• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3890 Courses in Cardiff delivered Live Online

GRAPHIC FACILITATION – AN INTRODUCTION

By Inclusive Solutions

This day will introduce you to the basic techniques and skills involved in doing graphic facilitation. Learn how to use a BIG piece of paper and a handful of pens to create a memorable summary of your training day, team meeting or your work with young people and families. Learn how to harvest the essence of an event in a visual representation. This is a ‘hands on’ interactive day built around demonstrations of graphic facilitation, coaching and the chance to try things out. Ideal for teams who can then go on together to practice, practice, practice. Learning Objectives To introduce you to the basic skills of graphic facilitation – no previous experience is needed To develop your capacity to ‘listen under the words’ and draw out the deeper messages To help you suspend your self-doubt – “I can’t draw!” and rediscover your capacity to create an effective visual representation of a meeting/training day/conversation etc Course Content The day will introduce you to the fundamentals of graphic facilitation and will include the following topics: Pens, Pastels and Paper – what you will need to get started The basic ‘grammar’ of graphic facilitation; the essential shapes, using colour, images, lettering, words, creating connection How to listen for the essence of what is being said and translate this into visual language A chance to do it live – with coaching

GRAPHIC FACILITATION – AN INTRODUCTION
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

INSIGHTS AND SOLUTIONS CIRCLE

By Inclusive Solutions

This can be introduced in one day but is better offered over a series of twilight or half day workshops with individualised coaching. We will provide background context for this approach and will directly model the process with real live issues facing participants. So bring your most challenging concerns to this training. Course Category Behaviour and Relationships Visioning and Problem Solving Team Building and Leadership Description ‘Insights and Solutions Circle’ a new expanded version of Solution Circle that uses some of the best of the Circle of Adults process. Its a 50 minute process and works really well with families and professionals! Contact us today for a live demo or training… Steps Problem presented Questions asked Theories Shared Strategies listed Dialogue regarding selected strategies Next steps Testimonials Excellent! It was great how we all cam up with ideas and theories including us parents I wish all meeting about my child’s behaviour were like this The whole world is going to be interested in this… The empowerment is great The buzz after the meeting says it all. Learning Objectives Deeper understanding of what is actually happening underneath the presenting behaviour Increased confidence in managing and building relationships with challenging pupils in mainstream schools Learn process for locating richer and wider range of practical strategies to impact on behaviour problems Deeper understanding of yourself and the psychodynamic processes happening between pupils, staff and pupils and families Opportunity to reflect on professional practice Mutual support established with other front line practitioners Who Is It For ? Team Around the Child agencies Parents and Professional working together Families Multi Agency Teams Social workers CAMHS teams Year Managers Primary and secondary staff teams Early Years and School based Practitioners Heads and Deputies SENCOs Advanced Skills Teachers Primary and secondary teachers Local Authority Support Services Course Content This can be introduced in one day but is better offered over a series of twilight or half day workshops with individualised coaching. We will provide background context for this approach and will directly model the process with real live issues facing participants. So bring your most challenging concerns to this training. The course answers the questions: Can we find an alternative to permanent exclusion or special unit or school placement? Cannot understand why a child is behaving as they do? Struggling with a child for whom praise is ineffective? Feeling isolated in your responses to a child’s needs? Worried about where your instinctive reactions are leading you? Cannot seem to get any consensus view of a young person’s behaviour/needs amongst all the family and professionals involved – is everyone pulling in different directions? We will cover: Setting the tone Background and detailed teaching of process Inclusion values underpinning this work Graphic and process facilitation skills Processes modelled and opportunities to try process out with coaching Practical setting up of insights and solutions circles Lessons learned If you liked this you may like: CIRCLES OF ADULTS…

INSIGHTS AND SOLUTIONS CIRCLE
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

DDOS demystified

5.0(3)

