• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

9665 Concept courses delivered Online

A Beginner's Guide to a Microservices Architecture

By Packt

Learn the Microservices overall Architecture, Building Blocks, Key Advantages, Challenges and Industry Case Studies

A Beginner's Guide to a Microservices Architecture
Delivered Online On Demand1 hour 54 minutes
£107.99

BRCGS Gluten-Free Issue 4 for Sites (2 Half-Day Sessions)

5.0(36)

By Ask Sonia Limited

Official BRCGS Gluten-Free Issue 4 for Sites course. Delivered online (Zoom) by a live BRCGS Approved Training Partner. Exam and Certificate fee included in the price.

BRCGS Gluten-Free Issue 4 for Sites (2 Half-Day Sessions)
Delivered Online + more
£220

Neurodiversity in the Workplace Champion Workshop

5.0(2)

By Changing Minds Training

This half-day workshop delivered face-to-face or online is designed for anyone in your organisation that wants to become a Neurodiversity Champion - someone who wants to educate and change the way that Neurodiversity is viewed in the workplace.

Neurodiversity in the Workplace Champion Workshop
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

Professional Certificate Course in Concepts in Digital Branding in London 2024

4.9(261)

By Metropolitan School of Business & Management UK

This course aims to provide the learners with an in-depth understanding of online brand positioning and marketing strategies. Upon completion of this course, learners will be equipped with the knowledge and skills to establish a strong brand image and develop effective marketing strategies that cater to the online market. After the successful completion of the course, you will be able to learn about the following, Online Brand Positioning Strategy. Ways to Establish Brand Trust Online. Concept and Advantages of Online Marketing Synergy. Outsourcing and in-house branding. Concept of global and local marketing. Significance of Localised Branding and Global Branding. Steps to Create Localisation in Branding. Financial Impact of Good Branding. Concept of Brand Perception. Ways to Measure Brand Perception. Tools to measure brand awareness. Key Performance Indicators or KPI For Brand Success. Steps in Continuous Brand Improvement. Calculating ROI for Branding. The course will cover various topics related to online brand positioning and marketing. The course will start with an introduction to online brand positioning strategy, followed by the ways to establish brand trust online. The concept and advantages of online marketing synergy will also be discussed. The course will cover various topics related to online brand positioning and marketing. The course will start with an introduction to online brand positioning strategy, followed by the ways to establish brand trust online. The concept and advantages of online marketing synergy will also be discussed. VIDEO - Course Structure and Assessment Guidelines Watch this video to gain further insight. Navigating the MSBM Study Portal Watch this video to gain further insight. Interacting with Lectures/Learning Components Watch this video to gain further insight. Concepts in Digital Branding Self-paced pre-recorded learning content on this topic. Concepts in Digital Branding Put your knowledge to the test with this quiz. Read each question carefully and choose the response that you feel is correct. All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course. The certificate is designed to enhance the learner's knowledge in the field. This certificate is for everyone eager to know more and get updated on current ideas in their respective field. We recommend this certificate for the following audience. Marketing Managers Brand Managers Digital Marketing Managers Social Media Managers E-commerce Managers Business Owners Marketing Consultants Advertising Executives Sales Managers Product Managers Average Completion Time 2 Weeks Accreditation 3 CPD Hours Level Advanced Start Time Anytime 100% Online Study online with ease. Unlimited Access 24/7 unlimited access with pre-recorded lectures. Low Fees Our fees are low and easy to pay online.

Professional Certificate Course in Concepts in Digital Branding in London 2024
Delivered Online On Demand14 days
£38

Power BI: Dashboard in a Day

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The Power BI in a Day course is designed for beginners and intermediate users of Power BI. Overview #NAME? Students will discover the full capabilities of Power BI in a one-day, hands-on workshop. Please Note: This workshop is primarily self-directed and students will work at their own pace while having access to an instructor for questions. 1 - Accessing & Preparing data Data Set Power BI Desktop Power BI Desktop ? Accessing Data Power BI Desktop ? Data Preparation 2 - Data Modeling and Exploration Power BI Desktop ? Data Modeling and Exploration Power BI Desktop ? Data Exploration Continued References 3 - Data Visualization Power BI Desktop Power BI Desktop ? Data Visualization References 4 - Publishing & Accessing Reports Power BI Desktop ? Creating Mobile View Power BI Service Power BI Service ? Publishing Report Power BI Mobile ? Accessing Report on Mobile Device Power BI Service ? Collaboration and Distribution References 5 - Dashboard and Collaboration Power BI Service Building Dashboard References Additional course details: Nexus Humans Power BI: Dashboard in a Day training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Power BI: Dashboard in a Day course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Power BI: Dashboard in a Day
Delivered Online
£595

Professional Certificate Course in Concepts in Global Supply Chain Ecosystem in London 2024

4.9(261)

