• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2552 Courses in Cardiff delivered Live Online

Decision Making and Problem Solving (Virtual)

By IIL Europe Ltd

Decision Making and Problem Solving (Virtual) We may live in an era of fast technology and increasing reliance upon automation, but our human abilities to think critically, make careful decisions, and solve nuanced problems are more important than ever. Our personal lives depend on those things, and so do the lives of our organizations. Since business is now conducted at remarkable speeds, we put our organizations at great risk daily when we have weak competencies with decision-making and problem-solving. Decisions and solutions that are executed impulsively and without structured approaches can create more problems or make existing ones worse! This course aims to help participants improve their skills so they can execute well and add value to the workplace. Learners will experience multiple decision-making and problem-solving models, tools, and techniques meant for the real world. They will learn how to align their growing toolboxes with the right situational contexts so that they can transfer that skill to the workplace. They will also discover how indecision, cognitive bias, and default thought processes can create obstacles to effective decision-making and problem-solving. What you will Learn Recognize the importance of making a sound decision in a timely manner Infer types of cognitive biases and obstacles that impact decision-making Separate facts, requirements, ideas, and perceptions when making a decision or solving problems Apply structured decision-making and problem-solving approaches Conduct cause and effect and Force Field analyses Evaluate alternative solution methods using various techniques Analyze real world situations to determine the best aligned decision-making and problem-solving models, tools, and techniques Implement decision-making and problem-solving models, tools, and techniques Getting Started Foundation Concepts Contextualizing decisiveness and problem-solving Discriminating between decisiveness and problem-solving Understanding Decision-Making Decision-making challenges and impacts Key drivers of good decision-making Thought processes and obstacles Knowledge, skills, and abilities (KSAs) Decision-Making Models and Supporting Tools Decision-making models, tools, and guidelines Tools to evaluate alternatives Translating requirements into action Problem-Solving Defining the problem Problem-solving models Cause and effect analysis Quick hit vs. innovative problem-solving Summary and Next Steps Course summary Personal action plan

Decision Making and Problem Solving (Virtual)
Delivered OnlineFlexible Dates
£850

SAFe Lean Portfolio Management: In-House Training

By IIL Europe Ltd

SAFe® Lean Portfolio Management: In-House Training Create a culture of innovation, flexibility, and speed where all people in the portfolio can effectively execute as one unified team. In this course, you will gain the practical tools and techniques necessary to implement the Lean Portfolio Management functions of Strategy and Investment Funding, Agile Portfolio Operations, and Lean Governance. You will have the opportunity to capture the current and future state of the portfolio with the Portfolio Canvas tool and identify important business initiatives for achieving the future state. You'll be able to establish portfolio flow with the Portfolio Kanban and prioritize initiatives for maximum economic benefit. The course also provides insights on how to establish Value Stream Budgets and Lean Budget Guardrails and measure the Lean portfolio performance. What you will Learn Describe the importance of LPM Connect the portfolio to enterprise strategy Implement Lean budgeting and guardrails Establish portfolio flow with the Portfolio Kanban Support operational excellence with APMO and CoPs Coordinate Value Streams Measure the LPM performance Build a plan for LPM implementation Introducing Lean Portfolio Management (LPM) Establishing Strategy and Investment Funding Applying Agile Portfolio Operations Applying Lean Governance Implementing the LPM function

SAFe Lean Portfolio Management: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£2,995

SAFe Lean Portfolio Management: Virtual In-House Training

By IIL Europe Ltd

SAFe® Lean Portfolio Management: Virtual In-House Training Create a culture of innovation, flexibility, and speed where all people in the portfolio can effectively execute as one unified team. In this course, you will gain the practical tools and techniques necessary to implement the Lean Portfolio Management functions of Strategy and Investment Funding, Agile Portfolio Operations, and Lean Governance. You will have the opportunity to capture the current and future state of the portfolio with the Portfolio Canvas tool and identify important business initiatives for achieving the future state. You'll be able to establish portfolio flow with the Portfolio Kanban and prioritize initiatives for maximum economic benefit. The course also provides insights on how to establish Value Stream Budgets and Lean Budget Guardrails and measure the Lean portfolio performance. What you will Learn Describe the importance of LPM Connect the portfolio to enterprise strategy Implement Lean budgeting and guardrails Establish portfolio flow with the Portfolio Kanban Support operational excellence with APMO and CoPs Coordinate Value Streams Measure the LPM performance Build a plan for LPM implementation Introducing Lean Portfolio Management (LPM) Establishing Strategy and Investment Funding Applying Agile Portfolio Operations Applying Lean Governance Implementing the LPM function

SAFe Lean Portfolio Management: Virtual In-House Training
Delivered OnlineFlexible Dates
£2,850

The Online NLP Practitioner Training

By Ely Wellbeing

•The Online NLP Practitioner Training is a comprehensive program that will provide you with the tools and techniques you need to overcome your chronic pain and mental health conditions. • The program includes a printable digital copy of the NLP Practitioner Manual, access to the video recording of the training, ‘live’ online demonstrations of the techniques in action on yourself, online support for one year by way of group calls, and assistance set up your business website. • This program is perfect for anyone who wants to achieve positive change in their lives! Whether you’re a self-starter who is interested in self-development or a professional who is seeking career development and job fulfilment.

