• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

768 Courses in Cardiff delivered Live Online

Cisco Implementing Cisco Data Center Core Technologies v1.2 (DCCOR)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network designers Network administrators Network engineers Systems engineers Data center engineers Consulting systems engineers Technical solutions architects Field engineers Cisco integrators and partners Server administrator Network manager Overview After taking this course, you should be able to: Implement routing and switching protocols in Data Center environment Implement overlay networks in data center Introduce high-level Cisco Application Centric Infrastructure (Cisco ACI™) concepts and Cisco Virtual Machine manager (VMM) domain integration Describe Cisco Cloud Service and deployment models Implement Fibre Channel fabric Implement Fibre Channel over Ethernet (FCoE) unified fabric Implement security features in data center Implement software management and infrastructure monitoring Implement Cisco UCS Fabric Interconnect and Server abstraction Implement SAN connectivity for Cisco Unified Computing System™ (Cisco UCS) Describe Cisco HyperFlex™ infrastructure concepts and benefits Implement Cisco automation and scripting tools in data center Evaluate automation and orchestration technologies The Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.2 course helps you prepare for the Cisco CCNP Data Center and CCIE Data Center certifications for advanced-level data center roles. In this course, you will master the skills and technologies you need to implement data center compute, LAN and SAN infrastructure. You will also learn the essentials of automation and security in data centers. You will gain hands-on experience deploying, securing, operating, and maintaining Cisco data center infrastructure including: Cisco MDS Switches and Cisco Nexus Switches; Cisco Unified Computing System (Cisco UCS) B-Series Blade Servers, and Cisco UCS C-Series Rack Servers. This course also earns you 64 Continuing Education (CE) credits towards recertification. This course, including the self-paced material prepares you to take the exam: 350-601 Implementing Cisco Data Center Core Technologies (DCCOR) This course will help you: Gain experience implementing, securing and automating network, compute, and storage infrastructure Gain knowledge and skills through Cisco?s unique combination of lessons and hands-on practice using enterprise-grade Cisco learning technologies, data center equipment, and software Qualify for professional and expert-level job roles in the high-demand area of enterprise-class data center environments Earn 64 CE credits toward recertification This course will help you prepare to take the 350-601 DCCOR exam. This exam tests your knowledge of implementing core data center technologies including network, compute, storage network, automation, and security. After you pass 350-601 DCCOR: You earn the Cisco Certified Specialist - Data Center Core certification and you satisfy the core requirement for these certifications: CCNP Data Center CCIE Data Center Implementing Data Center Switching Protocols* Spanning Tree Protocol Port Channels Overview Implementing First-Hop Redundancy Protocols* Hot Standby Router Protocol (HSRP) Overview Virtual Router Redundancy Protocol (VRRP) Overview Implementing Routing in Data Center* Open Shortest Path First (OSPF) v2 and Open Settlement Protocol (OSP) v3 Border Gateway Protocol Implementing Multicast in Data Center* IP Multicast in Data Center Networks Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Implementing Data Center Overlay Protocols Cisco Overlay Transport Virtualization Virtual Extensible LAN Implementing Network Infrastructure Security* User Accounts and Role Based Access Control (RBAC) Authentication, Authorization, and Accounting (AAA) and SSH on Cisco NX-OS Describing Cisco Application-Centric Infrastructure Cisco ACI Overview, Initialization, and Discovery Cisco ACI Management Describing Cisco ACI Building Blocks and VMM Domain Integration Tenant-Based Components Cisco ACI Endpoints and Endpoint Groups (EPG) Describing Packet Flow in Data Center Network* Data Center Traffic Flows Packet Flow in Cisco Nexus Switches Describing Cisco Cloud Service and Deployment Models Cloud Architectures Cloud Deployment Models Describing Data Center Network Infrastructure Management, Maintenance, and Operations* Time Synchronization Network Configuration Management Explaining Cisco Network Assurance Concepts* Need for Network Assurance Cisco Streaming Telemetry Overview Implementing Fibre Channel Fabric Fibre Channel Basics Virtual Storage Area Network (VSAN) Overview Implementing Storage Infrastructure Services Distributed Device Aliases Zoning Implementing FCoE Unified Fabric Fibre Channel over Ethernet Describing FCoE Implementing Storage Infrastructure Security* User Accounts and RBAC Authentication, Authorization, and Accounting Describing Data Center Storage Infrastructure Maintenance and Operations* Time Synchronization Software Installation and Upgrade Describing Cisco UCS Server Form Factors* Cisco UCS B-Series Blade Servers Cisco UCS C-Series Rack Servers Implementing Cisco Unified Computing Network Connectivity Cisco UCS Fabric Interconnect Cisco UCS B-Series Connectivity Implementing Cisco Unified Computing Server Abstraction Identity Abstraction Service Profile Templates Implementing Cisco Unified Computing SAN Connectivity iSCSI Overview Fibre Channel Overview Implementing Unified Computing Security User Accounts and RBAC Options for Authentication Introducing Cisco HyperFlex Systems* Hyper converged and Integrated Systems Overview Cisco HyperFlex Solution Describing Data Center Unified Computing Management, Maintenance, and Operations* Compute Configuration Management Software Updates Implementing Cisco Data Center Automation and Scripting Tools* Cisco NX-OS

