• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2557 Certification in Cash & Voucher Assistant (CVA) courses

VTCT Level 3 Swedish Body Massage Fast Track Course

By The Angel Academy Of Teaching & Training

Course Content History of Massage Benefits and effects of treatment Associated Anatomy & Physiology Contra-indications & contra-actions to treatment Client care and communication in beauty related industries Aftercare advice Monitor and maintain health and safety practice in the salon Practical demonstration Professional assessment Record cards and data-protection Duration Four days – 10.00am - 4.00pm

VTCT Level 3 Swedish Body Massage Fast Track Course
Delivered In-PersonFlexible Dates
£899

Leading with an IT Mindset - BCS Course

5.0(12)

By Duco Digital Training

This Level 4 practitioner award encourages individuals in or working towards a leadership role (this could be an IT or technical based-role), and you want to demonstrate modern leadership behaviours to nurture a high-performing team, especially during a time of organisational change.

Leading with an IT Mindset - BCS Course
Delivered OnlineFlexible Dates
£625

Wet Shaving - Advanced Course

By Alan d Hairdressing Education

Learn the classic Wet Shaving in our Advanced Wet Shaving Course. Ideal for qualified barbers looking to learn a new skill and add to their services. In this 2-day course, you’ll learn shaving theory along with skin tensioning and lathering techniques.

Wet Shaving - Advanced Course
Delivered In-PersonFlexible Dates
£715

CAVA Assessor and AET Teaching Bundle

5.0(1)

By Apex Learning

Ofqual Regulated Qualification | 100% Online Course | FREE Certificate, Assessment & 20 Premium Courses | Expert Support

CAVA Assessor and AET Teaching Bundle
Delivered Online On Demand6 days
£799

Data Protection Course - BCS Foundation

5.0(12)

By Duco Digital Training

Do you need a qualification in data protection or are you thinking about learning more about data protection for your organisation? The BCS Foundation Certificate in Data Protection designed for those who need to have an understanding of data protection, and the GDPR in particular, to do their job and knowledge of data protection law would be effective in their role.

Data Protection Course - BCS Foundation
Delivered Online On Demand23 hours
£950

Business Analysis Practice Course - BCS Practitioner

5.0(12)

By Duco Digital Training

Thinking about a career in Business Analysis? The BCS Practitioner Certificate in Business Analysis has been designed to provide valuable learning for those in roles such as business analyst, business architect, business systems analyst, data analyst, enterprise analyst, management consultant, process analyst, product manager, product owner, project manager, and systems analyst.

Business Analysis Practice Course - BCS Practitioner
Delivered Online On Demand18 hours
£950

Addigy Certified Associate (ACA) Course

By Influential Training

Addigy training London, Addigy training course

Addigy Certified Associate (ACA) Course
Delivered OnlineFlexible Dates
£720

RESILIA Foundation

By IIL Europe Ltd

RESILIA™ Foundation AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls

RESILIA Foundation
Delivered In-Person in LondonFlexible Dates
£1,995

RESILIA Foundation: In-House Training

By IIL Europe Ltd

RESILIA™ Foundation: In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls

RESILIA Foundation: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

Learn the classic Wet Shave in this intermediate barbering course. Ideal for qualified men’s hairdressers and barbers wanting to add Wet Shaving to their services. You’ll learn skin theory, skin tensioning, lathering techniques, skin preparation and more.

Wet Shaving
Delivered In-PersonFlexible Dates
£715