• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

307 C++ courses delivered Live Online

5 Day Focused IAM Certificate Course C23200

By Asset Management Consulting (Asset Management Academy)

Global leading Asset Management course online. This online IAM Certificate course will be hosted through Teams.

5 Day Focused IAM Certificate Course C23200
Delivered OnlineFlexible Dates
£1,806.78 to £2,100.39

5 Day Online IAM Certificate Course C23011

By Asset Management Consulting (Asset Management Academy)

Online Asset Management course. This IAM Certificate course will be hosted online, September 2023.

5 Day Online IAM Certificate Course C23011
Delivered OnlineFlexible Dates
£1,620 to £1,920

5 Day Online IAM Certificate Course C23015

By Asset Management Consulting (Asset Management Academy)

Online Asset Management course. This IAM Certificate course will be hosted online, December 2023.

5 Day Online IAM Certificate Course C23015
Delivered OnlineFlexible Dates
£1,440 to £1,740

5 Day Online IAM Certificate Course C23012

By Asset Management Consulting (Asset Management Academy)

Online Asset Management course. This IAM Certificate course will be hosted online, October 2023.

5 Day Online IAM Certificate Course C23012
Delivered OnlineFlexible Dates
£1,440 to £1,740

Business development for professional services (In-House)

By The In House Training Company

The market for professional services is becoming increasingly competitive, with some firms and individuals becoming very effective at winning new work, leaving others lagging way behind. Given the choice between spending time on client work and business development work, we all tend to choose that which we feel to be easier, more attractive and more aligned with our image of ourselves. We stay within our comfort zones, we focus on client work, and we only resort to business development work when we have to, which can also lead to 'feast or famine' syndrome. The programme will help participants: Understand the professional business development approach and the style that is appropriate for their business and their clients Follow a process to guide their conversations and business development meetings Prepare thoroughly for a business development meeting/contact with a client to ensure they use their time efficiently and maximise results Create a great first impression and professional opening to a conversation Ask open questions and listen effectively in order to spot opportunities, understand needs and progress the opportunity Identify and understand buying and decision-making processes and criteria Skilfully and confidently handle questions and objections Sell the benefits of their services and approach over those of their competitors Progress the sale by agreeing next steps and gaining commitment appropriately 1 Introduction Aims and objectives of the programme Personal introductions and objectives Workshop overview 2 An introduction to business development and selling for professionals What is selling? Who are you selling to? The buying experience What clients want The four-step business development process The business development cycle and pipeline management Upselling and cross-selling as well as winning new clients 3 Networking and generating leads What is networking? Networking objectives It's not what you know but who you know Asking for referrals and introductions Making appointments from networking activity 4 Opening the sales relationship/sales meeting What potential customers are thinking Judging first impressions Creating positive first impressions Building rapport and creating interest and impact Earning the right 5 Core communication skills for professional selling Overcoming barriers to listening The art of listening Questioning refresher Types of questions Questioning funnel 6 Understanding and identifying needs and opportunities Identifying the questions to ask to identify needs and opportunities Questions to move us through the buying and selling process Understanding their buying processes Asking questions that position you as a 'trusted adviser' The questions that give you a competitive advantage Knowing when you have asked enough questions 7 Introducing solutions Tailoring your 'pitch' to the client Speaking the client's language Using features and benefits Applying the benefit cycle 8 Handling objections and concerns Identifying the typical objections and concerns Understanding why clients raise objections and concerns Following a structure for handling objections Handling the price objection 9 Gaining commitment Knowing when to close The art of checking Recognising buying signals Small c and big C 10 Putting it all together Personal learning summary and action plans

Business development for professional services (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

EC-Council Certified Chief Information Security Officer (C|CISO)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is designed for the aspiring or sitting upper-level manager striving to advance his or her career by learning to apply their existing deep technical knowledge to business problems. In this course, students will learn in-depth content in each of the 5 CCISO Domains Domain 01 - Governance Define, Implement, Manage, and Maintain an Information Security Governance Program Information Security Drivers Establishing an information security management structure Laws/Regulations/Standards as drivers of Organizational Policy/Standards/Procedures Managing an enterprise information security compliance program Risk Management Risk mitigation, risk treatment, and acceptable risk Risk management frameworks NIST Other Frameworks and Guidance (ISO 31000, TARA, OCTAVE, FAIR, COBIT, and ITIL) Risk management plan implementation Ongoing third-party risk management Risk management policies and processes Conclusion Domain 2 - Security Risk Management, Controls, & Audit Management INFORMATION SECURITY CONTROLS COMPLIANCE MANAGEMENT GUIDELINES, GOOD AND BEST PRACTICES AUDIT MANAGEMENT SUMMARY Domain 03 - Security Program Management and Operations PROGRAM MANAGEMENT OPERATIONS MANAGEMENT Summary Domain 04 - Information Security Core Concepts ACCESS CONTROL PHYSICAL SECURITY NETWORK SECURITY ENDPOINT PROTECTION APPLICATION SECURITY ENCRYPTION TECHNOLOGIES VIRTUALIZATION SECURITY CLOUD COMPUTING SECURITY TRANSFORMATIVE TECHNOLOGIES Summary Domain 05 - Strategic Planning, Finance, Procurement and Vendor Management STRATEGIC PLANNING Designing, Developing, and Maintaining an Enterprise Information Security Program Understanding the Enterprise Architecture (EA) FINANCE PROCUREMENT VENDOR MANAGEMENT Summary

