• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

295 Courses in Cardiff delivered Live Online

C)ISSO - Certified Information Security Systems Officer Mile 2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview The person who carries this certification should be able to acquire necessary resources, advise senior leadership, collaborate with stakeholders, evaluate effectiveness, identify cybersecurity problems, manage threats, oversee information security awareness programs, participate in risk assessments, support compliance activities, and define or implement policies and procedures to ensure protection of critical infrastructure within an information security environment. If you are looking for the ?gotta have it? cybersecurity course, then the Certified Information Systems Security Officer is for you.ÿ The C)ISSO will prepare you for multiple managerial roles inside the INFOSEC community by covering a broad range of topics. You will learn theories in security concepts, practices, monitoring and compliance in IS management. An Information Systems Security Officer is able to implement and maintain cost-effective security controls that are closely aligned with business and industry standards. The C)ISSO certification course is an idealÿway to increaseÿknowledge, expertise, and skill for managers, auditors, and INFOSEC professionals.ÿ At Mile2 we consider the C)ISSO to be one of our flagship courses.The things you learn in this course can be applied to management, prevention teams, and recovery professionals. Material learned in the Live Class or Self-Study options will apply directly to the certification exam. Course Outline Risk Management Security Management Identification and Authentication Access Control Security Models and Evaluation Operations Security Vulnerability Assessments Symmetric Cryptography and Hashing Network Connections Network Protocols and Devices Telephony, VPNs, and Wireless Security Architecture and Attacks Software Development Security Database Security Malware and Software Attacks Business Continuity Disaster Recovery Incident Management, Law, and Ethics Physical Security Additional course details: Nexus Humans C)ISSO - Certified Information Security Systems Officer Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSO - Certified Information Security Systems Officer Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)ISSO - Certified Information Security Systems Officer Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou

Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry

Diploma in Health and Social Care Level 3

By NextGen Learning

Diploma in Health and Social Care Level 3 Course Overview The Diploma in Health and Social Care Level 3 offers a comprehensive introduction to the field, equipping learners with the essential skills and knowledge required to work effectively in health and social care environments. This course covers a wide range of topics, from communication strategies to understanding professional standards, safeguarding, and risk management. It is designed for those who wish to build a career in this rewarding sector, providing them with the practical insights and knowledge needed to make a positive impact on the lives of others. By completing this course, learners will gain the expertise to support vulnerable individuals, promote equality and diversity, and contribute to a high standard of care and safety in various healthcare settings. Course Description This course delves into the fundamental aspects of working in health and social care, including the roles, rights, and responsibilities of a healthcare worker. Learners will explore communication techniques, ethical issues, and the legal and professional standards that underpin effective practice. The course also examines how to promote equality, diversity, and rights within the workplace, along with safeguarding principles to protect vulnerable individuals. In addition, it covers important health and safety protocols, risk management strategies, and the essential duties of caregivers and healthcare professionals. This qualification will provide learners with a well-rounded understanding of the industry, preparing them to make informed decisions and take on various responsibilities within the sector. Learners will also have the opportunity to reflect on their development and enhance their critical thinking and decision-making abilities in care-related contexts. Diploma in Health and Social Care Level 3 Curriculum: Module 01: Introduction to Health and Social Care Module 02: Communication and its Relevance Module 03: Rights and Responsibilities as a Health and Social Care Worker Module 04: Role as A Caregiver and Healthcare Professional Module 05: Working in Health and Social Care; Promoting Equality, Diversity and Rights Module 06: Important Principles and Policies in Health and Social Care Work Module 07: Understanding Legal, Professional Standards of Practice and Ethical Aspects of Health Care Part – 1 Module 08: Understanding Legal, Professional Standards of Practice and Ethical Aspects of Health Care Part – 2 Module 09: Safeguarding Vulnerable Individuals Module 10: Health and Safety Responsibilities Module 11: Risk Management in Health and Social Care (See full curriculum) Who is this course for? Individuals seeking to work in health and social care. Professionals aiming to advance their careers in healthcare settings. Beginners with an interest in health, care, and social services. Those seeking to understand and support the rights of vulnerable individuals. Career Path Caregiver Healthcare Assistant Social Care Worker Health and Safety Officer Care Coordinator Safeguarding Officer Risk Management Specialist Equality and Diversity Officer

