• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

897 Basic courses in London

Definitive VPNs for engineers

5.0(3)

By Systems & Network Training

Definitive VPNs training course description A hands on course covering VPNs from the basics of benefits and Internet vs. Intranet VPNs through to detailed analysis of the technologies involved in VPNs. All the major VPN protocols are covered including PPPoE, L2TP, SSL, IPsec and dynamic VPNs. MPLS L3 VPNs are also covered. What will you learn Describe what a VPN is and explain the difference between different VPN types. Recognise the design and implementation issues involved in implementing a VPN. Explain how the various technologies involved in a VPN work. Describe and implement: L2TP, IPsec, SSL, MPLS L3 VPNs. Evaluate VPN technologies. Definitive VPNs training course details Who will benefit: Network personnel. Prerequisites: IP Security foundation for engineers. Duration 3 days Definitive VPNs training course contents VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, hardware based VPNs, Firewall based VPNs, software based VPNs, tunnelling topologies, tunnelling protocols, which tunnelling protocol should you use? requirements of tunnels. VPN security components Critical VPN security requirements, Encryption and authentication, Diffie Hellman, DES, 3DES, RSA, PKI, Ca server types, pre shared keys versus certificates, Enrolling with a CA, RADIUS in VPNs. PPP Encapsulation, operation, authentication. Hands on Setting up PPPoE and analysing PPP packets. PPTP Overview, Components, How it works, control and data connections, GRE. Hands on Building a PPTP VPN. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPSec, L2TP/PPP, Layer 2 versus layer 3 tunnelling. Hands on Implementing a L2TP tunnel. IPSec AH, HMAC, ESP, transport and tunnel modes, Security Association, use of encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPSec VPN. Intranet VPNs Headers, architecture, label switching, LDP, MPLS VPNs. VPN products and services PE and CPE, management, various VPN products. VPN issues and architectures VPN architectures: terminate VPN before/on/ after/in parallel with firewall, resilience issues, VRRP, performance issues, QoS and VPNs. documentation.

Definitive VPNs for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

Total SMTP and email for engineers

5.0(3)

By Systems & Network Training

SMTP training course description A hands on course focusing on the workings of email systems and the standard protocols that they use. The course is not specific to any particular implementation, but some vendor specifics are noted. Linux and Microsoft machines are used in hands on sessions to reinforce the theory of major sessions. The course concentrates on troubleshooting and interworking using network sniffing and protocol inspection rather than "which buttons to push". What will you learn Describe and explain SMTP MIME POP3 IMAP PGP, GPG, S/MIME SPF, DKIM, DMARC Configure mail routing Secure email systems SMTP training course details Who will benefit: Technical staff responsible for email systems. Prerequisites: TCP/IP foundation for engineers. Duration 3 days SMTP training course contents SMTP architecture What is SMTP, email before SMTP, SMTP history, the different protocols, clients, servers. Email composition, transmission, delivering emails, storing and reading emails. MUAs, MTAs, POP3, IMAP, SMTP, DNS, webmail. Hands on Setting up MTAs and MUAs and sending a simple email using telnet. The SMTP protocol SMTP protocol stack, SMTP headers, HELO, SMTP mail, MAIL FROM, RCPT TO, DATA, SMTPUTF8, 8BITMIME, TURN, EHLO, ETRN, 3 digit replies. Hands on Analysing SMTP packets on a network. DNS and SMTP SMTP forwarding, SMTP relays, interoperation, how SMTP uses DNS, MX records. Hands on Setting up mail relays. SMTP headers IMF data, From, to, cc, bcc, sender and recipient headers, message Ids, received trails, in-reply-to, received-SPF, mail list headers. Hands on Using clients to analyse details from mail headers, including true originators and path of emails. MIME Email attachments, MIME versions, content type headers, encoding, base 64, binary data, multi part headers, troubleshooting attachments. Hands on Analysing MIME headers and attachments. POP3 What is POP3, where to use POP3, authorisation, transactions, POP3 commands: USER, PASS, STAT, LIST, RETR, DELE. Hands on Setting up a POP3 server, analysing POP3 packets on a network. IMAP and IMAPS What is IMAP, where to use IMAP, authorisation, mailbox structure, IMAP commands: LOGIN, AUTHENTICATE, LIST, CREATE, Examine (message flags), SELECT, STORE. Hands on Setting up an IMAP server and analysing IMAP packets on a network. Interoperation Mail gateways, addressing, Exchange, sendmail. Email security Basics, Transport level: STARTTLS. Content: PGP/GPG, mail signing and encryption, S/MIME, digital certificates, secure email submission. Hands on Setting up and using a PGP key, configure MTAs to use TLS. Email authentication and spam prevention Mail relays, grey listing, block list & RBL, DNSBL (Real-time Black hole List), White list, SPF, Domain Keys Identified Mail (DKIM), Author Domain Signing Practices (ADSP), Abuse Report Format (ARF), Domain-based Message Authentication, Reporting and Conformance (DMARC). Hands on Relay spamming and the blocking spamming.

