• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

124 Courses in Cardiff delivered Live Online

CompTIA PenTest+ (PenTest)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for IT professionals who want to develop penetration testing skills to enable them to identify information-system vulnerabilities and effective remediation techniques for those vulnerabilities. Target students who also need to offer practical recommendations for action to properly protect information systems and their contents will derive those skills from this course. This course is also designed for individuals who are preparing to take the CompTIA PenTest+ certification exam PT0-002, or who plan to use PenTest+ as the foundation for more advanced security certifications or career roles. Individuals seeking this certification should have three to four years of hands-on experience performing penetration tests, vulnerability assessments, and vulnerability management. Overview After completing this course, you will be able to plan, conduct, analyze, and report on penetration tests, including the ability to: Plan and scope penetration tests. Conduct passive reconnaissance. Perform non-technical tests to gather information. Conductive active reconnaissance. Analyze vulnerabilities. Penetrate networks. Exploit host-based vulnerabilities. Test applications. Complete post-exploit tasks. Analyze and report pen test results. Security remains one of the hottest topics in IT and other industries. It seems that each week brings news of some new breach of privacy or security. As organizations scramble to protect themselves and their customers, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to some general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company. 1 - Outline Lesson 1: Scoping Organization/Customer Requirements Lesson 2: Defining the Rules of Engagement Lesson 3: Footprinting and Gathering Intelligence Lesson 4: Evaluating Human and Physical Vulnerabilities Lesson 5: Preparing the Vulnerability Scan Lesson 6: Scanning Logical Vulnerabilities Lesson 7: Analyzing Scanning Results Lesson 8: Avoiding Detection and Covering Tracks Lesson 9: Exploiting the LAN and Cloud Lesson 10: Testing Wireless Networks Lesson 11: Targeting Mobile Devices Lesson 12: Attacking Specialized Systems Lesson 13: Web Application-Based Attacks Lesson 14: Performing System Hacking Lesson 15: Scripting and Software Development Lesson 16: Leveraging the Attack: Pivot and Penetrate Lesson 17: Communicating During the PenTesting Process Lesson 18: Summarizing Report Components Lesson 19: Recommending Remediation Lesson 20: Performing Post-Report Delivery Activities Additional course details: Nexus Humans CompTIA Penetration Testing Certification (PenTest Plus) - (Exam PT0-002) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Penetration Testing Certification (PenTest Plus) - (Exam PT0-002) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA PenTest+ (PenTest)
Delivered OnlineFlexible Dates
£3,295

Writing for the Business Professional

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Professionals desiring to be able to communicate clearly and concisely in their writing will benefit from this course. Overview Awareness of common spelling and grammar issues in business writing. Basic concepts in sentence and paragraph construction. Basic structure of agendas, email messages, business letters, business proposals, and business reports. Collaborative writing techniques, tools and best practices Tips and techniques to use when deciding the most appropriate format to use for agendas, email messages, business letters, business proposals, and business reports In this course, you will learn the essential skills needed to organize your thoughts and select the best words and phrases to clearly convey them in writing. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. 1. Working With Words Monitoring Spelling, Grammar, and Verb Tense Creating a Reference Sheet 2. Constructing Sentences Recognizing Sentence Parts Classifying Sentence Type Increasing Readability with Punctuation 3. Creating Paragraphs The Three Basic Components Organization Methods 4. Finding Facts Identifying and Using Key Resources Fact-Finding and Information Gathering 5. Collaborative Writing Clarifying the Objective Collaborative Writing Strategies and Patterns 6. Types of Collaborative Business Writing Applying Different Construction Techniques Cut & Paste, Puzzle, Sequential Summative Integrating Construction 7. Collaborative Tools and Processes Planning and Revision Creating Outlines and Storyboards Building Team Cohesion 8. Writing Meeting Agendas Choosing an Agenda Format Structuring and Writing the Agenda 9. Writing E-Mails, Reports and Proposals Addressing Your Message Using Proper Grammar and Defining Acronyms Structuring, Formatting, and Writing Your Report Additional course details: Nexus Humans Writing for the Business Professional training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Writing for the Business Professional course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Writing for the Business Professional
Delivered OnlineFlexible Dates
£1,500