Cisco Implementing Cisco Data Center Core Technologies v1.2 (DCCOR)
Delivered OnlineFlexible Dates
Price on Enquiry

Blockchain Security Training

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Blockchain Architects Blockchain DevelopersApplication Developers Blockchain System AdministratorsNetwork Security Architects Cyber Security ExpertsIT Professionals w/cyber security experience Overview Those who attend the Security for Blockchain Professionals course and pass the exam certification will have a demonstrated knowledge of:Identifying and differentiating between security threats and attacks on a Blockchain network.Blockchain security methods, best practices, risk mitigation, and more.All known (to date) cyber-attack vectors on the Blockchain.Performing Blockchain network security risk analysis.A complete understanding of Blockchain?s inherent security features and risks.An excellent knowledge of best security practices for Blockchain System/Network Administrators.Demonstrating appropriate Blockchain data safeguarding techniques. This course covers all known aspects of Blockchain security that exist in the Blockchain environment today and provides a detailed overview of all Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, advanced Blockchain security and more. Fundamental Blockchain Security Cryptography for the Blockchain Hash Functions Public Key Cryptography Elliptic Curve Cryptography A Brief Introduction to Blockchain The Blocks The Chains The Network Promises of the Blockchain Blockchain Security Assumptions Digital Signature Security Hash Function Security Limitations of Basic Blockchain Security Public Key Cryptography Review Real-Life Public Key Protection Cryptography and Quantum Computers Lab 1 (Tentative) Finding Hash Function Collisions Reversible hash function Hash function with poor non-locality Hash function with small search space Breaking Public Key Cryptography Brute Forcing a Short Private Key Brute Forcing a Poorly-Chosen Private Key Consensus in the Blockchain Blockchain Consensus and Byzantine Generals Blockchain Networking Review Byzantine Generals Problem Relation to Blockchain Byzantine Fault Tolerance Introduction to Blockchain Consensus Security Blockchain Consensus Breakthrough Proof of Work What is Proof of Work? How does Proof of Work Solve BGP? Proof of Work Security Assumptions Attacking Proof of Work Proof of Stake What is Proof of Stake? How does Proof of Stake Solve BGP? Proof of Stake Security Assumptions Attacking Proof of Stake General Attacks on Blockchain Consensus Other Blockchain Consensus Algorithms Lab 2 (Tentative) Attacking Proof of Work Performing a 51% Attack Performing a Selfish Mining Attack Attacking Proof of Stake Performing a XX% Attack Performing a Long-Range Attack Malleable Transaction Attacks Advanced Blockchain Security Mechanisms Architectural Security Measures Permissioned Blockchains Checkpointing Advanced Cryptographic Solutions Multiparty Signatures Zero-Knowledge Proofs Stealth Addresses Ring Signatures Confidential Transactions Lab 3 (Tentative) Permissioned Blockchains 51% on a Checkpointed Blockchain Data mining on a blockchain with/without stealth addresses Zero-Knowledge Proof Simulation Trying to fake knowledge of a ZKP Module 4: Blockchain for Business Introduction to Ethereum Security What is Ethereum Consensus in Ethereum Smart Contracts in Ethereum Ethereum Security Pros and Cons of Ethereum Blockchains Introduction to Hyperledger Security What is Hyperledger Consensus in Hyperledger Smart Contracts in Hyperledger Hyperledger Security Pros and Cons of Hyperledger Blockchains Introduction to Corda Security What is Corda Consensus in Corda Smart Contracts in Corda Corda Security Pros and Cons of Corda Blockchains Lab 4 Blockchain Risk Assessment What are the Risks of the Blockchain? Information Security Information Sensitivity Data being placed on blockchain Risks of disclosure Regulatory Requirements Data encryption Data control PII protection Blockchain Architectural Design Public and Private Blockchains Open and Permissioned Blockchains Choosing a Blockchain Architecture Lab 5 Exploring public/private open/permissioned blockchains? Basic Blockchain Security Blockchain Architecture User Security Protecting Private Keys Malware Update Node Security Configuring MSPs Network Security Lab 6 (TBD) Smart Contract Security Introduction to Smart Contracts Smart Contract Security Considerations Turing-Complete Lifetime External Software Smart Contract Code Auditing Difficulties Techniques Tools Lab 7 (Tentative) Try a couple of smart contract code auditing tool against different contracts with built-in vulnerabilities Module 8: Security Implementing Business Blockchains Ethereum Best Practices Hyperledger Best Practices Corda Best Practices Lab 8 Network-Level Vulnerabilities and Attacks Introduction to Blockchain Network Attacks 51% Attacks Denial of Service Attacks Eclipse Attacks Routing Attacks Sybil Attacks Lab 9 Perform different network-level attacks System-Level Vulnerabilities and Attacks Introduction to Blockchain System Vulnerabilities The Bitcoin Hack The Verge Hack The EOS Vulnerability Lab 10 Smart Contract Vulnerabilities and Attacks Introduction to Common Smart Contract Vulnerabilities Reentrancy Access Control Arithmetic Unchecked Return Values Denial of Service Bad Randomness Race Conditions Timestamp Dependence Short Addresses Lab 11 Exploiting vulnerable smart contracts Security of Alternative DLT Architectures What Are Alternative DLT Architectures? Introduction to Directed Acyclic Graphs (DAGs) DAGs vs. Blockchains Advantages of DAGs DAG Vulnerabilities and Security Lab 12 Exploring a DAG network

