• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

51930 Courses in Cardiff delivered Online

Employment Law, GDPR & Contracts Law UK at QLS Endorsed Diploma

By Compliance Central

In the ever-evolving landscape of the professional world, the importance of comprehensive knowledge in Employment Law, GDPR, and Contracts Law within the UK has surged exponentially. With the digital economy's growth, the need for stringent data protection laws has become undeniable. Meanwhile, understanding Employment and Contracts Law has become a cornerstone for fostering fair and legally compliant workplaces. In this context, the "Employment Law, GDPR & Contracts Law UK at QLS Endorsed Diploma" bundle emerges as an unparalleled resource for those seeking to navigate these critical areas effectively. This exclusive Employment Law, GDPR & Contracts Law UK bundle, including QLS Endorsed and CPD QS Accredited courses, offers an in-depth exploration of the foundational and advanced aspects of "Employment Law, GDPR & Contracts Law UK." With the landscape of data protection and workplace rights under constant renovation, this collection of Employment Law, GDPR & Contracts Law UK courses provides learners with the knowledge to stay ahead in these crucial fields. The Employment Law, GDPR & Contracts Law UK bundle meticulously covers the nuances of GDPR, contracts, and employment legislation in the UK, equipping participants with the theoretical frameworks necessary to understand and apply these laws in various professional scenarios. QLS Endorsed Courses: Course 01: Certificate in GDPR Training at QLS Level 3 Course 02: Diploma in Contracts Law UK at QLS Level 5 Course 03: Diploma in Employment Law at QLS Level 5 CPD QS Accredited Courses: Course 04: HR Management Training Course 05: Recruitment Consultant Diploma Course 06: Paralegal Training Course 07: Legal Secretary and Office Skills Diploma Course 08: Contract Management Course Course 09: Legal Advisor Training Course 10: Mortgage Advisor Course 11: Wills and Probate Law Take your career to the next level with our bundle that includes technical courses and five guided courses focused on personal development and career growth. Course 12: Career Development Plan Fundamentals Course 13: CV Writing and Job Searching Course 14: Networking Skills for Personal Success Course 15: Ace Your Presentations: Public Speaking Masterclass Course 16: Decision Making and Critical Thinking Learning Outcomes: Comprehensive understanding of "Employment Law, GDPR & Contracts Law UK," equipping learners with the knowledge to navigate and apply these laws effectively. Insight into the latest legislative changes and how they impact organizations and their compliance processes. Enhanced ability to draft, analyze, and interpret contracts within the legal framework of the UK. Deepened knowledge of employment rights, obligations, and the legal mechanisms available to enforce them. Skills to implement GDPR compliance strategies, understand data protection principles, and manage data privacy. Understanding of the theoretical underpinnings of employment, GDPR, and contracts law, enabling informed decision-making and critical thinking in these domains. Seize this opportunity to elevate your career with our comprehensive bundle, endorsed by the prestigious QLS and accredited by CPD. Employment Law, GDPR & Contracts Law UK at QLS Endorsed Diploma. This Employment Law, GDPR & Contracts Law UK bundle course on "Employment Law, GDPR & Contracts Law UK" is meticulously designed to cover the essential aspects and latest updates in these fields. The first segment delves into GDPR, offering learners a detailed examination of data protection principles, rights of individuals, and the responsibilities of organizations under the GDPR framework. The exploration continues with Contracts Law, where participants gain insights into the formation, interpretation, and enforcement of contracts in the UK legal system. The course on Employment Law covers a wide range of topics, including employment rights, dispute resolution, and the legal frameworks governing employment relationships. Learners will benefit from a cohesive educational experience that ties together critical legal domains, ensuring a well-rounded understanding of "Employment Law, GDPR & Contracts Law UK." The theoretical focus of the course ensures a deep conceptual grasp, allowing participants to understand the broader implications of these laws on businesses and individuals alike. By the end of this Employment Law, GDPR & Contracts Law UK bundle, learners will be equipped with the knowledge to navigate the complexities of GDPR, Contracts, and Employment Law, enhancing their professional competencies and decision-making abilities. This comprehensive Employment Law, GDPR & Contracts Law UK bundle is structured to provide a robust foundation in "Employment Law, GDPR & Contracts Law UK," complemented by a series of courses focused on personal development and career growth. Such a holistic approach not only enriches participants' legal understanding but also empowers them with the skills to advance in their careers effectively. CPD 160 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Employment Law, GDPR & Contracts Law UK course is particularly useful for: Individuals seeking to deepen their understanding of "Employment Law, GDPR & Contracts Law UK." Professionals aiming to enhance their legal knowledge to apply in their current roles, particularly those in HR, legal, and management positions. Recent graduates looking to complement their academic knowledge with a thorough understanding of these key legal areas. Entrepreneurs and business owners needing to ensure their operations comply with current legislation. Legal advisors and consultants looking to update their knowledge on GDPR, Contracts, and Employment Law. Career changers aiming to enter fields that require a strong foundation in "Employment Law, GDPR & Contracts Law UK." Requirements You are warmly invited to register for this bundle. Please be aware that there are no formal entry requirements or qualifications necessary. This curriculum has been crafted to be open to everyone, regardless of previous experience or educational attainment. Career path Upon completion of the Employment Law, GDPR & Contracts Law UK courses, you will be able to: Legal Advisor HR Manager Contracts Manager Data Protection Officer Employment Law Consultant Legal Educator/Trainer Certificates 13 CPD Quality Standard Certificates Digital certificate - Included 3 QLS Endorsed Certificates Hard copy certificate - Included

Employment Law, GDPR & Contracts Law UK at QLS Endorsed Diploma
Delivered Online On Demand4 days
£310

Essential data centre technologies

5.0(3)

By Systems & Network Training

Data centre infrastructure course description This course provides a foundation in data centre infrastructure technologies. It begins with a tour of virtualisation and the impact of this on the network before moving on to the spine and leaf design, how it works and how to scale. Layer 2 technologies enabling this architecture are studied in terms of the impact on the data centre. The course then progresses onto how Layer 3 technologies such as BGP, EVPN and VXLAN are used in data centre networks. The course then studies interconnecting data centres finishing with a section on automation and orchestration of both underlay and overlay networks. What will you learn Explain the spine and leaf architecture Recognise the impact of virtualisation, containers and orchestration on the network Describe how the following technologies are used in data centres: Multi port aggregation Overlay networks MBGP, VRFs, EVPN VXLAN COOP Data centre infrastructure course details Who will benefit: Staff involved with Data centres. Prerequisites: Network fundamentals for engineers Duration 2 days Data centre infrastructure course contents What is Ethernet? Data centres versus enterprise networks. Servers, Blades, Racks, Clusters, Storage, Virtual Machines, Hosts, guests, containers, orchestration. Virtual switches. Distributed switches. Live migrations (e.g. vMotion). IP addressing and VM traffic. Data centre network architecture Spine leaf design. North south traffic, East West traffic, Scaling: Ports, bandwidth. N+1 redundancy, ratio East West optimisation, oversubscription. 2 tier versus 3 tier Leaf/Spine. Pods. Underlay, Overlay L2 technologies STP vs link aggregation vs multi link aggregation. LACP, LLDP, CDP. Scalability. VLANs and VLAN pruning. L2 design recommendations. Disabling STP on edge ports. L3 technologies Underlay, Overlay, VXLAN, VTEP, VXLAN overlay forwarding, EVPN, IS-IS, COOP, MP BGP, VRFs, EBGP, IBGP, AS numbers, route reflectors. Anycast gateways. MTU considerations-for data and control planes. BUM traffic. Data centre interconnects Pods, fabrics, multi pods, multi fabric, multi site. VXLAN with BGP/EVPN Data center interconnect. Cloud integration, Inter Site Networks. Automation Automation and orchestration, Zero touch provisioning, Devops, Netops, telemetry automated configuration for underlay and overlay, SDN.

Essential data centre technologies
Delivered in Internationally or OnlineFlexible Dates
£2,477

Zeroconf and Bonjour for engineers

5.0(3)

By Systems & Network Training

Zeroconf and Bonjour training course description A hands on training course focusing on Microsoft and Apple implementations of Zeroconf. The course covers all three main areas: Interface configuration, name resolution and service discovery. Hands on with Apple Bonjour and Microsoft UPnP compliment all the major theory sessions. What will you learn Explain how mDNS and LLMNR work. Explain how DNS-SD and SSDP work. Recognise the role of service discovery gateways. Zeroconf and Bonjour training course details Who will benefit: Technical staff working with Zeroconf. Developers using Zeroconf. Prerequisites: TCP/IP Foundation for engineers Duration 2 day Zeroconf and Bonjour training course contents What is Zeroconf? Zeroconf, architecture, Microsoft UPnP, Apple, Bonjour, devices, components. Home networks, enterprise networks, BYOD. Plug and play without Zeroconf DHCP, DNS, A, PTR, SRV records, DDNS. Hands on DHCP configuration. Address selection IPv4 link local addresses, IPv6 link local addresses. Hands: Addresses without DHCP. Name resolution mDNS, finding names, announcing names, .local DNS namespace, LLMNR. Hands on Names without DNS. Role of multicasting Multicast addresses, multicasts and switches, multicasts and routers. Hands on Multicasts, TTL. Service discovery DNS-SD, SRV and TXT lookups, SSDP, HTTP. Hands on Browsing for services Zeroconf in a routed environment Service Discovery gateways, configuration, service filters, DNS-LLQ, NAT-PMP. Miscellaneous Security, automatic multicast addresses, wireless auto configuration.

Zeroconf and Bonjour for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

MS-102T00 Microsoft 365 Administrator Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. A proficient understanding of DNS and basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices. A working knowledge of PowerShell. 1 - Configure your Microsoft 365 experience Explore your Microsoft 365 cloud environment Configure your Microsoft 365 organizational profile Manage your tenant subscriptions in Microsoft 365 Integrate Microsoft 365 with customer engagement apps Complete your tenant configuration in Microsoft 365 2 - Manage users, licenses, and mail contacts in Microsoft 365 Determine the user identity model for your organization Create user accounts in Microsoft 365 Manage user account settings in Microsoft 365 Manage user licenses in Microsoft 365 Recover deleted user accounts in Microsoft 365 Perform bulk user maintenance in Microsoft Entra ID Create and manage guest users Create and manage mail contacts 3 - Manage groups in Microsoft 365 Examine groups in Microsoft 365 Create and manage groups in Microsoft 365 Create dynamic groups using Azure rule builder Create a Microsoft 365 group naming policy Create groups in Exchange Online and SharePoint Online 4 - Add a custom domain in Microsoft 365 Plan a custom domain for your Microsoft 365 deployment Plan the DNS zones for a custom domain Plan the DNS record requirements for a custom domain Create a custom domain in Microsoft 365 5 - Configure client connectivity to Microsoft 365 Examine how automatic client configuration works Explore the DNS records required for client configuration Configure Outlook clients Troubleshoot client connectivity 6 - Configure administrative roles in Microsoft 365 Explore the Microsoft 365 permission model Explore the Microsoft 365 admin roles Assign admin roles to users in Microsoft 365 Delegate admin roles to partners Manage permissions using administrative units in Microsoft Entra ID Elevate privileges using Microsoft Entra Privileged Identity Management Examine best practices when configuring administrative roles 7 - Manage tenant health and services in Microsoft 365 Monitor the health of your Microsoft 365 services Monitor tenant health using Microsoft 365 Adoption Score Monitor tenant health using Microsoft 365 usage analytics Develop an incident response plan Request assistance from Microsoft 8 - Deploy Microsoft 365 Apps for enterprise Explore Microsoft 365 Apps for enterprise functionality Explore your app compatibility by using the Readiness Toolkit Complete a self-service installation of Microsoft 365 Apps for enterprise Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager Deploy Microsoft 365 Apps for enterprise from the cloud Deploy Microsoft 365 Apps for enterprise from a local source Manage updates to Microsoft 365 Apps for enterprise Explore the update channels for Microsoft 365 Apps for enterprise Manage your cloud apps using the Microsoft 365 Apps admin center 9 - Analyze your Microsoft 365 workplace data using Microsoft Viva Insights Examine the analytical features of Microsoft Viva Insights Explore Personal insights Explore Team insights Explore Organization insights Explore Advanced insights 10 - Explore identity synchronization Examine identity models for Microsoft 365 Examine authentication options for the hybrid identity model Explore directory synchronization 11 - Prepare for identity synchronization to Microsoft 365 Plan your Microsoft Entra deployment Prepare for directory synchronization Choose your directory synchronization tool Plan for directory synchronization using Microsoft Entra Connect Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - Implement directory synchronization tools Configure Microsoft Entra Connect prerequisites Configure Microsoft Entra Connect Monitor synchronization services using Microsoft Entra Connect Health Configure Microsoft Entra Connect cloud sync prerequisites Configure Microsoft Entra Connect cloud sync 13 - Manage synchronized identities Manage users with directory synchronization Manage groups with directory synchronization Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization Configure object filters for directory synchronization Explore Microsoft Identity Manager Troubleshoot directory synchronization 14 - Manage secure user access in Microsoft 365 Manage user passwords Enable pass-through authentication Enable multifactor authentication Enable passwordless sign-in with Microsoft Authenticator Explore self-service password management Explore Windows Hello for Business Implement Microsoft Entra Smart Lockout Implement conditional access policies Explore Security Defaults in Microsoft Entra ID Investigate authentication issues using sign-in logs 15 - Examine threat vectors and data breaches Explore today's work and threat landscape Examine how phishing retrieves sensitive information Examine how spoofing deceives users and compromises data security Compare spam and malware Examine account breaches Examine elevation of privilege attacks Examine how data exfiltration moves data out of your tenant Examine how attackers delete data from your tenant Examine how data spillage exposes data outside your tenant Examine other types of attacks 16 - Explore the Zero Trust security model Examine the principles and components of the Zero Trust model Plan for a Zero Trust security model in your organization Examine Microsoft's strategy for Zero Trust networking Adopt a Zero Trust approach 17 - Explore security solutions in Microsoft 365 Defender Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 Protect your organization's identities using Microsoft Defender for Identity Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint Protect against cyber attacks using Microsoft 365 Threat Intelligence Provide insight into suspicious activity using Microsoft Cloud App Security Review the security reports in Microsoft 365 Defender 18 - Examine Microsoft Secure Score Explore Microsoft Secure Score Assess your security posture with Microsoft Secure Score Improve your secure score Track your Microsoft Secure Score history and meet your goals 19 - Examine Privileged Identity Management Explore Privileged Identity Management in Microsoft Entra ID Configure Privileged Identity Management Audit Privileged Identity Management Control privileged admin tasks using Privileged Access Management 20 - Examine Azure Identity Protection Explore Azure Identity Protection Enable the default protection policies in Azure Identity Protection Explore the vulnerabilities and risk events detected by Azure Identity Protection Plan your identity investigation 21 - Examine Exchange Online Protection Examine the anti-malware pipeline Detect messages with spam or malware using Zero-hour auto purge Explore anti-spoofing protection provided by Exchange Online Protection Explore other anti-spoofing protection Examine outbound spam filtering 22 - Examine Microsoft Defender for Office 365 Climb the security ladder from EOP to Microsoft Defender for Office 365 Expand EOP protections by using Safe Attachments and Safe Links Manage spoofed intelligence Configure outbound spam filtering policies Unblock users from sending email 23 - Manage Safe Attachments Protect users from malicious attachments by using Safe Attachments Create Safe Attachment policies using Microsoft Defender for Office 365 Create Safe Attachments policies using PowerShell Modify an existing Safe Attachments policy Create a transport rule to bypass a Safe Attachments policy Examine the end-user experience with Safe Attachments 24 - Manage Safe Links Protect users from malicious URLs by using Safe Links Create Safe Links policies using Microsoft 365 Defender Create Safe Links policies using PowerShell Modify an existing Safe Links policy Create a transport rule to bypass a Safe Links policy Examine the end-user experience with Safe Links 25 - Explore threat intelligence in Microsoft 365 Defender Explore Microsoft Intelligent Security Graph Explore alert policies in Microsoft 365 Run automated investigations and responses Explore threat hunting with Microsoft Threat Protection Explore advanced threat hunting in Microsoft 365 Defender Explore threat analytics in Microsoft 365 Identify threat issues using Microsoft Defender reports 26 - Implement app protection by using Microsoft Defender for Cloud Apps Explore Microsoft Defender Cloud Apps Deploy Microsoft Defender for Cloud Apps Configure file policies in Microsoft Defender for Cloud Apps Manage and respond to alerts in Microsoft Defender for Cloud Apps Configure Cloud Discovery in Microsoft Defender for Cloud Apps Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - Implement endpoint protection by using Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint in Microsoft Intune Onboard devices in Microsoft Defender for Endpoint Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management Manage device discovery and vulnerability assessment Reduce your threat and vulnerability exposure 28 - Implement threat protection by using Microsoft Defender for Office 365 Explore the Microsoft Defender for Office 365 protection stack Investigate security attacks by using Threat Explorer Identify cybersecurity issues by using Threat Trackers Prepare for attacks with Attack simulation training 29 - Examine data governance solutions in Microsoft Purview Explore data governance and compliance in Microsoft Purview Protect sensitive data with Microsoft Purview Information Protection Govern organizational data using Microsoft Purview Data Lifecycle Management Minimize internal risks with Microsoft Purview Insider Risk Management Explore Microsoft Purview eDiscovery solutions 30 - Explore archiving and records management in Microsoft 365 Explore archive mailboxes in Microsoft 365 Enable archive mailboxes in Microsoft 365 Explore Microsoft Purview Records Management Implement Microsoft Purview Records Management Restore deleted data in Exchange Online Restore deleted data in SharePoint Online 31 - Explore retention in Microsoft 365 Explore retention by using retention policies and retention labels Compare capabilities in retention policies and retention labels Define the scope of a retention policy Examine the principles of retention Implement retention using retention policies, retention labels, and eDiscovery holds Restrict retention changes by using Preservation Lock 32 - Explore Microsoft Purview Message Encryption Examine Microsoft Purview Message Encryption Configure Microsoft Purview Message Encryption Define mail flow rules to encrypt email messages Add organizational branding to encrypted email messages Explore Microsoft Purview Advanced Message Encryption 33 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 34 - Implement Microsoft Purview Insider Risk Management Explore insider risk management Plan for insider risk management Explore insider risk management policies Create insider risk management policies Investigate insider risk management activities and alerts Explore insider risk management cases 35 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 36 - Explore Microsoft Purview Data Loss Prevention Examine Data Loss Prevention Explore Endpoint data loss prevention Examine DLP policies View DLP policy results Explore DLP reports 37 - Implement Microsoft Purview Data Loss Prevention Plan to implement Microsoft Purview Data Loss Protection Implement Microsoft Purview's default DLP policies Design a custom DLP policy Create a custom DLP policy from a template Configure email notifications for DLP policies Configure policy tips for DLP policies 38 - Implement data classification of sensitive information Explore data classification Implement data classification in Microsoft 365 Explore trainable classifiers Create and retrain a trainable classifier View sensitive data using Content explorer and Activity explorer Detect sensitive information documents using Document Fingerprinting 39 - Explore sensitivity labels Manage data protection using sensitivity labels Explore what sensitivity labels can do Determine a sensitivity label's scope Apply sensitivity labels automatically Explore sensitivity label policies 40 - Implement sensitivity labels Plan your deployment strategy for sensitivity labels Examine the requirements to create a sensitivity label Create sensitivity labels Publish sensitivity labels Remove and delete sensitivity labels Additional course details: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-102T00 Microsoft 365 Administrator Essentials
Delivered OnlineFlexible Dates
£2,975

French IGCSE Distance Learning Course by Oxbridge

By Oxbridge

Fuel your linguistic ambitions and elevate your fluency in French with our online Edexcel French IGCSE course. Whether you're preparing for A-Level study, planning to navigate foreign territories, or aspiring to make a splash in global business, this course equips you with the skills to communicate effectively and comprehend French with finesse. Enjoy the freedom to explore various topics like lifestyle, holidays, and environmental issues, with the personal attention and limitless assistance of your dedicated tutor. This course empowers you to articulate your thoughts spontaneously, listen to French dialogue, and write with confidence, all in a coherent and fluent manner. Recognise the prestige of being multilingual, a skill cherished by universities, employers, and a multitude of professions such as journalism, marketing, teaching, law enforcement, and many more! Our uniquely designed Edexcel IGCSE course allows you to study online at your own pace, with well-structured topics for efficient learning. Your tutor will offer valuable feedback on assignments and guidance throughout your studies to ensure your exam success. With this IGCSE French course, you will enjoy the following benefits: Course material aligned with the latest specifications, offering engaging and dynamic content. Option for fast track study for 2022 exams. Access to our partnered network of exam centres (exam venue guaranteed). Unending tutor support to help devise your study plan and throughout your studies. Exam pass guarantee (Should you fail the first time, our support continues till you pass). French, the UK's most chosen second language, can be mastered right from the comfort of your home through this IGCSE course, which focuses on both spoken and written aspects.  About the awarding body Awarding body: Edexcel Our course code: X811 Qualification code: 4FR1 Official Qualification Title: IGCSE French Edexcel, the UK's largest awarding organisation, has been steering individuals towards success through education for nearly two decades, both in the UK and overseas. It is a globally recognised education and examination body. ⏱ Study Hours Allocate between 120 and 150 hours for studying, plus additional time for completing assignments. 👩‍🏫 Study Method Our interactive online learning platform delivers the course, offering diverse resources such as videos, quizzes, and interactive activities. Should you prefer, the learning materials can be printed. 📆 Course Duration Upon enrolment, you are given up to two years to complete your studies and exams, with continuous tutor support. 📋 Assessment Enrolment for examinations is open from Summer 2022. You’ll need to complete two standard IGCSE written exams and one speaking assessment. Exams Paper 1: Listening – 30-minute written exam, contributing 25% towards IGCSE, 40 marks Paper 2: Reading and writing – One hour 45-minute written exam, contributing 50% towards IGCSE, 80 marks Paper 3: Speaking – 8-10 minute spoken exam, contributing 25% towards IGCSE, 40 marks Questions in the exam will be multiple-choice, structured, closed short answer, and open response. Your exam centre will be arranged at one of our partnered locations across the UK. Assignments  Throughout the course, various assignments will be required. These assignments will not contribute towards your final grade but will allow your tutor to provide feedback and track your progress. These assignments will also be used to provide predicted grades if needed. 👩‍🎓 Course Outcomes Upon successful completion, you will be awarded an IGC SE in French by Edexcel. This syllabus (4FR1) is specially chosen due to its suitability for distance learning. ℹ️ Additional Information Official Qualification Title - IGCSE French Difficulty - Level 2 Entry requirements - It is highly recommended that you possess a fundamental understanding of French before embarking on this course. Course Content The course content spans across various topics such as home life, school environment, food and health, the media, family, friends, holidays, special occasions, daily life, environmental issues, traditions, education, and future plans. You will also be guided on how to prepare for your speaking, listening, reading, and writing assessments.

French IGCSE Distance Learning Course by Oxbridge
Delivered Online On Demand
£475

Effective Mediation Skills

5.0(10)

By GBA Corporate

Overview Learn how to deal with conflict more effectively through one of our training courses and you can save people a lot of time, money, stress, and distraction. We offer a range of market-leading mediation training courses: from half-day to five-day programmes, covering all areas of mediation. This includes workplace mediation, neighbourhood and family conflict, bullying and harassment, and commercial disputes.

Effective Mediation Skills
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Blogging Online Course

4.5(3)

By Studyhub UK

Welcome to the 'Blogging Online Course,' a captivating journey into the realm of digital expression and lucrative online ventures. In Module 01, unravel the mysteries of blogging, discovering its essence and impact in the digital landscape. Module 02 beckons you to explore the intersection of evidence, monetization, and passion. Learn to transform your interests into thriving revenue streams by strategically establishing monetization from the start in Module 03. As you delve into Module 04, embrace the mantra of the Eight 'Be's of Blogging, uncovering the secrets to crafting compelling content that resonates with your audience. This course isn't just about blogging; it's about cultivating a digital presence that captivates, informs, and, most importantly, generates income. Join us on this odyssey of words and unlock the potential of your online narrative. Learning Outcomes Understand the fundamentals and significance of blogging in the digital era. Explore the intricate relationship between evidence, monetization, and personal interests. Strategically establish monetization from the inception of your blogging journey. Embrace the Eight 'Be's of Blogging for crafting engaging and impactful content. Develop the skills to create a captivating digital presence that attracts and retains readers. Why choose this Blogging Online Course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this Blogging Online Course for? Aspiring bloggers eager to launch their digital writing journey. Entrepreneurs seeking to monetize their passions through effective blogging strategies. Content creators looking to enhance their skills and build a loyal online audience. Small business owners interested in leveraging blogging for brand promotion. Individuals keen on turning their hobbies and interests ito sustainable online income. Career path Professional Blogger: £20,000 - £40,000 Digital Content Strategist: £25,000 - £45,000 Freelance Content Creator: £22,000 - £38,000 Social Media Influencer: £30,000 - £50,000 Brand Ambassador: £28,000 - £42,000 SEO Specialist: £26,000 - £44,000 Prerequisites This Blogging Online Course does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Blogging Online Course was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Blogging Online Course Module 01: What Is Blogging? 00:12:00 Module 02: Evidence Monetization Interest 00:09:00 Module 03: Establish Monetization from the Start 00:09:00 Module 04: The Eight 'Be's Of Blogging 00:12:00 Assignment Assignment - Blogging Online Course 00:00:00

Blogging Online Course
Delivered Online On Demand42 minutes
£10.99

Professional Certificate Course in Media Regulations and Corporate Media and Communication in London 2024

4.9(261)

By Metropolitan School of Business & Management UK

The aim of the "Media Regulations and Corporate Media and Communication" course is to provide students with an understanding of the legal and regulatory frameworks that govern the media industry and the role of corporate media and communication in this context.After the successful completion of the course, you will be able to learn about the following, Explore how the media industry is regulated in different ways. Understand The laws of Government to control the Press. Understand Corporate Media and Communication Media. Understand GLOBAL MEDIA AND COMMUNICATION AROUND THE WORLD Explore the Future of Mass Media. Explore Modern Media Delivery Pros and Cons. The course covers the various laws and regulations that apply to different forms of media, including broadcast media, print media, and digital media. Students will learn about the history of media regulation, the rationale behind different regulatory approaches, and the impact of regulation on media organizations and their audiences. The course also explores the role of corporate media and communication in shaping public perceptions of media organizations and their products. Students will learn about the strategies and tactics used by media companies to manage their reputations, build brand loyalty, and engage with audiences. The aim of the Media Regulations & Corporate Media and Communication course is to provide students with an understanding of the legal and regulatory frameworks that govern the media industry and the role of corporate media and communication in this context. The course covers the various laws and regulations that apply to different forms of media, including broadcast media, print media, and digital media. Students will learn about the history of media regulation, the rationale behind different regulatory approaches, and the impact of regulation on media organizations and their audiences. The course also explores the role of corporate media and communication in shaping public perceptions of media organizations and their products. Students will learn about the strategies and tactics used by media companies to manage their reputations, build brand loyalty, and engage with audiences. VIDEO - Course Structure and Assessment Guidelines Watch this video to gain further insight. Navigating the MSBM Study Portal Watch this video to gain further insight. Interacting with Lectures/Learning Components Watch this video to gain further insight. Media Regulations and Corporate Media and Communication Self-paced pre-recorded learning content on this topic. Media Regulations and Corporate Media and Communication Put your knowledge to the test with this quiz. Read each question carefully and choose the response that you feel is correct. All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course. The certificate is designed to enhance the learner's knowledge in the field. This certificate is for everyone eager to know more and get updated on current ideas in their respective field. We recommend this certificate for the following audience. Media Lawyers Media Relations Managers Regulatory Compliance Managers Corporate Communication Directors Public Relations Specialists Government Affairs Specialists Broadcast and Print Media Executives Digital Media Professionals Communications Managers Policy Analysts. Average Completion Time 2 Weeks Accreditation 3 CPD Hours Level Advanced Start Time Anytime 100% Online Study online with ease. Unlimited Access 24/7 unlimited access with pre-recorded lectures. Low Fees Our fees are low and easy to pay online.

Professional Certificate Course in Media Regulations and Corporate Media and Communication in London 2024
Delivered Online On Demand14 days
£32

Network programming with sockets

5.0(3)

By Systems & Network Training

Sockets programming training course description A hands on course for programmers using Sockets. It is important to recognise that the course assumes that delegates are already familiar with TCP/IP and Python. Practical exercises follow all the major theory sessions. What will you learn Read Python programs which use Sockets. Write Python programs which use Sockets. Debug Python programs which use Sockets. Sockets programming training course details Who will benefit: Programmers working with network applications. Prerequisites: TCP/IP foundation for engineers Python for network engineers Duration 2 days Sockets programming training course contents What is a socket? Review of IP, ICMP, UDP vs TCP, IP addresses, protocol numbers, ports. API's, UNIX I/O, sockets. SOCK_STREAM, SOCK_DGRAM. Hands on Compile and run code. The systems calls Clients and servers, structs, socket(), bind(), connect(), listen(), accept(), send(), recv(), sendto (), recvfrom(), close(), shutdown(), getpeername(), gethostname(). Hands on Walk through of example client and server code. First code TCP connections, passive opens, active opens. Hands on Write a simple 'hello world' server and client. Application protocols User character stream, ASCII turn taking, binary protocols. Hands on Raw SMTP, Writing a mail client. Clients Concurrency, polling, threads, event driven programming. Hands on Conferencing application. Servers Concurrency, stateful, stateless. Forks and execs. inetd. Hands on Running servers with and without inetd, chroot jails, conferencing server modifications. Advanced techniques Blocking, select(), partial send(s). Raw sockets, example sockets using Java, Perl and PHP. Hands on A broadcast application.

Network programming with sockets
Delivered in Internationally or OnlineFlexible Dates
£2,477

Junos Intermediate Routing

5.0(3)

By Systems & Network Training

Junos Intermediate Routing training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Describe typical uses, configure & monitor static, aggregate, and generated routes. Configure and share routes between routing instances. Explain the operations of OSPF. Describe BGP and its basic operations. Configure and monitor GRE and IP-IP tunnels. Junos Intermediate Routing training course details Who will benefit: Engineers responsible for configuring and monitoring devices running the Junos OS. Prerequisites: Intro to the Junos Operating System Duration 2 days Junos Intermediate Routing training course contents Protocol-Independent Routing Static Routes Aggregated Routes Generated Routes Martian Addresses Routing Instances Lab 1 Protocol-Independent Routing Load Balancing and Filter-Based Forwarding Overview of Load Balancing Configuring and Monitoring Load Balancing Overview of Filter-Based Forwarding Configuring and Monitoring Filter-Based Forwarding Lab 2 Load Balancing and Filter-Based Forwarding Open Shortest Path First Overview of OSPF Adjacency Formation and the Designated Router Election OSPF Scalability Configuring and Monitoring OSPF Basic OSPF Troubleshooting Lab 3 Open Shortest Path First Border Gateway Protocol Overview of BGP BGP Attributes IBGP Versus EBGP Configuring and Monitoring BGP Lab 4 Border Gateway Protocol IP Tunneling Overview of IP Tunneling GRE and IP-IP Tunnels Implementing GRE and IP-IP Tunnels Lab 5 IP Tunneling High Availability Overview of High Availability Networks Graceful Restart Graceful RE Switchover Nonstop Active Routing BFD VRRP Lab 6 High Availability Appendix A: IPv6 Introduction to IPv6 Routing Protocol Configuration Examples Tunneling IPv6 over IPv4 Lab 7 (Optional) IPv6 Appendix B: IS-IS Overview of IS-IS Overview of IS-IS PDUs Adjacency Formation and DIS Election Configuring and Monitoring IS-IS Basic IS-IS Troubleshooting Lab 8 (Optional) IS-IS Appendix C: Routing Information Protocol Introduction to RIP RIP Configuration Examples Monitoring and Troubleshooting RIP

Junos Intermediate Routing
Delivered in Internationally or OnlineFlexible Dates
£2,477