• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

958 Courses in Cardiff delivered Live Online

Master's Diploma in Digital Marketing Management

4.9(51)

By B&20 British School

Online Marketing course for individuals, companies, professionals that want to succeed on the job and improve marketing skills.

Master's Diploma in Digital Marketing Management
Delivered OnlineFlexible Dates
£1,650

Data storytelling

By Fire Plus Algebra

Data has become the most important resource for every organisation – but the insights gained from data analysis will only ever be truly valuable if they can be clearly expressed to other people.  This course is for anybody who works with data, and needs to communicate the meaning that's in the numbers to colleagues, customers, bosses or external stakeholders.  It will give you or your team the confidence and skills to translate raw data into compelling visual stories for your key audiences. The principles and skills covered apply to the simplest PowerPoint chart, to more complex interactive visualisations.  We’ll work with you before the course to ensure that we understand your organisation and what you’re hoping to achieve.  Sample learning content Session 1: What makes a great data-driven story The key elements of a successful infographic or presentation. Industry best practice, and discussion of good (and bad) examples. A simple framework for identifying the Audience, Story and Action. Session 2: Data in context How to balance function and aesthetic appeal. Identifying the right graph, chart, infographic or other visual. Framing the data and providing contextual information. Session 3: Designing for the human brain Using colours to add emphasis and meaning. Design and layout principles, and creating hierarchies of information. The principle of ‘self-sufficiency’, and removing clutter. Session 4: Navigation and narrative Tailoring visualisations for different types of communications. Structuring presentations and longer reports. Thinking in layers to create interactive dashboards. Delivery We deliver our courses over Zoom, to maximise flexibility. The training can be delivered in a single day, or across multiple sessions. All of our courses are live and interactive – every session includes a mix of formal tuition and hands-on exercises. To ensure this is possible, the number of attendees is capped at 16 people.  Tutor Alan Rutter is the founder of Fire Plus Algebra. He is a specialist in communicating complex subjects through data visualisation, writing and design. He teaches for General Assembly and runs in-house training for public sector clients including the Home Office, the Department of Transport, the Biotechnology and Biological Sciences Research Council, the Health Foundation, and numerous local government and emergency services teams. He previously worked with Guardian Masterclasses on curating and delivering new course strands, including developing and teaching their B2B data visualisation courses. He oversaw the iPad edition launches of Wired, GQ, Vanity Fair and Vogue in the UK, and has worked with Condé Nast International as product owner on a bespoke digital asset management system for their 11 global markets.
 Testimonial “I was familiar with Alan’s work as a Guardian Masterclass instructor on data visualisation and digital journalism, which made it easy for me to recommend him for onsite training at the Liverpool School of Tropical Medicine. We had a large group of people interested in honing their abilities to depict their research and stories in engaging ways. Alan’s course provided great insight about common communication pitfalls and how to avoid them, how to become better communicators by understanding the audience diversity, and it showcased some great online tools for creating infographics. This should be mandatory training for all students, academics, report writers and those involved with conveying research to the media as it will help increase the clarity and accessibility of our own research stories.”
 Dr Lee Haines | Liverpool School of Tropical Medicine

Data storytelling
Delivered OnlineFlexible Dates
£2,405.97

M.D.D ISSUES WITH IN LAWS PACKAGE (COUPLES)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

Offering the following services: Resolving conflicts with in-laws Establishing healthy boundaries in family relationships Effective communication strategies with extended family Navigating cultural differences in relationships Building understanding and harmony with in-laws Strengthening the bond with extended family Transformative therapy program for in-law issues Invest in the future of your relationship and family harmony today by addressing the issues with in-laws. Our compassionate therapists are ready to guide you towards resolution, healthier dynamics, and a more fulfilling relationship with your extended family. Take the first step towards positive change by scheduling a session with us now. 3 x 1 hour https://relationshipsmdd.com/product/issues-with-in-laws-package/

M.D.D ISSUES WITH IN LAWS PACKAGE (COUPLES)
Delivered in London or UK Wide or OnlineFlexible Dates
£500

