• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

30 Courses in Cardiff delivered Live Online

Public Private Partnership (PPP)

5.0(10)

By GBA Corporate

Overview Public Private Partnerships (PPPs) are arrangements typified by joined-up working between the public and private sectors. In the broadest sense, PPPs can cover all types of collaboration across the interface between the public and the private sector to deliver services. This course will equip participants with a basic understanding of PPPs and why they are needed. It will walk delegates through a typical PPP process, from the identification of potential PPP projects to risk appraisal, tendering, and implementation.

Public Private Partnership (PPP)
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Data Protection (GDPR) Practitioner Certificate

By Computer Law Training

5-day intensive data protection course, delivered by a specialist.

Data Protection (GDPR) Practitioner Certificate
Delivered OnlineFlexible Dates
£1,200

Level 7 Diploma In Accounting & Finance - Pathway To MSc Accounting & Finance Degree

4.9(261)

By Metropolitan School of Business & Management UK

Level 7 Diploma In Accounting & Finance - Pathway To MSc Accounting & Finance Degree Level 7 Diploma in Accounting & Finance (QCF) – 6 - 8 Months Credits: 120 Credits This qualification is designed for learners who wish to pursue a career in the financial services industry, professional accountancy, banking, and finance or management. The qualification equips learners with the essential skills and knowledge needed to pursue high-level careers in all types of organizations in the public and private sector and within industry and commerce, both in the UK and abroad. The Level 7 Diploma in Accounting and Finance qualification also provides learners with the opportunity to work toward a relevant master’s programme with advanced standing. This programme is a Pathway programme to MSc Accounting & Finance Degree  Course Details Assessment: Assignments Objectives: contemporary and specialized approaches to accountancy and finance key practical, theoretical and empirical issues, and academic research the complexity of the ever-changing legal framework in which the financial sector operates the latest developments in accountancy and reporting required by local, national and European governments. Accreditation All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. University Progression University Top-up On completion of this course, students have the opportunity to complete a Master degree programme from a range of UK universities. The top-up programme can be studied online or on campus. The top-up comprises the final 60 credits which consist of either a dissertation or a dissertation and one module. (The course tuition fee listed above does NOT include the top-up fees) University Progression Click here to see University routes and fee information for progression. Entry Requirements For entry onto the Level 7 Diploma in Human Resource Management leading to the MA Human Resource Management qualification, learners must possess: An honours degree in related subject or UK level 6 diploma or equivalent overseas qualification i.e. Bachelors Degree or Higher National Diploma OR Mature learners (over 25) with at least 5 years of management experience if they do not possess the above qualification (this is reviewed on a case by case basis) Workshops Workshops are conducted by live webinars for all students. Visa Requirements There is no Visa requirement for this programme.

Level 7 Diploma In Accounting & Finance - Pathway To MSc Accounting & Finance Degree
Delivered OnlineFlexible Dates
£3,250