Blockchain Security Training
Delivered OnlineFlexible Dates
Price on Enquiry

BOHS RP402 Refresher - Surveying and Sampling Strategies for Asbestos in Buildings

By Airborne Environmental Consultants Ltd

The main subject areas of the course are: the properties of asbestos and health effects of exposure to asbestos fibres an introduction to regulatory requirements types of asbestos and its uses in buildings types of asbestos surveys the asbestos register, risk assessment and management plan asbestos remediation

BOHS RP402 Refresher - Surveying and Sampling Strategies for Asbestos in Buildings
Delivered in Manchester + 1 more or OnlineFlexible Dates
£225

BOHS RP402 Refresher Online - Surveying and Sampling Strategies for Asbestos in Buildings

By Airborne Environmental Consultants Ltd

P402 Surveying and sampling strategies for asbestos in buildings is the industry standard qualification for asbestos surveyors. In addition to holding the qualification, asbestos surveyors are required to undertake and provide evidence of annual refresher training.

BOHS RP402 Refresher Online - Surveying and Sampling Strategies for Asbestos in Buildings
Delivered in Manchester + 1 more or OnlineFlexible Dates
£225

Python Taster 1-hour, Create a Password Validator

4.6(12)

By PCWorkshops

Powerful 1-hour Python workshop course understand Python Basics. Practical. Instructor-led. Online. Learn to code a Password Validator in 1 hour. 

