• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

699 Courses in Cardiff delivered Live Online

IATP - Asbestos Awareness Online refresher

By Airborne Environmental Consultants Ltd

If you have no intention of removing asbestos but work on buildings built or refurbished before the year 2000, asbestos could be present. You will need awareness training so you know how to avoid the risks. Asbestos awareness training should be given to employees whose work could foreseeably disturb the fabric of a building and expose them to asbestos or who supervise or influence the work. In particular, it should be given to those workers in the refurbishment, maintenance and allied trades where it is foreseeable that ACMs may become exposed during their work.

IATP - Asbestos Awareness Online refresher
Delivered in Manchester + 1 more or OnlineFlexible Dates
£55

Certified Information Privacy Technologist (CIPT)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialist Anyone who builds and develops IT systems Overview Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to preempt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal The Principles of Privacy in Technology training is the how to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. The training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Technologist (CIPT) certification program. Fundamentals of information privacy Reviewing the modern history of privacy Foundational privacy concepts Data protection roles and fair information practices Exploring the impacts of privacy and data protection regulations on information management Privacy in the IT environment Compliance requirements IT risks Stakeholder privacy expectations Differentiating between privacy and security Core privacy concepts Foundational elements for embedding privacy in IT Common privacy principles Data protection by design and default Privacy considerations in the information life cycle Privacy considerations throughout the stages of the information life cycle Privacy in systems and applications Examining the risks inherent in the IT environment and options for addressing them Identity and access management Credit card information and processing Remote access BYOD and telecommuting Data encryption Additional privacy-enhancing technologies in the enterprise environment Privacy techniques Strengths and weaknesses of authentication techniques Using identifiers Privacy by design Online privacy issues Unique challenges that come from online privacy issues Laws and regulations Online threats Social media E-commerce Tracking technologies Web security protocols Technologies with privacy considerations Privacy considerations associated with a variety of technologies Cloud computing Wireless IDs Location-based services ?Smart? technologies Video/data/audio surveillance Biometric recognition

Certified Information Privacy Technologist (CIPT)
Delivered OnlineFlexible Dates
Price on Enquiry

EC-Council Certified CISO (C|CISO) w/exam

By Nexus Human

Duration 4.375 Days 26.25 CPD hours This course is intended for CCISOs are certified in the knowledge of and experience in the following CISO Domains:Governance (Policy, Legal & Compliance)IS Management Controls and Auditing Management (Projects, Technology & Operations)Management ? Projects and OperationsInformation Security Core CompetenciesStrategic Planning & Finance Overview Please refer to Overview. The Certified CISO (C|CISO) course has certified leading information security professionals around the world and is the first of its kind training and certification program aimed at producing top-level Information Security Leaders. The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The program was developed by seasoned CISOs for current and aspiring CISOs. Governance Drivers that Influence Governance Corporate Governance Activities Information Security Governance Activities Governance and Ethical Decision Making Security Risk Management, Controls, and Audit Management Risk Management Audit Management Risk Treatment Risk Management Frameworks Risk Communication and Organizational Reporting Security Program Management and Operations Information Security Portfolio Management Information Security Program Management Information Security Project Management Security Operations Information Security Core Competencies Access Control Physical Security Network and Communications Security Threat and Vulnerability Management System and Application Security Encryption Concepts and Technology Strategic Planning, Financial Management, and Vendor Management Strategic Planning Financial Management Vendor Risk Management Additional course details: Nexus Humans EC-Council Certified CISO (C|CISO) w/exam training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified CISO (C|CISO) w/exam course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified CISO (C|CISO) w/exam
Delivered OnlineFlexible Dates
Price on Enquiry

Asbestos Awareness for the Engineering Industry Online

By Airborne Environmental Consultants Ltd

Asbestos Awareness training is a legal requirement for any worker who may encounter asbestos during their work. Modules will provide relevant and detailed knowledge about the dangers of asbestos, the products that contain asbestos, what it looks like, where it may have been used and the practical steps that can be taken to reduce their risk of exposure. In addition to common mandatory modules, learners will also choose a selection of modules relevant to their occupational pathway.

Asbestos Awareness for the Engineering Industry Online
Delivered in Manchester + 1 more or OnlineFlexible Dates
£65

Asbestos Awareness for the Engineering Industry

By Airborne Environmental Consultants Ltd

Asbestos Awareness training is a legal requirement for any worker who may encounter asbestos during their work. Modules will provide relevant and detailed knowledge about the dangers of asbestos, the products that contain asbestos, what it looks like, where it may have been used and the practical steps that can be taken to reduce their risk of exposure. In addition to common mandatory modules, learners will also choose a selection of modules relevant to their occupational pathway.

