• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

9701 Communication courses in Leeds delivered Online

Conflict Management training

5.0(58)

By Safety Solutions Training Ltd.

Course Content: Open discussions - risks associated with the workplace Health and safety legislation in relation to workplace violence - employer and employee duties Digital online security; avoiding online harassment The conflict cycle, dynamic threat assessment Effective use of body language and communication skills during confrontational situations Managing confrontation through distractions and interpersonal skills Lone worker safe systems of work; communication responsibilities Recognising potentially unsafe situations or situations of deteriorating safety i.e., violence and aggression, inappropriate conduct, malicious allegations Case study review Legislation regarding self-defence, emphasising its role as a last resort measure Post-incident procedures, emphasising the formulation of comprehensive and robust incident reports to identify potential risks and provide a thorough account of the situation.

Conflict Management training
Delivered in person or OnlineFlexible Dates
£99

Professional Management is crucial to your company's success. In fact, managers can have the single largest impact on your organisation's productivity and overall profitability, with more influence over employee morale and performance than anyone else.

Professional Management Programme
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£2,225

Professional Telephone Receptionist Course

4.3(43)

By John Academy

[vc_row][vc_column][vc_column_text] Description: Do you work from home or need to make telephone calls for your job? Does your telephone etiquette need improving? This Professional Telephone Receptionist Course is ideal for aspiring receptionists, or telephone receptionists who wish to build their skills for career advancement. Communication and customer service is an essential skill in any industry. Whether face to face or on the phone, being able to communicate professionally is a crucial aspect of any receptionist role. Throughout this telephone receptionist training course, you will learn how to be an effective communicator and will learn fundamental verbal communication techniques.  You will also learn essential time management and telephone skills for communicating with clients and colleagues on the telephone. Different forms of communication will also be explored in this course, and you will also look into the challenges teleworkers face. Whether you're a call centre agent or professional receptionist, you will be a communication expert and more confident person on completion of this communication skills training course. Who is the course for? Home-based receptionist and any communication or administrative specialists who need to learn how to become expert or professional with their telephone communication skills. People who have an interest in learning how to become their own professional receptionist. Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Assessment: At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After you have successfully passed the test, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. PDF certificate's turnaround time is 24 hours and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path: The Professional Telephone Receptionist Course is a useful qualification to possess, and would be beneficial for the following careers: Call Center Agent Contact Operator Customer Service Representative Home-based Professional Information Center Expert Telemarketer and telesales Telephone Researcher [/vc_column_text][/vc_column][/vc_row] Professional Telephone Receptionist Course Module One - Getting Started 00:30:00 Module Two - Core Skills Required 01:00:00 Module Three - Self-Management (I) 01:00:00 Module Four - Self-Management (II) 01:00:00 Module Five - Time Management (I) 01:00:00 Module Six - Time Management (II) 01:00:00 Module Seven - Organizing and Planning (I) 01:00:00 Module Eight - Organizing and Planning (II) 01:00:00 Module Nine - Communication (I) 01:00:00 Module Ten - Communication (II) 01:00:00 Module Eleven - Additional Challenges 01:00:00 Module Twelve - Wrapping Up 00:30:00 Activities Professional Telephone Receptionist Course - Activities 00:00:00 Mock Exam Mock Exam- Professional Telephone Receptionist Course 00:20:00 Final Exam Final Exam- Professional Telephone Receptionist Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Professional Telephone Receptionist Course
Delivered Online On Demand11 hours 40 minutes
£32

Building Partnerships: An Introductory Course in Communicating with Parent/Caregivers (Social Care)

5.0(1)

By Born at the Right Time

2-hour CPD certified introductory e-learning course focusing on the lived experience, communication and collaboration of working with families of children who have Special Educational Needs and Disabilities.

Building Partnerships: An Introductory Course in Communicating with Parent/Caregivers (Social Care)
Delivered Online On Demand2 hours
£30

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

Enhancing Performance with Productive Conflict: In-House Training

By IIL Europe Ltd

Enhancing Performance with Productive Conflict: In-House Training Most organizations have typically held the belief that workplace conflict is something that needs to be prevented, resolved, and/or mitigated. After all, conflict creates stress and leads to a variety of performance problems and very real costs. However, what savvy organizations have come to embrace is the understanding that when conflict is truly understood and harnessed, it can be utilized to not only add value to teams, but also enhance workplace performance. Conflict can be productive and make organizations better! Learners will explore the results of a formal, personalized, conflict-related assessment, uncovering targeted nuances of their conflict responses in action. Participants will learn to use basic strategies which allow them to transform destructive conflict responses into more productive ones, especially in the moment when they are happening. What you will Learn At the end of this program, you will be able to: Apply different models for understanding the lifecycle and dynamics of conflict Describe a physiological response to conflict and its impact on communication Recognize the correlation between a person's conflict style and how they respond to conflict Identify your own default responses to conflict and catch them in action Reframe automatic negative thoughts to create more positive interpersonal outcomes Utilize various tactics and strategies to transform destructive conflict responses into productive ones Getting Started Introductions and social agreements Course goal and objectives Opening activities Module 1: The Dynamics and Anatomy of Conflict Conflict basics Dynamics of conflict The anatomy of conflict Module 2: Conflict Styles and Conflict Conflict through the conflict style lens Exploring your style in conflict Destructive responses to conflict Module 3: Changing Your Response to Conflict Changing your conflict response Three steps to productive conflict Choosing a productive conflict response