Total SMTP and email for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

Catheterisation Training

By Lead Academy

Do you wish to advance your professional development in healthcare by gaining the necessary skills and knowledge relevant to catheterisation? This comprehensive catheterisation training course is ideal for you!  This course will help you learn about the entire process of catheterisation and the best practices for handling, inserting, and changing catheters securely. Whether you are a beginner or an experienced individual looking to advance your career in the healthcare sector, this course will set you up with the appropriate training required to excel in your role.   This extensive catheter training online course covers the following credentials:  Catheterisation process and methods Male and female catheterisation Various types of catheters Placement of the catheter after surgery Aseptic method Female and male urethral catheterisation Course Highlights Designed by healthcare professionals Accredited by the CPD Certification Recognised and Valuable Certification Self-Paced Online Theoretical Learning High-Quality E-Learning Study Materials Interactive practical training Remote Theoretical Learning Classroom-Based Catheterisation Training Course  To ensure effective catheter training, our classroom-based learning is divided into two parts:  Remote theoretical learning (online)  We offer comprehensive theoretical instruction for the first portion of our catheterization training course, which you can finish at your own convenience. After successfully completing the courses and assessments, you can go on to the practical learning phase.  Practical learning As part of the practical training, you will receive practical demonstrations and hands-on experience to justify your role.  Who is this Catheterisation Training Course for? This catheterisation course is primarily aimed at:  Health Visitors Healthcare professionals Nurses, midwives, pharmacists and doctors Freshers looking to begin their career in the healthcare sector Anyone looking to enhance their catheterisation skills Whether you are a fresher looking to kickstart your career in the field of healthcare and searching for catheterisation training for nurses or practising healthcare looking to enhance your catheterisation skills, this course will help you achieve your professional aspirations by all means.   Aims and Learning Outcomes of this Catheterisation Training Course  By the end of this catheterisation training course, you will:  Grasp the entire process and methods of catheterisation Recognise the basic types of catheters Gain knowledge about the process of female and male urethral catheterisation Know where the post-procedure catheter should be placed Learn how to change and handle catheters properly Understand how to maintain catheter systems on a daily basis Know how to keep and maintain records Entry Requirements There are no academic entry requirements for this catheterisation training course, and it is open to students of all academic backgrounds. However, you are required to have a laptop/desktop/tablet or smartphone and a good internet connection. Assessment Method This Female and Male Catheterisation training course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%.  Upon successful completion of the coursework and assessments, you will be directed to the practical learning part which will be conducted face-to-face. The practical training is taken during weekends to ensure maximum attendance. You will be required to attend the training from our London-based office which will be specified to you during enrolment. Upon successful demonstration of catheterisation, you will be awarded a certificate that is accepted by thousands of professional bodies and government regulators here in the UK and around the world. Course Curriculum 1. Introduction to Catheterisation 2. Anatomy and Physiology of Urinary System 3. Methods of Catheterisation 4. Size of Catheters 5. Reasons for Catheterisation 6. Causes and Types of Incontinence 7. Male Catheterisation Procedure 8. Female Catheterisation Procedure 9. Post Catheterisation Care 10. Removing an Indwelling Urethral Catheter 11. Risks Involved with an Indwelling Catheter 12. Infection Control and Prevention 13. Record Keeping 14. Conclusion Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Many organisations look for employees with CPD requirements, which means, that by doing this course, you would be a potential candidate in your respective field. Certificate of Achievement Competency Certificate and Certificate of Achievement from Lead Academy You will receive a competency certificate after successfully completing the Part 2 of the phlebotomy course, which serves as confirmation that you are qualified to function as a phlebotomist without the need for close supervision. Also, on successful completion of the phlebotomy course, you will be eligible to obtain a CPD accredited PDF and Hardcopy certificate of achievement as proof of your new skill. The certificate of achievement is an official credential that confirms that you successfully finished a course with Lead Academy.