By Systems & Network Training

DDOS demystified training course description This course covers DDOS attacks and how to defend against them. The course starts by studying DOS attacks and then DDOS attack. Reflectors, booters and stressers are followed by reflection and amplification. Once the various DDOS attacks have been covered we then study the ways to defend against DDOS attacks. What will you learn Describe DDOS. Explain how DDOS attacks work. Recognise DDOS attack types. Describe how to defend DDOS attacks. DDOS demystified training course details Who will benefit: Anyone involved in network security. Prerequisites: Network fundamentals Duration 1 day DDOS demystified training course contents What is DOS? Denial Of Service, outages, Attackers, Command and control, Bots. Why DOS? What is DDOS? Distributed, reflectors, botnets, botnet topologies, amplification, attack bandwidth, attack vectors, booters, stressers, backscatter, DirtJumper, XOR. RUDY. High and Low orbit Ion Cannon. Attack types Application layer attacks, HTTP flood, protocol attacks, SYN floods, teardrop, volumetric attacks, slowloris, DNS cachebusting, fraggle, smurf. IP address spoofing. Reflectors Reflector attacks, amplification attacks, quotients, embedded devices, DNS, NTP, SSDP. DDOS defence Protecting devices from becoming bots. Onsite, outsourced scrubbing, Defending self, defending the Internet, Black hole routing, rate limiting, intelligent application firewalls, anycast, IPS, upstream filtering, BCP38, BCP 140. uRPF.

DDOS demystified
Delivered in Internationally or OnlineFlexible Dates
£1,397

Microsoft Excel in Depth: Virtual In-House Training

By IIL Europe Ltd

Microsoft Excel® in Depth: Virtual In-House Training The goal of this course is to provide a deeper understanding of Excel and its intricacies and a new ability to use it efficiently producing the best solutions for your projects. This practical course provides a solid background of the features of Excel and a deeper understanding of its features, benefits and uses. This is not a beginner's course in Excel. You will learn some advanced features such as Pivot Tables, Charting, Tables, Sorting, Filtering and Functions. The goal of this course is to provide a deeper understanding of Excel and its intricacies and a new ability to use it efficiently producing the best solutions for your projects. What you Will Learn You'll learn how to: Use functions like IF, AVERAGE, SUMIF, SUMIFS, SUMPRODUCT, INDEX, MATCH, CHOOSE, DATE, and many more Create meaningful charts Use pivot tables Use Conditional Formatting, Data Validation Take advantage of using Named ranges, do sorting, filtering, tables Getting Started The building blocks of Excel, built-in functions, will be examined The basics of formatting your data will be examined Shortcuts and data manipulation will be explored Built-in features like those mentioned in the 'What you will learn' section above will be explored in detail Excel Functions - VLOOKUP, IF, INDEX, MATCH, CHOOSE, SUMIF, SUMIFS, SUMPRODUCT, DATE, so many more Using Named ranges, Data Validation, Sorting, and Filtering Learn the Name manager; Learn the difference between local and global names; Ensure correct access to linked workbooks; Ensure data accuracy; Learn how to use cascading data validation (for example, once a user chooses 'cars', another cell allows only Ford, Toyota, etc.); Sorting by more than 3 fields; Filtering by font, pattern, or value; See your data based on things like dates in the 3rd quarter, or fields where quantity x price is greater than some fixed value Conditional formatting and data formatting Make relevant data stand out Isolate highs and lows Make error cells invisible Learn about Data bars, Icon sets, and Color scales Highlight differences between worksheets Learn all the codes in the Format/Number list Using cell Styles Learn all about alignment, protection, borders, colors and more Pivot Tables Learn how to summarize large amounts of data with a few clicks Learn various ways of presenting the data Learn the various pivot table tools Learn how to customize and format a pivot table to suit your needs Learn how to group data Learn how to use the various options to present your data Charts Learn how to create a chart with one keystroke! Learn the 11 types of built-in charts Learn how to create a chart with one keystroke! Learn how to customize the charts to make the information tell the right story Learn how to use the design, layout, and formatting available to charts in Excel 2007 Learn embedded charts versus chart sheets Learn how to use modify all the pieces of a chart Array formulas Learn how to use the most powerful formulas in Excel Learn how to combine many formulas into one compact array-formula Learn the real power of these formulas and why regular formulas can't do the job Learn how to use built-in array formulas, like TREND or TRANSPOSE

Microsoft Excel in Depth: Virtual In-House Training
Delivered OnlineFlexible Dates
£850