Enhancing Performance with Productive Conflict: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£495

Special Education Needs Diploma Course

3.5(2)

By Elearncollege

Description Special Education Needs Diploma This course is aimed at children needing 'Special Educational Needs' who suffer from learning disabilities and learning difficulties. Learning, communication and even behavior are more difficult processes for such children when compared to other children of their age. This 'Special Educational Needs' course discusses various aspects of learning outcomes. If you are someone who would like to work with children having special educational needs, then this is the apt course you should be doing. On completion of this special education needs course, you will be equipped to understand the process involved in the development of a child thoroughly and assist children with special education needs. The course will help you help such children attain their full potential in learning. You will be equipped with the knowledge to support children having speech, communication and learning needs. Above all, you will be able to identify children with such issues. This course is the apt one if you wish to become a Special Education Needs teacher and looking to build your career as a teacher in schools, pupil referral units, nurseries and colleges. What you will learn 1. Frames of Reference 2. Models of Human Learning 3. Special Education Needs 4. Communication and Interaction 5. Cognition and Learning 6. Behavior, Emotional and Social Development 7. Sensory and other Physical Difficulties 8. Planning for Children with SEN 9. Assessment of Children with Special Education Needs (SEN) 10. Support from external agencies Course Outcomes After completing the course, you will receive a diploma certificate and an academic transcript from Elearn college. Assessment Each unit concludes with a multiple-choice examination. This exercise will help you recall the major aspects covered in the unit and help you ensure that you have not missed anything important in the unit. The results are readily available, which will help you see your mistakes and look at the topic once again. If the result is satisfactory, it is a green light for you to proceed to the next chapter. Accreditation Elearn College is a registered Ed-tech company under the UK Register of Learning( Ref No:10062668). After completing a course, you will be able to download the certificate and the transcript of the course from the website. For the learners who require a hard copy of the certificate and transcript, we will post it for them for an additional charge.

Special Education Needs Diploma Course
Delivered Online On Demand9 days
£99

1:1 Behaviour Support 1 hour

By Your Calm Classroom

Are you a teacher that wants to improve your classroom environment? Do you have questions about supporting children with their behaviour, communication and relationships? Book a 30 minute / 1 hour 1:1 coaching call. My coaching model will provide you with practical solutions to help you create a calm classroom environment. Discounts offered to subscribers.

1:1 Behaviour Support 1 hour
Delivered OnlineFlexible Dates
£40

Early Years Educator Bundle - QLS Endorsed

By Imperial Academy

10 QLS Endorsed Courses for Educator | 10 Endorsed Certificates Included | Life Time Access

Early Years Educator Bundle - QLS Endorsed
Delivered Online On Demand
£599

Supporting Vulnerable Clients

By Immigration Advice Service

A course designed for Immigration Advisors to support clients with mental health and trauma related experiences. View our Supporting Vulnerable Clients training course dates below, available remotely via Microsoft Teams. Empower yourself with the essential skills to support and advocate for vulnerable clients in our comprehensive 4 hour course on Supporting Vulnerable Clients. This course is designed to equip professionals with the knowledge and techniques needed to navigate complex situations containing , vulnerability, trauma, communication styles, and more. Moving beyond theory, this course offers participants hands-on skills practice and immersive activities to deepen their understanding of trauma and trauma responses. Join us in this engaging virtual session to elevate your ability to make a positive impact on the lives of vulnerable clients. Professionals learn to deliver disappointing news with sensitivity, navigating emotional responses such as anger, upset, and blame. Techniques for gracefully concluding conversations are explored, ensuring that participants leave with the skills to handle even the most challenging client interactions. Whilst this course is designed for Immigration Advisors, Solicitors and those working with clients in a range of capacities, this is an open course to individuals with experiences in alternative fields and available to those with an interest in attending.   Course joining links, materials and instructions are sent out 24hours before the course starts. Immigration Advice Service has been providing professional immigration services for over 10 years in the public, private and corporate sectors. Our Supporting Vulnerable Clients training course will give you all the knowledge you need about how to support clients with mental health and trauma related conditions. This an opportunity not to be missed by Immigration Advisors, Lawyers, Solicitors and Legal Professionals. Topics: What is “vulnerability” and what makes a client vulnerable? Trauma Impact of trauma on behaviour, communication Introduction to protective factors To recognise, highlight, empower Building rapport Responding to disclosures Responding with empathy Processing disclosures – emotionally and for administrative purposes Navigating uncertainty Having conversations about potential changes to the law when you don’t have the answers Managing aggression & understanding communication styles & cultural differences Delivering disappointing news Navigating expressions of emotion following this – anger, upset, blaming etc Preparing for & ending conversations Supporting yourself – looking after yourself   Session will include skills practice, & developing an understanding of trauma and trauma responses

Supporting Vulnerable Clients
Delivered OnlineFlexible Dates
£120