• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1760 Courses in Cardiff delivered Live Online

Personal Resilience

By Underscore Group

Enhance your ability to apply a range of techniques and tools to help improve management of emotions under stress, make more effective decisions in difficult scenarios and manage your energy more effectively in stressful situations.

Personal Resilience
Delivered OnlineFlexible Dates
£425

VBA with Microsoft Excel

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is primarily designed for students who want to gain the skills necessary to use VBA to automate tasks in Excel such as collecting data from external sources, cleaning, and manipulating data. The target student may also want to learn how to create custom worksheet functions to streamline worksheet formulas and make complex worksheets easier to support, maintain, and understand. Overview Identify general components of VBA and their appropriate use in solving business solutions. Record VBA macros to automate repetitive tasks. Write VBA code to create VBA subroutines and functions. Use various programming elements to solve problems through code, including variables,objects, conditional statements, and loops. Eliminate, avoid, or handle errors in VBA code, and optimize its performance. VBA (Visual Basic for Applications) enables you to enhance and extend the capabilities of Microsoft Excel and other applications in the Microsoft 365 application suite. You can use VBA to perform tasks that would be difficult or impossible to do using only worksheet functions, and you can automate a wide range of tasks so they can be performed faster, more consistently, and with less effort than performing them manually. This course will give you a good foundation for understanding, creating, and using VBA in your own Excel workbooks. You will learn how to use the macro recorder effectively, as well as how to write your own VBA code from scratch. You will use tools built into Excel to explore and learn VBA's capabilities and to optimize and debug your code. Prerequisites To ensure your success in this course, you should be an experienced Excel user who is comfortable creating and working with Excel workbooks, including tasks such as entering worksheet formulas, using absolute and relative addressing, formatting cells, and creating pivot tables and charts. This level of skill could be acquired by taking the Microsoft Excel for Office 365 (Desktop or Online) courses, Parts 1, 2, and 3. 1. Using VBA to Solve Business Problems Use Macros to Automate Tasks in Excel Identify Components of Macro-Enabled Workbooks Configure the Excel VBA Environment 2. Recording a Macro Use the Macro Recorder to Create a VBA Macro Record a Macro with Relative Addressing Delete Macros and Modules Identify Strategies for Using the Macro Recorder 3. Writing VBA Code Directly Write VBA Code Discover Objects You Can Use Create a Custom Function 4. Solving Problems through Code Make Decisions in Code Work with Variables Perform Repetitive Tasks 5. Improving Your VBA Code Debug VBA Errors Deal with Errors Improve Macro Performance 6. Controlling How and When Macros Run Prompt the User for Information Configure Macros to Run Automatically Additional course details: Nexus Humans VBA with Microsoft Excel (v1.2) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VBA with Microsoft Excel (v1.2) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VBA with Microsoft Excel
Delivered OnlineFlexible Dates
£655

Level 3 Assessor Certificate CAVA Course

By Canary Wharf Academy

Become a proficient assessor with our Level 3 Assessor CAVA course, designed to equip you with the essential skills to assess vocational competence effectively. Whether you're evaluating skills in a workshop, classroom, or training environment, this comprehensive course prepares you to guide learners through their learning journey with precision and feedback. Course Outline: Unit 301: Understanding the Principles and Practices of Assessment Unit 302: Assess Occupational Competence in the Work Environment Unit 303: Assess Vocational Skills, Knowledge, and Understanding Entry Requirements: No formal prerequisites are needed, but candidates should work in or aspire to quality assurance roles. This course is a solid foundation for those venturing into quality assurance responsibilities. Access to two learners is required for the full Award. Course Assessment: Under the guidance of your assessor, you'll compile a portfolio of evidence throughout the course. Your assessor will mark this portfolio, which will be internally quality-assured by the centre and authority. Course Fee: Online/Distance Learning: £359.99 Zoom Classroom-based Course: £479.99 Corporate or Group Booking: Benefit from special discounts on corporate or group bookings, allowing our experienced trainers to deliver tailored training at your location. How to Book: Book online via PayPal, debit/credit card, invoice, or bank transfer. You can also book over the phone or visit our office for assistance. Instant booking confirmation will be sent via email. Need Assistance? For any queries or assistance, our dedicated team is just a phone call or email away. We're here to support you every step of the way. Contact us today to embark on your journey towards becoming a certified assessor. Book Now

Level 3 Assessor Certificate CAVA Course
Delivered OnlineFlexible Dates
£479.99

Secretary PA Training

By EduTech - Taylor Mason

During this 2 day course, you will develop a learning-based action plan to use in your workplace ensuring that you can put the learning into action.

Secretary PA Training
Delivered OnlineFlexible Dates
£595

Secretary PA Training

By EduTech - Taylor Mason

During this 2 day course, you will develop a learning-based action plan to use in your workplace ensuring that you can put the learning into action.

Secretary PA Training
Delivered OnlineFlexible Dates
£595

Secretary PA Training

By EduTech - Taylor Mason

During this 2 day course, you will develop a learning-based action plan to use in your workplace ensuring that you can put the learning into action.

