• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5313 Courses in Cardiff delivered Live Online

Customer Excellence Training

By Beyond Theory: business training & coaching

leadership management training course customer service training

Customer Excellence Training
Delivered in Northampton or UK Wide or OnlineFlexible Dates
Price on Enquiry

Interest Rate Futures & Swaps - Pricing, Hedging & xVA Adjustments

5.0(5)

By Finex Learning

This 3 Days programme will equip you to use, price, manage and evaluate interest rate and cross-currency derivatives. The course starts with the building blocks of money markets and futures, through yield curve building to interest-rate and cross-currency swaps, and applications. The approach is hands-on and learning is enhanced through many practical exercises covering hedging, valuation, and risk management. This course also includes sections on XVA, documentation and settlement. The programme includes extensive practical exercises using Excel spreadsheets for valuation and risk-management, which participants can take away for immediate implementation.

Interest Rate Futures & Swaps - Pricing, Hedging & xVA Adjustments
Delivered in Internationally or OnlineFlexible Dates
Price on Enquiry

SDI 2.0 (Strength Deployment Inventory) : personality profiling

By Beyond Theory: business training & coaching

leadership management training course

SDI 2.0 (Strength Deployment Inventory) : personality profiling
Delivered in Northampton or UK Wide or OnlineFlexible Dates
Price on Enquiry

MBTI (Myers Briggs Type Indicator) : personality profiling

By Beyond Theory: business training & coaching

leadership management training course MBTI personality profiling

MBTI (Myers Briggs Type Indicator) : personality profiling
Delivered in Northampton or UK Wide or OnlineFlexible Dates
Price on Enquiry

Belbin Team Roles : personality profiling

By Beyond Theory: business training & coaching

leadership management training course belbin team roles

Belbin Team Roles : personality profiling
Delivered in Northampton or UK Wide or OnlineFlexible Dates
Price on Enquiry

Exam Readiness Intensive Workshop: AWS Certified Solutions Architect - Associate

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for: Solutions architects and cloud architects seeking their AWS Certified Solutions Architect - Associate certification Customers and APN Partners who have 6 to 12 months of experience with AWS including a strong architecture background and experience Individuals who prefer an instructor led course for training and exam readiness Individuals who have not taken the Architecting on AWS course in the last ~6 months Overview In this course, you will learn to: Make architectural decisions based on AWS architectural principles and best practices Leverage AWS services to make your infrastructure scalable, reliable, and highly available Leverage AWS Managed Services to enable greater flexibility and resiliency in an infrastructure Make an AWS-based infrastructure more efficient to increase performance and reduce costs Use the Well-Architected Framework to improve architectures with AWS solutions Navigate the logistics of the examination process, exam structure, and question types Identify how questions relate to AWS architectural concepts Interpret the concepts being tested by an exam question This five-day, instructor-led course helps busy architects get away from the day-to-day to get focused and ready for their AWS Certified Solutions Architect ? Associate exam. Attendees learn the fundamentals of building IT infrastructure on AWS, so they can build scalable and resilient solutions in the cloud, by spending the first 3 days on the Architecting on AWS course. They?ll start getting in the exam readiness mindset with bonus end of module quizzes. Next, they?ll learn strategies to answer exam questions and avoid common mistakes with the Exam Readiness: AWS Certified Solutions Architect ? Associate half-day course. The course broadens attendees? knowledge of AWS services with deep dives into Amazon Redshift, Amazon Kinesis, and AWS Key Management Service, and then concludes with two quizzes and an instructor guided review of the AWS Certified Solutions Architect ? Associate practice exam. Architecting on AWS Module 1: Introduction Module 2: The Simplest Architectures Hands-On Lab 1: Hosting a Static Website Module 3: Adding a Compute Layer Module 4: Adding a Database Layer Hands-On Lab 2: Deploying a Web Application on AWS Module 5: Networking in AWS Part 1 Hands-On Lab 3: Creating a Virtual Private Cloud Architecting on AWS (continued) Module 6: Networking in AWS Part 2 Module 7: AWS Identity and Access Management (IAM) Module 8: Elasticity, High Availability, and Monitoring Hands-On Lab 4: Creating a Highly Available Environment Module 9: Automation Hands-On Lab 5: Automating Infrastructure Deployment with AWS CloudFormation Module 10: Caching Architecting on AWS (continued) Module 11: Building Decoupled Architectures Module 12: Microservices and Serverless Architectures Hands-On Lab 6: Implementing a Serverless Architecture with AWS Managed Services Module 13: RTP/RPO and Backup Recovery Setup Module 14: Optimizations and Review Exam Readiness: AWS Certified Solutions Architect -- Associate Module 0: The Exam Module 1: Design Resilient Architectures Module 2: Design Performant Architectures Module 3: Specify Secure Applications and Architectures Module 4: Design Cost-Optimized Architectures Module 5: Define Operationally Excellent Architectures Exam Readiness Additional deep dive of AWS services Quiz #1 Practice exam: AWS Certified Solutions Architect ? Associate Quiz #2 Wrap-up

