• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

927 Courses in Cardiff delivered Live Online

Salesforce Prepare for your Marketing Cloud Administrator Certification Exam (CRT250)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This class is designed for administrators preparing to take the Salesforce Marketing Cloud Administrator exam who are able to configure Marketing Cloud products using industry and product best practices. You should be generally familiar with data structure in subscriber data management. You should also be able to thoroughly navigate Setup, troubleshoot account configuration, and manage user requests. Overview When you complete this course, you will be able to: Recall exam objectives. Discuss product features and functionality covered on the exam. Assess your exam readiness by answering practice questions. Familiarize yourself with additional resources necessary to prepare for the exam. Take the next step in your career and become a Salesforce Certified Marketing Cloud Administrator. In this 1-day, expert-led certification prep class, boost your exam readiness with a detailed exam overview, exam resources, and practice exam questions to test your knowledge. This course includes a voucher to sit for the Salesforce Marketing Cloud Administrator exam. Course Outline Exam Overview Digital Marketing Proficiency Review Governance and Compliance in Relation to Digital Marketing Review Security Best Practices for Date, Permissions, and PII Review Marketing Cloud Product Inventory and Offerings Subscriber Data Management Review the Contact Model Review Data Quality Evaluation Review Preference and Profile Center Setup Review Business Units, Users, and Security Configuration Review Integrations Configuration Review Features in Setup Home Review Marketing Cloud Extension Products Channel Management Review Mobile Studio Configuration Review Email Studio Configuration Review Social Studio and Advertising Configuration Review Journey Builder Concepts and Use Cases Maintenance Review Data Extraction and Report Generation Solutions Review Monitoring and System Availability Review Additional Marketing Cloud Product Benefits Practice Exam and Wrap-up Complete a Practice Exam Review Next Steps

Salesforce Prepare for your Marketing Cloud Administrator Certification Exam (CRT250)
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Certification Preparation for Platform App Builder (CRT403)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Certification Preparation for Platform App Builder is ideal for administrators, system integrators, and independent software vendors (ISVs) with an interest in sharpening the development, deployment, and administrative skills required to succeed in becoming a Salesforce Certified Platform App Builder Overview Architect and manage the correct data model based on business requirements. Configure application security. Define business logic and process automation declaratively. Design user interfaces. Customize applications for mobile use and Lightning. Deploy applications. Are you ready to take the next step in your career by becoming a Salesforce Certified Platform App Builder? By covering the details around the exam objectives, this course will help hone your knowledge of Salesforce application lifecycle management and the declarative and programmatic solutions available to you through guided scenarios, lecture, and discussion. Salesforce Fundamentals Capabilities of core CRM objects Boundaries of declarative customizations Use cases for programmatic customizations Security Restricting and extending object, record, and field access Determining appropriate sharing solutions Data Modeling and Management Determining an appropriate data model Relationship types and impact on record access, user interface, and reporting Considerations for changing field types Considerations of the schema builder Considerations for importing and exporting data Use cases of external objects Reporting Creating reports Report types Dashboards User Interface Customization options Custom buttons, links, and actions Declarative options for incorporating Lightning Components Mobile Declarative customizations available for the Salesforce1 user interface Business Logic and Process Automation Record types Formula fields Roll-up summary fields Validation rules Approval processes Workflow Visual workflow Process builder Automating business processes Ramifications of field updates and potential for recursion App Deployment Application lifecycle Sandboxes Change sets Unmanaged and managed packages Determining an appropriate deployment plan Wrapping Up Test preparation Practice exam

Salesforce Certification Preparation for Platform App Builder (CRT403)
Delivered OnlineFlexible Dates
Price on Enquiry

IOSH - Working safely course

By Airborne Environmental Consultants Ltd

Planned changes to the Construction Skills Certification Scheme mean that from September 2017, Construction Related Occupation (CRO) cards will be phased out. Without registration on an accepted course, or an industry-recognised qualification for your trade, you will not be able to apply for a CSCS card, unless you apply for the CSCS Labourer Card, to access construction sites. An IOSH Working Safely Certificate, along with a CITB Health & Safety Certificate, allows you to apply for a Labourer Card. Therefore, from September 2017, without a CSCS card, you won't get on site. The Labourer Card may be the only way you can get on site.

