• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2302 Courses in Cardiff delivered Live Online

ISO 37301 Lead Auditor

By Training Centre

  Many organizations seek competent auditors to determine whether their policies, procedures, and controls adhere to ISO 37301 requirements. This training course aims to help you complete these tasks successfully and intends to reflect the importance of effective CMS audits. In addition, this training course aims to strengthen your knowledge and skills to plan and carry out CMS audits based on the guidelines for auditing management systems provided in ISO 19011 and the certification process described in ISO/IEC 17021-1.  This training course can potentially qualify you to conduct audits on behalf of conformity assessment bodies. The exercises, quizzes, and case studies provided in this training course are designed to help you practice the most important aspects of a CMS audit: ISO 37301 requirements, auditing principles, tools and techniques used to obtain evidence, leading a team of auditors, conducting interviews with auditee, reviewing documented information, drafting nonconformity reports, and preparing the final audit report. After successfully completing the training course, you can sit for the exam and gain the "Certified ISO 37301 Lead Auditor' credential. This credential validates your professional capabilities and demonstrates that you have the knowledge and skills to audit a CMS based on ISO 37301. About This Course   This training course enables you to: Understand the main concepts of a compliance management system (CMS) and its processes based on ISO 37301 Acknowledge the relationship between ISO 37301 and other standards and regulatory frameworks Understand the auditor's role in planning, leading, and following up on a CMS audit in accordance with ISO 19011 Interpret the requirements of ISO 37301 in the context of a CMS audit Plan an audit, lead a team of auditors, draft nonconformity reports, and follow up on an audit Act with due professional care during an audit Course Agenda Day 1: Introduction to the compliance management system (CMS) and ISO 37301 Day 2: Audit principles and the preparation for and initiation of an audit Day 3: On-site audit activities Day 4: Closing of the audit and the Exam. Assessment     Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 12 question, essay type exam on Day 4 of the course. The overall passing score is 70%, to be achieved within the 150 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success.       Prerequisites   A fundamental understanding of ISO 37301 requirements (or ISO 19600 guidelines) for a CMS and a comprehensive knowledge of audit principles. What's Included?   Certification fees are included in the exam price. Training material of over 450 pages of information and practical examples. An attestation of course completion worth 31 CPD (Continuing Professional Development) credits will be issued to participants who have attended the training course. In case of exam failure, the candidate can retake the exam once for free within 12 months following the initial exam date. Who Should Attend?   The ISO 37301 Lead Auditor training course is intended for: Auditors seeking to perform and lead CMS audits Managers or consultants seeking to master the CMS audit process Individuals responsible for maintaining conformity to ISO 37301 requirements in an organization Technical experts seeking to prepare for a CMS audit Expert advisors and compliance officers Accreditation Provided by   This course is Accredited by NACS and Administered by the IECB.

ISO 37301 Lead Auditor
Delivered OnlineFlexible Dates
£1,450

Tableau Desktop - Part 2

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for professionals in a variety of job roles who are currently using Tableau to perform numerical or general data analysis, visualization, and reporting. They need to provide data visualizations from multiple data sources, or combine data to show comparisons, manipulate data through calculations, create interactive visualizations, or create visualizations that showcase insights from statistical analysis. This course is also designed for students who plan to obtain Tableau Desktop Certified Associate certification, which requires candidates to pass the Tableau Desktop Certified Associate exam. Overview Blend data multiple sources. Join data. Access data in PDFs. Refine visualizations with sets and parameters. Analyze data with calculations. Visualize data with advanced calculations. Perform statistical analysis and forecasting. Create geographic visualizations. Get answers with Ask and Explain The advent of cloud computing and storage has ushered in the era of "big data." With the abundance of computational power and storage, organizations and employees with many different roles and responsibilities can benefit from analyzing data to find timely insights and gain competitive advantage. Data-backed visualizations allow anyone to explore, analyze, and report insights and trends from data. Tableau© software is designed for this purpose. Tableau was built to connect to a wide range of data sources and allows users to quickly create visualizations of connected data to gain insights, show trends, and create reports. Beyond the fundamental capabilities of creating data driven visualizations, Tableau allows users to manipulate data with calculations to show insights, make visualizations interactive, and perform statistical analysis. This gives users the ability to create and share data driven insights with peers, executives, and clients. Prerequisites Tableau Desktop: Part 1 Lesson 1: Blending Data from Multiple Sources Topic A: Blend Data Topic B: Refine Blends to Visualize Key Information Lesson 2: Joining Data Topic A: Create Joins Topic B: Troubleshoot Joins Topic C: Merge Data with Unions Lesson 3: Accessing Data in PDFs Topic A: Connect to PDFs Topic B: Clean Up and Organize PDF Data Lesson 4: Refining Visualizations with Sets and Parameters Topic A: Create Sets Topic B: Analyze Data with Sets Topic C: Apply Parameters to Refine Visualizations Topic D: Create Advanced Visualizations Lesson 5: Analyzing Data with Calculations Topic A: Create Calculated Fields to Analyze Data Topic B: Manipulate Data with Functions Topic C: Analyze Data with Table Calculations Lesson 6: Visualizing Data with Advanced Calculations Topic A: Create Groups and Bins with Calculations Topic B: Analyze Data with LOD Expressions Lesson 7: Performing Statistical Analysis and Forecasting Topic A: Perform Statistical Analysis Topic B: Forecast Data Trends Lesson 8: Creating Geographic Visualizations Topic A: Create Maps Topic B: Customize Mapped Data Lesson 9: Getting Answers with Ask and Explain Topic A: Ask Data Topic B: Explain Data Additional course details: Nexus Humans Tableau Desktop - Part 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Tableau Desktop - Part 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Tableau Desktop - Part 2
Delivered OnlineFlexible Dates
£1,400