The Online NLP Practitioner Training
Delivered OnlineJoin Waitlist
£2,000

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites CompTIA Network+ Certification 1 - Security and Risk Management Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training 2 - Asset Security Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling 3 - Security Engineering Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities 4 - Information Security Management Goals Organizational Security The Application of Security Concepts 5 - Information Security Classification and Program Development Information Classification Security Program Development 6 - Risk Management and Ethics Risk Management Ethics 7 - Software Development Security Software Configuration Management Software Controls Database System Security 8 - Cryptography Ciphers and Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Hashing and Message Digests Email, Internet, and Wireless Security Cryptographic Weaknesses 9 - Physical Security Physical Access Control Physical Access Monitoring Physical Security Methods Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered OnlineFlexible Dates
£3,395

Essential Bluetooth

5.0(3)

By Systems & Network Training

Bluetooth training course description Bluetooth is used by many kids these days but is probably under-utilised in business environments. This hands on training course provides an overview of what Bluetooth is, how it works, what it can be used for and how to configure it on different devices. What will you learn Explain what Bluetooth is. Describe the Bluetooth protocol stack. Recognise the applications of Bluetooth. Configure Bluetooth. Bluetooth training course details Who will benefit: Anyone who needs to know more about Bluetooth. Prerequisites: None. Duration 2 days Bluetooth training course contents Classic Bluetooth Bluetooth overview Basics, standards, competing technologies. Bluetooth radio RF bands, power losses, frequency hopping. Bluetooth modulation PSK, DPSK, DPQSK. Bluetooth data transfer FH, TDD, FDMA, ACL, SCO, Bluetooth packets. Making connections Piconets, Scatternets, Pairing The protocol stack Baseband, Link Manager, L2CAP, SDP, GAP, RFCOMM. Profiles FTP, DUN, LAN, Synch, HDP, GOEP/OBEX etc. Security Authentication, authorisation, encryption, risks. Bluetooth Low Energy Introduction Bluetooth Smart and Bluetooth Smart Ready. BLE device types Design goals, terminology and core concepts. BLE usage models Presence detection, data broadcasting connectionless models, gateways. BLE architecture Controller, host, applications and stack splits. BLE protocol stack Link layer, HCI, L2CAP. BLE profiles GAP roles, models, procedures, security modes, data advertising. BLE security Pairing, bonding, data signing BLE applications Devices, services, profiles, peripherals

Essential Bluetooth
Delivered in Internationally or OnlineFlexible Dates
£2,477

RESILIA Foundation: In-House Training

By IIL Europe Ltd

RESILIA™ Foundation: In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls

RESILIA Foundation: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

Certified Kanban System Design – KMP I - 30 Apr - 2 May

By Tom Reynolds

Attend our world class Kanban University accredited Certified Kanban System Design training course and learn to implement Kanban in your company

Certified Kanban System Design – KMP I - 30 Apr - 2 May
Delivered OnlineFlexible Dates
£1,074 to £1,195

