• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3890 Courses in Cardiff delivered Live Online

Microsoft Office Basic to Advance

By NextGen Learning

Microsoft Office Basic to Advance Course Overview The "Microsoft Office Basic to Advanced" course provides comprehensive training on the essential applications in the Microsoft Office Suite. From Excel to Word, PowerPoint, and Access, this course equips learners with the skills needed to navigate and master each program's features. Whether you are looking to improve efficiency in everyday tasks or enhance your career prospects, this course covers everything from basic functions to advanced techniques, ensuring a thorough understanding of each program's capabilities. Upon completion, learners will be proficient in using Microsoft Office applications for personal, academic, and professional purposes, enhancing productivity and employability. Course Description This course dives into all key components of the Microsoft Office suite, offering in-depth coverage of Excel, Word, PowerPoint, and Access. Starting with the fundamentals, learners will gain expertise in managing data, creating documents, designing presentations, and managing databases. The course also covers advanced topics such as complex Excel functions, detailed document formatting in Word, effective presentation techniques in PowerPoint, and data management in Access. Through a blend of engaging activities and expert guidance, learners will acquire valuable skills to increase their productivity and confidently use these programs in any professional setting. Microsoft Office Basic to Advance Curriculum Module 01: Microsoft Excel 2019 New Features Module 02: Getting Started with Microsoft Excel Module 03: Performing Calculations Module 04: Modifying a Worksheet Module 05: Formatting a Worksheet Module 06: Printing Workbooks Module 07: Managing Workbooks Module 08: Microsoft Word 2019 Module 09: Microsoft Word 2019 New Features Module 10: Getting Started with Word Module 11: Formatting Text and Paragraphs Module 12: Working More Efficiently Module 13: Managing Lists Module 14: Adding Tables Module 15: Inserting Graphic Objects Module 16: Controlling Page Appearance Module 17: Preparing to Publish a Document Module 18: Workbooks - Microsoft Word 2016 (Beginner) Module 19: Microsoft PowerPoint 2019 Module 20: Microsoft PowerPoint 2019 New Features Module 21: PowerPoint Interface Module 22: Presentation Basics Module 23: Formatting Module 24: Inserting Options Module 25: Working with Objects Module 26: Table Module 27: Charts Module 28: Review and Presentation Module 29: Microsoft Access 2019 Module 30: Microsoft Access 2019 New Features Module 31: Introduction to Access Module 32: Modify Data Module 33: Working with Queries Module 34: Access Forms Module 35: Working with Reports (See full curriculum) Who is this course for? Individuals seeking to improve their Microsoft Office skills. Professionals aiming to enhance their software proficiency for career advancement. Beginners with an interest in office administration or data management. Those wishing to upgrade their knowledge of Microsoft Office for better job opportunities. Career Path Office Administrator Data Analyst Administrative Assistant Project Manager Executive Assistant IT Support Specialist

Microsoft Office Basic to Advance
Delivered OnlineFlexible Dates
£7.99

Clinical Coach Standardisation Event July 2025

By Samantha Morgan-Hourd

Clinical coach standardisation events

Clinical Coach Standardisation Event July 2025
Delivered OnlineJoin Waitlist
FREE

In Business Online Networking

5.0(10)

By We Are In Business

Come to an online event. Grow your business with expert training and support from other business professionals, entrepreneurs, freelancers, small start-ups and SME's.

In Business Online Networking
Delivered OnlineFlexible Dates
£10

Dementia Awareness

By Prima Cura Training

The course seeks to improve the wellbeing and experience of people with dementia and of the care staff working with them. It should improve your confidence in managing situations you find challenging.

Dementia Awareness
Delivered in person or OnlineFlexible Dates
FREE

Ask the IELTS examiner - Live session - Speaking & Writing

5.0(7)

By Virtual Educators Ltd.

Ask the IELTS examiner - Live session - Speaking & Writing
Delivered OnlineFlexible Dates
FREE

Boys' Brigade Holiday Leadership Course

5.0(4)

By Glasgow Boys' Brigade

This specialist training is required for anyone in charge of a Junior Section or Company Camp/Holiday. This course is being held online over two evenings, attendance at both parts is required. Open to any BBUK Leaders who have fully completed the registration process. Safeguarding and Managing Risk e-learning modules must be completed prior to attending the training course. By the end of the course you will be able to: Identify the key elements in the preparation phase of a residential. Set realistic aims for the event in consultation with children and young people. Plan and deliver a high-quality programme at a residential. Carry out effective risk assessments for residentials. Understand the importance of maintaining professional boundaries during settings such as residentials, events, and activities outside of BB weekly sessions. Recognise the importance of maintaining safe and appropriate boundaries with children and young people during residentials. Understand and meet the needs of children and young people away from home. Contribute to positive working relationships with adult colleagues. Renewal of certification is required every five years, which can be done by attending the course or submitting logfiles of residentials attended to UKHQ.