Automatic Driving Lessons in Lanarkshire

By Automaticdrivinglesson.com

Automatic transmission cars are growing in popularity in the UK. Without the constant need to change gears, you'll find driving in heavy, downtown traffic a much smoother and easier experience. And with less to do, you'll also have more opportunity to focus on the road and drive safely. With both male and female instructors available, we provide friendly, stress-free and professional tuition for automatic cars. Intensive courses and block bookings available throughout South Lanarkshire.

Automatic Driving Lessons in Lanarkshire
Delivered OnlineFlexible Dates
£100 to £2,895

AAT Level 2 Certificate in Bookkeeping

5.0(17)

By Learning Pro

Join AAT Level 2 Bookkeeping | Online | Learn From Home at Your Flexible Time | Excellent Support and Advice | Join Now

AAT Level 2 Certificate in Bookkeeping
Delivered OnlineFlexible Dates
£399

ITIL 4 Foundation: In-House Training

By IIL Europe Ltd

ITIL® 4 Foundation: In-House Training ITIL® 4 is built on the established core of best practice in the ITIL® guidance. ITIL® 4 provides a practical and flexible approach to move to the new world of digital transformation and embrace an end-to-end operating model for the delivery and operation of products and services. ITIL® 4 also provides a holistic end-to-end picture that integrates frameworks such as Lean IT, Agile, and DevOps. The ITIL® 4 Foundation is based on the exam specifications specified by AXELOS for the ITIL® 4 Foundation certification. The fundamental objective of this course is to help the participants understand the key concepts of service management and the ITIL® 4 service management framework and prepare for the ITIL® 4 Foundation exam. In addition, this course offers a rich learning experience that helps the participants relate ITIL® to their own work environment. The course includes a case study (based on a fictitious organization, 'Axle Car Hire') that will help the participants understand and experience the ITIL® guiding principles, service value, practices through real-world challenges and opportunities. The rich learning experience is supported by additional learning tools such as pre-course reading materials, post-course reading material, and a set of quick reference cards. What You Will Learn At the end of this program, you will be able to: Understand the key concepts of ITIL® service management Understand how ITIL® guiding principles can help an organization to adopt and adapt ITIL® service management Understand the four dimensions of ITIL® service management Understand the purpose and components of the ITIL® service value system, and activities of the service value chain, and how they interconnect Understand the key concepts of continual improvement Learn the various ITIL® practices and how they contribute to value chain activities Course Introduction Let's Get to Know Each Other Course Overview Course Learning Objectives Course Structure Course Agenda Introduction to IT Service Management in the Modern World Introduction to ITIL® 4 Structure and Benefits of ITIL® 4 Case Study: Axle Car Hire Case Study: Meet the Key People at Axle Case Study: The CIOs Vision for Axle Exam Details ITIL® 4 Certification Scheme Service Management - Key Concepts Intent and Context Key Terms Covered in the Module Module Learning Objectives Value and Value Co-Creation Value: Service, Products, and Resources Service Relationships Value: Outcomes, Costs, and Risks Exercise: Multiple-Choice Questions The Guiding Principles Intent and Context Identifying Guiding Principles Key Terms Covered in the Module Module Learning Objectives The Seven Guiding Principles Applying the Guiding Principles Exercise: Multiple-Choice Questions The Four Dimensions of Service Management Intent and Context The Four Dimensions Key Terms Covered in the Module The Four Dimensions and Service Value System Module Learning Objectives Organizations and People Information and Technology Partners and Suppliers Value Streams and Processes External Factors and Pestle Model Exercise: Multiple-Choice Questions Service Value System Intent and Context Service Value System and Service Value Chain Module Learning Objectives Overview of Service Value System Overview of the Service Value Chain Exercise: Multiple-Choice Questions Continual Improvement Intent and Context Key Terms Covered in the Module Introduction to Continual Improvement Module Learning Objectives The Continual Improvement Model Relationship between Continual Improvement and Guiding Principles Exercise: Multiple-Choice Questions The ITIL® Practices Intent and Context ITIL® Management Practices Key Terms Covered in the Module Module Learning Objectives The Continual Improvement Practice The Change Control Practice The Incident Management Practice The Problem Management Practice The Service Request Management Practice The Service Desk Practice The Service Level Management Practice Purpose of ITIL® Practices Exercise: Crossword Puzzle