Python Taster 1-hour, Create a Password Validator
Delivered OnlineFlexible Dates
£15

Crash Course on Entrepreneurship: Become a successful Business Owner

5.0(5)

By Apex Leadership Consult

In this course, you will learn how to set up your business and start earning money from it in less than 6 months from your date of enrolment. You will leverage the know-how of a Management Consultant, educator, coach, mentor and business owner without breaking your budget. This is a funded course.

Crash Course on Entrepreneurship: Become a successful Business Owner
Delivered OnlineFlexible Dates
FREE to £149.99

Stress can affect your ability to think clearly and rationally and to perform well. This session aims to help you better deal with stress by sharing key insights and strategies to reduce stress and optimize your work-life balance, particularly as we face uncertainties in the economy, the workplace and the environment.

Stress Management
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£180

Unlock Your Public Speaking Confidence

By Samina Arshad

Welcome to Embrace Public Speaking with Confidence Group Coaching event! Are you tired of feeling nervous and anxious when speaking in public? Join us on Thu Sep 26 2024 at 9.30 AM at The Warehouse - Birmingham Friends of the Earth environmental community hub to conquer your fears and become a confident speaker. This in-person event will explore practical techniques and strategies to help you communicate effectively and confidently in front of any audience. Enhance your leadership skills with this group coaching session to become more aware of your Public Speaking style, and preferences, thus, becoming amicable with expressing your voice effectively for impact at various levels. This may be publically with stakeholders, at a system, or partner level and with your customers, families or service users (outwardly) and within your team and organisation (inwardly). Don't miss this opportunity to boost your public speaking skills and unleash your full potential. See you there! Why not visit the Enigma company website for more information about us: www.enigmaccs.co.uk

Unlock Your Public Speaking Confidence
Delivered OnlineFlexible Dates
£97 to £150

