behavioural Support Specialist Child Psychology Assistant Autism or ADHD Support Advisor Early Years Practitioner Learning Support Mentor

ADHD, SEN, Autism & Child Care
Delivered OnlineFlexible Dates
£9.99

The GDPR Primer for Data Protection Officers

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for A prior understanding of EU Data Protection legislation is recommended. Candidates are typically management professionals and decision-makers who already have responsibility for data protection compliance within their organisation.Co-Requisite Subjects Candidates should have a good understanding of their own organisation?s data management activities through the life cycle from initial acquisition, through the various areas of processing and usage, to eventual removal or destruction. Overview To equip the learner with a foundational understanding of the principles of the General Data Protection Regulation (GDPR) and to provide constructive suggestions on implementing compliant processes. The social, historical and legal background leading to the General Data Protection Regulation (GDPR) The scope and global context of the GDPR The key concepts within the GDPR The definition of all key words and phrases relating to this Data Protection regulation Principle One: The criteria governing fair, open and transparent processing of personal data Principle Two: Purpose Limitation, the challenge of limiting the processing within the context of specified and lawful purposes Principle Three: Minimisation of processing, and ensuring that only that data is processed which is necessary to achieve the purpose. Principle Two: Purpose Limitation, the challenge of limiting the processing within the context of specified and lawful purposes Principle Three: Minimisation of processing, and ensuring that only that data is processed which is necessary to achieve the purpose. Principle Four: Ensuring that any personal data held by the organisation is kept accurate and current, and that any processing of such data is appropriate Principle Five: Management and storage of personal data in a manner that meets regulatory obligations, while minimising the time that the individual remains identifiable Principle Six: The criteria governing safe, secure and confidential processing of personal data in order to protect its integrity Principle Seven: The key roles, responsibilities and accountabilities of those involved in Data Management within an organisation Establishment within a single Member State Joint Controllers Privacy by Design and by Default Nominated Representatives Third-party Contracts and shared liability Logging of data management processes Data Breach Notification obligations Privacy Impact Assessments Overseas transfer of personal data L2.8 The Data Subject Rights, and their implications for the Data Controller and the Data Processor L2.8.1 The ?right to be forgotten? L2.8.2 The right to restriction of processing L2.8.3 The right to object to certain processing L2.8.4 The right to have inaccurate data amended or erased L2.8.5 The right to data portability L2.8.6 The right of access to one?s personal data L2.8.7 Rights in relation to automated decision-making and profiling The role of the Data Protection Officer (DPO) The role of the Data Protection Officer (DPO) Criteria for designating a DPO Tasks of the DPO Position of the DPO within the organisation The role of the Supervisory Authority within the Member State The Lead Supervisory Authority and independence Investigative, corrective and advisory powers Independence of the Supervisory Authority Collaboration with other Supervisory Authorities Codes of Conduct and Certification The role, powers and tasks of the European Data Protection Board (EDPB) The remedies, liabilities and penalties available under the GDPR Right to raise a complaint Right to representation Right to effective judicial remedy Right to compensation and liability Administrative fines of up to ?10m or 2% of GAT Administrative fines of up to ?20m or 4% of GAT Provisions for specific processing situations Freedom of Expression Processing of official documents Processing of National Identification Numbers Processing regarding employment Processing for archiving purposes Processing under obligations of official secrecy Processing of data by religious organisations Preparing for implementation of the GDPR Review of data management policies and procedures Review of data assets and security structures Training and Awareness-raising Data management governance structures Embedding Privacy By Design and Default Codes of Conduct and Certification against standards Breach detection and notification procedures Review of third-party agreements, contracts

The GDPR Primer for Data Protection Officers
Delivered OnlineFlexible Dates
Price on Enquiry