Boys' Brigade Holiday Leadership Course
Delivered Online + more
FREE

TEST: Lego Club for 5-10 year olds

5.0(14)

By Bean Learning

Lego club is totally awesome and you definitely want to come to it coz it is super cooool!

TEST: Lego Club for 5-10 year olds
Delivered OnlineFlexible Dates
FREE

How to Embed the Cademy Booking System on Your Website

4.8(6)

By Cademy

Join our webinar and learn how to seamlessly integrate the powerful Cademy booking system into your website. Don't miss this opportunity to unlock the potential of seamless course booking and registration on your website. Join us for this informative webinar and discover how to effectively embed the Cademy booking system for a hassle-free experience for your learners.

How to Embed the Cademy Booking System on Your Website
Delivered OnlineJoin Waitlist
FREE

Blockchain Security Training

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Blockchain Architects Blockchain DevelopersApplication Developers Blockchain System AdministratorsNetwork Security Architects Cyber Security ExpertsIT Professionals w/cyber security experience Overview Those who attend the Security for Blockchain Professionals course and pass the exam certification will have a demonstrated knowledge of:Identifying and differentiating between security threats and attacks on a Blockchain network.Blockchain security methods, best practices, risk mitigation, and more.All known (to date) cyber-attack vectors on the Blockchain.Performing Blockchain network security risk analysis.A complete understanding of Blockchain?s inherent security features and risks.An excellent knowledge of best security practices for Blockchain System/Network Administrators.Demonstrating appropriate Blockchain data safeguarding techniques. This course covers all known aspects of Blockchain security that exist in the Blockchain environment today and provides a detailed overview of all Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, advanced Blockchain security and more. Fundamental Blockchain Security Cryptography for the Blockchain Hash Functions Public Key Cryptography Elliptic Curve Cryptography A Brief Introduction to Blockchain The Blocks The Chains The Network Promises of the Blockchain Blockchain Security Assumptions Digital Signature Security Hash Function Security Limitations of Basic Blockchain Security Public Key Cryptography Review Real-Life Public Key Protection Cryptography and Quantum Computers Lab 1 (Tentative) Finding Hash Function Collisions Reversible hash function Hash function with poor non-locality Hash function with small search space Breaking Public Key Cryptography Brute Forcing a Short Private Key Brute Forcing a Poorly-Chosen Private Key Consensus in the Blockchain Blockchain Consensus and Byzantine Generals Blockchain Networking Review Byzantine Generals Problem Relation to Blockchain Byzantine Fault Tolerance Introduction to Blockchain Consensus Security Blockchain Consensus Breakthrough Proof of Work What is Proof of Work? How does Proof of Work Solve BGP? Proof of Work Security Assumptions Attacking Proof of Work Proof of Stake What is Proof of Stake? How does Proof of Stake Solve BGP? Proof of Stake Security Assumptions Attacking Proof of Stake General Attacks on Blockchain Consensus Other Blockchain Consensus Algorithms Lab 2 (Tentative) Attacking Proof of Work Performing a 51% Attack Performing a Selfish Mining Attack Attacking Proof of Stake Performing a XX% Attack Performing a Long-Range Attack Malleable Transaction Attacks Advanced Blockchain Security Mechanisms Architectural Security Measures Permissioned Blockchains Checkpointing Advanced Cryptographic Solutions Multiparty Signatures Zero-Knowledge Proofs Stealth Addresses Ring Signatures Confidential Transactions Lab 3 (Tentative) Permissioned Blockchains 51% on a Checkpointed Blockchain Data mining on a blockchain with/without stealth addresses Zero-Knowledge Proof Simulation Trying to fake knowledge of a ZKP Module 4: Blockchain for Business Introduction to Ethereum Security What is Ethereum Consensus in Ethereum Smart Contracts in Ethereum Ethereum Security Pros and Cons of Ethereum Blockchains Introduction to Hyperledger Security What is Hyperledger Consensus in Hyperledger Smart Contracts in Hyperledger Hyperledger Security Pros and Cons of Hyperledger Blockchains Introduction to Corda Security What is Corda Consensus in Corda Smart Contracts in Corda Corda Security Pros and Cons of Corda Blockchains Lab 4 Blockchain Risk Assessment What are the Risks of the Blockchain? Information Security Information Sensitivity Data being placed on blockchain Risks of disclosure Regulatory Requirements Data encryption Data control PII protection Blockchain Architectural Design Public and Private Blockchains Open and Permissioned Blockchains Choosing a Blockchain Architecture Lab 5 Exploring public/private open/permissioned blockchains? Basic Blockchain Security Blockchain Architecture User Security Protecting Private Keys Malware Update Node Security Configuring MSPs Network Security Lab 6 (TBD) Smart Contract Security Introduction to Smart Contracts Smart Contract Security Considerations Turing-Complete Lifetime External Software Smart Contract Code Auditing Difficulties Techniques Tools Lab 7 (Tentative) Try a couple of smart contract code auditing tool against different contracts with built-in vulnerabilities Module 8: Security Implementing Business Blockchains Ethereum Best Practices Hyperledger Best Practices Corda Best Practices Lab 8 Network-Level Vulnerabilities and Attacks Introduction to Blockchain Network Attacks 51% Attacks Denial of Service Attacks Eclipse Attacks Routing Attacks Sybil Attacks Lab 9 Perform different network-level attacks System-Level Vulnerabilities and Attacks Introduction to Blockchain System Vulnerabilities The Bitcoin Hack The Verge Hack The EOS Vulnerability Lab 10 Smart Contract Vulnerabilities and Attacks Introduction to Common Smart Contract Vulnerabilities Reentrancy Access Control Arithmetic Unchecked Return Values Denial of Service Bad Randomness Race Conditions Timestamp Dependence Short Addresses Lab 11 Exploiting vulnerable smart contracts Security of Alternative DLT Architectures What Are Alternative DLT Architectures? Introduction to Directed Acyclic Graphs (DAGs) DAGs vs. Blockchains Advantages of DAGs DAG Vulnerabilities and Security Lab 12 Exploring a DAG network