ISO 27001 (2022) Lead Auditor

By Training Centre

  Delivered in either Live Online (4 days) or in our Classroom (5 days), the ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO 27001. During this training course, you will acquire the knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process. About This Course   Based on practical exercises, you will be able to master audit techniques and become competent to manage an audit program, audit team, communication with customers, and conflict resolution. After acquiring the necessary expertise to perform this audit, you can sit for the exam and gain the "ISO/IEC 27001 Lead Auditor' credential. By holding this Lead Auditor Certificate, you will demonstrate that you have the capabilities and competencies to` audit organizations based on best practices.   The training course is based on both theory and best practices used in ISMS audits Lecture sessions are illustrated with examples based on case studies Practical exercises are based on a case study which includes role playing and discussions Practice tests are similar to the Certification Exam   The course is delivered both as a Live Online or Classroom environment, as follows; Day 1: Introduction to Information Security Management Systems (ISMS) and ISO/IEC 27001 Day 2: Audit principles, preparation and launching of an audit Day 3: On-site audit activities Day 4: Closing the audit and Examination   Learning Objectives Understand the operations of an Information Security Management System based on ISO/IEC 27001 Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks Understand an auditor's role to: plan, lead and follow-up on a management system audit in accordance with ISO 19011 Learn how to lead an audit and audit team Learn how to interpret the requirements of ISO/IEC 27001 in the context of an ISMS audit Acquire the competencies of an auditor to: plan an audit, lead an audit, draft reports, and follow-up on an audit in compliance with ISO 19011   The exam covers the following competency domains:   Domain 1: Fundamental principles and concepts of an Information Security Management System (ISMS) Domain 2: Information Security Management System controls and best practices based on ISO/IEC 27002 Domain 3: Planning an ISMS implementation based on ISO/IEC 27001 Domain 4: Implementing an ISMS based on ISO/IEC 27001 Domain 5: Performance evaluation, monitoring and measurement of an ISMS based on ISO/IEC 27001 Domain 6: Continual improvement of an ISMS based on ISO/IEC 27001 Domain 7: Preparing for an ISMS certification audit Prerequisites   A foundational understanding of ISO/IEC 27001 and knowledge of audit principles.    What's Included?   Refreshments & Lunch (Classroom only) Course Slide Deck Official Study Materials CPD Certificate The Exam   Who Should Attend?   Auditors seeking to perform and lead Information Security Management System (ISMS) certification audits Managers or consultants seeking to master an Information Security Management System audit process Individuals responsible for maintaining conformance with Information Security Management System requirements Technical experts seeking to prepare for an Information Security Management System audit Expert advisors in Information Security Management Our Guarantee   We are an approved IECB Training Partner for all of our courses. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training and exam retake offered Accreditation Assessment     Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 12 question, essay type exam on Day 4 of the course. The overall passing score is 70%, to be achieved within the 240 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success.   Provided by   This course is Accredited by NACS and Administered by the IECB

ISO 27001 (2022) Lead Auditor
Delivered OnlineFlexible Dates
£1,450

Streaming telemetry for engineers

5.0(3)

By Systems & Network Training

Streaming telemetry training course description An introduction to streaming telemetry. The course progresses from a brief look at the weaknesses of SNMP onto what streaming telemetry is, how it differs from the xflow technologies, the data formats available and how to configure it. What will you learn Describe streaming telemetry. Explain how streaming telemetry works. Describe the data presentation formats available. Configure streaming telemetry. Streaming telemetry training course details Who will benefit: Network engineers. Prerequisites: TCP/IP foundation for engineers. Duration 1 day Streaming telemetry training course content What is streaming telemetry? SNMP weaknesses, Netflow, sflow, polling and the old models, push vs pull, What is streaming telemetry? Telemetry streaming architecture Model driven versus event driven telemetry, subscriptions, publications. Periodic versus on change, model selection and scalability. Telemetry streaming protocols TCP, UDP, SSH, HTTP, HTTP2, NETCONF, RESTCONF, gRPC, gNMI. Models and Encoding The role of YANG. YANG models and tools. XML/ NETCONF, JSON/RESTCONF, JSON over UDP. Protocol buffers/gRPC. Google Protocol Buffers Decoder ring, protocol definition file. GPB-KV, GPB-Compact. Keys. Streaming telemetry configuration Router: Destination, Sensor, subscription. Collector: YANG models, .proto file. Pipeline. ELK: Consume, store, visualise streaming data. Collection tools APIs, YANG development Kit, Downstream consumers, influxdata, Grafana, Kafka, Prometheus, others.

Streaming telemetry for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,397

Total TRILL for engineers

5.0(3)

