• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

52327 Courses in Cardiff delivered Online

Family Law

By SkillWise

Overview Uplift Your Career & Skill Up to Your Dream Job - Learning Simplified From Home! Kickstart your career & boost your employability by helping you discover your skills, talents, and interests with our special Family Law Course. You'll create a pathway to your ideal job as this course is designed to uplift your career in the relevant industry. It provides the professional training that employers are looking for in today's workplaces. The Family Law Course is one of the most prestigious training offered at Skillwise and is highly valued by employers for good reason. This Family Law Course has been designed by industry experts to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Family Law Course, like every one of Skillwise's courses, is meticulously developed and well-researched. Every one of the topics is divided into elementary modules, allowing our students to grasp each lesson quickly. At Skillwise, we don't just offer courses; we also provide a valuable teaching process. When you buy a course from Skillwise, you get unlimited Lifetime access with 24/7 dedicated tutor support. Why buy this Family Law? Unlimited access to the course forever Digital Certificate, Transcript, and student ID are all included in the price Absolutely no hidden fees Directly receive CPD Quality Standard-accredited qualifications after course completion Receive one-to-one assistance every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Family Law there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for free. Original Hard Copy certificates need to be ordered at an additional cost of £8. Who is this course for? This Family Law course is ideal for Students Recent graduates Job Seekers Anyone interested in this topic People already working in the relevant fields and want to polish their knowledge and skills. Prerequisites This Family Law does not require you to have any prior qualifications or experience. You can just enroll and start learning. This Family Law was made by professionals and it is compatible with all PCs, Macs, tablets, and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path As this course comes with multiple courses included as a bonus, you will be able to pursue multiple occupations. This Family Law is a great way for you to gain multiple skills from the comfort of your home.   Module 01: Introduction to Family Law Introduction to Family Law 00:22:00 Module 02: Framing Family Law Framing Family Law 00:23:00 Module 03: Marriage in Family Law Marriage in Family Law 00:19:00 Module 04: Civil Partnership and Cohabitation Civil Partnership and Cohabitation 00:18:00 Module 05: Nullity in Marriage Nullity in Marriage 00:28:00 Module 06: Divorce and Family Law Divorce and Family Law 00:20:00 Module 07: Child Custody Child Custody 00:16:00 Module 08: Property and Finance on Divorce Property and Finance on Divorce 00:22:00 Module 09: Child Support and Family Law Child Support and Family Law 00:26:00 Module 10: Adoption Process Adoption Process 00:28:00 Module 11: Domestic Violence Domestic Violence 00:27:00 Module 12: Gender Equality in Family Law Gender Equality in Family Law 00:30:00 Module 13: Feminist Perspectives on Family Law Feminist Perspectives on Family Law 00:27:00 Mock Exam Final Exam Assignment Assignment - Family Law 07:02:00

Family Law
Delivered Online On Demand
£139

PROBLEM SOLVING TOOLS AND TECHNIQUES

By Inclusive Solutions

In this practical workshop session we will explore ways of problem solving around complex situations. The session will be practical and will aim to allow the sharing of experiences and good practice as well promoting innovative approaches to problem solving around systemic, organisational as well as individual inclusion issues. Course Category Behaviour and Relationships Visioning and Problem Solving Description ‘The question is not should they be here anymore. Now it’s how can we figure out how best to include them?’ In this practical workshop session we will explore ways of problem solving around complex situations. The session will be practical and will aim to allow the sharing of experiences and good practice as well promoting innovative approaches to problem solving around systemic, organisational as well as individual inclusion issues. Behaviour problems, relationship challenges and personnel dilemmas can all be worked on with these team oriented problem solving processes. We will introduce participants to a range of powerful effective approaches for them to choose from back in their own workplaces. Testimonials A great day – going away buzzing with ideas Excellent! Inspirational! Informative! Learning Objectives Increased confidence regarding problem solving around inclusion in mainstream settings Access to a wider range of practical strategies and techniques to impact on communication, realtionship, learning and behaviour issues Learn new problem solving processes Who Is It For ? Early Years and School based Practitioners Heads and Deputies Guidance staff Learning Support teams SENCOs Primary and secondary teachers Parents Local Authority Support Services Community workers and carers Course Content The course answers the questions : How can we work out how to include this child best? Is there a more structured way to run this meeting? Can we explore the emotional impact the person is having on us and still agree strategies? How can I get unstuck from this problem? The day will cover: Solution Circles Solution Focused approaches Synectics – using analogies and out of the box creativity Circles of Adults Using Imagination to solve problems If you liked this course you may well like: CIRCLES OF ADULTS

