• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3656 Courses in Cardiff delivered Live Online

Rates Structuring & Pricing

5.0(5)

By Finex Learning

Overview A comprehensive and practical 3 days workshop on pricing, using and managing structured interest rate derivatives. What used to be called exotic interest rate derivatives are now commonplace and an essential part of the financial marketplace either as legacy transactions or embedded in new structures. This intensive course is for anyone who wishes to be able to use, price, manage, market or evaluate standard interest rate derivatives such as Constant Maturity Swaps, Range Accruals and Quantos. We also look in detail at such important products as CMS spread-linked structures and volatility/variance swaps, always from a pragmatic practitioner’s perspective. Who the course is for This course is designed for anyone who wishes to be able to price, use, market, manage or evaluate interest rate derivatives. Interest-rate sales / traders / structurers / quants IT Bank Treasury ALM Central Bank and Government Treasury Funding managers Insurance Investment managers Fixed Income portfolio managers IPV professionals Course Content To learn more about the day by day course content please click here To learn more about schedule, pricing & delivery options, book a meeting with a course specialist now

Rates Structuring & Pricing
Delivered in Internationally or OnlineFlexible Dates
Price on Enquiry

5 Benefits of Using a 'Do My Assignment' Service

By Assignment help Online

Get Assignment help and Writing Services Online by University Experts.

5 Benefits of Using a 'Do My Assignment' Service
Delivered OnlineFlexible Dates
FREE

The Fintech Frontier: Why FDs Need to Know About Fintech

By FD Capital

The Fintech Frontier: Why FDs Need to Know About Fintech,” the podcast where we delve into the world of financial technology There are numerous areas where fintech can make a significant impact. For example, payment processing and reconciliation can be streamlined through digital payment solutions and automated tools. Data analytics and artificial intelligence can enhance financial forecasting, risk management, and fraud detection. Blockchain technology can revolutionize supply chain finance and streamline processes involving multiple parties. By understanding the capabilities of these fintech solutions, FDs can identify areas for improvement and select the right technologies to optimise their financial operations. Additionally, fintech can greatly enhance financial reporting and analysis. Advanced data analytics tools can extract meaningful insights from vast amounts of financial data, enabling FDs to make data-driven decisions and identify trends and patterns. Automation of repetitive tasks, such as data entry and reconciliation, reduces the risk of errors and frees up valuable time for FDs to focus on strategic initiatives. The adoption of cloud-based financial management systems also provides flexibility, scalability, and real-time access to financial data, empowering FDs to make informed decisions on the go. With the rapid pace of fintech advancements, how can FDs stay up to date and navigate the evolving fintech landscape? Continuous learning and engagement with the fintech community are key. Attend industry conferences, participate in webinars and workshops, and engage with fintech startups and established players. Networking with professionals in the field, joining fintech-focused associations, and following relevant publications and blogs can help FDs stay abreast of the latest fintech developments. Embracing a mindset of curiosity and adaptability is crucial in navigating the ever-changing fintech landscape. I would also encourage FDs to foster partnerships and collaborations with fintech companies. Engage in conversations with fintech providers to understand their solutions and explore potential synergies. By forging strategic partnerships, FDs can gain access to cutting-edge technologies and co-create innovative solutions tailored to their organisation’s unique needs. As we conclude, do you have any final thoughts or advice for our FD audience regarding fintech? Embrace fintech as an opportunity, not a threat. Seek to understand its potential and how it can align with your organisation’s goals and strategies. Be open to experimentation and pilot projects to test the viability of fintech solutions. Remember that fintech is a tool to enhance and optimize financial processes, and as FDs, we have a crucial role in driving its effective implementation. https://www.fdcapital.co.uk/podcast/the-fintech-frontier-why-fds-need-to-know-about-fintech/ Tags Online Events Things To Do Online Online Conferences Online Business Conferences #event #fintech #knowledge #fds #frontier

The Fintech Frontier: Why FDs Need to Know About Fintech
Delivered OnlineFlexible Dates
FREE