EC-Council Certified Chief Information Security Officer (C|CISO)
Delivered OnlineFlexible Dates
£3,495

23rd July Florence Rees #Agent121. Looking for: ADULT FICTION, NON-FICTION

5.0(3)

By I Am In Print

LOOKING FOR: ADULT FICTION, NON-FICTION Florence has been at A M Heath for five years and represents a range of commercial fiction and non-fiction. For fiction, comforting, funny and warm reads, as well as gripping page-turners, will always be Florence's cup of tea. Her favourite thing is to escape with a story she can’t put down. If you think your book fits that, then do send it to her.  Books in this vein that really left her wanting one more chapter include Marian Keyes’s character, Rachel, from Rachel’s Holiday that left Florence with a compassion for addiction that only the most skilled of writers can conjure. Florence finds Catherine Newman to be a genius for making hospice care so funny in We All Want Impossible Things. Smart page turners such as Anatomy of a Scandal, Such a Fun Age, and Tomorrow, and Tomorrow, and Tomorrow, wowed her with clever, gripping prose and complicated, flawed characters she hadn't met before. She also loves older classics like the Cazalet Chronicles and Georgette Heyer’s Regency novels. Florence is actively looking for writers who are under-represented in the publishing world, through non-traditional channels, as well as her submissions. She’s keen to find non-fiction and fiction writers who speak to a millennial and younger audience, be that a journalist who is looking to expand an idea, a screenwriter who is looking to try their hand at fiction or perhaps an activist with a social media platform.  She is also interested in environmental and social issues. The authors she represents include Jaspreet Kaur, Salma El-Wardany, Rachel Thompson, Annie Lord, Angelica Malin and Phil Ellis. Their books range from the heart-breaking and profound to the inspirational, funny and wise, with almost everything in between. Florence does not wish to receive, YA, Fantasy or Sci-fi.  Florence would like you to submit a covering letter, 1 page synopsis and the first 5,000 words of your manuscript in a single word document.  (In addition to the paid sessions, Florence is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Wednesdy 16th July 2025

23rd July Florence Rees #Agent121. Looking for: ADULT FICTION, NON-FICTION
Delivered Online + more
£72

Google WorkSpace

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for business users, educators, students, and knowledge workers in a variety of roles and fields who want to be able to use the apps included in Google Workspace to create and manage various types of files and communicate and collaborate with colleagues. Overview In this course, you will use the various apps included in Google Workspace to work productively as part of a team. You will: Navigate the Google Workspace environment and use Gmail to send and manage email correspondence. Manage schedules using Google Calendar™. Communicate with colleagues over text, voice, and video using Google Chat and Google Meet. Store and share files using Google Drive. Collaborate on documents using Google Docs, Google Slides™, and Google Keep™. Collaborate on data using Google Sheets and Google Forms™. Collaborate on websites using Google Sites™. The core productivity apps that make up the Google Workspace? suite enable users to work together on a variety of projects and tasks across many different industries and job roles. This course will teach you how to work efficiently and effectively in apps like Gmail?, Google Drive?, Google Docs?, Google Sheets?, Google Meet?, Google Chat?, and more?all while participating in a collaborative team environment. Lesson 1: Getting Started with Google Workspace Topic A: Navigate Google Workspace Topic B: Send and Manage Email Using Gmail Lesson 2: Managing Schedules Using Google Calendar Topic A: Create and Manage Events Topic B: Customize Calendars Topic C: Create and Share Calendars Topic D: Create and Manage Tasks Lesson 3: Communicating Using Google Chat and Google Meet Topic A: Chat Using Google Chat Topic B: Participate in Meetings Using Google Meet Lesson 4: Storing and Sharing Files Using Google Drive Topic A: Add Files and Folders Topic B: Manage Files and Folders Lesson 5: Collaborating on Documents Using Docs, Slides, and Keep Topic A: Create and Edit Documents Using Google Docs Topic B: Design Presentations Using Google Slides Topic C: Take Notes Using Google Keep Lesson 6: Collaborating on Data Using Sheets and Forms Topic A: Create and Manage Spreadsheets Using Google Sheets Topic B: Design Surveys Using Google Forms Lesson 7: Collaborating on Websites Using Sites Topic A: Create and Edit Sites Topic B: Share and Publish Sites Additional course details: Nexus Humans Google WorkSpace training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Google WorkSpace course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Google WorkSpace
Delivered OnlineFlexible Dates
Price on Enquiry