Blockchain Security Training
Delivered OnlineFlexible Dates
Price on Enquiry

Palo Alto Networks : Cortex XDR 3.2: Prevention and Deployment (EDU-260)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Cybersecurity analysts and engineers and security operations specialists, as well as administrators and product deployers. Overview Successful completion of this instructor-led course with hands-on lab activities should enable you to: Describe the architecture and components of the Cortex XDR family Use the Cortex XDR management console, including reporting Create Cortex XDR agent installation packages, endpoint groups, and policies Deploy Cortex XDR agents on endpoints Create and manage Exploit and Malware Prevention profiles Investigate alerts and prioritize them using starring and exclusion policies Tune Security profiles using Cortex XDR exceptions Perform and track response actions in the Action Center Perform basic troubleshooting related to Cortex XDR agents Deploy a Broker VM and activate the Local Agents Settings applet Understand Cortex XDR deployment concepts and activation requirements Work with the Customer Support Portal and Cortex XDR Gateway for authentication and authorization This instructor-led training enables you to prevent attacks on your endpoints. After an overview of the Cortex XDR components, the training introduces the Cortex XDR management console and demonstrates how to install agents on your endpoints and how to create Security profiles and policies. The training enables you to perform and track response actions, tune profiles, and work with Cortex XDR alerts. The training concludes with discussions about basic troubleshooting of the agent, the on-premises Broker VM component, and Cortex XDR deployment. Course Outline Module 1 - Cortex XDR Overview Module 2 - Cortex XDR Main Components Module 3 - Cortex XDR Management Console Module 4 - Profiles and Policy Rules Module 5 - Malware Protection Module 6 - Exploit Protection Module 7 - Cortex XDR Alerts Module 8 - Tuning Policies Using Exceptions Module 9 - Response Actions Module 10 - Basic Agent Troubleshooting Module 11 - Broker VM Overview Module 12 - Deployment Considerations Additional course details: Nexus Humans Palo Alto Networks : Cortex XDR 3.2: Prevention and Deployment (EDU-260) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks : Cortex XDR 3.2: Prevention and Deployment (EDU-260) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Palo Alto Networks : Cortex XDR 3.2: Prevention and Deployment (EDU-260)
Delivered OnlineFlexible Dates
Price on Enquiry