Project Risk Management

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for all project managers and project team leaders. Overview At course completion, students will be able to identify, analyze, respond to, and control project risks. This course focuses on improving the project manager?s risk management expertise, from initial planning through project closure. Participants will apply all course principles to a work-related case study taken directly from their work environment. Risk Management Overview Risk Management Benefit and Uses Project Risk Management Project Management Life Cycle Initiating Process Group Initiating Process Group Overview Develop Project Charter Identify Stakeholders Project Selection Criteria ROI Analysis ROI Methods Risk Complexity Index Project Selection Planning Process Group Planning Process Group Overview Scope Risks Schedule Risks Resource Risks Plan Risk Management Identify Risks Delphi Technique Subject Matter Expert Input Brainstorming Fishbone Diagrams Process Analysis Five Whys Influence Diagrams Risk Breakdown Structure (RBS) Risk Register Perform Qualitative Risk Analysis Probability and Impact Assessment Probability and Impact Chart Perform Quantitative Risk Analysis Three point estimates PERT Triangular Distributions Outlier Considerations Geometric Mean Normal Distributions Methods Tornado Diagrams Expected Monetary Value (EMV) Monte Carlo Plan Risk Responses Risk Response Strategies Overall Project Risk Checklists Executing, Monitoring and Controlling Process Groups Executing Process Group Overview Monitoring and Controlling Process Group Overview Control Risks Project Monitoring Longer Projects Closing Process Group Closing Process Group Overview Close Project or Phase Risk Activities During Closing Process Group Post-Project Risk Assessment

Project Risk Management
Delivered OnlineFlexible Dates
Price on Enquiry

MS Project (Part 1) - Project Initiation and Planning

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for all levels of experience in using Microsoft Project, as well as all levels of experience in project management. In particular, this course is designed for persons who need to author Microsoft Project work schedules including Project Managers and Project Assistants. Overview To be properly introduced, or reintroduced, to Microsoft Project. To gain an understanding of a proven mindset Microsoft Project users should possess each time they open and work Microsoft Project schedules. To gain an understanding of globally accepted project management principles. To be able to effectively apply Microsoft Project into the Initiation and Planning phases of a normal project life cycle. MS Project: Project Initiation and Planning (part 1 of a 3 part series) course provides proven tools and techniques for successfully using Microsoft Project to assist with managing projects. MS Project: Project Initiation and Planning (part 1 of a 3 part series) course provides proven tools and techniques for successfully using Microsoft Project to assist with managing projects.

MS Project (Part 1) - Project Initiation and Planning
Delivered OnlineFlexible Dates
Price on Enquiry

JSPX - Junos Service Provider Switching

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Network engineers, technical support personnel, reseller support engineers, and others responsible for implementing and/or maintaining the Juniper Networks products covered in this course. Overview Introduction to carrier Ethernet Describe the function of an Ethernet LAN Describe Ethernet frame filtering Implement VLAN tagging Implement IRB Implement a virtual switch Describe interconnecting routing instances Describe provider bridging Configure and monitor provider bridging Configure and monitor provider backbone bridging Explain the purpose of the Spanning Tree Protocol (STP) Configure and monitor the STP, the RSTP, the MSTP, and the VSTP Explain the purpose of bridge protocol data unit (BPDU), loop, and root protection Describe the basic operation of link fault management (LFM) Describe the basic operation of connectivity fault management (CFM) Configure and monitor Ethernet OAM Describe and configure Ethernet Ring Protection (ERP) The Junos Service Provider Switching course is a two-day course that provides students with intermediate switching knowledge and configuration examples that are most common in a Service provider implementation. Course Outline Course Introduction Carrier Ethernet Ethernet in the WAN Ethernet Standards Organizations MX Series Layer 2 Features Ethernet Switching and Virtual LANs Ethernet LANs Bridging Configuring and Monitoring VLANs Configuring and Monitoring IRB Layer 2 Address Learning and Forwarding Layer 2 Firewall Filtering Virtual Switches Routing Instances Overview Configuring and Monitoring Virtual Switches Interconnecting Routing Instances Provider Bridging Expanding the Bridged Network Provider Bridging Configuring and Monitoring Provider Bridging Provider Backbone Bridging Configuring and Monitoring Provider Backbone Bridging Spanning-Tree Protocols Overview of STP Overview of RSTP Overview of MSTP Overview of VSTP Configuring and Monitoring Spanning-Tree Protocols Understanding BPDU, Loop, and Root Protection Ethernet OAM OAM Overview LFM CFM Configuring and Monitoring OAM Ethernet Ring Protection ERP Overview Configuring and Monitoring ERP LAG Overview Configuring and Monitoring a LAG

JSPX - Junos Service Provider Switching
Delivered OnlineFlexible Dates
Price on Enquiry