By Systems & Network Training

Total TRILL training course description A comprehensive look at Transparent Interconnection of Lots of Links (TRILL). This TRILL course starts with the problems in traditional switched networks then moves onto to how TRILL solves these problems. As IS -IS is key to loop free topologies in TRILL networks, this protocol is also studied. What will you learn Explain the benefits of TRILL. Explain how TRILL works. Explain the role of IS-IS in TRILL. Integrate TRILL into existing networks. Total TRILL training course details Who will benefit: Technical staff working with Ethernet. Prerequisites: Definitive Ethernet switching for engineers Duration 1 day Total TRILL training course contents What is TRILL? Layer 2 versus Layer 3, STP problems: One path, convergence, MAC explosion. TRILL switches, RBridges, TRILL campus. TRILL standards TRILL components RBridges, mixing Rbridges with bridges, appointed forwarders. IS-IS Link layer IS-IS, SPF trees, traffic management. IS-IS extensions for TRILL. ISIS TLV. How TRILL works TRILL IS-IS hello discovery, Designated bridge, IS-IS flooding, Appointed forwarder, unicast versus multi-destination frames. TRILL nicknames. TRILL packet headers Local link header, TRILL header. TRILL over Ethernet, TRILL over PPP. VLANs. Fine grained labelling. TRILL BFD. TRILL OAM. Frame overheads. TRILL comparisons MPLS, IP, 802.1aq.

Total TRILL for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,397

Multi Venue Stage Rally Co-Driving

By Rally Navigation Training Services

Rally training webinar for co-drivers looking to take the step up from single venue stage rallies or road rallying to multi-venue stage rallies.

Multi Venue Stage Rally Co-Driving
Delivered Online
£30

Risk Management for IT Projects: Virtual In-House Training

By IIL Europe Ltd

Risk Management for IT Projects: Virtual In-House Training IT projects may have direct bottom-line impact on the organization, cost millions of dollars, cause organizational change and change the way the organization is perceived by clients. Many IT projects are notoriously hard to predict and are filled with risk. IT Risk Management takes a comprehensive look at IT project risk management using PMI's PMBOK® Guide Risk Management Model in the context of IT Project Life Cycle phases. The goal of this course is to arm the practitioner with a rigorous, common-sense approach to addressing uncertainty in projects. This approach includes the ability to influence project outcomes, avoid many potential project risks, and be ready to calmly and efficiently respond to unavoidable challenges. What you will Learn You'll learn how to: Describe the risk management process, using the PMBOK® Guide's standard models and terminology Discuss the potential barriers to managing risk effectively in IT project organizations Develop an effective risk management plan for IT projects Identify project risks using IT-specific, practical tools Analyze individual risk events and overall project risk using IT-specific, practical approaches Plan effective responses to IT-specific risk based on the results of risk analysis and integrate risk responses into project schedules and cost estimates Manage and control risk throughout the IT project life cycle Implement selected elements of IT project risk management on your next project Foundation Concepts Basic concepts and purpose Risk and project constraints Risk and corporate cultures Risk management and IT PLC standards Plan Risk Management for IT Projects Plan Risk management process Plan Risk management activities Design a standard template Assess the project-specific needs Tailor the template Produce a project-specific risk management plan Gain consensus and submit as part of overall project plan A risk management plan of IT projects Identify Risks for IT Projects Identify risk process overview Risk categories and examples Risk identification tools Risk events by project life-cycle phases Perform Risk Analysis for IT Projects Perform qualitative risk analysis overview Core qualitative tools for IT projects Auxiliary qualitative tools for cost and schedule estimates When to use quantitative analysis for IT projects Plan Risk Response for IT Projects Plan risk response overview Active risk response strategies for IT projects (Threat and Opportunity) Acceptance and contingency reserves Contingency planning for IT projects Plan risk responses for IT projects Implement Risk Response for IT Projects Implement Risk Responses Executing Risk Response Plans Techniques and Tools Used Continuous Risk Management Monitor Risks for IT Projects Monitor risks overview Monitor risks tips for IT projects Technical performance measurement systems Risk management implementation for IT projects

Risk Management for IT Projects: Virtual In-House Training
Delivered OnlineFlexible Dates
£850

IP security foundation for engineers

5.0(3)

By Systems & Network Training

IP security training course description Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls. What will you learn Describe: Basic security attacks RADIUS SSL IPSec VPNs Implement digital certificates Deploy firewalls to protect Web servers and users. Secure Web servers and clients. IP security training course details Who will benefit: Network administrators. Network operators. Security auditors Prerequisites: TCP/IP foundation for engineers Duration 2 days IP security training course contents TCP/IP review Brief overview of the relevant headers. Hands on Download software for course, use analyser to capture passwords on the wire. Security review Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death… keeping up to date with new threats. Hands on Use a port scanning tool, use a 'hacking' tool. Firewalls Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses. Hands on Set up a firewall and prevent attacks. NAT NAT and PAT, Why use NAT, NAT-ALG, RSIP. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Run a password-cracking program. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS. Hands on Using certificates. Web client and server security Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts. Hands on Browser security. VPNs and IPSec What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.

IP security foundation for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,497