Catheterisation Training
Delivered In-PersonFlexible Dates
£180

RESILIA Foundation

By IIL Europe Ltd

RESILIA™ Foundation AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls

RESILIA Foundation
Delivered In-Person in LondonFlexible Dates
£1,995

RESILIA Foundation: In-House Training

By IIL Europe Ltd

RESILIA™ Foundation: In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls

RESILIA Foundation: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

About this Training Course In today's business environment, there has never been more of a need to make Asset Management and Maintenance more cost effective and efficient. By utilising the Reliability Centred Maintenance process (RCM), you can increase safety performance, reduce maintenance costs, improve the effectiveness of your operations, boost machine uptime, and gain a greater understanding of the level of risk your organisation manages. RCM is just one component of an overall integrated Asset Management Process. All participants will complete detailed pre-course questionnaires before this 3 full-day course, enabling the trainer to tailor course content in order to meet specific delegate needs. Participant objectives are re-visited before, during and after the course, allowing the trainer to focus on outcomes and address any participant concerns and specific issues during the program. Training Objectives At the end of this course, participants will be able to: Develop skills to carry out successful RCMs and introduce the RCM process into their own and their company's daily activities. Be aware of our changing business environment and the need to apply RCM to drive continuous improvement, in safety, cost reduction, and minimise their environmental footprint Understand the impact of human reliability and the various methods used to improve this important area Understand the basics of Change Management and the methods used to securely anchor this process and make it routine Develop an appreciation for a holistic 'Asset Management' program, and know where the RCM process fits in, and the benefits it will deliver Target Audience Reliability Centred Maintenance is primarily a team activity and benefits from a cross functional team participation. This course is aimed at managers, engineers, technicians and operators at all levels who are responsible for the operation and maintenance of plant equipment and who will benefit from the elimination of bad actors (recurring equipment failure) and continuous improvement in the areas of safety, environmental impact, reliability and integrity. Trainer Your expert course leader has enjoyed a 37-year career with Shell International in a variety of leadership roles predominantly in Turnaround, Maintenance and Engineering Management before he left in late 2017 to pursue his interest in Turnaround and Maintenance Management consultancy. He has undertaken several Asset Management and Engineering positions within Shell Australia including the implementation and establishment of formal Reliability Studies including FMEA, RCA, RCM, Maintenance Planning and Turnaround Management programs at Geelong Refinery. Additionally, he was appointed Shell's Regional Turnaround Advisor within Australia and South East Asia supporting Shell Operating Companies throughout several Australasian and European sites. In more recent times, he had been engaged to implement and establish a formal Turnaround Management program within Brunei Shell Petroleum as well as becoming the appointed Regional Turnaround Management Subject Matter Expert (SME), TA Network and Governance & Assurance lead for Shell within the Shell Australasian, Russian Federation and Indian Sub-Continent OpCo community. His career repertoire includes hands-on practitioner, supervisory, reliability, contracts and management roles and he holds several maintenance and engineering tertiary qualifications including an Associate Diploma in Mechanical Engineering. He has presented at several Maintenance, Reliability, Asset Management & Turnaround forums and conferences. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Reliability Centred Maintenance
Delivered in Internationally or OnlineFlexible Dates
£2,493 to £2,899

Data Ethics for Business Professionals

By Mpi Learning - Professional Learning And Development Provider

Data Ethics for Business Professionals is designed for individuals who are seeking to demonstrate an understanding of the ethical uses of data in business settings.

