• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

780 Courses in Cardiff delivered Live Online

Accessible Documents

By Nexus Human

Duration 0.75 Days 4.5 CPD hours This course is intended for Making Microsoft Word documents accessible. Overview Please refer to Overview. During this course students will interact with a variety of Word documents and review components that would render the document inaccessible. Students will enable the Accessibility Checker and the Speak feature and progress through the processes and procedures to meet the AODA mandate. Students will ultimately create an accessible set of styles and use those styles within the document. Adding the Accessibility Checker and the Speak feature Discussions will follow as to the limitations of the checker When the checker won?t run Document Metadata Students will review where and why to add metadata to a Word Document Setting the application language and setting the document language Setting the document title Adding the Author and subject metadata fields Creating Accessible Paragraphs and Columns Students will see the perils of incorrect use of hard returns and text boxes within a document Exercises will have students work with paragraph formatting and column formatting for accessibility Creating Accessible Tables Students will interact with tables that are poorly designed and restricted them to still maintain content but that are now accessible Discussions will surround, changes to how tables are handled when sending to PDF Accessible Imagery Students will discuss the need to images with a document The Alternate text feature will be used and the rationale for adding specific types of descriptions Students will see and understand the rationale for ?in-line- imagery Styles for Navigation Students will use and modify the built-in styles feature of Microsoft Word and create a table of contents Students will see with the use of the navigation pane, how styles impact accessibility Students will also understand the importance of proper styles nesting Headers, Footers and Footnotes Students will discuss and then implement accessible headers and footers Students will discuss footnotes and alternative methods to provide footnotes Verifying Reading Order Students will ?listen? to their documents using the Speak feature Students will enable the selection pane as an accessibility tools and discuss its limitations Creating an Accessible Style Template Students will create several accessible styles including headings and paragraphs Students will save the style within a template Additional course details: Nexus Humans Accessible Documents training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Accessible Documents course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Accessible Documents
Delivered OnlineFlexible Dates
Price on Enquiry

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

Navigating Tax and Self-Assessment

5.0(36)

By PBC

Submit tax returns and self-assessments like a pro as we simplify the jargon and provide essential information on all things HMRC Navigating Tax and Self-Assessment Join us for an online event where we'll demystify the world of taxes and self-assessment. Whether you're a freelancer, small business owner, or just curious about managing your finances as a start-up, this event is for you! Our Chartered Certified Accountant, Mandeep Ubhi, is an expert in his field and will break down complex tax jargon into easy-to-understand language, giving you the confidence to tackle your tax obligations; from understanding tax allowances to filing your self-assessment, we've got you covered. Take advantage of this opportunity to gain valuable insights and tips to easily navigate the tax landscape!

Navigating Tax and Self-Assessment
Delivered OnlineFlexible Dates
FREE

Anxiety Relief with NLP & Hypnotherapy

By Proactive NLP Ltd

A life without anxiety can be yours with our bespoke blend of clinical hypnotherapy and advanced NLP therapy techniques. Start with a free online Q&A session. Start enjoying a life free from anxiety