Exam Readiness Intensive Workshop: AWS Certified Solutions Architect - Associate
Delivered OnlineFlexible Dates
Price on Enquiry

Credit Derivatives - Correlation & Counterparty Risk

5.0(5)

By Finex Learning

Overview This is a 2 day course on understanding credit markets converting credit derivatives, from plain vanilla credit default swaps through to structured credit derivatives involving correlation products such as nth to default baskets, index tranches, synthetic collateralized debt obligations and more. Gain insights into the corporate credit market dynamics, including the role of ratings agencies and the ratings process. Delve into the credit triangle, relating credit spreads to default probability (PD), exposure (EAD), and expected recovery (LGD). Learn about CDS indices (iTRAXX and CDX), their mechanics, sub-indices, tranching, correlation, and the motivation for tranched products. The course also includes counterparty risk in derivatives market where you learn how to managed and price Counterparty Credit Risk using real-world, practical examples Understand key definitions of exposure, including Mark-to-Market (MTM), Expected Exposure (EE), Expected Positive Exposure (EPE), Potential Future Exposure (PFE), Exposure at Default (EAD), and Expected Loss (EL) Explore the role of collateral and netting in managing counterparty risk, including the key features and mechanics of the Credit Support Annex (CSA) Briefly touch upon other XVA adjustments, including Margin Valuation Adjustment (MVA), Capital Valuation Adjustment (KVA), and Collateral Valuation Adjustment (CollVA). Who the course is for Credit traders and salespeople Structurers Asset managers ALM and treasury (Banks and Insurance Companies) Loan portfolio managers Product control, finance and internal audit Risk managers Risk controllers xVA desk IT Regulatory capital and reporting Course Content To learn more about the day by day course content please click here To learn more about schedule, pricing & delivery options, book a meeting with a course specialist now

Credit Derivatives - Correlation & Counterparty Risk
Delivered in Internationally or OnlineFlexible Dates
Price on Enquiry