DevSecOps Practitioner (DevOps Institute)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The target audience for the DevSecOps Practitioner course are professionals including: Anyone focused on implementing or improving DevSecOps practices in their organization Anyone interested in modern IT leadership and organizational change approaches Business Managers Business Stakeholders Change Agents Consultants DevOps Practitioners IT Directors IT Managers IT Team Leaders Product Owners Scrum Masters Software Engineers Site Reliability Engineers System Integrators Tool Providers Overview After completing this course, students will be able to: Comprehend the underlying principles of DevSecOps Distinguish between the technical elements used across DevSecOps practices Demonstrate how practical maturity concepts can be extended across multiple areas. Implement metric-based assessments tied to your organization. Recognize modern architectural concepts including microservice to monolith transitions. Recognize the various languages and tools used to communicate architectural concepts. Contrast the options used to build a DevSecOps infrastructure through Platform as a Service, Server-less construction, and event-driven mediums Prepare hiring practices to recognize and understand the individual knowledge, skills, and abilities required for mature Dev Identify the various technical requirements tied to the DevSecOps pipelines and how those impact people and process choices. Review various approaches to securing data repositories and pipelines. Analyze how monitoring and observability practices contribute to valuable outcomes. Comprehend how to implement monitoring at key points to contribute to actionable analysis. Evaluate how different experimental structures contribute to the 3rd Way. Identify future trends that may affect DevSecOps The DevSecOps Practitioner course is intended as a follow-on to the DevSecOps Foundation course. The course builds on previous understanding to dive into the technical implementation. The course aims to equip participants with the practices, methods, and tools to engage people across the organization involved in reliability through the use of real-life scenarios and case stories. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as implementing DevSecOps practices to their organizational structure, building better pipelines in distributed systems, and having a common technological language. This course positions learners to successfully complete the DevSecOps Practitioner certification exam. DevSecOps Advanced Basics Why Advance Practices? General Awareness People-Finding Them Core Process Technology Overview Understanding Applied Metrics Metric Terms Accelerating People-Reporting and Recording Integrating Process Technology Automation Architecting and Planning for DevSecOps Architecture Basics Finding an Architect Reporting and Recording Environments Process Accelerating Decisions Creating a DevSecOps Infrastructure What is Infrastructure? Equipping the Team Design Challenges Monitoring Infrastructure Establishing a Pipeline Pipelines and Workflows Engineers and Capabilities Continuous Engagement Automate and Identify Observing DevSecOps Outcomes Observability vs. Monitoring Who gets which Report? Setting Observation Points Implementing Observability Practical 3rd Way Applications Revisiting 3rd Way Building Experiments Getting the Most from the Experiment The Future of DevOps Looking Towards the Future Staying Trained Innovation What, and from Who? Post-Class Assignments/Exercises Extended advanced reading associated with Case Stories from the course Additional course details: Nexus Humans DevSecOps Practitioner (DevOps Institute) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DevSecOps Practitioner (DevOps Institute) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DevSecOps Practitioner (DevOps Institute)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere: Optimize and Scale [v7.0]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators Overview By the end of the course, you should be able to meet the following objectives: Configure and manage vSphere networking and storage for a large and sophisticated enterprise Use VMware vSphere Client™ to manage certificates Use Identity Federation to configure VMware vCenter Server to use external identity sources Use VMware vSphere Trust Authority™ to secure the infrastructure for encrypted VMs Use host profiles to manage VMware ESXi™ host compliance Create and manage a content library for deploying virtual machines Manage VM resource usage with resource pools Monitor and analyze key performance indicators for compute, storage, and networking resources for ESXi hosts Optimize the performance in the vSphere environment, including vCenter Server This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere© 7 features that build a foundation for a truly scalable infrastructure, and you discuss when and where these features have the greatest effect. Attend this course to deepen your understanding of vSphere and learn how its advanced features and controls can benefit your organization. As an exclusive benefit, those who participate in this course will receive additional premium recorded lecture material on vSphere security. Course Introduction Introductions and course logistics Course objectives Network Scalability Configure and manage vSphere distributed switches Describe how VMware vSphere© Network I/O Control enhances performance Explain distributed switch features such as port mirroring and NetFlow Storage Scalability Explain why VMware vSphere© VMFS is a high-performance, scalable file system Explain VMware vSphere© Storage APIs - Array Integration, VMware vSphere© API for Storage Awareness?, and vSphere APIs for I/O filtering Configure and assign virtual machine storage policies Create VMware vSAN? storage policies Recognize components of the VMware vSphere© Virtual Volumes? architecture Configure VMware vSphere© Storage DRS? and VMware vSphere© Storage I/O Control Host and Management Scalability Use the vSphere Client to manage vSphere certificates Describe identity federation and recognize its use cases Configure identity federation to allow vCenter Server to use external identity provider Describe the benefits and use cases of vSphere Trust Authority Configure vSphere Trust Authority Use host profiles to manage ESXi configuration compliance Create a local content library and subscribe to a published content library Deploy VMs from a content library Create and manage resource pools in a cluster Describe how scalable shares work CPU Optimization Explain the CPU scheduler operation and other features that affect CPU performance Explain NUMA and vNUMA support Use esxtop to monitor key CPU performance metrics Memory Optimization Explain ballooning, memory compression, transparent page sharing, and host-swapping techniques for memory reclamation when memory is overcommitted Use esxtop to monitor key memory performance metrics Storage Optimization Describe storage queue types and other factors that affect storage performance Discuss vSphere support for NVMe and iSER technologies Use esxtop to monitor key storage performance metrics Network Optimization Explain performance features of network adapters Explain the performance features of vSphere networking Use esxtop to monitor key network performance metrics vCenter Server Performance Optimization Describe the factors that influence vCenter Server performance Use VMware vCenter© Server Appliance? tools to monitor resource use Supplemental Content Appendix A: vSphere Auto Deploy Explain the purpose of VMware vSphere© ESXi ? Image Builder CLI Explain the purpose of VMware vSphere© Auto Deploy? Describe how an autodeployed ESXi host boots Configure a vSphere Auto Deploy environment Appendix B: vSphere Security Configure ESXi Host Access and Authentication Recognize strategies for securing vSphere components, such as vCenter Server, ESXi hosts, and virtual machines Describe vSphere support for security standards and protocols Describe virtual machine security features Describe the components of a VM encryption architecture Create, manage, and migrate encrypted VMs Encrypt core dumps List VM encryption events and alarms