PgMP Exam Prep: In-House Training

By IIL Europe Ltd

PgMP® Exam Prep: In-House Training This course is designed and developed by PgMP® certified consultants and instructors. Its aim is to prepare professionals who are familiar with the principles of program management for the Program Management Professional (PgMP)® Examination. The course is based on PMI's The Standard for Program Management, A Guide to the Project Management Body of Knowledge (PMBOK® Guide), and PMI's Program Management Professional (PgMP)® Examination Content Outline (current versions). Through this learning experience, you will explore: Program management from a PMI standard perspective, including the interdependencies between the five performance domains, the three program phases, and the ten supporting activities in this new and improved program management standard The difference between the five performance domains in the new program management standard and the five practice domains in the examination content outline The role and competencies of the program manager The difference between project managers and program managers - and their relationship in a program environment The difference between program managers and portfolio managers - and their relationship in a program environment How program managers align and manage benefits The best ways to engage and involve program stakeholder groups How to establish governance across the program life cycle What You Will Learn At the end of this course, you will be able to: Differentiate between the practice domains in the PMI PgMP® Examination Content Outline and the performance domains in The Standard for Program Management - Fourth Edition Name and describe the three phases in the program management life-cycle phases Describe the mapping of the life-cycle phases with the supporting program activities Identify the key outputs of the supporting program activities Articulate the interrelationships between the program management supporting processes and the mapping of processes to Knowledge Areas and Process Groups in the PMBOK® Guide - Sixth Edition Apply program management knowledge to answer foundation and scenario-based questions Summarize the process and eligibility criteria for earning the PgMP® credential Getting Started Introductions Course structure Course goals and objectives Foundation Concepts Programs, projects, and portfolio definitions differences, and how they relate The definition of a component and how it relates to a program Representative program management life cycle Role of the program manager and the program office The difference between the program management practice and performance domains Program Register and Knowledge Asset Management Program registers, and how they are used to manage knowledge assets Knowledge asset management, beginning with the data, information, knowledge, and wisdom (DIKW) Model Knowledge assets and relationship to the performance domains The program manager as a knowledge asset manager Types of Programs Perspectives on programs to establish the 'right' perspective Categories of programs based on the program standard Scenario-based questions Program and Organization Strategy Alignment An overview of the Program Strategy Alignment performance domain Exploration of the elements of strategic alignment, i.e., the business case, program charter, and program roadmap Exploration of organization maturity and strategic alignment Scenario-based questions that reference both the Program Strategy Alignment performance domain and the Strategic Program Management practice domain Program Benefits An overview of the Program Benefits Management performance domain Exploration of each benefits management interaction with the representative program management life cycle: Benefits IdentificationBenefits Analysis and PlanningBenefits DeliveryBenefits TransitionBenefits SustainmentScenario-based questions that reference both the Program BenefitsManagement performance domain and the Benefits Management practice domain Program Stakeholder Engagement An overview of the Program Stakeholder Engagement performance domain Exploration of each stakeholder engagement performance domain activity: Program Stakeholder IdentificationProgram Stakeholder AnalysisProgram Stakeholder Engagement PlanningProgram Stakeholder EngagementProgram Stakeholder CommunicationsScenario-based questions that reference both the Program StakeholderEngagement performance domain and the Stakeholder Management practice domain Program Governance An overview of the Program Governance performance domain Exploration of each program governance performance domain activity: Program governance practicesProgram governance roles and responsibilitiesProgram governance design and implementationGovernance relationship within programsScenario-based questions that reference both the Program Governance performance domain and the Governance practice domain Program Life Cycle Management An overview of the Program Life Cycle Management performance domain Exploration of the three phases in the representative program life cycle: Program DefinitionProgram DeliveryProgram ClosureExploration of the interaction between program activities and integration managementScenario-based questions that reference both the Program Life CycleManagement performance domain and the Program Life Cycle practice domain Program Management Supporting Activities - Part 1 An overview of the program management supporting activities Exploration of 5 of 10 supporting activities: Program change managementProgram communications managementProgram financial managementProgram information managementProgram procurement managementScenario-based question(s) presented after each supporting activity Program Management Supporting Activities - Part 2 Exploration of the remaining 6 of 10 supporting activities: Program quality managementProgram resource managementProgram risk managementProgram schedule managementProgram scope managementScenario-based question(s) presented after each supporting activity Program Management Professional (PgMP®) Examination Application process and timeline General and special eligibility criteria International Institute's Online Learning Tool - access to sample examination questions Program Management Professional (PgMP®) Examination breakdown of domains and subdomains Terms and conditions of the exam PgMP® Professional Code of Conduct

PgMP Exam Prep: In-House Training
Delivered OnlineFlexible Dates
£1,250 to £1,695

BOE310 SAP BusinessObjects Business Intelligence Platform - Administration and Security

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for System administrators Overview Prepare you to perform key administrative tasks in SAP BusinessObjects Business Intelligence platform to manage users, groups, and objects, and to distribute contents to users. In this course, students perform key administrative tasks in SAP BusinessObjects Business Intelligence platform to manage users, groups, and objects, and to distribute contents to users. SAP BusinessObjects Business Intelligence (BI) Platform Identifying the Components of the SAP BusinessObjects Business Intelligence BI Platform Content and Objects in the SAP BusinessObjects Business Intelligence (BI) Platform Viewing and Modifying Objects in the BI Platform Organizing Objects in the BI Platform Searching for Content in the BI Platform User and User Group Security in the SAP BusinessObjects Business Intelligence (BI) Platform Setting Up Users and Groups Administering Rights Application Security in the SAP BusinessObjects Business Intelligence (BI) Platform Managing Access to Applications Securing Applications Content Distribution Using Scheduling and Alerting Scheduling Objects Managing Instances Managing Calendars Managing Events Configuring Alerts and Alerting Publications and Publishing Designing Publications Additional course details: Nexus Humans BOE310 SAP BusinessObjects Business Intelligence Platform - Administration and Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BOE310 SAP BusinessObjects Business Intelligence Platform - Administration and Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BOE310 SAP BusinessObjects Business Intelligence Platform - Administration and Security
Delivered OnlineFlexible Dates
Price on Enquiry