Anxiety Relief with NLP & Hypnotherapy
Delivered OnlineFlexible Dates
£15

Getting Started with Programming, OO and Basic Java for Non-Developers (TT2000)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This basic course is intended for anyone who is new to software development and wants, or needs, to gain an understanding of the fundamentals of coding and basics of Java and object-oriented programming concepts. Attendees might include: Technically-minded attendees who want or who want to begin the process of becoming an OO application developer Technical team members from non-development roles, re-skilling to move into software and application development roles within an organization Recent college graduates looking to apply their college experience to programming skills in a professional environment, or perhaps needing to learn the best practices and standards for programming within their new organization Technical managers tasked with overseeing programming teams, or development projects, where basic coding knowledge and exposure will be useful in project oversight or communications needs Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in basic coding with Java, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment, guided by our expert team, attendees will learn: The steps involved in the creation and deployment of a computer program What OO programming is and what the advantages of OO are in today's world To work with objects, classes, and OO implementations The basic concepts of OO such as encapsulation, inheritance, polymorphism, and abstraction The basic constructs that all programming languages share The basic Java constructs supporting processing as well as the OO orientation How to use Java exception handling About and how to use classes, inheritance and polymorphism About use collections, generics, autoboxing, and enumerations How to take advantage of the Java tooling that is available with the programming environment being used in the class Getting Started with Programming, OO and Java Basics for Non-Developers is a skills-focused, hands-on coding course that teaches students the fundamentals of programming object oriented (OO) applications with Java to a basic level, using sound coding skills and best practices for OO development. This course is presented in a way that enables interested students to embrace the fundamentals of coding as well as an introduction to Java, in a gentle paced environment that focuses on coding basics.Students are introduced to the application development cycle, structure of programs, and specific language syntax. The course introduces important algorithmic constructs, string and character manipulation, dynamic memory allocation, standard I/O, and fundamental object-oriented programming concepts. The course explains the use of inheritance and polymorphism early on so the students can practice extensively in the hands-on labs. Structured programming techniques and error handling are emphasized. The course includes the processing of command line arguments and environment variables, so students will be able to write flexible, user-friendly programs. Students will leave this course armed with the required skills to begin their journey as a Java programmer using modern coding skills and technologies. Introduction to Computer Programming Introduction to Programming Programming Tools Programming Fundamentals Thinking About Objects Program Basics Programming Constructs Java: A First Look The Java Platform Using the JDK The Eclipse Paradigm Writing a Simple Class OO Concepts Object-Oriented Programming Inheritance, Abstraction, and Polymorphism Getting Started with Java Adding Methods to the Class Language Statements Using Strings Specializing in a Subclass Essential Java Programming Fields and Variables Using Arrays Java Packages and Visibility Advanced Java Programming Inheritance and Polymorphism Interfaces and Abstract Classes Exceptions Java Developer's Toolbox Utility Classes Enumerations and Static Imports Formatting Strings Collections and Generics Introduction to Generics Collections

Getting Started with Programming, OO and Basic Java for Non-Developers (TT2000)
Delivered OnlineFlexible Dates
Price on Enquiry