Secretary PA Training
Delivered OnlineFlexible Dates
£595

AEROLATINO CERTIFICATION

By Aerolatino

JOIN THE LATEST LATIN AMERICA DANCE WORKOUT!

AEROLATINO CERTIFICATION
Delivered OnlineFlexible Dates
£75

Balkan Melody Mastery

5.0(2)

By North West London Music Lessons

MAGIC BALKAN MUSIC ACADEMY Balkan Melody Mastery Learn great Balkan tunes and how to play them amazingly. When? Wednesday evenings, 19:00 – 20:30h GMT Where? Online on ZOOM, limited spaces in-person in Kenton, London HA3 This course will explore authentic Balkan tunes, emphasizing essential techniques for playing with precision and expression. The curriculum is taught via a mixture of by-ear learning and sheet music, allowing participants to delve into dynamic phrasing, articulation, ornamentation, tone, and speed. The course also offers exercises to enhance overall technique and flexibility. Details Wednesday evenings, 19:00 – 20:30h GMT Start on the 17th January 2024. The course will run weekly throughout the year, expect school holidays. Booking either annually on a 6-weekly direct debit or by booking 5-lesson units (more info below) Location: Online on zoom – limited in-person spaces in London HA3 Participants: players of melodic instruments from intermediate to advanced. Fee: £60/£45 concessions for 1 Unit of 5 weeks (half a term). Discounts when signing up until the end of the academic year   Booking Page: Click here to read details of payment and sign up for the course. Read below for extra events, extra discounts and all-inclusive fees. Watch Information Videos and including small demonstrations. Detailed Information The Balkan region is known for its rich and diverse musical heritage, which has been influenced by various cultures and traditions over the centuries. I am launching this new course to share the finer things about Balkan music. The correct notes can be played by any musician, but how often do I find myself in tears when listening to a great musician who gets it so wrong, simply because they did not have the opportunity to travel, listen, and learn from native masters? Instead, they might have learned it third-hand or from a piece of sheet music. Western classical music notation cannot fully capture the essence of other types of music, and a metronome can stifle the authentic phrasing of asymmetric Balkan rhythms. I am not a native Balkan music master either, but I feel very privileged that I had the opportunity to learn from several of them, and engage in endless, wild jam sessions. In this course, I aim to convey not only the right musical feel but also the fervour and passion for this music. The weekly course primarily targets melodic instruments. Tunes will be taught by ear, initially using the voice (sheet music will be sent out beforehand), and then practiced on the instrument. Special attention will be devoted to phrasing, articulation, and, of course, the typical charisma of Balkan music to give it that truly magical sound. Whilst I am a violinist and will demonstrate and lead with the violin and voice, the course is suitable for any melodic instrument. The level is aimed at intermediate to advanced players, although ambitious and diligent lower-intermediate players will also do well. We will briefly cover accompaniment aspects, including chord progressions, rhythm patterns, and techniques. Dedicated workshops for chordal instruments and percussion will be offered as we progress. The course will run weekly and continuously, with no regular sessions during usual UK school holidays. Booking will be in advance in 5-session units. Each unit can be booked individually, or you can sign up for an annual booking and pay in 6 instalments distributed over the whole year, receiving a 20% discount on the total course fee. For precise dates and a detailed payment plan please visit the BOOKING page. Information Videos about the general aims and philosophy of the course how to achieve expressive ornamentation how the accompaniments relate to the tunes Additional Events Balkan Academy Jam Session: A music making session, 3 times a year (towards the end of each term), online and in person, where course participants and their friends can play the studied material with a full-on group, including rhythm section and vocals.  Fee: £9 for course participants, £12 for others - sheet music downloads included Dates to be announced.   Chord Progressions and Accompaniment Special: A special workshop three times a year for guitars, accordions, pianos, bass players, and similar instruments, both online and in person. This workshop delves into the details of chord progressions and accompaniment patterns, including riffs and breaks. It will be co-hosted by an experienced guitarist. Fee: £9 for course participants, £12 for others. Dates to be announced. Balkan Percussion Special: A workshop designed for percussionists to study the rhythm patterns and techniques related to the course material. This workshop will be co-hosted by an experienced Balkan percussionist. It is tailored to friends and bandmates of the Balkan Melody Mastery course participants, allowing the pieces to be performed together in your own groups and jam sessions.  Fee: £9 for course participants, £12 for others. Dates to be announced.

Balkan Melody Mastery
Delivered OnlineFlexible Dates
£45 to £65

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

IFRS Accounting for the Oil and Gas Sector

By EnergyEdge - Training for a Sustainable Energy Future

Gain expertise in IFRS accounting for the oil and gas sector with our industry-focused training course. Enroll today with EnergyEdge.

IFRS Accounting for the Oil and Gas Sector
Delivered in Internationally or OnlineFlexible Dates
£2,299 to £2,399