M.D.D EMOTIONAL INTELLIGENCE PACKAGE (SELF IMPROVEMENT)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

Miss Date Doctor’s Emotional Intelligence coaching is designed to help you develop the skills and knowledge needed to understand and manage your emotions effectively. Emotional intelligence is a critical factor in building strong, healthy relationships, and our coaching can provide you with the tools needed to enhance your emotional intelligence and improve your relationships. Our Emotional Intelligence coaching includes a range of techniques and strategies, such as self-awareness, self-regulation, empathy, and social skills. We can help you learn to identify and manage your emotions, as well as to understand and respond effectively to the emotions of others. With our Emotional Intelligence coaching, you can learn to build stronger, more fulfilling relationships by improving your ability to communicate effectively, resolve conflicts, and understand the needs of your partner or potential partner. Whether you’re looking to enhance your personal relationships or to improve your professional performance, our Emotional Intelligence coaching can help you achieve your goals. Have 3 one hour sessions with a certified qualified experienced professional The Miss Date Doctor Emotional Intelligence package includes the following: Relationship Emotional Intelligence, Emotional Intelligence Coaching, Self-Awareness, Self-Regulation, Empathy, Social Skills, Emotion Management, Emotion Understanding, Emotional Intelligence Training, Communication, Conflict Resolution, Relationship Building, Emotional Intelligence Techniques. https://relationshipsmdd.com/product/emotional-intelligence-package/

M.D.D EMOTIONAL INTELLIGENCE PACKAGE (SELF IMPROVEMENT)
Delivered in London or UK Wide or OnlineFlexible Dates
£600

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

BABY PROJECT – WORKING WITH BABIES TO INCREASE EMPATHY

By Inclusive Solutions

This radical way of building empathy is inspired by the work of the ‘Roots of Empathy’ organisation in Canada. Roots of Empathy (ROE) is dedicated to building caring and peaceful societies through the development of empathy in children. It is a parenting education programme for elementary school students (between the ages of 3 to 14 years) based on monthly visits to the classroom by a parent and infant from the school neighbourhood. Course Category Behaviour and Relationships Autism and Communication Meeting emotional needs Description This radical way of building empathy is inspired by the work of the ‘Roots of Empathy’ organisation in Canada. As Mary Gordon founder of this way of working describes: ‘By regular visits to the classroom of local mums and their children build an empathic relationship with the baby.MARY GORDON Roots of Empathy (ROE) is dedicated to building caring and peaceful societies through the development of empathy in children. It is a parenting education program for elementary school students (between the ages of 3 to 14 years) based on monthly visits to the classroom by a parent and infant from the school neighbourhood. We teach teachers and educators to help children to observe, over the school year, how their baby forms an attachment to his or her parent. Children are encouraged to record how the infants develop. The children learn to spot their babies cues and unique temperament, while celebrating developmental milestones. Children are prepared for responsible and responsive parenting as they increase their knowledge about human development, learning, and infant safety. The baby project program brings about the development of empathy and emotional literacy: As children learn to take the perspective of others they are less likely to hurt through bullying, exclusion, aggression, and violence. Children learn how to challenge cruelty and injustice in their own classroom. Messages of social inclusion and activities that are consensus-building contribute to a culture of caring that changes the tone of the classroom. Involving fathers and men provides rich models of male nurturance Testimonials ‘13% increase in empathy scores for our year 1s’ ‘Years 2s empathy had increased by 35%’ ‘Now that I am older I can be happy for other people’ (6 year old) ‘Everyone is special – thats the truth – but when I was small I thought its not fair when someone got a present and I didn’t’ (7 year old) Dramatic improvements in children taking responsibility for actions and being less defiant over the year of the project. Learning Objectives Understanding of method and approach to building empathy with babies Full understanding of background to this approach Practical advice received as to how to set up baby project in classrooms across school Who Is It For ? Teachers School leaders Project Coordinators Social Care Course Content We will provide theoretical and evidence back ground to impact of this work. We will describe existing UK school based work. We will inspire staff in attendance to want to actively engage in this work There may even be a baby to hold!!