Preparing for the Associate Cloud Engineer Examination

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This class is intended for the following: Individuals preparing for the Associate Cloud Engineer examination. Recommended experience: 6 months+ hands-on experience with GCP This one-day instructor-led course helps prospective candidates structure their preparation for the Associate Cloud Engineer exam. The session will cover the structure and format of the examination, as well as its relationship to other Google Cloud certifications. Through lectures, demos, and hands-on labs, candidates will familiarize themselves with the domains covered by the examination. An Associate Cloud Engineer deploys applications, monitors operations, and manages enterprise solutions. With a shortage of cloud expertise in the job market, one which is projected to last for the next several years, Google Cloud certifications can be a way to differentiate yourself from the rest and prove you have not only the technical knowledge but the skills required to do the job. This course by itself will not prepare a candidate to pass the Associate Cloud Engineer certification exam. It will, however, help the candidate better understand the areas covered by the exam and navigate the recommended resources provided by Google and Qwiklabs for preparing to take the exam, so they can formulate their own personal study plan. This one-day instructor-led course helps prospective candidates structure their preparation for the Associate Cloud Engineer exam. The session will cover the structure and format of the examination, as well as its relationship to other Google Cloud certifications. Through lectures, demos and hands-on labs, candidates will familiarize themselves with the domains covered by the examination. An Associate Cloud Engineer deploys applications, monitors operations, and manages enterprise solutions. With a shortage of cloud expertise in the job market, one which is projected to last for the next several years, Google Cloud certifications can be a way to differentiate yourself from the rest and prove you have not only the technical knowledge, but the skills required to do the job. This course by itself will not prepare a candidate to pass the Associate Cloud Engineer certification exam. It will, however, help the candidate better understand the areas covered by the exam and navigate the recommended resources provided by Google and Qwiklabs for preparing to take the exam, so they can formulate their own personal study plan.

Preparing for the Associate Cloud Engineer Examination
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Segment Routing on Cisco IOS XR (SEGRTE201)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Systems engineers Network engineers Field engineers Technical support personnel Channel partners and resellers Overview After taking this course, you should be able to: Describe the key concepts of segment routing Implement and verify IGP segment routing Migrate an existing Multiprotocol Label Switching (MPLS) LDP-based network to segment routing Implement and verify TI-LFA segment routing Instantiate segment routing policies Instantiate multidomain segment routing policies Configure and verify BGP prefix segments and SR-based services The Implementing Segment Routing on Cisco IOS XR (SEGRTE201) v2.0 course covers the fundamental concepts of Segment Routing (SR), how to configure and verify segment routing within an Interior Gateway Protocol (IGP), and the interworking of Label Distribution Protocol (LDP) with segment routing. You will learn how to implement Topology-Independent Loop-Free Alternate (TI-LFA) using segment routing, and how to instantiate and verify segment routing traffic engineering policies. You will also learn how to implement segment routing within Border Gateway Protocol (BGP). Introduction to Segment Routing Examining Unified Fabric Routing Exploring Segment Routing Concepts Examining Segment Types Examining the Segment Routing Global Block (SRGB) IGP Segment Routing Implementation and Verification Examining the IGP Control Plane Examining SRGB and IGP Interactions Examining Prefix and Adjacency SIDs Intermediate System to Intermediate System (IS-IS) Multilevel and Open Shortest Path First (OSPF) Multi-Area Configuring and Verifying IS-IS SR Operation Configuring and Verifying OSPF SR Operation Segment Routing and LDP Interworking SR and LDP Interworking Data Plane Mapping Server Function and Configuration Interworking Deployment Models Topology Independent ? Loop Free Alternate Examining Classic LFA Examining TI-LFA Fundamentals Implementing and Verifying TI-LFA for SR Traffic Implementing and Verifying SR TI-LFA for LDP Traffic TI-LFA and SR LDP Interworking Segment Routing Policies ? Traffic Engineering (SR-TE) Exploring SR Policies Introducing the Anycast and Binding SIDs Enabling and Verifying SR Policies Instantiating SR Policies Instantiating SR Policies using BGP Dynamic Multidomain SR Policies Configuring and Verifying a Path Computation Element (PCE) Configuring and Verifying BGP Link-State (LS) Configuring Multidomain SR Policies with a PCE Configuring Multidomain SR Policies with On Demand Next-Hop (ODN) Segment Routing?Based Services Examining the BGP Prefix-SID Operation Configuring and Verifying the BGP Prefix SID Examining Egress Peer Engineering Examining the BGP Prefix-SID Operation SR Flexible Algorithm and Performance Measurement (PM) Delay SR-Enabled VPNs

