• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2443 Courses in Cardiff delivered Online

Credit Control Mastery Bundle: Enhance Financial Management and Debt Recovery Skills Course

5.0(2)

By Training Express

Struggling with overdue invoices and cash flow headaches? The Credit Control Mastery Bundle is your strategic edge in managing credit wisely and reclaiming control over your finances. Designed with sharp insight into the challenges businesses face, this course bundle offers an intelligent approach to debt recovery and credit management—without drowning you in jargon or theory. Expect straight-talking lessons that equip you to handle overdue accounts, reduce financial risk, and keep your bottom line looking far more cheerful. This isn't about lofty ideas or endless slideshows—it’s about sharpening your ability to assess creditworthiness, communicate with debtors effectively, and put structure into your systems. Whether you're navigating small business finances or managing accounts for a larger operation, this bundle helps you stay steps ahead in credit strategy. With clear, actionable knowledge tailored for the digital learning space, you’ll learn how to maintain a healthy cash flow while keeping things civil with clients who owe you. Key Features of Credit Control Mastery Bundle CPD Accredited Credit Control Mastery Course Instant PDF certificate Fully online, interactive Credit Control Masterycourse Self-paced learning and laptop, tablet, smartphone-friendly 24/7 Learning Assistance Discounts on bulk purchases Enrol now in this Credit Control Mastery Bundle course to excel! To become successful in your profession, you must have a specific set of Credit Control Mastery skills to succeed in today's competitive world. In this in-depth Credit Control Masterytraining course, you will develop the most in-demand Credit Control Mastery skills to kickstart your career, as well as upgrade your existing knowledge & skills. Credit Control Mastery Curriculum Financial Controller Training Module 01: The Concept of Financial Controller Module 02: Financial Statement Module 03: Financial Analysis Module 04: Ratio Analysis Module 05: Planning, Budgeting and Forecasting Module 06: Budgetary Control Module 07: Internal Control and Cash Module 08: Strategic Management Decision Module 09: Financial Audit Budget & Forecast Unit 01: Introduction Unit 02: Detail Budget Requirement Unit 03: Process of Making Budget Debt Management Module 01: Introduction to Debt Management Module 02: Long Term and Short Term Debt Module 03: Identifying Your Debt Module 04: Debt Management Plan Module 05: Debt Assessment Module 06: Debt Financing Module 07: Building Budget Module 08: Debt Counselling Module 09: When Is Debt Good? Module 10: Avoiding Debt Problems Module 11: How to Handle Debt Collectors Module 12: How to Get Out of Debt Module 13: Dealing with Bankruptcy and Insolvency Module 14: Laws and Regulations Accreditation This Credit Control Mastery bundle courses are CPD accredited, providing you with up-to-date skills and knowledge and helping you to become more competent and effective in your chosen field. Certification Once you've successfully completed your Credit Control Mastery course, you will immediately be sent a digital certificate. Also, you can have your printed certificate delivered by post (shipping cost £3.99). CPD 30 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This course is ideal for all employees or anyone who genuinely wishes to learn more about Credit Control Mastery basics. Requirements No prior degree or experience is required to enrol in this course. Career path This Credit Control Mastery Course will help you to explore avariety of career paths in the related industry. Certificates Digital certificate Digital certificate - Included Once you've successfully completed your course, you will immediately be sent a FREE digital certificate. Hardcopy Certificate Hard copy certificate - Included Hardcopy Certificate (UK Delivery): For those who wish to have a physical token of their achievement, we offer a high-quality, printed certificate. This hardcopy certificate is also provided free of charge. However, please note that delivery fees apply. If your shipping address is within the United Kingdom, the delivery fee will be only £3.99. Hardcopy Certificate (International Delivery): For all international addresses outside of the United Kingdom, the delivery fee for a hardcopy certificate will be only £10.