Data Ethics for Business Professionals
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£45

Microsoft Active Directory

5.0(3)

By Systems & Network Training

Microsoft Active Directory course description A thorough understanding of this system is essential for anyone managing enterprise MS networks. Essential theory is complimented with a high level of hands on practice allowing delegates to observe the idiosyncrasies of Active Directory and Group Policy at first hand. Delegates learn the fundamental theory of AD and progress onto building a multi-domain network in the classroom. The course includes troubleshooting methods, and essential maintenance procedures. This course is designed to teach you the skills needed for day to day management of these technologies. What will you learn Install AD on multiple PCs. Use the tools to create and manage objects. Create appropriate group policies to restrict selected user's desktops and network access. Install DNS to support Active Directory without loosing Internet Connectivity. Maintain and troubleshoot AD problems Backup Active Directory. Microsoft Active Directory course details Who will benefit: Technical staff working with AD based networks. Prerequisites: Supporting Windows server. Duration 3 days Microsoft Active Directory course contents Introduction to Active Directory Network authentication methods, Active Directory defined, AD naming conventions, network management with AD, AD structures: Domains, Organisational Units, Forests & Trees, Sites, The Global Catalogue. Windows 2003 new features, installing AD. Hands on Installing an AD network. Windows overview Management methods Server management tools, installing the additional tools, Terminal Server: Administration mode, Administrator accounts in AD, Local Security Policy. Hands on Install the management tools, Management using Terminal Services. Creating & Managing Objects (a quick look) AD management tools, AD users and computers, Creating & managing OUs, User Accounts and groups, controlling access to AD objects, moving objects, Publishing resources, locating objects in AD, delegating authority. Hands on Creating a control OU structure and delegating authority. Introduction to Group Policies What are Group Policies? Where Group Policy data is stored, security, Group Policy flow. Hands on Implementing Group Policies Working with Group Policies Local security templates, administrative templates, scripts, folder redirection, software deployment. Hands on Scripts, redirecting the start menu, creating a secure, robust desktop environment. Implementing DNS DNS basics, troubleshooting, implementing DNS zones. Hands on Building a unified DNS solution. Maintaining and managing the AD database AD support tools, database internal structure, replication, replication tools, Single Operations Masters, tools for maintenance, maintenance techniques, Backing up AD, Directory Services restore mode, NTDSUtil, Authoritative & non-authoritative restoration, rebuilding. Hands on NTDSUtil.

Microsoft Active Directory
Delivered in Internationally or OnlineFlexible Dates
£1,877

C&G 2921-31 EV Charge Point Installer

5.0(9)

By Optima Electrical Training

This Level 4 City and Guilds 2396-01 Design and Verification of Electrical Installations course has been designed to help develop the skills and up date the knowledge of the requirements to enable you to professionally design, erect and then verify an electrical installation. This course is aimed at those who will have responsibility for designing, supervising, installing and testing electrical installations. Further information can be found here: C&G 2396 Electrical Design Course — Optima Electrical Training (optima-ect.com)

C&G 2921-31 EV Charge Point Installer
Delivered In-Person in London + 2 more or UK WideFlexible Dates
£435