Trauma: Patterns of the past

By Human Givens College

Essential trauma awareness training on the causes, symptoms and best ways to treat PTSD Join our expert tutor live online to deepen your understanding of trauma and our responses to it – recovery is possible… Accredited CPD Certificate: 6 hours Length: 1 day (9.15am - 4.00pm GMT) Excellent online trauma course! I've worked with complex trauma for over 5 years and there was still plenty for me to take away...KAT MARLOW, PSYCHOTHERAPIST Why do some people become traumatised and others not? What makes an event traumatic? Why are the symptoms of trauma so many and varied? What happens if someone freezes – or experiences a shutdown or dissociative response – during a traumatic event? Live Online Training – Join Ros Townsend on Tues 16th April 2024 to find out the answers to these questions, and many more… You’ll also have time to ask your own questions and benefit from the group discussions. Once you’ve booked you’ll receive emailed confirmation – you’ll get your Zoom link the day before the event. Limited numbers – book soon to ensure your place. BONUS RECORDING – the training is recorded, in case anyone experiences technical difficulties on the day, so you will also get a recording for a limited time afterwards to maximise your learning. This inspiring and helpful online course with Ros Townsend, a highly experienced psychotherapist and trainer who specialises in treating trauma, will give you a thorough, clear understanding of how and why we can be impacted by traumatic events, what is happening in our brains, what causes post-traumatic stress (PTS) symptoms, why we respond in different ways (fight, flight, freeze or shutdown/dissociation), how to help someone who is suffering, when to seek professional help – and more. Why take this course Suffering from trauma, whether from a single incident or multiple events spread over the course of many years, can have a significantly detrimental impact on a person’s mental and physical health, and their quality of life. It can also greatly affect the lives of those around them. Since the Covid-19 Pandemic, more people than usual have experienced extremely stressful, distressing and/or frightening events, and many are finding that it has left them with symptoms of post-traumatic stress which can, in themselves, be very frightening. Recovery is possible – understanding is key Understanding what causes PTSD symptoms, how our brains and bodies react to distressing events and what makes us vulnerable to becoming traumatised, are all key to successful recovery. This knowledge creates a firm foundation on which to build successful coping strategies and clarifies what needs to happen to enable successful self-help and recovery. During the day you will also gain a clear understanding of how to spot the ‘early warning signs’ of trauma, before they go on to affect further areas of someone’s life, which red-flag signs indicate that it is time to seek professional help, and how trauma specialists are able to help people recover, from even the most difficult times, effectively – and lots more. Jam-packed full of essential information and important insights, real-life case studies and tips, this trauma course clarifies the different ways trauma can impact on people, leaving you better equipped to help support recovery and build resilience. It is an essential course for anyone who works with distressed people or who wishes to support someone they care for in their recovery from trauma, or for those simply wishing to better understand what they, or someone they care for, are experiencing. You will have plenty of time to ask questions throughout the day as the course is designed as a balance between structured learning, group discussion and activities (it is a live, expanded version of our shorter online course: Understanding Trauma). Ros is a brilliant teacher and presenter. She made the whole course interesting, engaging and informative as well as very supportive. She was also very patient with all our questions!GEMMA ROGERS, COUNSELLOR/COACH What you will learn A clear understanding of what trauma is – and the different survival responses we have evolved to help us deal with it What happens in our brains when we experience a traumatic event Why some people are affected by traumatic events, but not others What makes something ‘a trauma’ What symptoms may indicate that someone has been traumatised Why post-traumatic stress (PTS) occurs and the many different ways it can present The physical and psychological causes of post traumatic stress symptoms such as flash backs, hypervigilance, anger, poor sleep, poor memory, physical pain, difficulty thinking, digestive problems, low mood, apparent over-reaction to non-threatening situations Why PTS symptoms can develop years after a traumatic event The fight, flight and freeze response – its impact on our brain and body, and why it can be triggered inappropriately Why experiencing trauma in a passive survival state – such as freeze, shutdown or a dissociative state – can affect an individual particularly deeply How high emotional arousal impacts on our ability to think clearly Why our brains evolved this way Why some people experience trauma in a passive survival state such as freeze, shutdown or a dissociative state – and why we shouldn’t feel ashamed or guilty if we do The double whammy that comes with the ‘freeze’ response Why some sufferers experience ‘shutdown’ or dissociation as a result of trauma – and how this can lead to feelings of shame or guilt Why anger and other strong emotions can follow when someone comes out of a shutdown state during recovery from trauma How traumatic memories can stay ‘live’, keeping us on constant alert for danger ‘The straw that broke the camel’s back’: why one seemingly small event can tip someone into PTSD after years of exposure to other distressing events The importance of pattern-matching in understanding how our brains work Why post-traumatic stress triggers seemingly inappropriately extreme fear reactions The far-reaching impacts of unresolved trauma, including the development of co-morbid conditions and unhelpful coping strategies, such as addictions How unresolved trauma can lead to depression – the trauma / depression cycle Differences when treating single incident trauma, multiple trauma or ‘complex trauma’ When to seek professional help – spotting the ‘red-flag’ signs that you, or someone you care for, might need further support Where to find effective professional help An understanding of how the rewind technique works; its many advantages and applications The common elements of all effective treatments for post traumatic stress (PTSD) How we need to adapt traditional approaches to treating trauma for those experiencing shutdown or dissociative symptoms in the present Working holistically from the human givens approach The natural way we recover from distressing events What we all need as human beings to live emotionally healthy lives How to best employ self-help strategies to support your own recovery or to help others’ suffering from the effects of trauma How to build resilience and recover from symptoms How to access the ‘recovery zone’ Using breathing techniques with clients suffering from trauma Self-help strategies for improving your mental health and minimising traumatic symptoms A wonderfully informative course – I learned so much about traumaCOUNSELLOR Please note This live online training course is an expanded, live version of our shorter online course: Understanding Trauma. If you work with people with Complex Trauma, you may also like our attended workshops: Complex Trauma: Working effectively with challenging cases. Who this workshop is suitable for Anyone interested in understanding trauma and the many different ways it can present, the physical and psychological causes of post traumatic stress symptoms (PTSD), and what can be done to help – whether for personal or professional reasons. Anyone working with traumatised people including health and welfare professionals, such as: psychologists, counsellors, psychotherapists, mental health nurses, psychiatrists, school counsellors, student wellbeing officers, doctors, nurses, OTs, social workers, health visitors, youth workers, outreach, support workers, clinical psychologists, midwives, welfare officers, youth workers, hypnotherapists Anyone working with traumatised members of public services, such as: firefighters, police, paramedics and military personnel Family members of a traumatised individual who wish to understand more about how they can support their recovery or help them to access support Individuals wanting to understand more about their own experience of symptoms relating to trauma and learn more about what effective support is available – you will find the information on this course hugely helpful. Please note As the course deals with the subject of trauma, participants should be aware that discussion of specifically chosen examples of trauma and PTS symptoms will take place, for illustrative purposes, during the day. These will be generic examples for teaching purposes, however, and will not go into unnecessary detail or be voyeuristic or inherently distressing. Participants on the course will not at any stage be expected or put under pressure to discuss or disclose details of any personal experiences of a traumatic nature that they may have had. Course Programme The ‘Trauma: Patterns from the Past’ live online course starts at 9.15am and runs until 4.00pm. 9.15am Join the Zoom meeting 9.30am Introducing PTS 11.00am Comfort break and discussion 11.30am Understanding PTS 1.00pm Lunch break 1.45pm Red-flag signs – when to seek professional support 2.45pm Comfort break and discussion 3.00pm Self-help strategies 4.00pm Day ends This course has been independently accredited by the internationally recognised CPD Standards Office for 6 hours of CPD training. On completion of this training you’ll receive CPD certificates from the College and the CPD Standards Office.