Diploma in Health and Social Care Level 3
Delivered OnlineFlexible Dates
£7.99

Scrum Developer Certified (SDC)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This is highly recommended for everyone in a company who works in a Scrum Team or anyone who interacts with any Scrum Team. This will also be very useful for those who are interested in understanding the basics of Scrum and how this method could be used effectively. Overview To ensure that students understand the basics of Scrum To enable Scrum Team members to effectively contribute to a Scrum project. To enable Scrum Team members to apply Scrum effectively in Scrum/Agile projects. In this course, students learn to understand the basics of Scrum, effectively contribute to a Scrum project, and learn how to enable Scrum Team members to apply Scrum effectively in Scrum/Agile projects.Successful candidates will be awarded the Scrum Developer Certified (SDC?) certification by SCRUMstudy after passing the included certification exam. Introduction Agile Overview Scrum Overview Principles The Six Scrum Principles Organization Core Roles and Non-core Roles Business Justification Value-driven Delivery Factors used to Determine Business Justification Confirm Benefits Realization Quality Quality Defined Quality, Scope and Business Value Quality Management in Scrum Change Unapproved and Approved Changes Change in Scrum Risk Risks and Issues Risk Management Procedure Introduction to Scrum Project PhasesInitiate Create Project Vision Process Identify Scrum Master and Stakeholders Process Form Scrum Team and Develop Epics processes Create Prioritized Product Backlog and Conduct Release Planning Processes Plan and Estimate Create User Stories Process Estimate User Stories and Commit User Stories Processes Identify Tasks and Estimate Tasks Processes Create Sprint Backlog Process Implement Create Deliverables and Conduct Daily Stand-up processes Groom Prioritized Product Backlog Process Review and Retrospect Demonstrate and Validate Sprint Process Retrospect Sprint Process Additional course details: Nexus Humans Scrum Developer Certified (SDC) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Scrum Developer Certified (SDC) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Scrum Developer Certified (SDC)
Delivered OnlineFlexible Dates
Price on Enquiry

Accounting and Finance

By NextGen Learning

Accounting and Finance Course Overview: This Accounting and Finance course offers a comprehensive understanding of the key principles and practices involved in accounting and finance. Learners will gain insights into essential financial concepts, from understanding the role of accountants to analysing financial statements. The course equips learners with the skills needed to navigate the world of financial management, preparing them for a wide range of opportunities in the finance industry. By completing this course, learners will be able to confidently approach financial tasks, from budgeting to risk management, and develop a clear understanding of the financial decision-making process. Course Description: This course covers the fundamentals of accounting and finance, offering in-depth insights into financial processes, accounting mechanics, and the preparation and analysis of financial statements. Learners will explore the role of accountants, budgeting and budgetary control, and financial markets, while also gaining a strong foundation in financial risk management and investment strategies. With a focus on analytical skills, the course will help learners develop a deeper understanding of financial operations and decision-making. By the end of the course, participants will be well-equipped to analyse financial data, manage risks, and apply their knowledge in a range of financial contexts. Accounting and Finance Curriculum: Module 01: Introduction to Accounting and Finance Module 02: The Role of an Accountant Module 03: Accounting Process and Mechanics Module 04: Introduction to Financial Statements Module 05: Financial Statement Analysis Module 06: Budgeting and Budgetary Control Module 07: Financial Markets Module 08: Financial Risk Management Module 09: Investment Management Module 10: Auditing (See full curriculum) Who is this course for? Individuals seeking to gain a solid understanding of accounting and finance. Professionals aiming to develop their financial management skills. Beginners with an interest in the finance or accounting industries. Those looking to transition into a finance-focused career. Career Path: Accountant Financial Analyst Budget Analyst Investment Advisor Risk Manager Auditor Finance Manager Banking and Financial Services

Accounting and Finance
Delivered OnlineFlexible Dates
£7.99

Know Your Customer (KYC)

