• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

698 Courses in Cardiff delivered Live Online

BOHS P408 - Identification and Quantification of Asbestos in Soils using PLM and PCM

By Airborne Environmental Consultants Ltd

The main subject areas of the course are: Controlling the health risks of asbestos. Sample handling and waste disposal. Identification of asbestos by PLM. Gravimetric quantification of asbestos-containing materials. Discrimination and quantification of free fibres by dispersion and PCM. Analysis of soils - practical application.

BOHS P408 - Identification and Quantification of Asbestos in Soils using PLM and PCM
Delivered in Manchester + 1 more or OnlineFlexible Dates
£1,225

Suicide First Aid

5.0(2)

By Changing Minds Training

This one-day Suicide First Aid training course gives learners the knowledge and tools to understand that suicide is one of the most preventable deaths and some basic skills can help someone with thoughts of suicide stay safe from their thoughts and stay alive.

Suicide First Aid
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

Managing Conflict

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for any business professional who encounters conflict in the workplace. Overview Recognize the impact of conflict in the workplace by identifying your personal reaction and developing a healthy attitude toward conflict. Analyze conflict by assessing the situation and identifying the source of the conflict. Utilize effective communication techniques to manage conflict in a proactive manner. Resolve conflict by evaluating approaches, and determining and implementing an action plan with the best solution. An organization improves its likelihood of success by effectively managing conflict. As a leader within your organization, you share in that responsibility. This course will help you cultivate the skills necessary to help manage conflict and ultimately to decrease the presence of conflict in the workplace. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. 1. Recognizing the Impact of Conflict Identify Your Personal Reaction to Conflict Develop a Healthy Attitude Toward Conflict 2. Analyzing Conflict Assess the Situation Identify the Source of the Conflict 3. Dealing with Conflict Listen Actively Communicate Effectively Respond to Negative Tactics Avoid Conflict Escalation 4. Resolving Conflict Evaluate Approaches to Conflict Resolution Determine the Best Solution Implement an Action Plan Additional course details: Nexus Humans Managing Conflict (Second Edition) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Managing Conflict (Second Edition) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Managing Conflict
Delivered OnlineFlexible Dates
£435

C)HISSP-Certified Health Information Systems Security Practitioner Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for IS Security Officers Privacy Officers Health IS Managers Risk Managers Information Security Managers Compliance and Privacy Officers Overview Upon completion, the student will be ready to take the Certified Healthcare Information Systems Security Practitioner exam by mile2. In addition, at the end of the CHISSP course, the student will be versed with best practices in the healthcare industry and will be able to establish a framework with current best practices in respects to privacy, regulation and risk management. The Certified Healthcare IS Security Practitioner, C)HISSP certification course covers the skills and knowledge to implement the best IT healthcare practices, as well as, regulatory compliance and standards in the healthcare industry. Because of growing industry regulations and privacy requirements in the healthcare industry, the C)HISSP was developed by Mile2. Graduates of this course have become vital in managing and protecting healthcare data and are tasked to protect patient information by implementing, managing, and assessing proper IT controls for patient health information integrity. Course Outline Intro to the Healthcare Industry Regulatory Environment Healthcare Privacy and Security Policies Information Governance Risk Management Third-Party Risk Management

C)HISSP-Certified Health Information Systems Security Practitioner Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vRealize Automation SaltStack SecOps: Deploy and Manage [V8.6]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security administrators who are responsible for using SaltStack SecOps to manage the security operations in their enterprise Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of SaltStack Config and SaltStack SecOps Integrate SaltStack Config with directory services. Configure roles and permissions for users and groups to manage and use SaltStack SecOps Use targeting to ensure that the jobs run on the correct minion systems Use remote execution modules to install the packages, transfer files, manage services, and manage users on minion systems Manage configuration control on the minion systems with states, pillars, requisites, and declarations Use Jinja and YAML code to manage the minion systems with the state files Enforce the desired state across minion systems automatically Use SaltStack SecOps to update the compliance and vulnerability content libraries Use SaltStack SecOps to enforce compliance and remediation on the infrastructure with industry standards Use SaltStack SecOps to provide automated vulnerability scanning and remediation on your infrastructure This two-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in using VMware vRealize© Automation SaltStack© SecOps. SaltStack SecOps allows you to scan your system for compliance against security benchmarks, detect system vulnerabilities, and remediate your results. This course enables you to create the SaltStack SecOps custom compliance libraries and use SaltStack SecOps. In addition, this course provides you with the fundamentals of how to use VMware vRealize© Automation SaltStack© Config to install software and manage system configurations. Course Introduction Introductions and course logistics Course objectives SaltStack Config Architecture Identify the SaltStack Config deployment types Identify the components of SaltStack Config Describe the role of each SaltStack Config component SaltStack Config Security Describe local user authentication Describe LDAP and Active Directory authentication Describe the roles and permissions in vRealize Automation for SaltStack Config Describe the roles and permissions in SaltStack Config Describe the SecOps permissions in SaltStack Config Describe the advanced permissions available in SaltStack Config Targeting Minions Describe targeting and its importance Target minions by minion ID Target minions by glob Target minions by regular expressions Target minions by lists Target minions by compound matching Target minions by complex logical matching Remote Execution and Job Management Describe remote execution and its importance Describe functions and arguments Create and manage jobs Use the Activities dashboard Configuration Control Through States, Pillars, Requisites, and Declarations Define the SaltStack states Describe file management in SaltStack Config Create the SaltStack state files Identify the components of a SaltStack state Describe pillar data and the uses of pillar data Configure pillar data on the SaltStack Config master server Use pillar data in variables in the state files Describe the difference between IDs and names in the state files Use the correct execution order Use requisites in the state files Using Jinja and YAML Describe the SaltStack Config renderer system Use YAML in the state files Use Jinja in the state files Use Jinja conditionals, lists, and loops Using SaltStack SecOps Comply Describe the SaltStack SecOps Comply architecture Describe CIS and DISA STIG benchmarks Describe the SaltStack SecOps Comply security library Describe the remediation differences between SaltStack SecOps and VMware Carbon Black© Create and manage the policies Create and manage the custom checks Run assessments on the minion systems Use SaltStack SecOps to remediate the noncompliant systems Manage the SaltStack SecOps Comply configuration options Manage the benchmark content ingestion Using SaltStack SecOps Protect Describe Common Vulnerabilities and Exposures (CVEs) Use the Protect dashboard Create and manage the policies Update the vulnerability library Run the vulnerability scans Remediate the vulnerabilities Manage the vulnerability exemptions