How to create healing stories for distressed children

By Human Givens College

A masterclass in devising therapeutic metaphors This inspiring online training day gives you powerful, non-intrusive ways to help distressed young people – and others – overcome difficulties in their lives – the skills you will learn can also be used with adults Accredited CPD: 6 hours Length: 1 day (9.15am - 4.00pm GMT) LIVE ONLINE – Join Pamela Woodford live online on Tuesday 18th June 2024 for this enjoyable, experiential CPD accredited training day – you will have plenty of opportunities to ask questions, take part in exercises to practice the steps involved, come up with pertinent metaphors and create your own story. Limited numbers. BONUS RECORDING – you will also get a recording of the tutor sessions for a limited time afterwards to maximise your learning. >> If you can’t make this date please register your interest below and we’ll let you know as soon as a new date is available. Fantastic online training, engaging and thought-provoking throughout. The confidence Pamela has given me will impact positively on my everyday practice, I am truly inspired...PSYCHOTHERAPIST Why take this course Children’s natural affinity with stories gives us an incredibly powerful, non-directive way to help emotionally distressed and abused young people, who can sometimes be hard to reach in any other way. On this practical live training event you will learn how to tap into your own metaphorical brain to create therapeutic stories and metaphors ‘in the moment’ that are appropriate to each individual’s circumstances and experiences. Throughout the day Pamela – a master storyteller and highly experienced psychotherapist – draws on her own case histories, metaphor and story examples as she guides you through the steps involved in ‘thinking on your feet’ and creating a story yourself in the moment. By the end of the day you will have lots of new, innovative ways to engage with and help distressed children deal with the experiences they have had – whilst also offering them hope, understanding, and new ways of thinking and feeling about life and themselves. Indeed, you may well be surprised at how quickly positive psychological changes occur as a result of the stories you will create and tell ‘in the moment’. Stories also play a crucial role in child development – through the ways the different characters think, act and overcome difficulties, children gain important templates for understanding the world and dealing with the challenges and situations they will meet in life – both now and in the future. They are a wonderful way to help build resilience. Storytelling and the careful use of therapeutic metaphor are crucial elements of successful counselling and psychotherapy – they help bypass assumptions and rigid thinking to offer a new, broader way of looking at things, awaken innate resources and offer crucial hope – just what struggling children need… Wonderful, interactive online course. Pamela is a joy to listen to – I learnt so muchCOUNSELLOR What will you learn A clear understanding of how to address emotional issues in children Simple ways to calm and relax children – “it’s the way you tell ‘em” Tips for igniting your own imagination and creativity How to ‘think metaphor’ to find the right one for each situation A step-by-step guide to creating your own stories – the 6 steps for creating short stories with metaphors specifically tailored to quickly bring about positive psychological changes in children and young people Breathing life into inanimate objects and taking inspiration from nature – how to tune into your metaphorical mind Valuable experience in creating your own therapeutic story from scratch How to use your stories and metaphors The importance of paying attention to the words children use when telling you something Case histories which illustrate the effectiveness and flexibility of stories – and show why they are such powerful therapeutic tools, even with difficult cases How to find your own metaphors and connect them emotionally to distressing situations Using embedded suggestions in stories – exercise Different ways to use therapeutic stories, such as those in Pamela’s acclaimed Brighter Little Minds series, to develop emotional literacy The importance of incorporating all of our senses How to adapt stories to use with adolescents and adults Tips for thinking creatively ‘on your feet’ to come up with suitable metaphors and ideas there and then in the moment Flexible skills that can easily be adapted to working with adults Why subtly entwining a child’s interests into a story makes its impact stronger How to introduce a story or therapeutic metaphor naturally into your conversation Feedback on the story you create and time to ask questions of the tutor – a highly experienced and creative psychotherapist who has spent decades working therapeutically with distressed children and young people A greater appreciation of the subtle power of metaphor, imagination and embedded suggestions and how to use them to help the young people you care for Increased confidence in creating and telling therapeutic stories yourself A variety of story examples and ‘scripts’ Lots of new ideas from Pamela Woodford’s ‘treasure chest of healing spells’ to spark your own creativity Tips for improving your own storytelling abilities Such a helpful live online training day – the use of metaphor via story form is a powerful toolHEAD OF BEHAVIOUR SUPPORT SERVICE – EDUCATION Course Programme The ‘How to create healing stories for distressed children’ live online workshop starts at 9.15am and runs until 4.00pm. (GMT). 9.15am Join the Zoom meeting 9.30am What can go wrong for children? How stories can help 11.00am Comfort break and discussion 11.10am Using metaphor, relaxation, imagination and embedded suggestions 1.00pm Lunch break 1.40pm Setting the scene and creating the story 3.10pm Comfort break and discussion 3.20pm Sharing the stories you have created 4.00pm Day ends Who is this course suitable for? Anyone working with emotionally distressed children or young people, including: Psychotherapists, therapists and counsellors Teachers and educational professionals Childcare and healthcare professionals (and students) Foster carers Adoptive parents – and perspective adoptive parents Social workers Parents and carers Interested friends or family who wish to help a young person they know And anyone who would like to attend for personal reasons This course has been independently accredited by the internationally recognised CPD Standards Office for 6 hours of CPD training. On completion of this training you’ll receive CPD certificates from the College and the CPD Standards Office.

How to create healing stories for distressed children
Delivered OnlineFlexible Dates
£145