Asbestos Awareness for the Engineering Industry
Delivered in Manchester + 1 more or OnlineFlexible Dates
£65

Introduction to procurement (In-House)

By The In House Training Company

This very practical one-day programme provides participants with the skills and knowledge required to be an effective member of the procurement team and to enable them to procure a wide range of resources for the organisation, in a compliant and cost-effective manner. It also empowers them to be able to collaborate with all key stakeholders. By the end of the programme participants will be able to: Understand the basic concepts of good procurement practice Apply a range of tools and techniques for developing scopes of work and specifications Apply various methods to select and evaluate suppliers Develop robust contract award strategies Appreciate the commercial importance of effective procurement and opportunities to reduce cost and add value Develop appropriate procurement strategies depending on risk and value Appreciate the legal aspects of procurement 1 Welcome Introductions Aims and objectives Plan for the day 2 The basics of procurement The concept of total cost of ownership v price The procurement cycle The roles of the customer and the contractor Impact upon profit 3 Specification process Importance of effective specifications Specification development process Types of specification Team approach Use of performance specifications Early supplier involvement (ESI) / early contractor involvement (ECI) 4 Quality Concepts and practices Defining 'fit for purpose' Conformance to requirements Compliance to standards Role of the supplier Quality assurance tools and techniques 5 Procurement methods RFP RFQ ITT Negotiated procurement Strategic partnerships Outsourcing 6 Tendering How to undertake a formal tendering process Business case to award Critical stages in the process Risks and benefits 7 Tender evaluation How to undertake a quotation analysis Tools of analysis Use of VFM models Role of the customer Comparisons around cost, quality, and delivery 8 Supplier selection and evaluation Developing critical selection criteria Using the 10Cs model Importance of effective selection process Weighting systems Importance of validity and evidence 9 Capital equipment procurement Life cycle cost issues Payback calculations Compatibility issues Maintenance and training issues After-sales support 10 Supplier relationships Corporate social responsibility issues Communication 360 feed-back Open and ethical Initial understanding Clear and fair terms and conditions 11 Close Review of key learning points Personal action planning

Introduction to procurement (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Creating a Safe Workplace: Understanding the Impact of Domestic Abuse

By Safe Space Consultancy

This 1 hour on-line training seminar provides an opportunity for employers, HR managers, supervisors, and team leaders to learn how domestic abuse can impact on an employee and the business as well as the next steps to support your staff and protect your business.

Creating a Safe Workplace: Understanding the Impact of Domestic Abuse
Delivered OnlineFlexible Dates
£79

Spill Management Training

By NextGen Learning

Spill Management Training Course Overview This Spill Management Training course provides a comprehensive understanding of how to effectively manage and respond to spill incidents in various settings. Covering a range of topics, from hazardous substances and pollution response planning to spill clean-up and prevention, the course prepares learners to handle spill incidents with confidence. Through clear guidelines and site-specific solutions, the course ensures that learners are equipped to minimise environmental impact, reduce risks, and comply with relevant regulations. Learners will gain valuable skills in spill management, safety practices, and regulatory compliance, ensuring a safer work environment. Course Description The Spill Management Training course delves deeper into key areas essential for spill management, including hazardous substances identification, response strategies, and effective clean-up methods. Learners will explore pollution incident response planning, spill management techniques for different environments, and site-specific pollution control options. Each module is designed to offer valuable insights into best practices for spill prevention and control, while encouraging a culture of responsibility and environmental awareness. By the end of the course, learners will have the skills to manage spills efficiently, ensuring safety and compliance within their workplace. Spill Management Training Curriculum Module 01: Introduction to Spill Management Module 02: Hazardous Substances Module 03: Pollution Incident Response Planning Module 04: Managing a Spill Module 05: Spill Clean-Up Guideline Module 06: Spills on a Road or Highway Module 07: Diesel Spillages: An Overview Module 08: Site-Specific Pollution Control Options Module 09: Spill Prevention & Control Checklist Module 10: Ways to Encourage Best Practice (See full curriculum) Who is this course for? Individuals seeking to enhance their environmental safety skills. Professionals aiming to specialise in spill management or environmental protection. Beginners with an interest in pollution control and safety procedures. Organisations requiring staff training in spill management and compliance. Career Path Environmental Health and Safety Officer Spill Response Coordinator Environmental Consultant Pollution Control Specialist Health and Safety Manager