The customer journey is changing faster than ever before. Can you keep up? Our brand-new Search Marketing course is here to get you ready – with the chance to learn directly from top SEO expert Neil Patel and his team. Course Overview The customer journey is changing faster than ever before. Can you keep up? Our brand-new Search Marketing course is here to get you ready – with the chance to learn directly from top SEO expert Neil Patel and his team. Did you know that search marketing is currently one of the most in-demand roles? And that growth isn’t going to stop anytime soon. Develop true Search Marketing expertise for where search is now and where it’s going Program learning outcomes and content: What Will I Learn? Develop the skills to work in search right now. Learn about search engine optimization, paid search, and digital display advertising, along with the latest platforms including Google Ads, Microsoft Ads (Bing Ads), and Google Analytics 4. Study using a dynamic mix of interactive lessons, videos, and downloadable tools, along with live sessions on the latest trends and channels. You’ll be awarded with a DMI search marketing certification that’s recognized globally, along with a completion badge from Neil Patel. Course Content: Introduction to Search Marketing: Being found in the right place at the right time may look effortless but it’s an art. You’re going to need lots of key concepts, tools and tricks. Explore how the core search elements work together to drive targeted traffic that converts into sales. • Search Marketing • SEO & Paid Search principles • Demand generation • Analytics & reporting • Data visualization SEO Setup & Content: The search engine can feel all seeing, all knowing but it can be won over. SEO is the way to come out on top. Understanding the algorithms and ranking factors puts you in the driver’s seat. But that’s not all. What does it take to really engage people? Content that speaks to them. Find out what your audiences are looking for, create the content they care about, and then serve it to them where they are. The key to a big, visionary content strategy that works. • Setting SEO objectives • Keyword research • Creating content • On-page optimization • Content scheduling Optimizing SEO: Everyone wants to get their website in front of more people. The right people. That’s where search engine optimization comes in. There’s a lot to get a handle on with SEO, all working together to make your content more visible. Pick the quick wins, gather momentum, or optimize for a better return-on-investment. • SEO for eCommerce • Backlinking for authority • Local & international optimization • Off-page optimization Paid Search Fundamentals: So you know how to grow those organic searches and it’s going well. But you want to succeed faster. Cut right to the chase with paid search. Learn the fundamentals of PPC advertising and how it can work to promote your business. • Paid search concepts • Ads & landing pages • Keywords • Creating a paid search campaign Paid Search Campaigns: Now that you know the basics, it’s time to start running your campaigns. Use PPC advertising to boost your visibility. Discover how to measure and optimize your campaigns to get the best out of every single click. • Managing the campaign budget • Optimizing campaigns • Reporting on paid search Demand Generation: Capture interest wherever people are in their journey. Whether they’re a first time visitor, just getting to know you or coming back again and again. Demand generation gives you the tactics to drive awareness and long-term engagement. Sure, it takes time but it’s worth the payoff. • Demand generation campaigns • Outbound channels & ad formats • Campaign targeting & bidding • Optimizing your campaign • Involving display & video advertising Search Analytics: Search analytics can feel a bit like having a superpower. There’s so much you can know about what your target market is doing, what they want, how they speak. All of this data is at your fingertips, you just need to know how to use it. So let’s dive in. Plus with the shift to Google Analytics 4 daunting many businesses, we’ll get you set for success on the new interface. • Analytics fundamentals • Monitoring campaigns • Introduction to GA4 • Configuring Google Analytics • Conversion rate optimization Data& Data Visualization: Data gives us so many new insights and opportunities to work with. But we’re always looking for ways to make data more engaging, especially in a digital world where we have so much of it. Tell the story of what you’ve discovered with data visualization. It helps to communicate more effectively and bring everyone along for the journey. • Turning data into actions • Ways of visualizing data • Forecasting search performance Search Strategy - Research & Planning: So you have tools, techniques, and practiced skills. You’ve learned all of the stepping stones behind making search work hard. Now is your chance to get an action plan together. A strategic, focused plan that really delivers. One backed up by research and structured by set objectives. • Planning a search strategy • Research for search campaigns • Setting objectives for search Search Strategy 2 - Execution & Optimization It’s time to put everything you’ve learned into practice with a high-performing search marketing strategy. You have the skills, you’ve done the research, your action plan is prepared. Let’s execute the strategy and make it a reality. Exciting, isn’t it? • Omnichannel search approach • Adapting to change • Evaluating search strategies • Long term performance DURATION 8-10 Weeks WHATS INCLUDED Course Material Case Study Experienced Lecturer Refreshments Certificate

DMI Specialist Search
Delivered In-PersonFlexible Dates
£1,500