IOSH - Working safely course
Delivered in Manchester + 1 more or OnlineFlexible Dates
Price on Enquiry

Power BI - dashboards (1 day) (In-House)

By The In House Training Company

Power BI is a powerful data visualisation program that allows businesses to monitor data, analyse trends, and make decisions. This course is designed to provide a solid understanding of the reporting side of Power BI, the dashboards, where administrators, and end users can interact with dynamic visuals that communicates information. This course focuses entirely on the creation and design of visualisations in dashboards, including a range of chart types, engaging maps, and different types of tables. Designing dashboards with KPI's (key performance indicators), heatmaps, flowcharts, sparklines, and compare multiple variables with trendlines. This one-day programme focuses entirely on creating dashboards, by using the many visualisation tools available in Power BI. You will learn to build dynamic, user-friendly interfaces in both Power BI Desktop and Power BI Service. 1 Introduction Power BI ecosystem Things to keep in mind Selecting dashboard colours Importing visuals into Power BI Data sources for your analysis Joining tables in Power BI 2 Working with data Utilising a report theme Table visuals Matrix visuals Drilling into hierarchies Applying static filters Group numbers with lists Group numbers with bins 3 Creating visuals Heatmaps in Power BI Visualising time-intelligence trends Ranking categorical totals Comparing proportions View trends with sparklines 4 Comparing variables Insert key performance indicators (KPI) Visualising trendlines as KPI Forecasting with trendlines Visualising flows with Sankey diagrams Creating a scatter plot 5 Mapping options Map visuals Using a filled map Mapping with latitude and longitude Mapping with ArcGIS or ESRI 6 Creating dashboards High-level dashboard Migration analysis dashboard Adding slicers for filtering Promote interaction with nudge prompts Searching the dashboard with a slicer Creating dynamic labels Highlighting key points on the dashboard Customised visualisation tooltips Syncing slicers across pages 7 Sharing dashboards Setting up and formatting phone views Exporting data Creating PDF files Uploading to the cloud Share dashboards in SharePoint online

Power BI - dashboards (1 day) (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

U5TR712 - IBM Maximo Asset Management - System Administration and Development v7.6x