By NextGen Learning

Know Your Customer (KYC) Course Overview: The "Know Your Customer (KYC)" course is designed to provide learners with a comprehensive understanding of KYC processes, their relevance in financial services, and the associated regulatory requirements. Covering vital topics such as customer identification, anti-money laundering (AML) strategies, and the protection of data privacy, this course equips learners with the knowledge needed to navigate the complex landscape of KYC compliance. By the end of the course, learners will be able to apply these concepts in their daily professional roles, ensuring adherence to industry regulations and maintaining robust compliance standards. Course Description: This course delves deeper into the principles of KYC, focusing on customer due diligence, risk management, and anti-money laundering (AML) practices that safeguard organisations against financial crimes. Learners will explore the relevant regulations governing KYC in the UK and the methods used to conduct thorough customer verification. Additionally, the course provides insights into data privacy requirements, helping businesses mitigate risks and comply with industry standards. With interactive learning modules and assessments, this course ensures that participants gain practical knowledge, enhance their professional skills, and build a strong foundation in KYC and AML compliance. Know Your Customer (KYC) Curriculum: Module 01: Introduction to KYC Module 02: Customer Due Diligence Module 03: AML (Anti-Money Laundering) Module 04: KYC, AML, and Data Privacy Regulations for Business Operations in the United Kingdom Module 05: Regulations to be Complied by Industries Module 06: Methods for Carrying Out KYC and AML and the Future of KYC Compliance (See full curriculum) Who is this course for? Individuals seeking to understand KYC compliance Professionals aiming to enhance their knowledge of financial regulations Beginners with an interest in finance and regulatory compliance Anyone looking to advance their career in risk management or compliance Career Path Compliance Officer Anti-Money Laundering (AML) Specialist Risk Management Consultant KYC Analyst Financial Compliance Advisor

Know Your Customer (KYC)
Delivered OnlineFlexible Dates
£7.99

Project review (In-House)

By The In House Training Company

All organisations today operate in an environment of constant and rapid change. Managing this change effectively is often achieved through a portfolio of formal projects. Many organisations today have qualified and experienced project management staff to run their projects. Some organisations today have dedicated functions, staff or processes to support their project management teams. The very largest organisations have in-house Enterprise Programme Offices, or project management specialists in corporate audit or risk functions; or organise 'Red Team Reviews' of a project by other staff with project management experience who are not participating in the reviewed project. But for many mid-size businesses and SMEs - and even some larger organisations - these resources are simply not available. For them, having access to external expertise to assure project management disciplines and to coach project managers can be a major contributor to project success. Such reviews can take place at project initiation; at major stage-gates (especially if significant capital is to be committed at the stage-gate); or at any other time if concerns arise concerning project quality, cost or timescales. And it is for those organisations that we offer the necessary expertise, on an ad hoc basis, in reviewing projects and coaching senior project management staff. A document review and workshop led by one of our consultants can help you assess whether: The strategic goals and priorities for the project are clear and being addressed Governance of the project within the business is defined and being effectively executed Project roles and responsibilities are clear and effective The credibility and robustness of the project plan can be enhanced Performance measures and reporting procedures are effective Critical risks are identified and being managed and contingencies are agreed The roles, responsibilities and capabilities of the key players in the project team are fit for purpose Budgets are realistic and costs being managed effectively Communication and change management activities are effectively planned and being executed At your discretion, you can capture the outcomes from the workshop for yourselves, in terms of identifying opportunities for improvement, or you can have our consultant write a report and make recommendations to you.

Project review (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Symantec Data Center Security - Server Advanced 6.0

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for information technology professionals, security professionals, network, system managers and administrators tasked with installing, configuring and maintaining Symantec Data Center Security: Server Advanced. Overview At the completion of the course, you will be able to: Describe the major components of Symantec Data Center Security: Server Advanced and how they communicate. Install the management server, console and agent. Define, manage and create assets, policies, events and configurations. Understand policy creation and editing in depth. course is an introduction to implementing and managing a Symantec Data Center Security: Server Advanced 6.0 deployment. Introduction Course Overview The Classroom Lab Environment Introduction to Security Risks and Risk Security Risks Security Risk Management Managing and Protecting Systems Corporate Security Policies and Security Assessments Host-Based Computer Security Issues SDCS:Server Advanced Overview SDCS: Server Advanced Component Overview Policy Types and Platforms Management Console Overview Agent User Interface Overview DEMO of Management Console Installation and Deployment Planning the Installation Deploying SDCS:SA for High Availability Scalability Installing the Management Server Installing the Management Console Installing a Windows Agent Installing a UNIX Agent LAB: Install Manager and Agents Configuring Assets Asset and Agent Overview Viewing Agents and Assets Managing Agents Managing Agents on Assets LAB: Create Asset Groups LAB: Examine Agent Interface Policy Overview Policies Defined Prevention Policy Overview Process Sets Resource Access Policy Options Detection Policy Overview IDS Capabilities Rules Collectors Policy Management Workspace User Interface on Agent Example Use Cases LAB: Paper Based Scenarios LAB: What type of security strategy should be used? Detailed Prevention Policies Policy Editor Policy Structure Global Policy Options Service Options Program Options Policy Processing Order Network Rules File Rules Registry Rules Process Sets Predefined Policies LAB: Deploy Strict policy LAB: Examine Functionality Advanced Prevention Profiling Applications Customizing Predefined Policies LAB: Modify Policy Previously Deployed LAB: Re-examine Functionality LAB: Preparing for Policy deployment LAB: Best Practice - Covering Basics LAB: Further Enhance Strict Policy LAB: Create Custom Process Set LAB :Secure an FTP Server LAB: Troubleshoot Policy/pset Assignment Using CLI Detection Policies Detection Policies Structure Collectors Rules Predefined Detection Policies Creating a Detection Policy Using the Template Policy LAB: Deploy Baseline Policy LAB: Create Custom Policy Event Management Events Defined Viewing Events Reports and Queries Overview Creating Queries and Reports Creating Alerts LAB: View Monitor Types and Search Events LAB: Create Real Time Monitor Agent Management and Troubleshooting Configurations Defined Creating and Editing Configurations Common Parameters Prevention Settings Detection Settings Analyzing Agent Log Files Diagnostic Policies Local Agent Tool ? sisipsconfig LAB: Create Custom Configurations LAB: Implement Bulk Logging LAB: Disable Prevention on Agent Using CLI LAB: Use Diagnostic Policy to Gather Logs LAB: Troubleshoot a Policy System Management Managing Users and Roles Server Security Viewing and Managing Server Settings Viewing and Managing Database Settings Viewing and Managing Tomcat Settings LAB: Create a New User LAB: View System Settings

Symantec Data Center Security - Server Advanced 6.0
Delivered OnlineFlexible Dates
Price on Enquiry

Business Leadership

By NextGen Learning

Course Overview The Business Leadership course is designed to empower aspiring and existing leaders with the core competencies required to thrive in dynamic business environments. Through a structured and comprehensive learning journey, this course equips learners with strategic insights into management functions, leadership styles, organisational development, and performance enhancement. It explores key areas such as emotional intelligence, talent management, and ethical decision-making, while also covering communication, conflict resolution, and risk management. Whether you are aiming to lead teams, shape organisational direction, or drive change, this course delivers a strong foundation in leadership theory and practice. Learners will benefit from a thorough understanding of leadership frameworks that are essential for influencing, inspiring, and navigating complex workplace challenges. Upon completion, learners will be well-positioned to step into leadership roles or enhance their contribution to existing roles with confidence and clarity. Course Description This course delves into the essential components of effective business leadership by blending leadership theory with key managerial disciplines. Learners will explore leadership styles, employee motivation strategies, and succession planning, alongside modules on communication skills and managing meetings. Additional topics such as negotiation, conflict management, stress handling, and emotional intelligence provide a holistic perspective on leadership responsibilities. The course also examines organisational skills, risk management, and corporate responsibility—offering learners a solid grasp of strategic and ethical leadership. With practical knowledge of Microsoft Word, Excel, and PowerPoint integrated into the curriculum, learners will also gain competence in using essential tools for business documentation and presentations. Ideal for professionals looking to refine their leadership approach or aspiring individuals preparing for management roles, this course delivers comprehensive guidance on how to lead effectively and ethically across a range of business contexts. Course Modules: Module 01: Understanding Management and Leadership Module 02: Leadership Theories Module 03: Improving Management and Leadership Performance Module 04: High Performance Teams Module 05: Motivating Employees Module 06: Organisational Skills Module 07: Talent Management Module 08: Succession Planning Module 09: Business Process Management Module 10: Communication Skills Module 11: Negotiation Techniques Module 12: Managing Meetings and Giving Feedback Module 13: Managing Change Module 14: Time Management Module 15: Stress Management Module 16: Emotional Intelligence in Leadership Module 17: Managing Conflict Module 18: Dealing with Office Politics Module 19: Risk Management Module 20: Corporate Responsibility and Ethics Module 21: Microsoft Word, Excel, PowerPoint (See full curriculum) Who is this course for? Individuals seeking to build leadership capabilities for organisational roles. Professionals aiming to progress into managerial or executive positions. Beginners with an interest in leadership, team management, or business strategy. Entrepreneurs or business owners wanting to lead teams more effectively. Career Path Team Leader Department Manager Operations Supervisor Project Coordinator Human Resources Officer Business Consultant Organisational Development Executive Corporate Trainer