By Metropolitan School of Business & Management UK

In this Professional Certificate Course, participants will gain a comprehensive understanding of the key concepts and strategies necessary to manage and optimize global supply chain operations. The course covers the nature of the supply chain ecosystem, the concept of supply chain de-verticalization, supply chain trends such as modularity and outsourcing, and the role of institutions in supply chain management. Additionally, the course covers economic, regulatory, and trade-related innovations that impact global supply chains, as well as the management of supply chain resources and the concept of supply chain clusters. Upon completion, participants will have a strong foundation in supply chain management and be prepared to excel in a variety of roles in the field. Our Professional Certificate Course in Concepts in Global Supply Chain Ecosystem is designed to provide participants with an in-depth understanding of the key concepts and strategies required to manage and optimize global supply chain operations. Upon completion, participants will have the skills and knowledge necessary to excel in a variety of supply chain management roles. After the successful completion of the course, you will be able to learn about the following, The nature of Supply Chain Ecosystem. The concept of Supply Chain De-verticalization. Supply Chain Trends: Modularity and Outsourcing. Role of Institutions. Economic, Regulatory and Trade-related Innovations. Institutions and Supply Chains. Supply Chain Resources and Management. The concept of supply chain clusters. In this Professional Certificate Course, participants will gain a comprehensive understanding of the key concepts and strategies necessary to manage and optimize global supply chain operations. The course covers the nature of the supply chain ecosystem, the concept of supply chain de-verticalization, supply chain trends such as modularity and outsourcing, and the role of institutions in supply chain management. Additionally, the course covers economic, regulatory, and trade-related innovations that impact global supply chains, as well as the management of supply chain resources and the concept of supply chain clusters. Upon completion, participants will have a strong foundation in supply chain management and be prepared to excel in a variety of roles in the field. VIDEO - Course Structure and Assessment Guidelines Watch this video to gain further insight. Navigating the MSBM Study Portal Watch this video to gain further insight. Interacting with Lectures/Learning Components Watch this video to gain further insight. Concepts in Global Supply Chain Ecosystem Self-paced pre-recorded learning content on this topic. Concepts in Global Supply Chain Ecosystem Put your knowledge to the test with this quiz. Read each question carefully and choose the response that you feel is correct. All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course. The certificate is designed to enhance the learner's knowledge in the field. This certificate is for everyone eager to know more and get updated on current ideas in their respective field. We recommend this certificate for the following audience, Professionals in supply chain management Individuals interested in pursuing a career in supply chain management Business owners and entrepreneurs Students pursuing a degree in supply chain management or a related field. Average Completion Time 2 Weeks Accreditation 3 CPD Hours Level Advanced Start Time Anytime 100% Online Study online with ease. Unlimited Access 24/7 unlimited access with pre-recorded lectures. Low Fees Our fees are low and easy to pay online.

Professional Certificate Course in Concepts in Global Supply Chain Ecosystem in London 2024
Delivered Online On Demand14 days
£33

22nd January John Baker #Agent121. Looking for: YA/NA FANTASY, SFF, HORROR, ADULT FICTION

5.0(1)

By I Am In Print

LOOKING FOR: YA/NA FANTASY, SFF, HORROR, ADULT FICTION John joined the agency in 2019 where, as a junior agent, he is focusing on building his own small, cultivated list, shaped around his passion for Science Fiction and Fantasy, alongside providing administrative support across the agency. John also leads the film & TV desk for the wider agency and is on the Association of Author’s Agent’s Bridge Committee. John is building a small but unique list of authors, who all share a passion for subverting expectations and creating rich new worlds of adventure. John is looking for anything under the broad church of SFF, from literary to pulpy, high fantasy to gritty urban, but he would especially love to hear from anyone under-represented in the genre, particularly neurodiverse writers. John is also keen to grow his horror list, but definitely in the vein of psychological terror more than straight gore-fest. In particular, John is looking for lush and inventive YA/NA fantasy, science fiction and horror, especially stories that challenge the tropes and expectations of the genre. He would love some near-future sci-fi or speculative, in the vein of Black Mirror‘s more uplifting episodes, (e.g. San Junipero), or a high-concept rom-com like Palm Springs. He’s also on the hunt for some grounded speculative takes on modern-day professions, such as medicine, law, policing, politics, espionage, and international relations. After falling head over heels for his first romantasy, John is keen to see more cosy low-stakes, high-charm stories, or sweeping fantastical love stories (not adverse to a bit of spice), especially from under-represented backgrounds. John is still searching for his beefy epic fantasy, but it needs to be breaking the mould in some way, Sanderson will always be the best at being Sanderson. Anything building from a Non-Anglo-Christian cultural background would be a great start. Horror-wise, gothic will always be a favourite and he loves a mythologically inspired scarefest. He’s keen to read an intelligent creature feature from the POV of the monster, or even something with a strong romantic element amongst all the gore. He’s open to projects at the more literary end of the spectrum, a rich magical realism, or something character-led yet supernatural and would love a high-concept mystery, in the vein of Stuart Turton. He’s not the best agent for military sci-fi or hard-SF and the right comedic fantasy has yet to hit his inbox, (please don’t comp Douglas Adams or Sir Terry). John would like you to submit a covering letter, 1-2 page synopsis and the first three chapters (or 10,000 words whichever is longest) of your manuscript in a single word document. (In addition to the paid sessions, John is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Wednesday 15th January 2025