BABY PROJECT – WORKING WITH BABIES TO INCREASE EMPATHY
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

Assertiveness for Assessors and Trainers

4.0(1)

By Panda Education and Training Ltd

Are you an assessor or a trainer looking to enhance your effectiveness and communication skills? Do you find it challenging to confidently express your thoughts, to get what you want from situations and to maintain control during training sessions or assessments?  If so, our “Assertiveness for Assessors and Trainers” live online workshop is made for you. Effective Communication: Assertiveness empowers you to communicate your ideas clearly, ensuring your message is understood by learners. You’ll learn techniques to express your thoughts confidently, leading to improved engagement and comprehension. Confidence Building: Learn techniques for appearing more confident when communicating with others.  Taking control: Take control of situations through your body language and the verbal / written language you use. Invest in Your Success This 2.5 hour session will help you gain the skills to lead with confidence, communicate effectively, and prioritise yourself in your life.  Further Information This 2.5 hour session held live online via Teams will give you the tools and techniques you need to be more assertive. Workshop Benefits Interactive Workshops: Engage in hands-on activities, role plays, and real-world scenarios to practice assertive communication techniques in a safe and supportive environment.Expert Facilitators: Our experienced trainers will guide you through proven strategies, drawing on their expertise in communication, psychology, and training methodologies.Tailored Content: The course content is specifically designed for assessors and trainers, addressing challenges and situations unique to your profession.Practical Tools: Walk away with a toolkit of practical techniques, scripts, and strategies that you can immediately apply in your assessments and training sessions.Networking Opportunities: Connect with fellow assessors and trainers, sharing insights, experiences, and best practices to further enhance your professional journey.

Assertiveness for Assessors and Trainers
Delivered OnlineFlexible Dates
£75

M.D.D CONFLICT RESOLUTION PACKAGE (COUPLES)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

Miss Date Doctor’s Conflict Resolution coaching is designed to help couples and individuals navigate conflicts in a healthy and constructive way. Our coaching provides you with the tools and techniques needed to resolve conflicts without damaging your relationship or emotional well-being. We understand that conflicts can arise in any relationship, and that dealing with them effectively is key to building stronger, more fulfilling relationships. Our Conflict Resolution coaching can help you develop skills such as active listening, empathy building, and problem-solving, as well as techniques to de-escalate tense situations and prevent conflicts from becoming destructive. Our coaching also includes strategies for preventing conflicts from arising in the first place, such as setting clear boundaries, communicating effectively, and building healthy habits. With our Conflict Resolution coaching, you can learn to navigate conflicts in a way that strengthens your relationship and helps you build a brighter future together. The Miss Date Doctor Conflict Resolution Package helps with the following: Relationship Conflict, Conflict Resolution Techniques, Conflict Management, Active Listening, Empathy Building, Problem-Solving, De-escalation, Preventing Conflicts, Healthy Habits, Clear Boundaries, Communication, Conflict Resolution Coaching, Conflict Resolution Skills. https://relationshipsmdd.com/product/conflict-resolution-package/

M.D.D CONFLICT RESOLUTION PACKAGE (COUPLES)
Delivered in London or UK Wide or OnlineFlexible Dates
£550

Project Management for Non-Project Managers (Virtual)

By IIL Europe Ltd

Project Management for Non-Project Managers (Virtual) Individuals who are involved in projects (commissioning, supporting, sponsoring, etc.) may often be unfamiliar with project management. A basic understanding of project management is essential for non-project managers, who are critical stakeholders contributing to project success. This awareness course usesA Guide to the Project Management Body of Knowledge (PMBOK® Guide) and other sources to introduce you to project management vocabulary, concepts, and techniques. It also provides insights into the realities of being a project manager, and opportunities to explore how you can positively impact projects in your own role. Getting Started Introductions Course structure Course goals and objectives Foundation Concepts Project management overview Strategic value of project management Defining project success Project life-cycle models and governance Project roles and responsibilities Project Initiating and Planning Initiating the project Defining project requirements and scope Developing the project schedule and budget Project Risk Management, Executing, Monitoring, and Closing Understanding, evaluating, and adjusting for risk Honoring the baseline and executing the project Monitoring and controlling the project Closing the project Project Interpersonal Processes Project communication Project team development Conflict management

Project Management for Non-Project Managers (Virtual)
Delivered OnlineFlexible Dates
£450