VMware vSphere: Optimize and Scale [v7.0]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere 6.5 Optimize and Upgrade

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators. Overview Configure and manage VMware ESXi? networking and storage for a large and sophisticated enterprise Use VMware vSphere© Client?, VMware vSphere© Web Client, and VMware vSphere© ESXi? Shell to manage vSphere Use VMware vSphere© Auto Deploy? and host profiles to provision ESXi hosts Optimize the performance of all vSphere components Use VMware vRealize© Log Insight? to monitor system logs Deploy VMware vCenter© Server Appliance? to be highly available and optimized for performance Migrate a Windows vCenter Server system to vCenter Server Appliance 6.5 Harden the vSphere environment against security threats Encrypt virtual machines for additional security This advanced course provides students with advanced knowledge of configuring and operating a highly available and scalable virtual infrastructure. Course Introduction Introductions and course logistics Course objectives Identify additional resources for after this course Identify other VMware Education offerings Describe the user interfaces available in vSphere 6.5 Network Scalability Configure and manage vSphere distributed switches Explain distributed switch features such as port mirroring, LACP, QoS tagging, and NetFlow Storage Scalability Explain VMware vSphere© Storage APIs - Array Integration and VMware vSphere© API for Storage Awareness? Configure and assign virtual machine storage policies Configure VMware vSphere© Storage DRS? and VMware vSphere© Storage I/O Control Create and use virtual volumes in vSphere Host and Management Scalability Explain the uses of VMware vCenter© Converter? Define and use content libraries Describe and use host profiles Describe and use VMware vSphere© ESXi? Image Builder CLI and vSphere Auto Deploy CPU Optimization Explain the CPU scheduler operation, NUMA support, and other features that affect CPU performance Use esxtop to monitor key CPU performance metrics Memory Optimization Explain ballooning, memory compression, and host-swapping techniques for memory reclamation when memory is overcommitted Use esxtop to monitor key memory performance metrics Storage Optimization Describe storage queue types and other factors that affect storage performance Use esxtop to monitor key storage performance metrics 8 Network Optimization Network Optimization Explain the performance features of network adapters Explain the performance features of vSphere networking Use esxtop to monitor key network performance metrics Analyzing vSphere Explain how Proactive DRS enhances virtual machine availability Use vRealize Log Insight to identify and troubleshoot issues vCenter Server Availability and Performance Describe the high availability options for vCenter Server and VMware Platform Services Controller? Describe and use VMware vCenter Server© High Availability Identify the factors that influence vCenter Server performance Migrate a Windows vCenter Server 5.5 system to vCenter Server Appliance 6.5 vSphere Security Configure ESXi host access and authorization Secure ESXi, vCenter Server, and virtual machines Use VMware Certificate Authority to configure vSphere certificate management Configure vSphere to encrypt virtual machines, core dumps Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere 6.5 Optimize and Upgrade training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere 6.5 Optimize and Upgrade course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vSphere 6.5 Optimize and Upgrade
Delivered OnlineFlexible Dates
Price on Enquiry