LINX 3 training course description A detailed study of BGP, from the basics of how it works through to advanced issues such as route reflectors, policy, filtering, route selection and routing registries. The course culminates with a study of an industrial strength BGP template illustrating important issues such as bogon filtering. Practical hands on with routers follow the major sessions to reinforce the theory. A multiple choice exam, leading to the LAIT III certification, is available after the course. The exam consists of 60 questions and lasts 2 hours. What will you learn Connect enterprises to the Internet, and ISPs to each other. Describe how BGP works. List, describe and configure the main BGP attributes. Implement and troubleshoot BGP. Work with route aggregation and calculate CIDR prefixes in seconds. Influence traffic paths with BGP. LINX 3 training course details Who will benefit: Network engineers. Prerequisites: LAIT I and II OR CCNP and take LAIT I and LAIT II exams whilst on this course. Duration 5 days LINX 3 training course contents Basic BGP IGPs, EGPs, What's BGP? BGP RIB, in/out process, tables peers, adding routes. Hands on Simple configuration and troubleshooting. The Internet and peering ASs, AS numbers, Internet structure, ISP types, ISP network design, IXs, peering vs. transit, public/ private peering, bi/multi-lateral peering. Hands on AS information gathering. How BGP works Incremental updates, Path vector protocols, BGP protocol stack, the BGP header, message types, NLRI, withdrawn routes, route refresh, route dampening. Hands on More troubleshooting, packet analysis. MBGP and IPv6 Multiprotocol routing, AFI, SAFI, MBGP and multicasts, IPv6, MPLS VPNs. Hands on IPv6 BGPv4 aggregation CIDR, benefits, techniques, shortcuts, configuring BGP aggregation, leaking routes. Hands on Reducing routing table size. BGP path selection BGP attributes, attribute types, route selection order, Local preference, AS prepend, MEDs. Hands on Influencing traffic with BGP. BGP routing policies What is policy? Examples, route filtering, AS filtering, REs, applying preference selectively, peer groups. Hands on Sophisticated policies. RIPE and routing registries RIRs, Allocations, assignments, PI vs. PA. Objects, RPSL, routing registry, Hands on The RIPE database. Automating BGP configuration Automation tools, whois, IRRToolSet, Bogon lists, tracking bogon lists, HTTP, Peering, routing registries, DNS. Communities What is a community? Community names, communities for: peer types and geography. RFC 1998, default communities. Hands on Setting local preference on other routers. Route servers What are route servers? LINX route servers, route server policy control, What are route collectors, Looking glasses. Hands on Setting up and working with a route server. Peer relationships IBGP, EBGP, next hop self, advertising routes into/out of BGP, synchronisation. Hands on IBGP, troubleshooting a large BGP network. Route reflectors and confederations Full mesh IBGP, Route reflectors, RR configuration and design, confederations, migration issues. Hands on RR configuration. BGP architectures Stub vs. transit AS, when to use BGP, multihoming strategies and issues, default routes. Multihop EBGP, load balancing. Hands on Multihoming. BGP security RFC 7454, security steps, BGP TTL security, filters, RPKI, ROAs, rsync, rrdp, validators. A secure BGP template. Hands on RPKI prefix validation.

LINX 3
Delivered in Internationally or OnlineFlexible Dates
£2,797

Estimating for Business Analysts: In-House Training

By IIL Europe Ltd

Estimating for Business Analysts: In-House Training A business analyst does not have authority to estimate the project and will not be held responsible for the project staying within the proposed budget; however, the business analyst does participate in various planning exercises with the project team. Many times the business analyst is on his or her own, required to provide estimates of how long it will take to perform their tasks. This course acquaints you with the basics of estimating from the point of view of the business analyst, emphasizing time estimates for the work. It also covers some of the product cost estimates that a business analyst may have to provide when the business is performing a cost/benefit analysis for the project. What you will Learn You'll learn how to: Translate business needs and requirements into estimates Estimate durations using a variety of techniques Negotiate differences in estimates Getting Started Introductions Course structure Course goals and objectives Foundation Concepts The importance of estimating to a business analyst The good and bad of estimating The project context The meaning of good estimating Focuses of estimating Characteristics of a good estimate Estimating the Time Requirements Applicable BABOK® Knowledge Areas Business Analysis Planning and Monitoring Elicitation and Collaboration Estimating the elicitation Information Gathering Plan Relative times for elicitation activities Planning and estimating the business analysis approach and activities Planning the business analysis activities Impact of process Estimating the Product Estimating the value of the product Business analyst's role Defining and determining value Function and use case points Agile estimating Planning Poker Other agile estimating techniques Negotiating estimates Negotiation techniques Negotiation approaches Summary What did we learn, and how can we implement this in our work environment?