Trauma: Patterns of the past
Delivered OnlineFlexible Dates
£145

Eazzy Slim Hypnotherapy, Hypno-No-Jab and Hypnotic Gastic Band.

5.0(26)

By The Northern College Of Clinical Hypnotherapy

🌟 Hypnotherapists’ Workshop Day: The Eazzy Slim System & The Hypnotic Gastric Band 🌟 Date: 21st of June | Location: Online (Zoom) | Time: 10 am till 4 pm Are you ready to expand your weight-loss toolkit with powerful, non-invasive techniques that create real and lasting change? Join us for an immersive one-day workshop where we’ll explore the full potential of the Eazzy Slim Programme — a structured, proven system designed specifically for hypnotherapists to help clients achieve sustainable weight loss without the need for medication or surgery. 🔍 What You'll Learn: The Hypno-No-Jab Approach: Discover how to offer clients a highly effective hypnotic alternative to pharmaceutical weight-loss injections like Mounjaro or Ozempic especially important given rising concerns over side effects, long-term use, and the controversial decision to make these drugs available to children. Hypnotic Gastric Band: Learn how to safely and ethically guide clients through a hypnotic gastric band process, mimicking the physical sensation and psychological impact of surgery without any of the risks. The Psychology of Sustainable Change: Explore how to leverage hypnotherapy to reshape beliefs, habits, and identity around eating, self-worth, and health. 🧠 Why It Matters: While medications like Mounjaro can offer temporary results, they often come with side effects, dependency risks, and rebound weight gain once stopped. Likewise, gastric band surgery, once a popular bariatric option, has seen a sharp decline due to its high rate of complications, reoperations, and limited long-term success. Our clients are looking for something different. Something safe. Natural. Sustainable. Empowering. That’s where you come in. 💼 Leave with a Complete Toolkit: Whether you’re working in-person, online, or offering remote packages, this workshop will give you everything you need to start delivering Eazzy Slim straight away, including: Session structure & protocols Client scripts and resources Marketing guidance for positioning your service as a credible alternative to jabs and surgery Q&A and practitioner support 👥 Who This Is For: Qualified hypnotherapists looking to specialise in weight management Practitioners concerned about the long-term health impact of pharmacological weight loss Therapists passionate about offering clients empowering mind-body solutions 🎟️ Secure your place today and become part of the solution. Places are limited to ensure an interactive, high-value experience.

Eazzy Slim Hypnotherapy, Hypno-No-Jab and Hypnotic Gastic Band.
Delivered OnlineJoin Waitlist
£50 to £150