Cisco Implementing Segment Routing on Cisco IOS XR (SEGRTE201)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Security engineers Security administrators Security architects Operations engineers Network engineers Network administrators Network or security technicians Network managers System designers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and administer the Cisco Email Security Appliance (ESA) Control sender and recipient domains Control spam with Talos SenderBase and anti-spam Use anti-virus and outbreak filters Use mail policies Use content filters Use message filters to enforce email policies Prevent data loss Perform LDAP queries Authenticate Simple Mail Transfer Protocol (SMTP) sessions Authenticate email Encrypt email Use system quarantines and delivery methods Perform centralized management using clusters Test and troubleshoot This course shows you how to deploy and use Cisco© Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA). Describing the Cisco Email Security Appliance Cisco Email Security Appliance Overview Technology Use Case Cisco Email Security Appliance Data Sheet SMTP Overview Email Pipeline Overview Installation Scenarios Initial Cisco Email Security Appliance Configuration Centralizing Services on a Cisco Administering the Cisco Email Security Appliance Distributing Administrative Tasks System Administration Managing and Monitoring Using the Command Line Interface (CLI) Other Tasks in the GUI Advanced Network Configuration Using Email Security Monitor Tracking Messages Logging Controlling Sender and Recipient Domains Public and Private Listeners Configuring the Gateway to Receive Email Host Access Table Overview Recipient Access Table Overview Configuring Routing and Delivery Features Controlling Spam with Talos SenderBase and Anti-Spam SenderBase Overview Anti-Spam Managing Graymail Protecting Against Malicious or Undesirable URLs File Reputation Filtering and File Analysis Bounce Verification Using Anti-Virus and Outbreak Filters Anti-Virus Scanning Overview Sophos Anti-Virus Filtering McAfee Anti-Virus Filtering Configuring the Appliance to Scan for Viruses Outbreak Filters How the Outbreak Filters Feature Works Managing Outbreak Filters Using Mail Policies Email Security Manager Overview Mail Policies Overview Handling Incoming and Outgoing Messages Differently Matching Users to a Mail Policy Message Splintering Configuring Mail Policies Using Content Filters Content Filters Overview Content Filter Conditions Content Filter Actions Filter Messages Based on Content Text Resources Overview Using and Testing the Content Dictionaries Filter Rules Understanding Text Resources Text Resource Management Using Text Resources Using Message Filters to Enforce Email Policies Message Filters Overview Components of a Message Filter Message Filter Processing Message Filter Rules Message Filter Actions Attachment Scanning Examples of Attachment Scanning Message Filters Using the CLI to Manage Message Filters Message Filter Examples Configuring Scan Behavior Preventing Data Loss Overview of the Data Loss Prevention (DLP) Scanning Process Setting Up Data Loss Prevention Policies for Data Loss Prevention Message Actions Updating the DLP Engine and Content Matching Classifiers Using LDAP Overview of LDAP Working with LDAP Using LDAP Queries Authenticating End-Users of the Spam Quarantine Configuring External LDAP Authentication for Users Testing Servers and Queries Using LDAP for Directory Harvest Attack Prevention Spam Quarantine Alias Consolidation Queries Validating Recipients Using an SMTP Server SMTP Session Authentication Configuring AsyncOS for SMTP Authentication Authenticating SMTP Sessions Using Client Certificates Checking the Validity of a Client Certificate Authenticating User Using LDAP Directory Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate Establishing a TLS Connection from the Appliance Updating a List of Revoked Certificates Email Authentication Email Authentication Overview Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing Verifying Incoming Messages Using DKIM Overview of Sender Policy Framework (SPF) and SIDF Veri?cation Domain-based Message Authentication Reporting and Conformance (DMARC) Verification Forged Email Detection Email Encryption Overview of Cisco Email Encryption Encrypting Messages Determining Which Messages to Encrypt Inserting Encryption Headers into Messages Encrypting Communication with Other Message Transfer Agents (MTAs) Working with Certificates Managing Lists of Certificate Authorities Enabling TLS on a Listener?s Host Access Table (HAT) Enabling TLS and Certi?cate Verification on Delivery Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services Using System Quarantines and Delivery Methods Describing Quarantines Spam Quarantine Setting Up the Centralized Spam Quarantine Using Safelists and Blocklists to Control Email Delivery Based on Sender Configuring Spam Management Features for End Users Managing Messages in the Spam Quarantine Policy, Virus, and Outbreak Quarantines Managing Policy, Virus, and Outbreak Quarantines Working with Messages in Policy, Virus, or Outbreak Quarantines Delivery Methods Centralized Management Using Clusters Overview of Centralized Management Using Clusters Cluster Organization Creating and Joining a Cluster Managing Clusters Cluster Communication Loading a Configuration in Clustered Appliances Best Practices Testing and Troubleshooting Debugging Mail Flow Using Test Messages: Trace Using the Listener to Test the Appliance Troubleshooting the Network Troubleshooting the Listener Troubleshooting Email Delivery Troubleshooting Performance Web Interface Appearance and Rendering Issues Responding to Alerts Troubleshooting Hardware Issues Working with Technical Support References Model Specifications for Large Enterprises Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch O?ces Cisco Email Security Appliance Model Specifications for Virtual Appliances