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The audience includes implementers, developers, system administrators, project teams, database administrators and engine project technical teams. The audience also includes consultants that are looking to gain an understanding of Maximo Asset Management 7.6.0.x and the engine. Overview After completing this course, you should be able to perform the following tasks: List the components of Tivoli's process automation engine Understand Maximo modules and applications Understand Tivoli's Process Automation Engine Create the foundation data necessary for Maximo Asset Management Customize the engine database and applications Automate IBM Service Management applications using workflows Use the Maximo Work Centers Use the Integration Framework to import and export data This course is designed for anyone planning to use Maximo Asset Management and Tivoli?s process automation engine with one of the IBM System Management (ISM) products. It is a course that introduces you to the features and functions of both products. IBM Maximo Asset Management Overview This unit focuses on Maximo as an overall product and how Maximo assists companies with their asset management lifecycle. Tivoli Process Automation Engine This unit describes the functions of Tivoli?s process automation engine and introduces the products that are based on the engine. This unit also introduces Start Centers and basic navigation. Architecture and components This unit covers the architecture of Tivoli?s process automation engine. The various components that make up the system are described. The unit will address Java EE servers and the basic use of WebSphere© as it relates to the engine. The unit then covers the organization of the administrative workstation and system properties. The unit briefly describes the setup of the system for using attachments. Foundation Data This unit covers the creation of foundation data for Tivoli?s process automation engine. The foundation data is the software constructs that are necessary in the basic configuration of the product. These constructs include organizations, sites, locations, classifications, and various engine financial configurations. Security Security addresses the need to protect system resources from unauthorized access by unauthenticated users. Resources in the system are protected by Authentication and Authorization. Database architecture This unit illustrates the possible database configurations using the Database Configuration application. It also presents specific command lines that you can run to configure the changes made on the attributes of business objects using the Database Configuration application. Work Management Work Management is a collection of components and products that work together to form a powerful process and work management system. This unit provides a look at work management and focuses on using Work Management to generate, process, and complete work orders. Customizing an application This unit provides an overview of the Application Designer and Migration Manager. You will learn how to change, duplicate and create applications. You will learn the process to move from development, integration testing, user acceptance testing and moving to production. Automation This unit provides a high-level overview of key automation application programs and their functionality. It describes cron tasks, which are used to automate jobs in the system. The unit then discusses various communication tools in the system such as Communication Templates and the E mail Listener application. Finally, automated means of notification using escalations and actions are covered. Workflow This unit focuses on workflow. You learn about the Workflow Designer and its tools. You also learn how to modify an existing workflow and how to manage the included workflows. Reporting This unit provides an overview of the data analysis and reporting options that you can use in the system to analyze data. You create query by example (QBE) reports, result sets, key performance indicators (KPI), and query-based reports (QBRs). Students can optionally review Appendix A to learn how to create a simple enterprise report using Business Intelligence Reporting Tools (BIRT) designer. This report provides an example of how developers create more complex, widely used reports for users. Integration Framework In this unit, a high-level overview of the Integration Framework is provided. The Integration Framework architecture and components are described and basic configuration steps are described. The configuration and steps for loading and exporting data to and from the system are covered. You have the opportunity to practice them also. Budget Monitoring This unit provides information on a new feature introduced in Maximo 7.6.0.8, the Budget Monitoring application. In this application, you can create budget records to monitor transactions in a financial period. Inspection Tools and Tasks This unit introduces the new Inspection application. You can use the Inspections tools to create online inspection forms by using your desktop computer or laptop, and you can use the forms to complete an inspection by using your desktop computer, laptop, or tablet. Troubleshooting This unit focuses on troubleshooting as a systematic approach to solving a problem. The goal is to determine why something does not work as expected and to resolve the problem. It discusses the configuration of logging in the application. It also covers basic troubleshooting techniques, some important component logs, and information about obtaining help from Tivoli Support. Additional course details: Nexus Humans U5TR712 - IBM Maximo Asset Management - System Administration and Development v7.6x training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the U5TR712 - IBM Maximo Asset Management - System Administration and Development v7.6x course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

U5TR712 - IBM Maximo Asset Management - System Administration and Development v7.6x
Delivered OnlineFlexible Dates
Price on Enquiry

IELTS Prep Platform - 6 Months Plan

5.0(7)

By Virtual Educators Ltd.

6 Months Subscription Up to 100 mock tests Detailed feedback and scoring on all skills Progress report Model Answer Library on Writing Six free one-to-one sessions with an IELTS Expert

IELTS Prep Platform - 6 Months Plan
Delivered OnlineFlexible Dates
£59.99

Project review (In-House)

By The In House Training Company

All organisations today operate in an environment of constant and rapid change. Managing this change effectively is often achieved through a portfolio of formal projects. Many organisations today have qualified and experienced project management staff to run their projects. Some organisations today have dedicated functions, staff or processes to support their project management teams. The very largest organisations have in-house Enterprise Programme Offices, or project management specialists in corporate audit or risk functions; or organise 'Red Team Reviews' of a project by other staff with project management experience who are not participating in the reviewed project. But for many mid-size businesses and SMEs - and even some larger organisations - these resources are simply not available. For them, having access to external expertise to assure project management disciplines and to coach project managers can be a major contributor to project success. Such reviews can take place at project initiation; at major stage-gates (especially if significant capital is to be committed at the stage-gate); or at any other time if concerns arise concerning project quality, cost or timescales. And it is for those organisations that we offer the necessary expertise, on an ad hoc basis, in reviewing projects and coaching senior project management staff. A document review and workshop led by one of our consultants can help you assess whether: The strategic goals and priorities for the project are clear and being addressed Governance of the project within the business is defined and being effectively executed Project roles and responsibilities are clear and effective The credibility and robustness of the project plan can be enhanced Performance measures and reporting procedures are effective Critical risks are identified and being managed and contingencies are agreed The roles, responsibilities and capabilities of the key players in the project team are fit for purpose Budgets are realistic and costs being managed effectively Communication and change management activities are effectively planned and being executed At your discretion, you can capture the outcomes from the workshop for yourselves, in terms of identifying opportunities for improvement, or you can have our consultant write a report and make recommendations to you.