PROBLEM SOLVING TOOLS AND TECHNIQUES
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

PERSON CENTRED REVIEWS

By Inclusive Solutions

Learn how to carry out a Person Centred Review based on the values of person centred thinking. Course Category Person Centred Planning Inclusion Strategic Work Visioning and Problem Solving Description Person centred planning is a way of expressing a set of inclusive values through a unique range of tools and techniques. The most commonly used person centred tool is a Person Centred Review – and it shows these values in action. All person centred planning tools and processes are driven by a commitment to achieve inclusive outcomes for the person whose plan it is, and the young people involved are always present throughout their planning session. The focus of all person centred approaches is the whole person irrespective of the label they carry. Two people, a process facilitator and a graphic facilitator, typically facilitate plans. The role of the support service staff in this work is as a facilitator not as an expert participant, problem solver, assessor or provider of consultation. Person Centred Reviews like MAPS and PATH are especially effective tools in planning transitions and annual review processes for young people with additional support needs and for through-care planning for young people who are looked after or accommodated. Over time person centred working will reveal areas of unmet need in current provision and thereby inform the ongoing strategic planning within any particular region. Testimonials Be the first…. Learning Objectives To Explore the values underpinning person centred working To show how person centred planning with Person Centred Reviews naturally captures young people’s strengths and capacities A demonstration of how person centred reviews encourage meaningful consultation and participation with young people (particularly for those who cannot make their views known in typical ways To show how Person Centred Planning leads to the building of stronger parent/school partnerships To indicate how person centred planning can promote multi-agency teamwork and shared responsibilities To increase understanding the how of process and graphic facilitation in person centred work. Who Is It For ? Teachers and School Staff Education Services Social Care Staff Health Professionals Transition Coordinators Family Support Workers Link Workers Course Content An introduction to the person centred planning Person Centred Reviews – live demonstrations of process in action followed by real time coaching of facilitation skills. We would stress that this is an introductory day and that participants will be expected to make plans for their own follow up and further practice of the tools covered in the course of the day. If you liked this course you may well like: PERSON CENTRED PLANNING USING PATH AND MAPS

PERSON CENTRED REVIEWS
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

PUPIL PARTICIPATION: LISTENING TO THE POWERFUL VOICE OF YOUNG PEOPLE

By Inclusive Solutions

Local authorities are being encouraged to seek the views of young people in relation to the services they receive. Schools and the whole range of support services (e.g. behaviour support, youth offending teams, social services, CAMHS etc.) are being expected to routinely ask young people for their views. This goes beyond involving young people in plans that concern them e.g care plans, individual education plans, pastoral support plans etc. Online Course now available via Teachable Platform – Ask the Children Learn at your own pace… lots of text and video support Course Category Peer Support Description Local authorities are being encouraged to seek the views of young people in relation to the services they receive. Schools and the whole range of support services (e.g. behaviour support, youth offending teams, social services, CAMHS etc.) are being expected to routinely ask young people for their views. This goes beyond involving young people in plans that concern them e.g care plans, individual education plans, pastoral support plans etc. This training will focus on how young people can be effectively engaged in giving their views and will present a model for use in evaluating services to young people based on the concept of resilience. This model enables young people to be clear about what has helped and hindered them in being able to overcome difficulties. It also provides a framework for evaluating the extent to which services are reducing risk and increasing protective factors to enable young people to develop the resilience. Testimonials ‘Yet again inspiring and opening more doors than I can go through’? ‘This opened a lot of avenues for thought and reflection. It will help me to help colleagues to see where they can improve practice to create a more inclusive environment within the whole school.’ ‘Some great ideas and restored my self belief! Fantastic’ Learning Objectives Strategies for engaging young people Knowledge and Understanding of resilience In relation to system and environmental factors Strategies for reducing risk and increasing protective factors In relation to Individual young people and services Evaluation framework for services to young people Who Is It For ? Youth offending teams Social services CAMHS Primary and secondary teachers Heads and Deputies SENCOs Learning Support and Guidance staff Advanced Skills Teachers Parents Local Authority Support Services Community Development workers Early Years and School based Practitioners Social work staff Health Services Course Content The course answers the questions : How can we truly involve pupils? Practically how do we go about listening to pupils views? What if we do not like what they tell us? How can we involve our most disaffected young people? Key themes Tools for engaging young people and gaining their views The concept of resilience System and environmental risk and protective factors that impact on young people’s resilience Reducing risk and Increasing protective factors Resilience planning for Individuals and services Evaluating services to young people If you liked this course you may well like: CIRCLES OF FRIENDS

PUPIL PARTICIPATION: LISTENING TO THE POWERFUL VOICE OF YOUNG PEOPLE
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

Certified Information Security Manager (CISM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification. Overview Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Identify and manage information security risks to achieve business objectives. Create a program to implement the information security strategy. Implement an information security program. Oversee and direct information security activities to execute the information security program. Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents. In this course, students will establish processes to ensure that information security measures align with established business needs. Prerequisites Information security governance Information risk management Information security program development Information security program management Incident management and response 1 - Information Security Governance Develop an Information Security Strategy Align Information Security Strategy with Corporate Governance Identify Legal and Regulatory Requirements Justify Investment in Information Security Identify Drivers Affecting the Organization Obtain Senior Management Commitment to Information Security Define Roles and Responsibilities for Information Security Establish Reporting and Communication Channels 2 - Information Risk Management Implement an Information Risk Assessment Process Determine Information Asset Classification and Ownership Conduct Ongoing Threat and Vulnerability Evaluations Conduct Periodic BIAs Identify and Evaluate Risk Mitigation Strategies Integrate Risk Management into Business Life Cycle Processes Report Changes in Information Risk 3 - Information Security Program Development Develop Plans to Implement an Information Security Strategy Security Technologies and Controls Specify Information Security Program Activities Coordinate Information Security Programs with Business Assurance Functions Identify Resources Needed for Information Security Program Implementation Develop Information Security Architectures Develop Information Security Policies Develop Information Security Awareness, Training, and Education Programs Develop Supporting Documentation for Information Security Policies 4 - Information Security Program Implementation Integrate Information Security Requirements into Organizational Processes Integrate Information Security Controls into Contracts Create Information Security Program Evaluation Metrics 5 - Information Security Program Management Manage Information Security Program Resources Enforce Policy and Standards Compliance Enforce Contractual Information Security Controls Enforce Information Security During Systems Development Maintain Information Security Within an Organization Provide Information Security Advice and Guidance Provide Information Security Awareness and Training Analyze the Effectiveness of Information Security Controls Resolve Noncompliance Issues 6 - Incident Management and Response Develop an Information Security Incident Response Plan Establish an Escalation Process Develop a Communication Process Integrate an IRP Develop IRTs Test an IRP Manage Responses to Information Security Incidents Perform an Information Security Incident Investigation Conduct Post-Incident Reviews

Certified Information Security Manager (CISM)
Delivered OnlineFlexible Dates
£1,995

SC-200T00 Microsoft Security Operations Analyst

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies. Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst. Prerequisites Basic understanding of Microsoft 365 Fundamental understanding of Microsoft security, compliance, and identity products Intermediate understanding of Windows 10 Familiarity with Azure services, specifically Azure SQL Database and Azure Storage Familiarity with Azure virtual machines and virtual networking Basic understanding of scripting concepts. 1 - Introduction to Microsoft 365 threat protection Explore Extended Detection & Response (XDR) response use cases Understand Microsoft Defender XDR in a Security Operations Center (SOC) Explore Microsoft Security Graph Investigate security incidents in Microsoft Defender XDR 2 - Mitigate incidents using Microsoft 365 Defender Use the Microsoft Defender portal Manage incidents Investigate incidents Manage and investigate alerts Manage automated investigations Use the action center Explore advanced hunting Investigate Microsoft Entra sign-in logs Understand Microsoft Secure Score Analyze threat analytics Analyze reports Configure the Microsoft Defender portal 3 - Protect your identities with Microsoft Entra ID Protection Microsoft Entra ID Protection overview Detect risks with Microsoft Entra ID Protection policies Investigate and remediate risks detected by Microsoft Entra ID Protection 4 - Remediate risks with Microsoft Defender for Office 365 Automate, investigate, and remediate Configure, protect, and detect Simulate attacks 5 - Safeguard your environment with Microsoft Defender for Identity Configure Microsoft Defender for Identity sensors Review compromised accounts or data Integrate with other Microsoft tools 6 - Secure your cloud apps and services with Microsoft Defender for Cloud Apps Understand the Defender for Cloud Apps Framework Explore your cloud apps with Cloud Discovery Protect your data and apps with Conditional Access App Control Walk through discovery and access control with Microsoft Defender for Cloud Apps Classify and protect sensitive information Detect Threats 7 - Respond to data loss prevention alerts using Microsoft 365 Describe data loss prevention alerts Investigate data loss prevention alerts in Microsoft Purview Investigate data loss prevention alerts in Microsoft Defender for Cloud Apps 8 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 9 - Investigate threats by using audit features in Microsoft Defender XDR and Microsoft Purview Standard Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Start recording activity in the Unified Audit Log Search the Unified Audit Log (UAL) Export, configure, and view audit log records Use audit log searching to investigate common support issues 10 - Investigate threats using audit in Microsoft Defender XDR and Microsoft Purview (Premium) Explore Microsoft Purview Audit (Premium) Implement Microsoft Purview Audit (Premium) Manage audit log retention policies Investigate compromised email accounts using Purview Audit (Premium) 11 - Investigate threats with Content search in Microsoft Purview Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 12 - Protect against threats with Microsoft Defender for Endpoint Practice security administration Hunt threats within your network 13 - Deploy the Microsoft Defender for Endpoint environment Create your environment Understand operating systems compatibility and features Onboard devices Manage access Create and manage roles for role-based access control Configure device groups Configure environment advanced features 14 - Implement Windows security enhancements with Microsoft Defender for Endpoint Understand attack surface reduction Enable attack surface reduction rules 15 - Perform device investigations in Microsoft Defender for Endpoint Use the device inventory list Investigate the device Use behavioral blocking Detect devices with device discovery 16 - Perform actions on a device using Microsoft Defender for Endpoint Explain device actions Run Microsoft Defender antivirus scan on devices Collect investigation package from devices Initiate live response session 17 - Perform evidence and entities investigations using Microsoft Defender for Endpoint Investigate a file Investigate a user account Investigate an IP address Investigate a domain 18 - Configure and manage automation using Microsoft Defender for Endpoint Configure advanced features Manage automation upload and folder settings Configure automated investigation and remediation capabilities Block at risk devices 19 - Configure for alerts and detections in Microsoft Defender for Endpoint Configure advanced features Configure alert notifications Manage alert suppression Manage indicators 20 - Utilize Vulnerability Management in Microsoft Defender for Endpoint Understand vulnerability management Explore vulnerabilities on your devices Manage remediation 21 - Plan for cloud workload protections using Microsoft Defender for Cloud Explain Microsoft Defender for Cloud Describe Microsoft Defender for Cloud workload protections Enable Microsoft Defender for Cloud 22 - Connect Azure assets to Microsoft Defender for Cloud Explore and manage your resources with asset inventory Configure auto provisioning Manual log analytics agent provisioning 23 - Connect non-Azure resources to Microsoft Defender for Cloud Protect non-Azure resources Connect non-Azure machines Connect your AWS accounts Connect your GCP accounts 24 - Manage your cloud security posture management? Explore Secure Score Explore Recommendations Measure and enforce regulatory compliance Understand Workbooks 25 - Explain cloud workload protections in Microsoft Defender for Cloud Understand Microsoft Defender for servers Understand Microsoft Defender for App Service Understand Microsoft Defender for Storage Understand Microsoft Defender for SQL Understand Microsoft Defender for open-source databases Understand Microsoft Defender for Key Vault Understand Microsoft Defender for Resource Manager Understand Microsoft Defender for DNS Understand Microsoft Defender for Containers Understand Microsoft Defender additional protections 26 - Remediate security alerts using Microsoft Defender for Cloud Understand security alerts Remediate alerts and automate responses Suppress alerts from Defender for Cloud Generate threat intelligence reports Respond to alerts from Azure resources 27 - Construct KQL statements for Microsoft Sentinel Understand the Kusto Query Language statement structure Use the search operator Use the where operator Use the let statement Use the extend operator Use the order by operator Use the project operators 28 - Analyze query results using KQL Use the summarize operator Use the summarize operator to filter results Use the summarize operator to prepare data Use the render operator to create visualizations 29 - Build multi-table statements using KQL Use the union operator Use the join operator 30 - Work with data in Microsoft Sentinel using Kusto Query Language Extract data from unstructured string fields Extract data from structured string data Integrate external data Create parsers with functions 31 - Introduction to Microsoft Sentinel What is Microsoft Sentinel? How Microsoft Sentinel works When to use Microsoft Sentinel 32 - Create and manage Microsoft Sentinel workspaces Plan for the Microsoft Sentinel workspace Create a Microsoft Sentinel workspace Manage workspaces across tenants using Azure Lighthouse Understand Microsoft Sentinel permissions and roles Manage Microsoft Sentinel settings Configure logs 33 - Query logs in Microsoft Sentinel Query logs in the logs page Understand Microsoft Sentinel tables Understand common tables Understand Microsoft Defender XDR tables 34 - Use watchlists in Microsoft Sentinel Plan for watchlists Create a watchlist Manage watchlists 35 - Utilize threat intelligence in Microsoft Sentinel Define threat intelligence Manage your threat indicators View your threat indicators with KQL 36 - Connect data to Microsoft Sentinel using data connectors Ingest log data with data connectors Understand data connector providers View connected hosts 37 - Connect Microsoft services to Microsoft Sentinel Plan for Microsoft services connectors Connect the Microsoft Office 365 connector Connect the Microsoft Entra connector Connect the Microsoft Entra ID Protection connector Connect the Azure Activity connector 38 - Connect Microsoft Defender XDR to Microsoft Sentinel Plan for Microsoft Defender XDR connectors Connect the Microsoft Defender XDR connector Connect Microsoft Defender for Cloud connector Connect Microsoft Defender for IoT Connect Microsoft Defender legacy connectors 39 - Connect Windows hosts to Microsoft Sentinel Plan for Windows hosts security events connector Connect using the Windows Security Events via AMA Connector Connect using the Security Events via Legacy Agent Connector Collect Sysmon event logs 40 - Connect Common Event Format logs to Microsoft Sentinel Plan for Common Event Format connector Connect your external solution using the Common Event Format connector 41 - Connect syslog data sources to Microsoft Sentinel Plan for syslog data collection Collect data from Linux-based sources using syslog Configure the Data Collection Rule for Syslog Data Sources Parse syslog data with KQL 42 - Connect threat indicators to Microsoft Sentinel Plan for threat intelligence connectors Connect the threat intelligence TAXII connector Connect the threat intelligence platforms connector View your threat indicators with KQL 43 - Threat detection with Microsoft Sentinel analytics What is Microsoft Sentinel Analytics? Types of analytics rules Create an analytics rule from templates Create an analytics rule from wizard Manage analytics rules 44 - Automation in Microsoft Sentinel Understand automation options Create automation rules 45 - Threat response with Microsoft Sentinel playbooks What are Microsoft Sentinel playbooks? Trigger a playbook in real-time Run playbooks on demand 46 - Security incident management in Microsoft Sentinel Understand incidents Incident evidence and entities Incident management 47 - Identify threats with Behavioral Analytics Understand behavioral analytics Explore entities Display entity behavior information Use Anomaly detection analytical rule templates 48 - Data normalization in Microsoft Sentinel Understand data normalization Use ASIM Parsers Understand parameterized KQL functions Create an ASIM Parser Configure Azure Monitor Data Collection Rules 49 - Query, visualize, and monitor data in Microsoft Sentinel Monitor and visualize data Query data using Kusto Query Language Use default Microsoft Sentinel Workbooks Create a new Microsoft Sentinel Workbook 50 - Manage content in Microsoft Sentinel Use solutions from the content hub Use repositories for deployment 51 - Explain threat hunting concepts in Microsoft Sentinel Understand cybersecurity threat hunts Develop a hypothesis Explore MITRE ATT&CK 52 - Threat hunting with Microsoft Sentinel Explore creation and management of threat-hunting queries Save key findings with bookmarks Observe threats over time with livestream 53 - Use Search jobs in Microsoft Sentinel Hunt with a Search Job Restore historical data 54 - Hunt for threats using notebooks in Microsoft Sentinel Access Azure Sentinel data with external tools Hunt with notebooks Create a notebook Explore notebook code

SC-200T00 Microsoft Security Operations Analyst
Delivered OnlineFlexible Dates
£2,380

Business Proposal Making Course

4.3(43)

By John Academy

Description: Proposals are persuasive documents that are to acquire funding officially. So, it is imperative that you know how to make a convincing proposal for your personal and professional benefit. Business Proposal Making Course will help you with just that. This course has a number of tips and techniques to increase the potential success of your proposals. You will learn about the different types of funding, proposals, ten steps of proposal writing, key elements, resources, activities, and evaluation, etc. By this techniques, you will frequently make successful proposals which will further promote your value in your organization. Learning Outcomes: Identify worthy funders for your organizations on the internet to use assessable skill so that you can recognize the effectiveness of funding connected to their individual organization Explain the necessity of matching funders interests with Narrate the utilities of matching funders' interests with organizational requirements to apply this knowledge to make decisions about the legality to submit a proposal Explain and realize the fundamental components to write proposals for non-profit organizations Relate as well as realize the fundamental procedures to write proposals successfully. Elaborate proficient bondage building plans to get involved with funders and apply this information for writing a funding proposal Narrate five reasons in the least for what funding proposals could be unacceptable. Plan, write and submit a proposal in response to funders guidelines Make a strategy, write a proposal to submit for the funders' guidelines Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Business Proposal Making Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Business Proposal Making Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Modules Course Overview 00:15:00 Sources of Funding 00:15:00 Types of Proposals 00:30:00 Proposals as a Relationship Builder 00:30:00 RFPs/RFQs (Requests for Proposals or Request for Quote) 00:30:00 The Ten Steps of Proposal Writing 00:15:00 Defining the Needs and Desired Results 00:15:00 Resources and Activities and Evaluation 00:15:00 Sustainability and Budget 00:30:00 Conclusion, Introduction, and Executive Summary 00:30:00 Mock Exam Mock Exam- Business Proposal Making Course 00:20:00 Final Exam Final Exam- Business Proposal Making Course 00:20:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Business Proposal Making Course
Delivered Online On Demand4 hours 25 minutes
£18

Certified Business Analysis Professional (CBAP) Boot Camp: Virtual In-House Training