Sale & Purchase of Oil & Gas Properties

By EnergyEdge - Training for a Sustainable Energy Future

About this Training A variety of factors such as prices for crude oil and natural gas, liability exposure, and relations with host countries, present an opportunity for investors looking to acquire assets without taking on elements of exploration and market risk. Conversely, operators want to ensure that they are in the best position to monetise the disposal of interests in their portfolios. The material in this course covers the range of considerations that occur in the sale and purchase of upstream oil and gas properties. They include structuring (asset sale, share transfer, merger, interest swaps, and farm-outs), process (tender, direct negotiation, due diligence, preliminary and final agreements, closing and post-closing adjustments) and how funding is structured (credit agreements and reserve base lending). Training Objectives Upon completion of this course, participants will be able to: Plan and prepare for the sale or purchase of upstream oil and gas properties Select and structure the type of transaction best suit to the position of the Buyer and Seller Conduct and evaluate the commercial, operational, and legal aspects of due diligence Negotiate and document the terms and conditions contained in sale and purchase agreements for oil and gas properties Conduct post-closing adjustments in the sale and purchase of operating properties Assist in the negotiation of credit arrangements to fund the purchase of oil and gas properties Target Audience This course has been specifically designed for commercial, operating, legal and financial professionals involved in the sale and purchase of upstream oil and gas properties whose roles include: Conducting tenders for the sale of exploration and operating interests Performing due diligence reviews Negotiating preliminary and definitive agreements Arranging credit agreements and other types of funding Course Level Basic or Foundation Trainer Your expert course leader is an international legal expert in petroleum law who is based in Scotland. He received the degrees of Juris Doctor from the University of Wyoming and LLM-Energy Law from the University of Utah. He has been listed in the Guide to the World's Leading Energy and Natural Resources Lawyers. In over 30 years of practice, he has been chief legal officer in petroleum companies, consultant to development banks and aid programmes, and law professor. His private sector experience included positions as General Counsel of the Petroleum Corporation of New Zealand and Chief Legal Officer for Sinclair Oil Corporation in the United States. He has been a consultant to the Asian Development Bank, The World Bank and the European Investment Bank on petroleum sector policy, gas sales agreements, and production sharing contracts. This has included assignments in Cambodia, Bangladesh, India, Indonesia, Laos, Pakistan, Papua New Guinea, Philippines, and Vietnam. Your expert course leader has been an adviser and trainer on negotiations for various petroleum companies including BP, BG Group, Gazprom, KazMunayGas, Perushaan Gas Negera, Pertamina, PETRONAS, Philippine National Oil Corporation, Total, Shell and Statoil. He was appointed by Economic Community of West African States (ECOWAS) as the lead negotiator on behalf of four West African governments for the West African Gas Pipeline Project. His academic credentials include an appointment as Distinguished Visiting Professor for Oil & Gas Law at the University of Wyoming. He is currently Honourary Professor for International Petroleum Law at the University of Dundee Centre for Energy, Petroleum & Mineral Law and Policy. At CEPMLP, he has been the Course Director and principal instructor for seminars on Petroleum Industry Negotiations, Petroleum Service Contracts, Gas Industry Contracts, and Downstream Petroleum Law. He is the course author of International Comparative Petroleum Law. His publications include A Framework for Negotiating and Documenting International Petroleum Transactions and A Framework for Negotiating and Managing Production Sharing Contracts and Related Agreements. His academic work has been published in the Land and Water Law Review, Tulsa Law Journal and Journal of Comparative and International Law. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Sale & Purchase of Oil & Gas Properties
Delivered in Internationally or OnlineFlexible Dates
£3,009 to £3,499

A dynamic and interactive one-day or two-half-day live virtual workshop for women leaders in business, government and non-profit organizations.

Women in Management & Leadership
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£534

CertNexus Certified CyberSec First Responder (CFR-410)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners preparing for or who currently perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for those roles within federal contracting companies and private sector firms whose mission or strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD Information Network (DoDIN) operation and incident handling. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. Overview In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will: Assess cybersecurity risks to the organization. Analyze the threat landscape. Analyze various reconnaissance threats to computing and network environments. Analyze various attacks on computing and network environments. Analyze various post-attack techniques. Assess the organization's security posture through auditing, vulnerability management, and penetration testing. Collect cybersecurity intelligence from various network-based and host-based sources. Analyze log data to reveal evidence of threats and incidents. Perform active asset and network analysis to detect incidents. Respond to cybersecurity incidents using containment, mitigation, and recovery tactics. Investigate cybersecurity incidents using forensic analysis techniques. This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation. In addition, this course and subsequent certification (CFR-410) meet all requirements for personnel requiring DoD directive 8570.01-M position certification baselines: CSSP Analyst CSSP Infrastructure Support CSSP Incident Responder CSSP Auditor The course and certification also meet all criteria for the following Cybersecurity Maturity Model Certification (CMMC) domains: Incident Response (IR) Audit and Accountability (AU) Risk Management (RM) Lesson 1: Assessing Cybersecurity Risk Topic A: Identify the Importance of Risk Management Topic B: Assess Risk Topic C: Mitigate Risk Topic D: Integrate Documentation into Risk Management Lesson 2: Analyzing the Threat Landscape Topic A: Classify Threats Topic B: Analyze Trends Affecting Security Posture Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments Topic A: Implement Threat Modeling Topic B: Assess the Impact of Reconnaissance Topic C: Assess the Impact of Social Engineering Lesson 4: Analyzing Attacks on Computing and Network Environments Topic A: Assess the Impact of System Hacking Attacks Topic B: Assess the Impact of Web-Based Attacks Topic C: Assess the Impact of Malware Topic D: Assess the Impact of Hijacking and Impersonation Attacks Topic E: Assess the Impact of DoS Incidents Topic F: Assess the Impact of Threats to Mobile Security Topic G: Assess the Impact of Threats to Cloud Security Lesson 5: Analyzing Post-Attack Techniques Topic A: Assess Command and Control Techniques Topic B: Assess Persistence Techniques Topic C: Assess Lateral Movement and Pivoting Techniques Topic D: Assess Data Exfiltration Techniques Topic E: Assess Anti-Forensics Techniques Lesson 6: Assessing the Organization's Security Posture Topic A: Implement Cybersecurity Auditing Topic B: Implement a Vulnerability Management Plan Topic C: Assess Vulnerabilities Topic D: Conduct Penetration Testing Lesson 7: Collecting Cybersecurity Intelligence Topic A: Deploy a Security Intelligence Collection and Analysis Platform Topic B: Collect Data from Network-Based Intelligence Sources Topic C: Collect Data from Host-Based Intelligence Sources Lesson 8: Analyzing Log Data Topic A: Use Common Tools to Analyze Logs Topic B: Use SIEM Tools for Analysis Lesson 9: Performing Active Asset and Network Analysis Topic A: Analyze Incidents with Windows-Based Tools Topic B: Analyze Incidents with Linux-Based Tools Topic C: Analyze Indicators of Compromise Lesson 10: Responding to Cybersecurity Incidents Topic A: Deploy an Incident Handling and Response Architecture Topic B: Mitigate Incidents Topic C: Hand Over Incident Information to a Forensic Investigation Lesson 11: Investigating Cybersecurity Incidents Topic A: Apply a Forensic Investigation Plan Topic B: Securely Collect and Analyze Electronic Evidence Topic C: Follow Up on the Results of an Investigation Additional course details: Nexus Humans CertNexus Certified CyberSec First Responder (CFR-410) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified CyberSec First Responder (CFR-410) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Certified CyberSec First Responder (CFR-410)
Delivered OnlineFlexible Dates
£3,495

Certified Information Privacy Technologist (CIPT)

By Training Centre

  The CIPT is the first and only certification of its kind worldwide. It was launched by the IAPP in 2014 and updated in early 2023 to meet the growing need that only tech pros can fill-securing data privacy at all stages of IT product and service lifecycles.  Whether you work in the public or private sector, data privacy skills are quickly becoming a must-have-and that's a great opportunity for you.  The CIPT certification also holds accreditation under ISO 17024: 2012 About This Course   What will you learn?   Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to pre-empt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal.   This course has two programmatic modules, the first four areas focus on the fundamentals of data protection. The second module takes the fundamentals and puts it into practice.   MODULE 1: Fundamentals of Information Privacy   Unit 1: Common Principles and Approaches to Privacy This unit includes a brief discussion of the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles.   Unit 2: Jurisdiction and Industries This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors.   Unit 3: Information Security: Safeguarding Personal Information This unit presents introductions to information security, including definitions, elements, standards and threats/vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM).   Unit 4: Online Privacy: Using Personal Information on Websites and with Other Internet-related Technologies This unit examines the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children's online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices.    MODULE 2: Privacy in Technology   Unit 1: Understanding the Need for Privacy in the IT Environment This unit highlights the impact that regulatory activities, security threats, advances in technology and the increasing proliferation of social networks have on IT departments.   Unit 2: Core Privacy Concepts This unit reveals how privacy compliance becomes more attainable through developing information lifecycle plans, data identification and classification systems and data flow diagrams.   Unit 3: Regulations and Standards Impacting Privacy in IT This unit introduces privacy laws, regulations and standards that can help IT professionals design better privacy programmes and systems to handle personal information throughout the data lifecycle.   Unit 4: Privacy in Systems and Applications This unit develops an understanding of the risks inherent in the IT environment and how to address them.   Unit 5: Online Privacy Issues This unit presents information about online threats, threat prevention and the role of IT professionals in ensuring proper handling of user data.   Unit 6: De-identifying and Anonymizing Personally Identifiable Information This unit reveals the importance of personally identifiable information and methods for ensuring its protection.   Unit 7: Cloud Computing This unit evaluates privacy and security concerns associated with cloud services, and standards that exist to advise on their use. Prerequisites   There are no prerequisites for this course but attendees would benefit from a review of the materials on the IAPP site. What's Included?   1 years membership of the IAPP  Refreshments & Lunch (Classroom courses only) Participant Guide Official Study Guides Official Practice Exam Official Q&A The Exam Fees Who Should Attend?   The CIPT credential shows you've got the knowledge to build your organisation's data protection structures from the ground up. With regulators worldwide calling for tech professionals to factor data protection into their products and services, the job market for privacy-trained IT pros has never been stronger. As a result, the CIPT is targeted towards; Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialists Accreditation Our Guarantee   We are an approved IAPP Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.

Certified Information Privacy Technologist (CIPT)
Delivered OnlineFlexible Dates
£1,395

Financing an Export Plan

By Business Works

This module will cover the importance of cashflow and sound business planning; types of trade finance, government backed preferential interest loans bank overdrafts; bank loans & bank factoring facilities; bank Customer Foreign Currency CFC accounts, Eurocurrency accounts and other private sector loan facilities.

Financing an Export Plan
Delivered OnlineFlexible Dates
Price on Enquiry

Bribery and corruption risk assessment

By Global Risk Alliance Ltd

Our training programme will provide those involved at any stage of the process for procuring goods and/or services within their organisations with the knowledge and skillset to identify and mitigate the threat posed by the breadth and multi-layered complexity of procurement fraud, corruption and associated financial crime and money laundering.

Bribery and corruption risk assessment
Delivered OnlineFlexible Dates
£500 to £1,000

How to identify and mitigate procurement fraud and corruption

By Global Risk Alliance Ltd

Our training programme will provide those involved at any stage of the process for procuring goods and/or services within their organisations with the knowledge and skillset to identify and mitigate the threat posed by the breadth and multi-layered complexity of procurement fraud and corruption.

How to identify and mitigate procurement fraud and corruption
Delivered OnlineFlexible Dates
£500 to £1,000

Educators matching "Private sector"

Show all 6
Cenex (Centre of Excellence for Low Carbon & Fuel Cell Technologies)

cenex (centre of excellence for low carbon & fuel cell technologies)

Loughborough

Cenex was established as the UK’s first Centre of Excellence for Low Carbon and Fuel Cell technologies in 2005. Today, Cenex focuses on low emission transport & associated energy infrastructure and operates as an independent, not-for-profit research technology organisation (RTO) and consultancy, specialising in project delivery, innovation support and market development. We also organise Cenex-EXPO, the UK’s premier low carbon vehicle event, to showcase the latest technology and innovation in the industry. Our independence ensures impartial, trustworthy advice, and, as a not-for-profit, we are driven by the outcomes that are right for you, your industry and your environment, not by the work which pays the most or favours one technology. Finally, as trusted advisors with expert knowledge, we are the go-to source of guidance and support for public and private sector organisations along their transition to a zero-carbon future and will always provide you with the insights and solutions that reduce pollution, increase efficiency and lower costs. Together, we can lower your emissions through innovation in transport and energy infrastructure. View our projects and case studies [https://www.cenex.co.uk/projects-case-studies/] to see more of the work we do. INDEPENDENT: Truly impartial advice you can trust, based on in-house findings rather than manufacturer calculations. NOT-FOR-PROFIT: Driven to reduce the environmental impact of transport, energy and infrastructure, not by profits or returns-on-investment. EXPERTS: Access the best possible low emission solutions supported by evidence-based research, consultancy and models.