Project review (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou

Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry

Power BI - advanced (1 day) (In-House)

By The In House Training Company

This course starts with data transformation strategies, exploring capabilities in the Power Query Editor, and data-cleansing practices. It looks at the Advanced Query Editor to view the M language code. This course focuses on advanced DAX measures that include filtering conditions, with a deep dive into time intelligence measures. Like the M query language, DAX is a rich functional language that supports variables and expression references. This course also looks at the creation of dynamic dashboards and incorporates a range of visualisations available in Power BI Desktop and online in the AppSource. The course finishes with a look at setting up end user level security in tables. 1 The query editor Split by row delimiter AddDays to determine deadlines Advanced query editor 2 Fuzzy matching joins Matching inconsistencies by percentage Matching with transformation table 3 Logical column functions Logical functions IF, AND, OR Using multiple conditions Including FIND in functions 4 Editing DAX measures Make DAX easier to read Add comments to a measure Using quick measures 5 The anatomy of CALCULATE Understanding CALCULATE context filters Adding context to CALCULATE with FILTER Using CALCULATE with a threshold 6 The ALL measure Anatomy of ALL Create an ALL measure Using ALL as a filter Use ALL for percentage 7 DAX iterators Anatomy of iterators A closer look at SUMX Using RELATED in SUMX Create a RANKX RANKX with ALL 8 Date and time functions Overview of functions Create a DATEDIFF function 9 Time intelligent measures Compare historical monthly data Create a DATEADD measure Creating cumulative totals Creating cumulative measures Visualising cumulative totals 10 Visualisations in-depth Utilising report themes Create a heatmap Comparing proportions View trends with sparklines Group numbers using bins Setting up a histogram 11 Comparing variables Visualising trendlines as KPI Forecasting with trendlines Creating a scatter plot Creating dynamic labels Customised visualisation tooltips Export reports to SharePoint 12 User level security Setting up row level security Testing user security

Power BI - advanced (1 day) (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Power BI - intermediate (2 day) (In-House)

By The In House Training Company

This course is designed for those already using Power BI Desktop and are ready to work with more comprehensive elements of analysing and reporting in Power BI. The course maintains a balanced look at data analysis including the Power Query Editor, with a deep dive into writing DAX formulas, and enhanced dashboard visualisations. The aim of this course is to provide a more complete understanding of the whole Power BI analytics process, by working with business examples that will equip you with the necessary skills to output comprehensive reports and explore Power BI's analytical capabilities in more depth. 1 The Query Editor Grouping rows in a table Split row by delimiter Add days to determine deadlines The query editor 2 Fuzzy Matching Joins Matching inconsistencies by percentage Matching with transformation table 3 The Query Editor M Functions Adding custom columns Creating an IF function Nested AND logics in an IF function 4 DAX New Columns Functions Including TRUE with SWITCH Using multiple conditions The FIND DAX function The IF DAX function Logical functions IF, AND, OR 5 Editing DAX Measures Making DAX easier to read Add comments to a measure Using quick measures 6 The Anatomy of CALCULATE Understanding CALCULATE filters Add context to CALCULATE with FILTER Using CALCULATE with a threshold 7 The ALL Measure Anatomy of ALL Create an ALL measure Using ALL as a filter Use ALL for percentages 8 DAX Iterators Anatomy of iterators A closer look at SUMX Using RELATED with SUMX Create a RANKX RANKX with ALL 9 Date and Time Functions Overview of functions Create a DATEDIFF function 10 Time Intelligent Measures Compare historical monthly data Create a DATEADD measure Creating cumulative totals Creating cumulative measures Visualising cumulative totals 11 Visualisations In-Depth Utilising report themes Applying static filters Group data using lists Group numbers using bins Creating heatmaps Comparing proportions View trends with sparklines 12 Comparing Variables Visualising trendlines as KPI Forecasting with trendlines Creating a scatter plot Creating dynamic labels Customised visualisation tooltips Export reports to SharePoint

Power BI - intermediate (2 day) (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry