• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

904 Courses in Cardiff delivered Live Online

Introduction to AI for Trainers and Assessors

4.0(1)

By Panda Education and Training Ltd

Introduction to AI for Trainers and Assessors

Introduction to AI for Trainers and Assessors
Delivered Online
£75

Navigating Tax and Self-Assessment

5.0(36)

By PBC

Submit tax returns and self-assessments like a pro as we simplify the jargon and provide essential information on all things HMRC Navigating Tax and Self-Assessment Join us for an online event where we'll demystify the world of taxes and self-assessment. Whether you're a freelancer, small business owner, or just curious about managing your finances as a start-up, this event is for you! Our Chartered Certified Accountant, Mandeep Ubhi, is an expert in his field and will break down complex tax jargon into easy-to-understand language, giving you the confidence to tackle your tax obligations; from understanding tax allowances to filing your self-assessment, we've got you covered. Take advantage of this opportunity to gain valuable insights and tips to easily navigate the tax landscape!

Navigating Tax and Self-Assessment
Delivered OnlineFlexible Dates
FREE

Carbon Capture and Storage (CCS): Project Risks & How to Manage Them

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT) Governments, regulators and energy companies are pursuing CO2 storage technologies to meet their net-zero carbon commitments as well as targets set by the international Paris Agreement on climate change. For successfully executing Carbon Capture & Storage (CCS) projects, various technical, operational, economic and environmental risks and associated stakeholders need to be managed. In this 5 half-day Virtual Instructor Led Training (VILT) course, the methods for managing risk in CCS projects are addressed with a focus on CO2 injection and storage. The VILT course will also demonstrate how to assess storage capacity of a potential CO2 storage reservoir, model framing techniques, and well injectivity issues related to CO2 injection. The potential leak paths will be discussed such as reservoir seals, leakage along faults and aspects of well integrity. In the VILT course, the design of a monitoring programme will also be discussed. The VILT course will be supported by various case studies. This VILT course will cover the following modules: CCS projects in an international context Site selection and site characterization Storage capacity assessment Injectivity assessment Containment assessment Measurement, monitoring & verification Training Objectives On completion of this VILT course, participants will be able to: Uncover the functions and associated components required to capture, transport and store CO2 in subsurface aquifers and (depleted) hydrocarbon reservoirs Find a systematic and integrated approach to risk identification and assessment for CO2 storage projects (maturation) Appreciate the requirements (physics modelling) and uncertainties to assess the CO2 storage capacity of a selected site. Understand the challenges, data and methods to assess CO2 well injectivity and well integrity Identify the leakage pathways of a selected storage site, and understand the assessment methods and associated uncertainties Learn how to design a monitoring program Target Audience This VILT course is intended for all surface and subsurface engineers such as facility engineers, geologists, geophysicists, reservoir engineers, petrophysicists, production technologists/engineers, well engineers and geomechanical specialists. Also, (sub)surface team leads, project managers, business opportunity managers, decision executives, and technical risk assessment & assurance specialists will benefit from this VILT course as it provides a common framework and workflow to develop a CCS project. For each class, it is highly recommended that a mix of disciplines mentioned above are represented to facilitate discussions from different perspectives. Course Level Basic or Foundation Training Methods This VILT course is built around cases in which teams work to identify and assess CO2 storage site issues using a systematic thought approach in this course. In addition, exercises are used to practise the aspects of the CCS risk assessment process. The VILT course provides a venue for discussion and sharing of good practices as well as opportunities to practise multi-discipline co-operation and facilitation. Participants are encouraged to bring their own work issues and challenges and seek advice from the expert course leaders and other participants about all aspects of CCS. This VILT course will be delivered online in 5 half-day sessions comprising 4 hours per day, with 2 breaks of 10 minutes per day. Trainer Trainer 1: Your expert course leader has more than 36 years of experience in the oil & gas industry with Shell. He gained broad experience in petroleum engineering, with expertise in integrated production systems from subsurface, wells and surface. He has had assignments in Production Technology, R&D, Production Chemistry, Rock Mechanics and Reservoir Engineering cEOR, with a proven track record in technology screening, development and deployment, field development planning, conceptual well design and Production System Optimization (PSO) of gas and oil fields as well as preparing Well, Reservoir & Facility Management (WRFM) strategies and plans. He had also worked on assignments in NAM and did fieldwork in Oman, Gabon and Shell Nigeria. He is a skilled workshop facilitator. He discovered his passion for teaching following an assignment in Shell Learning. During his time in Shell, he developed and taught technical courses to Shell professionals via blended learning. Trainer 2: Your second expert course leader has over 30 years of experience identifying, assessing and mitigating technical risks with Shell. The main focal point of his experience is in subsurface and Geomechanical risks. He is the the founding father of various innovations in how we assess risks by tool development (for bore hole stability, 3D geomechanical field evaluations and probabilistic assessment). He also developed an eye for people motivation, change management and facilitation. He was also responsible for the Geomechanical competence framework, and associated virtual and classroom training programme in Shell for 10 years. Trainer 3: Your third expert course leader has more than 30 years of experience in Shell, focusing on research and development in drilling and offshore systems. His areas of expertise is in project management, finance, business planning, investment, development studies and economics models. In 2021, he worked on a project that looked into the economic evaluation of P18A field complex for CO2 storage. He has an MSc in Mechanical Engineering (M.E.) TU Delft Netherlands (Hons) and a baccalaureate from Erasmus University Rotterdam. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Carbon Capture and Storage (CCS): Project Risks & How to Manage Them
Delivered in Internationally or OnlineFlexible Dates
£1,536 to £2,899