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)
Delivered OnlineFlexible Dates
Price on Enquiry

Continuous Delivery Ecosystem Foundation (DevOps Institute)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for #NAME? Overview The learning objectives for CDA include a practical understanding of: Goals, history, terminology, and pipeline The importance, practices, and transformation of a DevOps collaborative culture Design practices, such as modular design and microservices Continuous Integration (Cl), such as version control, builds, and remediation Tenets and best practices of Continuous Testing (CT) Continuous Delivery and Deployment (CD): packaging, containers, and release Continuous Monitoring (CM): monitoring and analysis infrastructure, process, and apps Infrastructure and tools: frameworks, tools, and infrastructure as code Security Assurance: DevSecOps The opportunity to hear and share real-life scenarios This course is designed for participants who are engaged in the design, implementation, and management of DevOps deployment pipelines and toolchains that support Continuous Integration, Continuous Delivery, Continuous Testing and potentially Continuous Deployment. The course highlights underpinning processes, metrics, APls and cultural considerations with Continuous Delivery. Key benefits of Continuous Delivery will be covered including increased velocity to assist organizations to respond to market changes rapidly, thus being able to outmaneuver competition, reduce risk and lower costs while releasing higher quality solutions. Increased productivity and employee morale by having more activities performed by pipelines instead of humans so teams can focus on vision while pipelines do the execution.This course prepares you for the Continuous Delivery Ecosystem Foundation(CDEF) certification. Course Introduction Course goals Course agenda CDA Concepts Continuous delivery (CD) definition Architecting for continuous delivery Continuous delivery and DevOps Relationships between CD, Waterfall, Agile, ITIL, and DevOps Benefits of continuous delivery CDA Culture Importance of culture to the CD Architect What a CD Architect can do about culture How to maintain culture Assignment: DevOps culture and practices to create flow Design Practices for Continuous Delivery Why design is important to continuous delivery CD Architect?s role in design Key design principles CD best practices Microservices and containers Continuous Integration Continuous integration (CI) defined CD Architect?s role in CI Importance of CI Benefits of CI CI best practices Assignment: Optimizing CI workflows Continuous Testing Continuous testing (CT) defined Importance of CT Benefits of CT CD Architect?s role in CT Five tenets of CT CT best practices Assignment: Handling environment inconsistencies Continuous Delivery and Deployment Continuous delivery defined Continuous deployment defined Benefits of continuous delivery and deployment CD Architect?s role in continuous delivery and deployment Continuous delivery and deployment best practices Assignment: Distinguishing continuous delivery and deployment Continuous Monitoring Continuous monitoring defined Importance of continuous monitoring CD Architect?s role in continuous monitoring Continuous monitoring best practices Assignment: Monitoring build progress Infrastructure and Tools Importance of infrastructure and tools CD Architect?s role in infrastructure and tools Building a DevOps toolchain Infrastructure/tools best practices Assignment: identifying common infrastructure/tool components Security Assurance Importance of security assurance DevSecOps and Rugged DevOps defined CD Architect?s role in security Security best practices Assignment: Applying security practices Capstone exercise Identifying toolchain and workflow improvements Summary Additional Sources of Information Exam Preparations Exam requirements Sample exam review

Continuous Delivery Ecosystem Foundation (DevOps Institute)
Delivered OnlineFlexible Dates
Price on Enquiry