Business Leadership
Delivered OnlineFlexible Dates
£9.99

PgMP Exam Prep: Virtual In-House Training

By IIL Europe Ltd

PfMP® Exam Prep: Virtual In-House Training This is an intensive PfMP® Exam preparation course. This learning experience guides you through the multi-faceted discipline of portfolio management by focusing on the related technical, leadership, and business skills required to navigate it in the real world. First and foremost, this is an intensive PfMP® exam preparation course. Over the course, we go beyond exam prep to provide selected practice in applying key portfolio management skills, tools, and techniques. This learning experience guides you through the multi-faceted discipline of portfolio management by focusing on the related technical, leadership, and business skills required to navigate it in the real world. The journey zooms in and out between governance context and specific operational activities. The ultimate goal is practical application, with the bonus of certification along the way. What You Will Learn By the end of this program, you will be able to: Align and manage the portfolio, strategically, to satisfy organizational objectives and priorities, through benefit realization Articulate and emulate the role of a portfolio manager Apply the principles and skills of a portfolio manager to your real-world environment Study and prepare for the PfMP® Examination Apply for the certification, per the PMI PfMP Handbook and pass the initial panel review on your application Getting Started Course Overview Details of the PfMP® Certification process Foundation Concepts Projects, program, and portfolios A portfolio management process Strategy and value The role of the portfolio manager The role of key stakeholders Life cycle management The Portfolio Life Cycle Overview of Life Cycle Portfolio Management Information System (PMIS) Governance within the Portfolio Life Cycle Strategic Management Strategy concepts Supporting documentation and the strategic plan Planning and optimization Organizational risk appetite Managing strategic change Governance Management Overview and Guiding Principles The Concept of Governance Effective Design Factors Governance Roles Capacity and Capability Management Overview and Guiding Principles Capacity Management and Planning Supply and Demand (Management and Optimization) Organization Capabilities (Assessment and Development) Performance Management (Reporting, Analytics, and Balance) Stakeholder Engagement The Importance of Stakeholders Overview and Guiding Principles Definition and Identification Analysis and Planning Communications Approaches and Management Value Management Overview (Guiding Principles, Definition, and Components) Negotiating Expected Value Maximizing Value Assuring Value Realizing Value Measuring and Reporting Value A Look at Tools Risk Management Overview and Guiding Principles Portfolio Risk Planning Portfolio Risk Identification Portfolio Risk Assessment Portfolio Risk Response Examination Content Outline (ECO) Overview Structure Strategic Tasks Mapping Governance Tasks Mapping Performance Tasks Mapping Risk Tasks Mapping Communication Tasks Mapping List of Knowledge and Skills Exam Prep and Practice Overview Documenting experience Submitting the application Preparing to sit for the exam

PgMP Exam Prep: Virtual In-House Training
Delivered OnlineFlexible Dates
Price on Enquiry