22nd January John Baker #Agent121. Looking for: YA/NA FANTASY, SFF, HORROR, ADULT FICTION
Delivered Online + more
£72

Professional Certificate Course in Communication and Delegation in Health and Social Care in London 2024

4.9(261)

By Metropolitan School of Business & Management UK

The aim of this course is to provide learners with a comprehensive understanding of organizational communication, delegation, and supervision in health and social care settings. The course covers topics such as the concept of organizational communication. It also explores the concept of delegation. Additionally, the course covers the concept of supervision, its importance, and the key skills required for effective supervision in health and social care settings. By the end of this course, learners will be equipped with the knowledge and skills required to communicate effectively, delegate tasks appropriately. After the successful completion of the course, you will be able to learn about the following, The concept of organisational communication. The concept of delegation in health and social care. The concept of supervision in health and social care.   The aim of this course is to provide learners with a comprehensive understanding of communication, delegation, and supervision in health and social care settings. The course covers topics such as the concept of organizational communication. The course also explores the concept of delegation. Additionally, the course will focus on the concept of supervision. By the end of this course, learners will be equipped with the knowledge and skills required to communicate effectively, delegate tasks appropriately, and provide effective supervision to staff in health and social care settings, ultimately improving the quality of care provided to patients and clients. The aim of this course is to provide learners with a comprehensive understanding of organizational communication, delegation, and supervision in health and social care settings. The course covers topics such as the concept of organizational communication. It also explores the concept of delegation. Additionally, the course covers the concept of supervision, its importance, and the key skills required for effective supervision in health and social care settings. By the end of this course, learners will be equipped with the knowledge and skills required to communicate effectively, delegate tasks appropriately. VIDEO - Course Structure and Assessment Guidelines Watch this video to gain further insight. Navigating the MSBM Study Portal Watch this video to gain further insight. Interacting with Lectures/Learning Components Watch this video to gain further insight. Communication and Delegation in Health and Social Care - N Self-paced pre-recorded learning content on this topic. Communication and Delegation in Health and Social Care Put your knowledge to the test with this quiz. Read each question carefully and choose the response that you feel is correct. All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course. The certificate is designed to enhance the learner's knowledge in the field. This certificate is for everyone eager to know more and get updated on current ideas in their respective field. We recommend this certificate for the following audience. Healthcare Communications Manager Social Care Team Leader Delegation and Compliance Specialist Health Services Supervisor Community Engagement Coordinator Patient Liaison Officer Healthcare Communications Consultant Care Management Coordinator Delegation and Empowerment Coach Social Services Communications Director. Average Completion Time 2 Weeks Accreditation 3 CPD Hours Level Advanced Start Time Anytime 100% Online Study online with ease. Unlimited Access 24/7 unlimited access with pre-recorded lectures. Low Fees Our fees are low and easy to pay online.

Professional Certificate Course in Communication and Delegation in Health and Social Care in London 2024
Delivered Online On Demand14 days
£34

NCSP 800-171 Specialist

By IIL Europe Ltd

The NCSP® 800-171 Specialist accredited (APMG International), certified (NCSC/GCHQ-UK), and recognized (DHS-CISA-USA) certification course teaches Digital Business, Operational Stakeholders, Auditors, and Risk Practitioners a Fast-Track approach to adopting and adapting the 800-171 controls in the context of a NIST Cybersecurity Framework program. This course looks at the impact of adapting a principled approach to the enterprise risk management (ERM) framework to better support cybersecurity decisions, establishing the context for the selected informative reference (IR). It guides participants on the best approach to adapting, implementing, and operating (AIO) a comprehensive cybersecurity program that can be integrated into the existing organizational capabilities and incorporates the selected IR. NCSP® 800-171 Specialist introduces the integration of typical enterprise capabilities with cybersecurity from the selected cybersecurity IR perspective. The overall approach places these activities into a systems-thinking context by introducing the service value management system (SVMS), including governance, assurance, and the Z-X model. With this in place, the course presents the approach to adapt, implement, operate, and improve the organizational cybersecurity posture that builds on the application of the FastTrack™ concept presented in the NCSP Practitioner course. The NIST Cybersecurity Professional (NCSP®) program is the industry's first accredited certification training program that teaches organizations how to build a Digital Value Management Overlay System capable of leveraging the NIST Cybersecurity Framework to deliver the secure, digital business outcomes expected by executives, government regulators, and legal advisors.

NCSP 800-171 Specialist
Delivered OnlineFlexible Dates
£2,995

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered Online
£3,495