Estimating for Business Analysts: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£495

Estimating for Business Analysts: Virtual In-House Training

By IIL Europe Ltd

Estimating for Business Analysts: Virtual In-House Training A business analyst does not have authority to estimate the project and will not be held responsible for the project staying within the proposed budget; however, the business analyst does participate in various planning exercises with the project team. Many times the business analyst is on his or her own, required to provide estimates of how long it will take to perform their tasks. This course acquaints you with the basics of estimating from the point of view of the business analyst, emphasizing time estimates for the work. It also covers some of the product cost estimates that a business analyst may have to provide when the business is performing a cost/benefit analysis for the project. What you will Learn You'll learn how to: Translate business needs and requirements into estimates Estimate durations using a variety of techniques Negotiate differences in estimates Getting Started Introductions Course structure Course goals and objectives Foundation Concepts The importance of estimating to a business analyst The good and bad of estimating The project context The meaning of good estimating Focuses of estimating Characteristics of a good estimate Estimating the Time Requirements Applicable BABOK® Knowledge Areas Business Analysis Planning and Monitoring Elicitation and Collaboration Estimating the elicitation Information Gathering Plan Relative times for elicitation activities Planning and estimating the business analysis approach and activities Planning the business analysis activities Impact of process Estimating the Product Estimating the value of the product Business analyst's role Defining and determining value Function and use case points Agile estimating Planning Poker Other agile estimating techniques Negotiating estimates Negotiation techniques Negotiation approaches Summary What did we learn, and how can we implement this in our work environment?

Estimating for Business Analysts: Virtual In-House Training
Delivered OnlineFlexible Dates
£450

Business Intelligence: In-House Training

By IIL Europe Ltd

Business Intelligence: In-House Training Business Intelligence (BI) refers to a set of technology-based techniques, applications, and practices used to aggregate, analyze, and present business data. BI practices provide historical and current views of vast amounts of data and generate predictions for business operations. The purpose of Business Intelligence is the support of better business decision making. This course provides an overview of the technology and application of BI and how it can be used to improve corporate performance. What you will Learn You will learn how to: Specify a data warehouse schema Identify the data and visualization to be used for data mining and Business Intelligence Design a Business Intelligence user interface Getting Started Introductions Agenda Expectations Foundation Concepts The challenge of decision making What is Business Intelligence? The Business Intelligence value proposition Business Intelligence taxonomy Business Intelligence management issues Sources of Business Intelligence Data warehousing Data and information Information architecture Defining the data warehouse and its relationships Facts and dimensions Modeling, meta-modeling, and schemas Alternate architectures Building the data warehouse Extracting Transforming Loading Setting up the data and relationships Dimensions and the Fact Table Implementing many-to-many relationships in data warehouse Data marts Online Analytical Processing (OLAP) What is OLAP? OLAP and OLTP OLAP functionality Multi-dimensions Thinking in more than two dimensions What are the possibilities? OLAP architecture Cubism Tools OLAP variations - MOLAP, ROLAP, HOLAP BI using SOA Applications of Business Intelligence Applying BI through OLAP Enterprise Resource Planning and CRM Business Intelligence and financial information Business Intelligence User Interfaces and Presentations Data access Push-pull data access Types of decision support systems Designing the front end Presentation formats Dashboards Types of dashboards Common dashboard features Briefing books and scorecards Querying and Reporting Reporting emphasis Retrofitting Talking back Key Performance Indicators Report Definition and Visualization Typical reporting environment Forms of visualization Unconstrained views Data mining What is in the mine? Applications for data mining Data mining architecture Cross Industry Standard Process for Data Mining (CISP-DM) Data mining techniques Validation The Business Intelligence User Experience The business analyst role Business analysis and data analysis Five-step approach Cultural impact Identifying questions Gathering information Understand the goals The strategic Business Intelligence cycle Focus of Business Intelligence Design for the user Iterate the access Iterative solution development process Review and validation questions Basic approaches Building ad-hoc queries Building on-demand self-service reports Closed loop Business Intelligence Coming attractions - future of Business Intelligence Best practices in Business Intelligence

