• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2305 Courses in Cardiff delivered Live Online

Using work styles in teams

5.0(2)

By The Self Leadership Initiative

Leverage your team's work styles to achieve more

Using work styles in teams
Delivered OnlineFlexible Dates
£10

Ethical decision making

5.0(2)

By The Self Leadership Initiative

Learn how to break down ethical dilemmas into steps to help you make wiser decisions.

Ethical decision making
Delivered OnlineFlexible Dates
£10

Report writing (In-House)

By The In House Training Company

This very practical session is designed to enable participants to improve the impact, clarity and accuracy of their reports. It focuses equally on the two key areas - structure and writing technique. This course will help participants: Scope reports based on objective and intended readership Write a structured report Use the Fog Index to ensure readability Write grammatically correct and well-punctuated text Review and edit their work. 1 Introduction Objectives and overview Introductions and personal aims 2 What makes a good report? Practical activity and feedback 3 Before you start The planning process and scoping a report Organising information Key report headings What goes where? Writing practice and review 4 Writing tips and techniques Clear English and use of language Grammar and sentence structure Refresher in punctuation Writing in the third person The Fog Index - and how to measure readability 5 Pulling it all together Reviewing and proofing 6 Review Summary of key learning points Action planning

Report writing (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

BOHS (international) IP403 - Asbestos Fibre Counting (PCM)

By Airborne Environmental Consultants Ltd

The main subject areas of the course are: Setting up of microscopes. Filter preparation, fibre counting and outline of air sampling equipment. Calculation of results, quality control, reporting and communication.

BOHS (international) IP403 - Asbestos Fibre Counting (PCM)
Delivered in Manchester + 1 more or OnlineFlexible Dates
Price on Enquiry

Commercial instinct (In-House)

By The In House Training Company

An insightful, enjoyable and experiential programme to help you analyse data and information and make a balanced decision based upon sound commercial reasoning. It will enable you to identify options, make decisions and take actions based on a thorough analysis combined with instinct and intuition to make a positive effect on profitability. This programme will help you: Identify ways to analyse data and sort relevant from irrelevant information Develop analytical and numerate thinking, and consider the financial implications of a decision Make decisions based on sound commercial reasoning - a mix of intuition and analysis Select from a range of tools to analyse a situation and apply these effectively Understand how costs and profits are calculated Use tried-and-tested techniques to manage and control your budgets Appreciate the fundamentals of financial analysis Focus on the bottom line Identify the basics of capital investment appraisal for your business Evaluate results and seek opportunities for improvement to your business 1 The commercial environment What do shareholders and investors want? What do managers want? Profit v non-profit organisations Investor expectations 2 Financial and non-financial information Risk and reward considerations Drivers of commercial decisions 3 Running a business A practical exercise to bring financial statements to life Different stakeholder interests in a business The impact and consequences of decisions on financial statements 4 Where do I make a difference to the organisation? How can I contribute to an improved business performance? Key performance indicators - measuring the right things A 'balanced scorecard' approach - it's not all about money! 5 A 'balanced scorecard' approach Analysing and reviewing my contribution to the business direction What is the current focus of my commercial decisions? Developing the business in the right way - getting the balance right! Where should/could it be in the future? Do my decisions support the overall vision and strategy? 6 Making commercial decisions Left-brain and right-brain thinking Convergent and divergent thinking Analysis and instinct Interactive case study exercise - emotional and rational decisions Reflection - what is my style of making decisions 7 Let's consider the customer! Identifying target markets Differentiating propositions and products Customer service considerations Marketing considerations and initiatives Pricing strategies and considerations 8 Strategic analysis The external environment The internal environment LEPEST analysis SWOT analysis Forecasting Group activity - analysing markets and the competition How do these improve your decisions? 9 Comparing performance Analysing key financial ratios Ways to compare performance and results Break-even analysis 10 Profit and loss accounts and budgeting Managing income and expenditure The budgeting process How does this link to the profit and loss account? Managing and controlling a cost centre/budget The role of the finance department Different ways of budgeting Incremental budgeting Zero-based budgeting 11 Understanding the balance sheet Purpose of balance sheets Understanding and navigating the content What does a balance sheet tell you? How do you affect your balance sheet? Links to the profit and loss account A practical team exercise that brings financial statements to life 12 Business decisions exercise How does this improve your decisions? A practical exercise to apply new knowledge and bring commercial thinking to to life The impact and consequences of decisions on financial statements 13 Working capital Why is this important? The importance of keeping cash flowing Business decisions that affect cash Calculating profit 14 Capital investment appraisal Capex v Opex Payback Return on investment The future value of money The concept of hurdle rate 15 Lessons learned and action planning So what? Recap and consolidation of learning The decisions that I need to consider Actions to achieve my plan