HoardingUK Choice and Control in Hoarding Behaviour

5.0(6)

By HoardingUK

Hoarding training designed to be an educational, interactive and empowering day that works to positively impact attendees active client work.

HoardingUK Choice and Control in Hoarding Behaviour
Delivered Online + more
FREE to £95

FUNDAMENTALS OF CORPORATE CREDITS

5.0(10)

By GBA Corporate

Overview The course begins by introducing credit risk, its components and its drivers. The course then dives into business risk assessment and group structure risks. After examining financial statements, including accounting concepts and principles, the course concludes with a review of financial analysis and its four main risk areas.

FUNDAMENTALS OF CORPORATE CREDITS
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,779

Techniques of Quality and Productivity Management

5.0(10)

By GBA Corporate

Overview This course examines the major tools, techniques, and principles aimed at improving quality and productivity in the public sector. To provide students with practical methods for improving public organizations, this course will cover accountability systems, performance measurement, pay-for-performance reward systems, contracting out, and organizational assessment

Techniques of Quality and Productivity Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,779

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

BOHS P405 - Management of Asbestos in Buildings (including Asbestos Removal)

By Airborne Environmental Consultants Ltd

The main subject areas of the course are: Legislation and guidance for asbestos practitioners. The properties of asbestos and health effects of exposure to asbestos fibres. The types of asbestos and its uses in buildings. The types of asbestos surveys. The asbestos register, risk assessment and management plan. Asbestos remediation. The role of asbestos analysts and laboratory procedures.

BOHS P405 - Management of Asbestos in Buildings (including Asbestos Removal)
Delivered in Manchester + 1 more or OnlineFlexible Dates
£775

Banking and Financial Institutional Analysis

5.0(10)

By GBA Corporate

Overview This course will provide participants with an introduction to the key elements to consider in analysing financial institutions for example factors used in the assessment of the operational performance of financial institutions including but not limited to solvency, liquidity, earnings, management and systems/controls. The program will primarily cover banking institutions but there will also be some sessions devoted to risks associated with insurance companies. 

Banking and Financial Institutional Analysis
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

City & Guilds Electric Vehicle Charging Equipment Installation

By Technique Learning Solutions

This qualification aims to provide expert guidance to learners wishing to gain knowledge and understanding on Electric Vehicle charging equipment installation. This 2 day course provides expert guidance on EV charging equipment installation, an important emerging area which is not covered in detail by the current edition of the Wiring Regulations (BS 7671) or the IET’s Guidance Notes. Aimed at experienced electricians interested in understanding a wide range of equipment and systems available, this course applies to the specialised installation requirements of electric vehicle charging equipment in domestic dwellings, on-street locations, commercial and industrial premises. The course provides detailed guidance and recommendations on all aspects of the installation of Electric Vehicle Charging Equipment from the origin of the electrical supply, through distribution and final circuits, installation of the charging equipment itself to the cable between the charging equipment and vehicle’s electrical inlet. Also included are related issues of site layout and planning and subsequent inspection, testing, certification and maintenance of installations. Why take this course? Currently there is an increasing demand for new electric vehicle charging points but too few installers to roll them out. This is already a booming market which is due to get much bigger in the near future. The number of public charging connectors and locations has increased by 38% in the past 12 months and is expected to continue at that rate for years to come. Entry Requirements There are no formal entry requirements for this qualification, however we do expect you to meet the following requirements: Minimum age 18 years old (mandatory) Must be able to demonstrate the following competencies Be able to correctly install and terminate: pvc/pvc cable (twin and earth) Steel Wire armoured cable (swa) Be able to carry out an initial verification (inspection & testing) on an electrical installation and complete the necessary paperwork. Please Note: These competencies are required for the assessment and are not taught as part of the course. It is also recommended that you are up to date with your wiring regulations.

City & Guilds Electric Vehicle Charging Equipment Installation
Delivered in Clay Cross or Online
£500
1...678910...91