Business Intelligence: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,495

Domestic Violence (Achieving ILR)

By Immigration Advice Service

This course equips immigration practitioners and advocates with the knowledge and skills to assist domestic violence survivors in obtaining Indefinite Leave to Remain (ILR) in the UK. Course Overview:   Achieving Indefinite Leave to Remain in Domestic Violence Cases” is a comprehensive training program designed for immigration practitioners and advocates. It provides the necessary knowledge and skills to support domestic violence survivors in obtaining Indefinite Leave to Remain (ILR) in the UK. Participants will explore eligibility criteria, evidence gathering, exceptional circumstances, and application processes to empower survivors on their journey to safety and security. Throughout the course, participants will gain a deep understanding of the eligibility requirements for ILR, enabling them to effectively advise and support their clients. They will learn how to guide survivors in collecting and presenting compelling evidence that strengthens their cases, while also understanding alternative routes and exceptional circumstances for those who do not meet standard eligibility criteria. The course provides practical strategies for enhancing the chances of a successful outcome. Participants will also learn the step-by-step procedures for making a domestic violence concession application, equipping them with the skills to compile persuasive application packages. By the end of the training, participants will be equipped with the knowledge, practical skills, and strategies necessary to assist domestic violence survivors in achieving ILR.   Course joining links, materials and instructions are sent out 24hours before the course starts. Why Choose IAS’ Immigration Training Courses? Immigration Advice Service has been providing professional immigration services for over 10 years in the public, private and corporate sectors. Our fully qualified and OISC regulated trainer will guide you through the content in our comprehensive training course. See why others like to study with IAS: Delivered Online Expert Course Trainer Free Course Materials Certificate of Attendance   Join over 92% of satisfied customers who found their training with IAS useful and beneficial. You will also be provided with training materials to keep after completing the course. How is this course structured? The “Domestic Violence (Immigration based)” training workshop will involve the following: 1. Understanding Eligibility: Who Qualifies for Indefinite Leave to Remain Overview of the criteria and requirements for domestic violence survivors seeking Indefinite Leave to Remain Exploring the key factors that determine eligibility 2. Advising Clients about Evidence Guidance on effectively advising clients on gathering and presenting compelling evidence to support their cases Understanding the types of evidence that can strengthen an application and highlight the impact of domestic violence 3. Considering Exceptional Circumstances when Clients Do Not Qualify under the Rules Exploring alternative routes and exceptional circumstances that may still enable survivors to secure Leave to Remain Discussing strategies for presenting exceptional circumstances to enhance the chances of a successful outcome 4. Making a Domestic Violence Concession Application