Spill Management Training
Delivered OnlineFlexible Dates
£7.99

Information Management

By NextGen Learning

Information Management Course Overview This Information Management course provides a comprehensive understanding of the principles and practices essential for effectively managing information in today’s data-driven world. It covers core topics such as strategic planning, databases, management information systems, and the auditing of information systems. The course is designed to enhance learners' understanding of how information can be efficiently organised, secured, and utilised for decision-making within organisations. Upon completion, learners will be equipped with the skills to manage data, ensure compliance with data protection laws, and address ethical and social issues surrounding information management. This course is ideal for individuals looking to advance their knowledge in information management and pursue a career in this dynamic field. Course Description The Information Management course explores critical aspects of managing data and information systems, offering in-depth insights into the processes and tools used in modern organisations. The course covers a broad range of topics, including developing information management strategies, understanding and implementing databases, and examining management information systems (MIS) for efficient decision-making. Learners will also gain knowledge of auditing information systems to ensure accuracy, integrity, and security. The ethical, legal, and social considerations of data protection and information governance are also discussed. Throughout the course, learners will engage with key theories and practices, preparing them to apply their knowledge to various industries, ensuring organisations meet legal requirements and maximise the value of their information assets. Information Management Curriculum Module 01: Introduction to Information Management Module 02: Information Management Strategy Module 03: Databases and Information Management Module 04: Management Information Systems (MIS) Module 05: Auditing Information Systems Module 06: Ethical and Social Issues and Data Protection (See full curriculum) Who is this course for? Individuals seeking to understand the principles of information management. Professionals aiming to enhance their knowledge of information governance and security. Beginners with an interest in data management and organisational systems. Anyone looking to develop skills for improving organisational efficiency and compliance. Career Path Data Analyst Information Manager Records Manager IT Compliance Officer Data Protection Officer Information Systems Auditor

Information Management
Delivered OnlineFlexible Dates
£7.99

CCSE Check Point Certified Security Expert

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is recommended for technical professionals who perform advanced deployment configurations of Check Point products. Overview Provide an overview of the upgrade service and options available. Explain how to perform management upgrade and migration. Articulate the process using CPUSE features. Articulate the purpose and function of Management High Availability. Explain Primary vs Secondary, Active vs Standby and Synchronization. Explain disaster recovery steps in case the primary management server becomes unavailable. Provide overview of Central Deployment in SmartConsole. Articulate an understanding of Security Gateway cluster upgrade methods. Explain about Multi Version Cluster (MVC) upgrades. Discuss Gaia Commands and how they are used. Explain the main processes on s and s. Describe how to work with scripts and SmartTasks to configure automatic actions. Explain the Management Data Plane Separation (MDPS) Explain kernel operations and traffic flow Articulate Dynamic and Updatable Objects in Security Gateways Explain the policy installation flow and files used. Describe the use of policy installation history. Explain concurrent and accelerated install policy. Describe an overview of APIs and ways to use and authenticate. Explain how to make changes in GAIA and management configuration. Explain how to install policy using API. Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance. Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance. Articulate how utilizing multiple traffic queues can make traffic handling more efficient. Discuss Site-to-Site VPN basics, deployment and communities. Describe how to analyze and interpret VPN tunnel traffic. Explain Link Selection and ISP Redundancy options. Explain tunnel management features. Discuss Check Point Remote Access solutions and how they differ from each other. Describe how client security can be provided by Remote Access . Explain authentication methods including machine authentication. Explain Multiple Entry Point (MEP). Discuss the Mobile Access Software Blade and how it secures communication and data exchange during remote connections. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. Course Outline Prepare for a Security Management Server Upgrade Upgrade the Security Management Server Deploy a Secondary Security Management Server Configure a Distributed Log Server Upgrade a Security Gateway from SmartConsole Work with the Command Line Use Scripts and SmartTasks Configure Dynamic Objects Monitor Traffic Verify Policy Installation and Status Work with Gaia and Management APIs Work with Acceleration Features Configure a Locally Managed Site to Site VPN Configure a Site to Site VPN with an Interoperable Device Configure Remote Access VPN Configure Mobile Access VPN Configure a High Availability Cluster Work with ClusterXL Configure Policy Compliance Deploy SmartEvent

CCSE Check Point Certified Security Expert
Delivered OnlineFlexible Dates
Price on Enquiry