CertNexus Certified Ethical Emerging Technologist (CEET) v1.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for technology leaders, solution developers, project managers, organizational decision makers, and other individuals seeking to demonstrate a vendor-neutral, cross-industry understanding of ethics in emerging data-driven technologies, such as AI, robotics, IoT, and data science. This course is also designed for professionals who want to pursue the CertNexus Certification Exam CET-110: Certified Ethical Emerging Technologies. Overview In this course, you will incorporate ethics into data-driven technologies such as AI, IoT, and data science. You will: Describe general concepts, theories, and challenges related to ethics and emerging technologies. Identify ethical risks. Practice ethical reasoning. Identify and mitigate safety and security risks. Identify and mitigate privacy risks. Identify and mitigate fairness and bias risks. Identify and mitigate transparency and explainability risks. Identify and mitigate accountability risks. Build an ethical organization. Develop ethical systems in technology-focused organizations. Mutually reinforcing innovations in computing and engineering are catapulting advances in technological production. From blockchain and artificial intelligence (AI) to gene editing and the Internet of Things (IoT), these advances come with tremendous opportunities for improvement in productivity, efficiency, and human well-being. But as scandals increasingly demonstrate, these advances also introduce new and serious risks of conflict and harm.Technology professionals now face growing demands to identify and mitigate ethical risks to human rights and the environment, as well as to navigate ethical tradeoffs between qualities such as privacy and accuracy, fairness and utility, and safety and accountability. This course provides the tools to identify and manage common ethical risks in the development of emerging data-driven technologies. It distills ethical theory, public regulations, and industry best practices into concrete skills and guidelines needed for the responsible development of digital products and services. By following the course's practical, problems-based approach, learners will become adept at applying theories, principles, frameworks, and techniques in their own roles and organizations. Introduction to Ethics of Emerging Technologies Topic A: What?s at Stake Topic B: Ethics and Why It Matters Topic C: Ethical Decision-Making in Practice Topic D: Causes of Ethical Failures Identifying Ethical Risks Topic A: Ethical Reasons Topic B: Stumbling Blocks for Ethical Reasoning Topic C: Identify Ethical Risks in Product Development Topic D: Tools for Identifying Ethical Risks Topic E: Use Regulations, Standards, and Human Rights to Identify Ethical Risks Ethical Reasoning in Practice Topic A: Ethical Theories Topic B: Use Ethical Decision-Making Frameworks Topic C: Select Options for Action Topic D: Avoid Problems in Ethical Decision-Making Identifying and Mitigating Security Risks Topic A: What Is Security? Topic B: Identify Security Risks Topic C: Security Tradeoffs Topic D: Mitigate Security Risks Identifying and Mitigating Privacy Risks Topic A: What Is Privacy? Topic B: Identify Privacy Risks Topic C: Privacy Tradeoffs Topic D: Mitigate Privacy Risks Identifying and Mitigating Fairness and Bias Risks Topic A: What Are Fairness and Bias? Topic B: Identify Bias Risks Topic C: Fairness Tradeoffs Topic D: Mitigate Bias Risks Identifying and Mitigating Transparency and Explainability Risks Topic A: What Are Transparency and Explainability? Topic B: Identify Transparency and Explainability Risks Topic C: Transparency and Explainability Tradeoffs Topic D: Mitigate Transparency and Explainability Risks Identifying and Mitigating Accountability Risks Topic A: What Is Accountability? Topic B: Identify Accountability Risks Topic C: Accountability Tradeoffs Topic D: Mitigate Accountability Risks Building an Ethical Organization Topic A: What Are Ethical Organizations? Topic B: Organizational Purpose Topic C: Ethics Awareness Topic D: Develop Professional Ethics within Organizations Developing Ethical Systems in Technology-Focused Organizations Topic A: Policy and Compliance Topic B: Metrics and Monitoring Topic C: Communication and Stakeholder Engagement Topic D: Ethical Leadership

CertNexus Certified Ethical Emerging Technologist (CEET) v1.0
Delivered OnlineFlexible Dates
Price on Enquiry

Finance for project managers and engineers (In-House)