JL2V - Junos Layer 2 VPNs

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Course Level : Junos Layer 2 VPNs (JL2V) is an advanced-level course. Overview Define the term virtual private network. Describe the business drivers for MPLS VPNs. Describe the differences between Layer 2 VPNs and Layer 3 VPNs. List advantages for the use of MPLS Layer 3 VPNs and Layer 2 VPNs. Describe the roles of a CE device, PE router, and P router in a BGP Layer 2 VPN. Explain the flow of control traffic and data traffic for a BGP Layer 2 VPN. Configure a BGP Layer 2 VPN and describe the benefits and requirements of over-provisioning. Monitor and troubleshoot a BGP Layer 2 VPN. Explain the BGP Layer 2 VPN scaling mechanisms and route reflection. Describe the Junos OS BGP Layer 2 VPN CoS support. Describe the flow of control and data traffic for an LDP Layer 2 circuit. Configure an LDP Layer 2 circuit. Monitor and troubleshoot an LDP Layer 2 circuit. Describe the operation of FEC 129 BGP autodiscovery for Layer 2 VPNs. Configure a FEC 129 BGP autodiscovery Layer 2 VPN. Monitor and troubleshoot a FEC 129 BGP autodiscovery for Layer 2 VPNs. Describe the difference between Layer 2 MPLS VPNs and VPLS. Explain the purpose of the PE device, the CE device, and the P device. Explain the provisioning of CE and PE routers. Describe the signaling process of VPLS. Describe the learning and forwarding process of VPLS. Describe the potential loops in a VPLS environment. Configure BGP, LDP, and FEC 129 BGP autodiscovery VPLS. Troubleshoot VPLS. Describe the purpose and features of Ethernet VPN. Configure Ethernet VPN. Monitor and troubleshoot Ethernet VPN. Describe the Junos OS support for hierarchical VPN models. Describe the Junos OS support for Carrier-of-Carriers VPN Option C. Configure the interprovider VPN Option C. Describe the Junos OS support for multisegment pseudowire for FEC 129. Describe and configure circuit cross-connect (CCC). This two-day course is designed to provide students with MPLS-based Layer 2 virtual private network (VPN) knowledge and configuration examples. Course IntroductionMPLS VPNs MPLS VPNs Provider-Provisioned VPNs BGP Layer 2 VPNs Overview of Layer 2 Provider-Provisioned VPNs BGP Layer 2 VPN Operational Model: Control Plane BGP Layer 2 VPN Operational Model: Data Plane Preliminary BGP Layer 2 VPN Configuration BGP Layer 2 Configuration Monitoring and Troubleshooting BGP Layer 2 VPNs Lab: BGP Layer 2 VPNs Layer 2 VPN Scaling and CoS Review of VPN Scaling Mechanisms Layer 2 VPNs and CoS LDP Layer 2 Circuits LDP Layer 2 Circuit Operation LDP Layer 2 Circuit Configuration LDP Layer 2 Circuit Monitoring and Troubleshooting FEC 129 BGP Autodiscovery Layer 2 Circuit Operation FEC 129 BGP Autodiscovery Layer 2 Circuit Configuration FEC 129 BGP Autodiscovery Monitoring and Troubleshooting Virtual Private LAN Services Layer 2 MPLS VPNs Versus VPLS BGP VPLS Control Plane BGP VPLS Data Plane Learning and Forwarding Process Loops VPLS Configuration VPLS Configuration VPLS Troubleshooting Ethernet VPN (EVPN) EVPN Overview EVPN Control Plane EVPN Operation EVPN Configuration EVPN Troubleshooting

JL2V - Junos Layer 2 VPNs
Delivered OnlineFlexible Dates
Price on Enquiry

C30M03 - FD&FA Voice Alarm Systems - BS 5839-8 (online)

5.0(1)

By Ember Compliance

Learners will be introduced to Voice Alarm (VA) systems as part of the fire alarm solutions.

C30M03 - FD&FA Voice Alarm Systems - BS 5839-8 (online)
Delivered Online
£230