Commercial instinct (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

GDPR Workshop

By Computer Law Training

A one day course on GDPR for beginners, including practical exercises.

GDPR Workshop
Delivered OnlineFlexible Dates
£250

Total Accounting Training Course Package - With Guaranteed Job Placement

By Osborne Training

Total Accounting Training Course Package - With Guaranteed Job Placement It is a comprehensive practical accounting training program designed to build the bridge between knowledge and practical aspects of accounting and tax. With this accounting courses many modules of tax and accounting are covered as well as Computerised Accounting & Payroll. Moreover, After completing the modules you will have the chance to get hands on experience which will open the door for lucrative Accounting, Tax & Payroll sector. CompletOsborne Trainingion of this training program will earn you valuable verified CPD points. As an accountant, it is vital to gain CPD points to retain your accounting membership and to comply with Professional Accounting Bodies (such as ACCA, AAT, CIMA, ICAEW etc.) requirements. Advanced Excel Bookkeeping VAT Training - Preparation and Submission Personal Tax Return Training Company Accounting and Tax Training Sage 50 Accounting Training Sage Payroll Training

Total Accounting Training Course Package - With Guaranteed Job Placement
Delivered in London or OnlineFlexible Dates
Price on Enquiry

BOHS (international) IP404 - Air monitoring, clearance testing and issuing clearance certificates

By Airborne Environmental Consultants Ltd

The main subject areas of the course are: Good practice in asbestos removal or remediation Asbestos Removal Control Plans Air sampling for asbestos Enclosures, clearance air monitoring and reporting

BOHS (international) IP404 - Air monitoring, clearance testing and issuing clearance certificates
Delivered in Manchester + 1 more or OnlineFlexible Dates
Price on Enquiry

Attacking and Securing .Net Web Applications (TT8320-N)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate-level programming course, designed for experienced .Net developers who wish to get up and running on developing well defended software applications. Real world programming experience with .Net is required. Overview Students who attend Attacking and Securing .Net Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a .Net perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on .Net security training that offers a unique look at .Net application security. Beginning with penetration testing and hunting for bugs in .Net web applications, you thoroughly examine best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, driving home the mechanics of how to secure .Net web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Injection Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? .NET Issues and Best Practices Making Application Security Real Time Permitting Topics Cryptography Overview .NET Cryptographic Services

Attacking and Securing .Net Web Applications (TT8320-N)
Delivered OnlineFlexible Dates
Price on Enquiry

Attacking and Securing Java / JEE Web Applications (TT8320-J)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate -level programming course, designed for experienced Java developers who wish to get up and running on developing well defended software applications. Familiarity with Java and JEE is required and real world programming experience is highly recommended. Ideally students should have approximately 6 months to a year of Java and JEE working knowledge. Overview Students who attend Attacking and Securing Java Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a Java/JEE perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on Java / JEE security training that offers a unique look at Java application security. Beginning with penetration testing and hunting for bugs in Java web applications, you embrace best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, allowing you to experience the mechanics of how to secure JEE web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? Making Application Security Real

Attacking and Securing Java / JEE Web Applications (TT8320-J)
Delivered OnlineFlexible Dates
Price on Enquiry