ITIL 4 Foundation: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

Level 3 Assessor Qualification (TAQA)

4.0(1)

By Panda Education and Training Ltd

Become a qualified assessor

Level 3 Assessor Qualification (TAQA)
Delivered Online + more
£415 to £650

Data Protection (GDPR) Practitioner Certificate

By Computer Law Training

5-day intensive data protection course, delivered by a specialist.

Data Protection (GDPR) Practitioner Certificate
Delivered OnlineFlexible Dates
£1,200

BABY PROJECT – WORKING WITH BABIES TO INCREASE EMPATHY

By Inclusive Solutions

This radical way of building empathy is inspired by the work of the ‘Roots of Empathy’ organisation in Canada. Roots of Empathy (ROE) is dedicated to building caring and peaceful societies through the development of empathy in children. It is a parenting education programme for elementary school students (between the ages of 3 to 14 years) based on monthly visits to the classroom by a parent and infant from the school neighbourhood. Course Category Behaviour and Relationships Autism and Communication Meeting emotional needs Description This radical way of building empathy is inspired by the work of the ‘Roots of Empathy’ organisation in Canada. As Mary Gordon founder of this way of working describes: ‘By regular visits to the classroom of local mums and their children build an empathic relationship with the baby.MARY GORDON Roots of Empathy (ROE) is dedicated to building caring and peaceful societies through the development of empathy in children. It is a parenting education program for elementary school students (between the ages of 3 to 14 years) based on monthly visits to the classroom by a parent and infant from the school neighbourhood. We teach teachers and educators to help children to observe, over the school year, how their baby forms an attachment to his or her parent. Children are encouraged to record how the infants develop. The children learn to spot their babies cues and unique temperament, while celebrating developmental milestones. Children are prepared for responsible and responsive parenting as they increase their knowledge about human development, learning, and infant safety. The baby project program brings about the development of empathy and emotional literacy: As children learn to take the perspective of others they are less likely to hurt through bullying, exclusion, aggression, and violence. Children learn how to challenge cruelty and injustice in their own classroom. Messages of social inclusion and activities that are consensus-building contribute to a culture of caring that changes the tone of the classroom. Involving fathers and men provides rich models of male nurturance Testimonials ‘13% increase in empathy scores for our year 1s’ ‘Years 2s empathy had increased by 35%’ ‘Now that I am older I can be happy for other people’ (6 year old) ‘Everyone is special – thats the truth – but when I was small I thought its not fair when someone got a present and I didn’t’ (7 year old) Dramatic improvements in children taking responsibility for actions and being less defiant over the year of the project. Learning Objectives Understanding of method and approach to building empathy with babies Full understanding of background to this approach Practical advice received as to how to set up baby project in classrooms across school Who Is It For ? Teachers School leaders Project Coordinators Social Care Course Content We will provide theoretical and evidence back ground to impact of this work. We will describe existing UK school based work. We will inspire staff in attendance to want to actively engage in this work There may even be a baby to hold!!

BABY PROJECT – WORKING WITH BABIES TO INCREASE EMPATHY
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

Electricity Pricing and Marginal Cost Analysis - Virtual Instructor Led Training (VILT)

By EnergyEdge - Training for a Sustainable Energy Future

Develop a deep understanding of electricity pricing and marginal cost analysis with EnergyEdge's virtual instructor-led training course. Enroll now for a rewarding learning journey!

Electricity Pricing and Marginal Cost Analysis - Virtual Instructor Led Training (VILT)
Delivered in Internationally or OnlineFlexible Dates
£1,399 to £1,499