By The In House Training Company

What do engineers and project managers need to know of finance? 'Nothing - leave it to the accountants!' No, no, no! Engineers must be conversant with the terminology and statements that accountants use. Technical expertise in projects, service delivery, production or other areas can only really be harnessed if the managers understand the accounting and reporting that drives businesses. This course gives the necessary understanding to project, production and technical managers. It develops their skills in understanding financial and management accounting. Accountants may not always like it but a major part of their work is to be the 'servants of business' and to gather, compile and present your figures. So you must understand the figures - they belong to you, your processes or projects. There are many reasons for maintaining accurate accounts. This course focuses on the strategic issues (those over-used words) - what figures reveal about the drivers of business and what they reveal about the day-to-day issues that accountants bother you with. The course will enhance your understanding of finance and of the accounting issues which affect your projects, production and technical areas of business. This course will help you: Understand the business world in figures - make sense of what the accountants are telling you Appreciate what drives business - and how this affects your role in your part of the business Relate your activities to the success of the business - through figures Gain the skills to advance in management - financial awareness is a 'must have' if you are to progress in your career 1 What do accountants do? The finance function, types of accountant, financial v management accounting and the treasury function Understanding the role of the finance function and how the information you provide may be used 2 The basic financial statements Balance sheets and income statements (P&L accounts) What they are, what they contain and above all what they can reveal - how to read them The accounting process - from transactions to financial statements What underpins the statements - accounting systems and internal controls 3 Why be in business - from a financial perspective The driving forces behind financial information Performance measures - profitability, asset utilisation, sales and throughput, managing capital expenditure 4 Accounting rules - accounting standards Accounting concepts and the accounting rules: accruals, 'going concern' - substance over form and other 'desirable qualities' Accruals - why the timing of a transaction is so important to the finance function Depreciation and amortisation - the concepts and practice Accounting standards - the role of International Financial Reporting Standards 5 Cash The importance of cash flow - working capital management Cash flow statements - monitoring overall cash flows Raising cash - levels of borrowing, gearing Spending cash - an outline of capital expenditure appraisal 6 Budgeting Why budget? - good and bad practice Determining why budgets play a key role and should not be simply an annual ritual Justifying your budgets - the link between the strategic plan and day-to-day budgeting - alignment of company culture Budgets as motivators - the importance of the right culture Techniques to improve budgeting - whether day-to-day or capital budgeting 7 Costing The type and detail of costing very much depends on your business - eg, manufacturing piston rings is quite different from the construction of a power plant Issues with overhead allocation Accounting for R&D 8 Reading financial statements Annual financial statements - why they are produced, what's in them and what you should look for Learning what a set of accounts reveals about a company's current situation, profitability and future prospects 9 Performance measurement - analytical reviews and ratio analysis ROI/ROCE Profitability, margins and cost control Sales - asset turnover Efficiency (asset / stock turnover, debtor / creditor days) 'City' measures Investment (interest / dividend cover, earnings per share, dividend yield)

Finance for project managers and engineers (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Facebook Ads Masterclass

By NextGen Learning

Facebook Ads Masterclass Course Overview The "Facebook Ads Masterclass" is designed to provide learners with an in-depth understanding of Facebook advertising strategies. It covers essential topics such as ad campaigns, audience targeting, optimisation, and budget management. This course empowers learners to create highly effective ad campaigns that drive results. By the end, learners will be able to boost engagement, increase traffic, and generate leads through well-optimised Facebook ads. Whether you're new to digital marketing or looking to refine your ad strategy, this course provides the necessary skills to succeed in the competitive social media marketing landscape. Course Description In this comprehensive masterclass, learners will explore key aspects of Facebook advertising, starting with the basics of boosting posts to drive immediate engagement. The course covers advanced topics like traffic ads, lead generation, and video marketing strategies to build brand awareness. Throughout, learners will gain expertise in various ad formats, audience targeting, and bid strategies that optimise performance. By the end of the course, learners will possess the skills required to create highly targeted campaigns, optimise for conversions, and manage budgets efficiently, ensuring maximum return on investment. Facebook Ads Masterclass Curriculum Module 01: Boost Post to Get Quick Response Module 02: Ad Campaign: Traffic Ad – Website Module 03: Traffic to Messenger Ad and Cost Optimization Module 04: Facebook Event Response Module 05: Video Marketing Ads - Brand Awareness Module 06: Carousel Ads Optimization & Bid Strategy Module 07: Page Likes Campaign with Split Testing Module 08: Lead Generation Ad Module 09: Video Views Ad with Advanced Audience Combination (See full curriculum) Who is this course for? Individuals seeking to enhance their social media marketing skills. Professionals aiming to develop expertise in Facebook advertising. Beginners with an interest in digital marketing and online advertising. Entrepreneurs looking to leverage Facebook ads for business growth. Career Path Social Media Marketing Manager Digital Marketing Specialist Facebook Ads Manager Content Marketing Specialist Digital Advertising Consultant

Facebook Ads Masterclass
Delivered OnlineFlexible Dates
£7.99