By IIL Europe Ltd

Certified Business Analysis Professional™ (CBAP®) Boot Camp: Virtual In-House Training The course provides targeted exam preparation support for IIBA® Level 3 - CBAP® exam candidates, including both a BABOK® Guide Version 3.0 content review and exam preparation tutorial. The class is interactive, combining discussion, application of concepts, study tips, and a practice exam. Knowledge Check quizzes and self-assessments allow candidates to identify areas of weakness and create a custom study plan tailored to their individual needs as well as study aids to support their exam preparation after the course. The course materials include a copy of A Guide to the Business Analysis Body of Knowledge® (BABOK® Guide) Version 3.0. What you will Learn Upon completion, participants will be able to: Demonstrate familiarity with the structure and content of the IIBA® BABOK® Guide Improve their probability of passing the Level 3 - CBAP® Exam Identify their knowledge gaps through the use of module Knowledge Check quizzes Gauge their readiness for taking the exam by IIBA® BABOK® Guide Knowledge Are Foundation Concepts for IIBA® CBAP® Prep IIBA® - the Organization Business Analysis - the Profession Knowledge Check Terminology and Key Concepts IIBA®'s BABOK® Guide - the Standard Underlying Competencies BA Techniques Business Analysis Planning and Monitoring Knowledge Check Overview BAP&M Tasks BAP&M Techniques Elicitation and Collaboration Knowledge Check Overview E&C Tasks E&C Techniques Requirements Life Cycle Management Knowledge Check Overview RLCM Tasks RLCM Techniques Strategy Analysis Knowledge Check Overview SA Tasks SA Techniques Requirements Analysis and Design Definition Knowledge Check Overview RA&DD Tasks RA&DD Techniques Solution Evaluation Knowledge Check Overview SE Tasks SE Techniques Exam Preparation Practice Exam and debrief Exam Preparation Study Tips Manage Study Plan Exam Process Exam day

Certified Business Analysis Professional (CBAP) Boot Camp: Virtual In-House Training
Delivered OnlineFlexible Dates
£2,350

Keys To Inclusion

By Inclusive Solutions

How can we interrupt the isolation of disabled, challenging and other ‘different’ children and adults? This is our lead workshop/training day and is both a values primer and a practical guide to successful strategies for developing inclusive practice in educational and non educational settings for children and young people of all ages. This is practical plus being a ‘hearts and minds’ day. What does inclusion mean? Can we imagine what an inclusive school look like? What do we have to do? The day gives those present opportunities to reflect on their attitudes and practice in relation to the inclusion of children and adults who are different or challenging. The Keys can be presented as a powerful interactive Keynote for large conferences. A great way to launch a conference as the first key is ‘welcome’. Learning Objectives Increased confidence regarding developing inclusive practice in mainstream schools and other settings Access to a wider range of practical strategies to impact on behaviour problems Deeper understanding of core values surrounding inclusion of disabled and challenging children and adults Opportunity to reflect on professional attitudes and behaviour towards parents and pupils New skills and processes to make inclusion successful Course Content The course answers the questions : Why inclusion? What is inclusion? How do we go about including high profile children or young people? What does inclusion have to do with me? Best delivered over the course of a full day, ‘Keys to Inclusion’ introduces participants to 6 guiding Ideas that underpin inclusive practice. The importance of WELCOME Inclusion is about Adults’ learning Taking the Long View Giftedness as a new paradigm for understanding disability and difference The Intentional Building of Relationships – ‘Circle of Friends’ work as an example of this Not doing it alone – the importance of Teams in developing inclusive practice.

Keys To Inclusion
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

Home Education | Online Course

4.9(27)

By Apex Learning

Overview This comprehensive course on Home Education | Online Course will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Home Education | Online Course comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Home Education | Online Course. It is available to all students, of all academic backgrounds. Requirements Our Home Education | Online Course is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 11 sections • 11 lectures • 03:33:00 total length •Introduction to Home Education: 00:18:00 •Formal Requirements for Homeschooling: 00:29:00 •Advantages and Disadvantages of Home Education: 00:23:00 •Methods of Homeschooling (Part -A): 00:33:00 •Methods of Homeschooling (Part - B): 00:28:00 •Methods of Homeschooling (Part - C): 00:17:00 •Assessment of Home Education: 00:25:00 •Challenges of Home Education: 00:14:00 •Advice for Prospective Homeschooler's Parents: 00:26:00 •Assignment - Home Education | Online Course: 00:00:00 •Order Your Certificate: 00:00:00

Home Education | Online Course
Delivered Online On Demand3 hours 33 minutes
£12