Advanced SQL Programming (TTSQL005)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This is an intermediate and beyond level SQL course geared for experienced end users, data scientists, business analysts, application developers and database administrators. Students should have recently attended a basic SQL class or have equivalent experience. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment led by our expert practitioner, attendees will learn advanced skills needed to: Advanced Query Techniques Manipulating Table Data Using SQL's Data Manipulation Language (DML) User-Defined Functions Stored Procedures Triggers A company?s success hinges on responsible, accurate database management. Organizations rely on highly available data to complete all sorts of tasks, from creating marketing reports and invoicing customers to setting financial goals. Data professionals like analysts, developers and architects are tasked with creating, optimizing, managing and analyzing data from databases ? with little room for error. When databases aren?t built or maintained correctly, it?s easy to mishandle or lose valuable data. Our SQL Programming and Database Training Series provides students with the skills they require to develop, analyze and maintain data and in correctly structured, modern and secure databases. Next Level SQL explores how to identify and use advanced querying techniques to manipulate and index tables. All hands-on work in this course is ANSI SQL compliant and should work with most SQL databases such as Oracle, SQL Server, MySQL, MS Access, Informix, Sybase, or any other ANSI SQL compliant database. Advanced Query Techniques Join inner outer (Left, Right, Full) Subqueries Simple Correlated Using the Exists Operator Tips for Developing Complex Queries Performing Set Operations Aggregating Results Using Group by Creating Temporary Tables Manipulating Table Data Using SQL's Data Manipulation Language (DML) Inserting Data into Tables Updating Existing Data Deleting Records Truncating Tables Implementing Data Integrity with Transactions Beginning Explicit Transactions Committing Transactions Rolling Back Transactions User-Defined Functions Definition and Benefits of Use CREATE FUNCTION Syntax RETURN Clause and the RETURNS Statement Scalar vs. Table Functions Comparison with Stored Procedures Returning Scalar Values and Tables ALTER and DROP FUNCTION Stored Procedures Definition and Benefits of Use CREATE PROCEDURE Syntax Variables and Parameters Control of Program Flow ALTER and DROP PROCEDURE Implementation Differences Triggers Definition and Benefits of Use Alternatives (e.g., Constraints) CREATE TRIGGER Syntax Trigger Types 'Inserted' (or 'NEW') and 'Deleted' (or 'OLD') Tables Event Handling and Trigger Execution ALTER and DROP TRIGGER Additional course details: Nexus Humans Advanced SQL Programming (TTSQL005) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced SQL Programming (TTSQL005) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Advanced SQL Programming (TTSQL005)
Delivered OnlineFlexible Dates
Price on Enquiry

Interior Design Tutor one to one

By Real Animation Works

Interior design tutor one to one open 7 days 9 am to 9 pm

Interior Design Tutor one to one
Delivered in London or OnlineFlexible Dates
£380

Developing on Hyperledger Fabric 1.4

By Nexus Human

Duration 2 Days 12 CPD hours Overview Understand why Blockchain is needed and where Explore the major components of BlockchainLearn about Hyperledger Fabric and the structure of the Hyperledger ArchitectureLean the features of the Fabric model including chaincode, SDKs, Ledger, Security and Membership ServicesPerform comprehensive labs on writing chaincodeExplore the architecture of Hyperledger FabricUnderstand and perform in depth labs on Bootstrapping the NetworkPerform comprehensive labs to integrate/develop an application with Hyperledger Fabric running a smart contractBuild applications on Hyperledger FabricCourse Outline: This training course has been created to walk you through Chaincode Development, Testing, and Deployment for a Hyperledger Fabric Network catering specifically toward Golang written Chaincode (Fabric?s original Chaincode Language). Additionally as an Application Developer you will learn how to write, and prepare Client Applications using the most mature Standard Development Kit in Hyperledger Fabric, NodeJS. Blockchain Basics (Overview)Hyperledger Fabric Development EnvironmentKnowing the Difference: ComposerChaincode Use CasesChaincode BasicsGolang Shim DevelopmentDatabases for the DeveloperChaincode Dev. Deployment and InteractionsClients & SDK Development: Fabric-NetworkClients & SDK Development: Fabric-Client InteractionsLogging and Monitoring

Developing on Hyperledger Fabric 1.4
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to Phlebotomy Course - Certificate Update and Renewal (GPT003R)

4.6(39)

By Geopace Training

Update and renewal option for Geopace Training Certificate holders Update and renew your existing certificate ... Recommended certificate renewal after 18 months Nationally Recognised Dual Accreditations Open College Network Accredited (Advanced Level) CPD Accredited (The CPD Certification Service) Recaps phlebotomy theory incl. legislation Updates your certification and compliancy Awards cumulative credits and CPD points awarded Basic understanding of English language required Download a certificate on completion of your online course APPLICANTS ARE REQUIRED TO HAVE COMPLETED AN ACCREDITED INTRODUCTION TO PHLEBOTOMY COURSE

Introduction to Phlebotomy Course - Certificate Update and Renewal (GPT003R)
Delivered OnlineFlexible Dates
£149