CompTIA A+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for individuals who have basic computer user skills and who are interested in obtaining a job as an entry-level IT technician. This course is also designed for students who are seeking the CompTIA A+ certification and who want to prepare for the CompTIA A+ Core 1 220-1101 Certification Exam and the CompTIA A+ Core 2 220-1102 Certification Exam. Overview On course completion, participants will be able to: Support operating systems. Install and configure PC system unit components and peripheral devices. Install, configure, and troubleshoot display and multimedia devices. Install, configure, and troubleshoot storage devices. Install, configure, and troubleshoot internal system components. Install, configure, and maintain operating systems. Maintain and troubleshoot Microsoft Windows. Explain network infrastructure concepts. Configure and troubleshoot network connections. Manage users, workstations, and shared resources. Implement client virtualization and cloud computing. Implement physical security. Secure workstations and data. Troubleshoot workstation security issues. Support and troubleshoot laptops. Support and troubleshoot mobile devices. Install, configure, and troubleshoot print devices. Implement operational procedures. CompTIA A+ certified professionals are proven problem solvers. They support today's core technologies from security to cloud to data management and more. CompTIA A+ is the industry standard for launching IT careers into today's digital world. It is the only industry recognized credential with performance-based items to prove pros can think on their feet to perform critical IT support tasks in the moment. It is trusted by employers around the world to identify the go-to person in end point management and technical support roles. CompTIA A+ is regularly re-invented by IT experts to ensure that it validates core skills and abilities demanded in the workplace. 1 - Installing Motherboards and Connectors Explain Cable Types and Connectors Install and Configure Motherboards Explain Legacy Cable Types 2 - Installing System Devices Install and Configure Power Supplies and Cooling Select and Install Storage Devices Install and Configure System Memory Install and Configure CPUs 3 - Troubleshooting PC Hardware Apply Troubleshooting Methodology Configure BIOS/UEFI Troubleshoot Power and Disk Issues Troubleshoot System and Display Issues 4 - Comparing Local Networking Hardware Compare Network Types Compare Networking Hardware Explain Network Cable Types Compare Wireless Networking Types 5 - Configuring Network Addressing and Internet Connections Compare Internet Connection Types Use Basic TCP/IP Concepts Compare Protocols and Ports Compare Network Configuration Concepts 6 - Supporting Network Services Summarize Services Provided by Networked Hosts Compare Internet and Embedded Appliances Troubleshoot Networks 7 - Summarizing Virtualization and Cloud Concepts Summarize Client-Side Virtualization Summarize Cloud Concepts 8 - Supporting Mobile Devices Set Up Mobile Devices and Peripherals Configure Mobile Device Apps Install and Configure Laptop Hardware Troubleshoot Mobile Device Issues 9 - Supporting Print Devices Deploy Printer and Multifunction Devices Replace Print Device Consumables Troubleshoot Print Device Issues 10 - Configuring Windows Configure Windows User Settings Configure Windows System Settings 11 - Managing Windows Use Management Consoles Use Performance and Troubleshooting Tools Use Command-line Tools 12 - Identifying OS Types and Features Explain OS Types Compare Windows Editions 13 - Supporting Windows Perform OS Installations and Upgrades Install and Configure Applications Troubleshoot Windows OS Problems 14 - Managing Windows Networking Manage Windows Networking Troubleshoot Windows Networking Configure Windows Security Settings Manage Windows Shares 15 - Managing Linux and macOS Identify Features of Linux Identify Features of macOS 16 - Configuring SOHO Network Security Explain Attacks, Threats, and Vulnerabilities Compare Wireless Security Protocols Configure SOHO Router Security Summarize Security Measures 17 - Managing Security Settings Configure Workstation Security Configure Browser Security Troubleshoot Workstation Security Issues 18 - Supporting Mobile Software Configure Mobile OS Security Troubleshoot Mobile OS and App Software Troubleshoot Mobile OS and App Security 19 - Using Support and Scripting Tools Use Remote Access Technologies Implement Backup and Recovery Explain Data Handling Best Practices Identify Basics of Scripting 20 - Implementing Operational Procedures Implement Best Practice Documentation Use Proper Communication Techniques Use Common Safety and Environmental Procedures

CompTIA A+
Delivered OnlineFlexible Dates
£2,475