VMware vRealize Automation SaltStack SecOps: Deploy and Manage [V8.6]
Delivered OnlineFlexible Dates
Price on Enquiry

Safeguarding Train the Trainer

4.9(1007)

By Caring For Care

Definition of Safeguarding Legislation & agreed ways of working Definition of Safeguarding Legislation & agreed ways of working Every child matters guidance Myths and statistics Effects on young people Leadership/worker skills Common indicators of abuse Reporting of abuse and potential abuse Barriers to reporting abuse Understanding the types of abuse Recognising acts, signs and symptoms of abuse Who is vulnerable / at risk The role of dignity in safeguarding Legislation and policies and procedure What to do should you have a concern Overview of prevent How to respond to an individual should they disclose a concern

Safeguarding Train the Trainer
Delivered OnlineFlexible Dates
£450

EUSR SHEA Telecommunications Course

5.0(179)

By Cross Compliance Training Limited

Become a professional in the Telecomms industry with our EUSR SHEA Telecommunications Card Training Overview Our Energy Utilities Skills Register Safety Health Environmental Awareness EUSR SHEA Telecommunications Card Training is designed for professionals working in telecommunication-related industries, such as Telephone Exchanges, on the network, customer properties and more. The course equips participants with essential knowledge and skills to ensure safe and environmentally responsible practices on work sites near telecommunication environments. Upon completion, you’ll receive the coveted EUSR SHEA Telecommunications Card.

EUSR SHEA Telecommunications Course
Delivered OnlineFlexible Dates
£210

CCSP Certification Prep Course

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Anyone whose position requires CCSP certificationIndividuals whose responsibilities involve procuring, securing, and managing cloud environments or purchased cloud services Overview In-depth coverage of the six domains required to pass the CCSP exam:Architectural concepts and design requirementsCloud data securityCloud platform and infrastructure securityCloud application securityOperationsLegal and compliance This course is the most comprehensive review of cloud security concepts and industry best practices covering the six domains of the CCSP Common Body of Knowledge (CBK). You will gain knowledge in identifying the types of controls necessary to administer various levels of confidentiality, integrity, and availability, with regard to securing data in the cloud. You will identify the virtual and physical components of the cloud infrastructure with regard to risk management analysis, including tools and techniques necessary for maintaining a secure cloud infrastructure. You will gain an understanding in cloud software assurance and validation, utilizing secure software, and the controls necessary for developing secure cloud environments. You will identify privacy issues and audit processes utilized within a cloud environment, including auditing controls, assurance issues, and the specific reporting attributes. Architectural Concepts and Design Requirements Cloud Data SecurityCloud Platform and Infrastucture Security Cloud Application SecurityOperations Legal and compliance

CCSP Certification Prep Course
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to Oracle Database Security Ed 1

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for Administrator, Database Administrator, End User, Network Administrator, and Systems Administrator. Overview Upon completion of this course, students will be able to Describe and determine database security requirements, Understand Oracle security solutions to help meet security requirements, Implement basic database security, Configure network security, and Discover basic security configuration issues. This Introduction to Oracle Database Security Ed 1 training teaches you how to use Oracle Database features to help meet the security, privacy and compliance requirements of your organization. Introduction Course Objectives Course Schedule Detective Security Controls Preventive Security Controls Your Learning Aids Basic Workshop Architecture Understanding Security Requirements Fundamental Data Security Requirements Security Risks Techniques to Enforce Security Choosing Security Solutions Database Access Control: Authentication Protecting Against Database Bypass with Encryption Protecting Sensitive Data Protecting against Application Bypass Detecting Threats Compliance Implementing Basic Database Security Database Security Checklist Reducing Administrative Effort Principle of Least Privilege Objects Protection Configuring Network Security Network Access Control Listener Security Listener Usage Control Manage fine-grained access to external network services Discovering Basic Configuration Issues Accessing Enterprise Manager Security Reports Using Various Security Reports

Introduction to Oracle Database Security Ed 1
Delivered OnlineFlexible Dates
Price on Enquiry

Mental Health First Aid Annual Refresher

5.0(50)

By Pochat Training

Refresh your skills from when you last did your mental health first aid course! How much do you still remember? How comfortable are you approaching someone? Is there more to learn?

Mental Health First Aid Annual Refresher
Delivered in Chesterfield or Online + more
£90