• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

117 C2 courses in Cardiff delivered Live Online

C++ Bootcamp Course, 2-Months

4.6(12)

By PCWorkshops

C++ Bootcamp is for coding beginners: You want all the basic stuff, all the advanced stuff and practical experience and get a fantastic job in C++

C++ Bootcamp Course, 2-Months
Delivered OnlineFlexible Dates
£2,000

3 Day Online Asset Management Certificate Course C23013

By Asset Management Consulting (Asset Management Academy)

Global leading Asset Management course online. This online IAM Certificate course will be hosted through Teams.

3 Day Online Asset Management Certificate Course C23013
Delivered OnlineFlexible Dates
£960 to £1,260

C30M03 - FD&FA Voice Alarm Systems - BS 5839-8 (online)

5.0(1)

By Ember Compliance

Learners will be introduced to Voice Alarm (VA) systems as part of the fire alarm solutions.

C30M03 - FD&FA Voice Alarm Systems - BS 5839-8 (online)
Delivered Online
£230

C01M05 - FD&FA Maintenance principles - BS 5839-1 (online)

5.0(2)

By Ember Compliance

Learners will develop knowledge from the FD&FA foundation module and/or industry experience and apply this to the maintenance of FD&FA systems.

C01M05 - FD&FA Maintenance principles - BS 5839-1 (online)
Delivered Online + more
£230

EC-Council Certified Cybersecurity Technician (C|CT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to: Early-career IT professionals, IT managers, career changers, and career advancers Students and recent graduates Overview After completing this course, you will understand: Key concepts in cybersecurity, including information security and network security Information security threats, vulnerabilities, and attacks The different types of malware Identification, authentication, and authorization Network security controls Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management) Application security design and testing techniques Fundamentals of virtualization, cloud computing, and cloud security Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures Cryptography and public-key infrastructure Data security controls, data backup and retention methods, and data loss prevention techniques Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic The incident handling and response process Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation Concepts in business continuity and disaster recovery Risk management concepts, phases, and frameworks EC-Council?s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs. Course Outline Information Security Threats and Vulnerabilities Information Security Attacks Network Security Fundamentals Identification, Authentication, and Authorization Network Security Controls: Administrative Controls Network Security Controls: Physical Controls Network Security Controls: Technical Controls Network Security Assessment Techniques and Tools Application Security Virtualization and Cloud Computing Wireless Network Security Mobile Device Security Internet of Things (IoT) and Operational Technology (OT) Security Cryptography Data Security Network Troubleshooting Network Traffic Monitoring Network Log Monitoring and Analysis Incident Response Computer Forensics Business Continuity and Disaster Recovery Risk Management

EC-Council Certified Cybersecurity Technician (C|CT)
Delivered OnlineFlexible Dates
£3,495

EC-Council Certified Chief Information Security Officer (C|CISO)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is designed for the aspiring or sitting upper-level manager striving to advance his or her career by learning to apply their existing deep technical knowledge to business problems. In this course, students will learn in-depth content in each of the 5 CCISO Domains Domain 01 - Governance Define, Implement, Manage, and Maintain an Information Security Governance Program Information Security Drivers Establishing an information security management structure Laws/Regulations/Standards as drivers of Organizational Policy/Standards/Procedures Managing an enterprise information security compliance program Risk Management Risk mitigation, risk treatment, and acceptable risk Risk management frameworks NIST Other Frameworks and Guidance (ISO 31000, TARA, OCTAVE, FAIR, COBIT, and ITIL) Risk management plan implementation Ongoing third-party risk management Risk management policies and processes Conclusion Domain 2 - Security Risk Management, Controls, & Audit Management INFORMATION SECURITY CONTROLS COMPLIANCE MANAGEMENT GUIDELINES, GOOD AND BEST PRACTICES AUDIT MANAGEMENT SUMMARY Domain 03 - Security Program Management and Operations PROGRAM MANAGEMENT OPERATIONS MANAGEMENT Summary Domain 04 - Information Security Core Concepts ACCESS CONTROL PHYSICAL SECURITY NETWORK SECURITY ENDPOINT PROTECTION APPLICATION SECURITY ENCRYPTION TECHNOLOGIES VIRTUALIZATION SECURITY CLOUD COMPUTING SECURITY TRANSFORMATIVE TECHNOLOGIES Summary Domain 05 - Strategic Planning, Finance, Procurement and Vendor Management STRATEGIC PLANNING Designing, Developing, and Maintaining an Enterprise Information Security Program Understanding the Enterprise Architecture (EA) FINANCE PROCUREMENT VENDOR MANAGEMENT Summary

EC-Council Certified Chief Information Security Officer (C|CISO)
Delivered OnlineFlexible Dates
£3,495

Supervision and Managing Performance Course

By DG Legal

This course satisfies the supervision requirements in the LAA Standard Contract & covers the key skills needed to ensure compliance with the LAA Contract.

Supervision and Managing Performance Course
Delivered Online + more
£225 to £300

Vitamin D, Vitamin C and B12 Deficiencies

4.9(22)

By AB Health Group

Vitamin D, Vitamin C and Vitamin B12 Deficiency Training

Vitamin D, Vitamin C and B12 Deficiencies
Delivered OnlineFlexible Dates
£250

C02M01 - FD&FA Domestic - BS 5839-6 (online)

5.0(1)

By Ember Compliance

Delegates will develop knowledge of the requirements for the design, installation and commissioning of Fire Detection and Fire Alarm systems within domestic properties in compliance with the requirements of BS 5839-6 and other codes of practice.

C02M01 - FD&FA Domestic - BS 5839-6 (online)
Delivered OnlineFlexible Dates
£230

C10M03 - FD&FA Special Inspection - BS 5839-1 (online)

5.0(1)

By Ember Compliance

Learners will develop knowledge from the FD&FA maintenance module (C01M05) and/or industry experience and apply this to the ‘recommendations for special inspection on the appointment of a new servicing organization’.

C10M03 - FD&FA Special Inspection - BS 5839-1 (online)
Delivered OnlineFlexible Dates
£230