Domestic Violence (Achieving ILR)
Delivered OnlineFlexible Dates
£120

Project Management Fundamentals

By Nexus Human

This course is intended for This course is intended for anyone who wants to learn the fundamentals of project management. No prior experience required. Overview Goals and benefits of implementing project management Key project management terminology, frameworks, and tools How to apply the approaches and processes to better manage and complete a project Important interpersonal interactions needed for successful projects This 1-Day virtual Project Management Best-Practices course provides an overview of fundamental elements of the project lifecycle ? from project initiation through project close. With a focus on traditional project management concepts, students will complete this course with an improved ability to understand the best path forward for bringing projects to successful completion. Students will benefit from this course by understanding the foundational principles of project management, improving their project management skills, utilizing tools and techniques to effectively manage projects, gaining a common project management language to improve communication, and learning frameworks to identify, manage, and mitigate risk. Concepts learned in this course are immediately applicable to ongoing projects. Note: This course has been approved by PMI for 8 PDUs. 1 - Introduction What are Projects? What is Project Management? Basic Project Management Process Project Selection How Projects Further Organizational Goals What Factors can Influence Projects? Documentation Project Management Tools Role of the Project Manager The Language of Project Management 2 - Starting a Project Authorizing the Project (Project Selection) Assigning the PM Identifying and Documenting the High-Level Scope Gathering a Planning Team Identifying and Documenting the Impacted Parties 3 - Planning a Project Adapting to the Needs of the Project (Planning Level) Identifying the Work Required Estimating Time, Cost and Resources Required Developing a Schedule Developing a Budget Planning Communications and Quality Risk Management Purchases and Outside Vendors for a Project 4 - Executing the Project Baselines Managing Participants in the Project Managing Interested and Impacted Parties Performing the Planned Work Negotiating and Signing Contracts Managing Communications, Risk and Quality 5 - Overseeing and Controlling the Project Controlling the Scope, Schedule and Budget Controlling Change to the Project (Scope, Schedule, Cost and Final Product) Quality Assurance and Control Contract Administration 6 - Ending a Project Overseeing and Controlling the Project Executing the Project Closing Contracts Transferring the Final Product Lessons Learned and Archiving Records

Project Management Fundamentals
Delivered OnlineFlexible Dates
£350

Business Intelligence: Virtual In-House Training

By IIL Europe Ltd

Business Intelligence: Virtual In-House Training Business Intelligence (BI) refers to a set of technology-based techniques, applications, and practices used to aggregate, analyze, and present business data. BI practices provide historical and current views of vast amounts of data and generate predictions for business operations. The purpose of Business Intelligence is the support of better business decision making. This course provides an overview of the technology and application of BI and how it can be used to improve corporate performance. What you will Learn You will learn how to: Specify a data warehouse schema Identify the data and visualization to be used for data mining and Business Intelligence Design a Business Intelligence user interface Getting Started Introductions Agenda Expectations Foundation Concepts The challenge of decision making What is Business Intelligence? The Business Intelligence value proposition Business Intelligence taxonomy Business Intelligence management issues Sources of Business Intelligence Data warehousing Data and information Information architecture Defining the data warehouse and its relationships Facts and dimensions Modeling, meta-modeling, and schemas Alternate architectures Building the data warehouse Extracting Transforming Loading Setting up the data and relationships Dimensions and the Fact Table Implementing many-to-many relationships in data warehouse Data marts Online Analytical Processing (OLAP) What is OLAP? OLAP and OLTP OLAP functionality Multi-dimensions Thinking in more than two dimensions What are the possibilities? OLAP architecture Cubism Tools OLAP variations - MOLAP, ROLAP, HOLAP BI using SOA Applications of Business Intelligence Applying BI through OLAP Enterprise Resource Planning and CRM Business Intelligence and financial information Business Intelligence User Interfaces and Presentations Data access Push-pull data access Types of decision support systems Designing the front end Presentation formats Dashboards Types of dashboards Common dashboard features Briefing books and scorecards Querying and Reporting Reporting emphasis Retrofitting Talking back Key Performance Indicators Report Definition and Visualization Typical reporting environment Forms of visualization Unconstrained views Data mining What is in the mine? Applications for data mining Data mining architecture Cross Industry Standard Process for Data Mining (CISP-DM) Data mining techniques Validation The Business Intelligence User Experience The business analyst role Business analysis and data analysis Five-step approach Cultural impact Identifying questions Gathering information Understand the goals The strategic Business Intelligence cycle Focus of Business Intelligence Design for the user Iterate the access Iterative solution development process Review and validation questions Basic approaches Building ad-hoc queries Building on-demand self-service reports Closed loop Business Intelligence Coming attractions - future of Business Intelligence Best practices in Business Intelligence

Business Intelligence: Virtual In-House Training
Delivered OnlineFlexible Dates
£850

Winter Series 2025 - Organisation & Relationship Systems Coaching Training

By CRR UK

CRRUK equips professionals with the concepts, skills and tools to build conscious, intentional relationships, and to coach relationship systems of any size.

Winter Series 2025 - Organisation & Relationship Systems Coaching Training
Delivered OnlineJoin Waitlist
£4,920