F5 Networks Configuring BIG-IP Advanced WAF - Web Application Firewall (formerly ASM)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is intended for security and network administrators who will be responsible for the installation, deployment, tuning, and day-to-day maintenance of the F5 Advanced Web Application Firewall. In this 4 day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks. The course includes lecture, hands-on labs, and discussion about different F5 Advanced Web Application Firewall tools for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day exploits. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP System Configuration Leveraging F5 Support Resources and Tools Module 2: Traffic Processing with BIG-IP Identifying BIG-IP Traffic Processing Objects Overview of Network Packet Flow Understanding Profiles Overview of Local Traffic Policies Visualizing the HTTP Request Flow Module 3: Web Application Concepts Overview of Web Application Request Processing Web Application Firewall: Layer 7 Protection F5 Advanced WAF Layer 7 Security Checks Overview of Web Communication Elements Overview of the HTTP Request Structure Examining HTTP Responses How F5 Advanced WAF Parses File Types, URLs, and Parameters Using the Fiddler HTTP Proxy Module 4: Common Web Application Vulnerabilities A Taxonomy of Attacks: The Threat Landscape What Elements of Application Delivery are Targeted? Common Exploits Against Web Applications Module 5: Security Policy Deployment Defining Learning Comparing Positive and Negative Security Models The Deployment Workflow Policy Type: How Will the Policy Be Applied Policy Template: Determines the Level of Protection Policy Templates: Automatic or Manual Policy Building Assigning Policy to Virtual Server Deployment Workflow: Using Advanced Settings Selecting the Enforcement Mode The Importance of Application Language Configure Server Technologies Verify Attack Signature Staging Viewing Requests Security Checks Offered by Rapid Deployment Defining Attack Signatures Using Data Guard to Check Responses Module 6: Policy Tuning and Violations Post-Deployment Traffic Processing Defining Violations Defining False Positives How Violations are Categorized Violation Rating: A Threat Scale Defining Staging and Enforcement Defining Enforcement Mode Defining the Enforcement Readiness Period Reviewing the Definition of Learning Defining Learning Suggestions Choosing Automatic or Manual Learning Defining the Learn, Alarm and Block Settings Interpreting the Enforcement Readiness Summary Configuring the Blocking Response Page Module 7: Attack Signatures & Threat Campaigns Defining Attack Signatures Attack Signature Basics Creating User-Defined Attack Signatures Defining Simple and Advanced Edit Modes Defining Attack Signature Sets Defining Attack Signature Pools Understanding Attack Signatures and Staging Updating Attack Signatures Defining Threat Campaigns Deploying Threat Campaigns Module 8: Positive Security Policy Building Defining and Learning Security Policy Components Defining the Wildcard Defining the Entity Lifecycle Choosing the Learning Scheme How to Learn: Never (Wildcard Only) How to Learn: Always How to Learn: Selective Reviewing the Enforcement Readiness Period: Entities Viewing Learning Suggestions and Staging Status Violations Without Learning Suggestions Defining the Learning Score Defining Trusted and Untrusted IP Addresses How to Learn: Compact Module 9: Cookies and Other Headers F5 Advanced WAF Cookies: What to Enforce Defining Allowed and Enforced Cookies Configuring Security Processing on HTTP headers Module 10: Reporting and Logging Overview: Big Picture Data Reporting: Build Your Own View Reporting: Chart based on filters Brute Force and Web Scraping Statistics Viewing F5 Advanced WAF Resource Reports PCI Compliance: PCI-DSS 3.0 The Attack Expert System Viewing Traffic Learning Graphs Local Logging Facilities and Destinations How to Enable Local Logging of Security Events Viewing Logs in the Configuration Utility Exporting Requests Logging Profiles: Build What You Need Configuring Response Logging Module 11: Lab Project 1 Lab Project 1 Module 12: Advanced Parameter Handling Defining Parameter Types Defining Static Parameters Defining Dynamic Parameters Defining Dynamic Parameter Extraction Properties Defining Parameter Levels Other Parameter Considerations Module 13: Automatic Policy Building Overview of Automatic Policy Building Defining Templates Which Automate Learning Defining Policy Loosening Defining Policy Tightening Defining Learning Speed: Traffic Sampling Defining Track Site Changes Lesson 14: Web Application Vulnerability Scanner Integration Integrating Scanner Output Importing Vulnerabilities Resolving Vulnerabilities Using the Generic XML Scanner XSD file Lesson 15: Deploying Layered Policies Defining a Parent Policy Defining Inheritance Parent Policy Deployment Use Cases Lesson 16: Login Enforcement and Brute Force Mitigation Defining Login Pages for Flow Control Configuring Automatic Detection of Login Pages Defining Session Tracking Brute Force Protection Configuration Source-Based Brute Force Mitigations Defining Credentials Stuffing Mitigating Credentials Stuffing Lesson 17: Reconnaissance with Session Tracking Defining Session Tracking Configuring Actions Upon Violation Detection Lesson 18: Layer 7 DoS Mitigation Defining Denial of Service Attacks Defining the DoS Protection Profile Overview of TPS-based DoS Protection Creating a DoS Logging Profile Applying TPS Mitigations Defining Behavioral and Stress-Based Detection Lesson 19: Advanced Bot Protection Classifying Clients with the Bot Defense Profile Defining Bot Signatures Defining Proactive Bot Defense Defining Behavioral and Stress-Based Detection Defining Behavioral DoS Mitigation Lesson 20: Form Encryption using DataSafe Targeting Elements of Application Delivery Exploiting the Document Object Model Protecting Applications Using DataSafe The Order of Operations for URL Classification Lesson 21: Review and Final Labs Review and Final Labs

F5 Networks Configuring BIG-IP Advanced WAF - Web Application Firewall (formerly ASM)
Delivered OnlineFlexible Dates
Price on Enquiry

Free Webinar | Purpose-Built Student Accommodation (PBSA) : Theory and Model Showcase

4.3(5)

By Bayfield Training

Purpose built student accommodation is a type of residential property specifically built for university students by private developers. In this webinar, we delve into the intricacies of PBSA, drawing comparisons with conventional real estate. Additionally, we’ll present a model highlighting its key aspects. Join us to gain insights into this unique asset class and its modelling intricacies.

Free Webinar | Purpose-Built Student Accommodation (PBSA) : Theory and Model Showcase
Delivered OnlineFlexible Dates
FREE

1:1 Science-based Relationship and Dating Coaching FOR MEN

By Single To Couple Consulting

Are you tired of “rocky” relationships, bad dates or feeling lonely? Most of us have learned the hard way, the cost of getting a relationship wrong can be enormous. The rewards of getting it right are immeasurable! That is why, as a certified Relationship & Dating Coach, I help clients avoid the pitfalls and find lasting happiness. So, do you really want to do it right this time around? Take charge of your love lfie today and book a free confidential 30-minute introductory session.

1:1 Science-based Relationship and Dating Coaching FOR MEN
Delivered OnlineFlexible Dates
FREE