Credit Control Mastery Bundle: Enhance Financial Management and Debt Recovery Skills Course
Delivered Online On Demand1 hour
£21

Wireshark 101 for engineers

5.0(3)

By Systems & Network Training

Wireshark 101 training course description Wireshark is a free network protocol analyser. This hands-on course focuses on troubleshooting networks using the Wireshark protocol analyser. The course concentrates on the product and students will gain from the most from this course only if they already have a sound knowledge of the TCP/IP protocols What will you learn Download and install Wireshark. Capture and analyse packets with Wireshark. Configure capture and display filters. Customise Wireshark. Troubleshoot networks using Wireshark. Wireshark 101 training course details Who will benefit: Technical staff looking after networks. Prerequisites: TCP/IP Foundation for engineers Duration 2 days Wireshark 101 training course contents What is Wireshark? Protocol analysers, Wireshark features, versions, troubleshooting techniques with Wireshark. Installing Wireshark Downloading Wireshark, UNIX issues, Microsoft issues, the role of winpcap, promiscuous mode, installing Wireshark. Wireshark documentation and help. Hands on Downloading and installing Wireshark. Capturing traffic Starting and stopping basic packet captures, the packet list pane, packet details pane, packet bytes pane, interfaces, using Wireshark in a switched architecture. Hands on Capturing packets with Wireshark. Troubleshooting networks with Wireshark Common packet flows. Hands on Analysing a variety of problems with Wireshark. Capture filters Capture filter expressions, capture filter examples (host, port, network, protocol), primitives, combining primitives, payload matching. Hands on Configuring capture filters. Working with captured packets Live packet capture, saving to a file, capture file formats, reading capture files from other analysers, merging capture files, finding packets, going to a specific packet, display filters, display filter expressions. Hands on Saving captured data, configuring display filters. Analysis and statistics with Wireshark Enabling/disabling protocols, user specified decodes, following TCP streams, protocol statistics, conversation lists, endpoint lists, I/O graphs, protocol specific statistics. Hands on Using the analysis and statistics menus. Command line tools Tshark, capinfos, editcap, mergecap, text2pcap, idl2eth. Hands on Using tshark. Advanced issues 802.11 issues, management frames, monitor mode, packet reassembling, name resolution, customising Wireshark. Hands on Customising name resolution.

Wireshark 101 for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,497

Learn Python, JavaScript, and Microsoft SQL for Data science

By NextGen Learning

Course Overview This comprehensive course offers a deep dive into three essential technologies for data science: Python, JavaScript, and Microsoft SQL. Learners will gain foundational knowledge and practical skills in each of these key areas, which are crucial for handling data, creating interactive websites, and working with databases. By the end of the course, students will be proficient in writing Python code for data analysis, creating dynamic web content with JavaScript, and managing data with Microsoft SQL. The course is designed to equip learners with the technical skills needed to succeed in data science, making it a valuable investment for anyone looking to excel in this growing field. Course Description In this course, learners will explore the core principles of Python, JavaScript, and Microsoft SQL, all tailored to the needs of data science professionals. The curriculum covers Python’s data structures, functions, and libraries essential for data analysis, while JavaScript introduces students to web development skills, including client-side validation and data visualisation. The Microsoft SQL section focuses on data management, including filtering, joining, and structuring queries. Learners will develop a solid understanding of these technologies, which will enable them to manipulate data, automate processes, and design interactive applications. The course also includes real-world applications, ensuring learners are well-prepared for future opportunities in data science and web development. Course Modules: Module 01: JavaScript Getting Started Module 02: JavaScript Fundamentals Module 03: JavaScript Strings Module 04: JavaScript Operators Module 05: JavaScript Conditional Statements Module 06: JavaScript Control Flow Statements Module 07: JavaScript Functions Module 08: Data Visualization (Google Charts) Module 09: JavaScript Error Handling Module 10: JavaScript Client-Side Validations Module 11: Python Introduction Module 12: Python Basic Module 13: Python Strings Module 14: Python Operators Module 15: Python Data Structures Module 16: Python Conditional Statements Module 17: Python Control Flow Statements Module 18: Python Core Games Module 19: Python Functions Module 20: Python Args, KW Args for Data Science Module 21: Python Project Module 22: Publish Your Website for Live Module 23: MS SQL Statements Module 24: MS SQL Filtering Data Module 25: MS SQL Functions Module 26: MS SQL Joins Module 27: MS SQL Advanced Commands Module 28: MS SQL Structure and Keys Module 29: MS SQL Queries Module 30: MS SQL Structure Queries Module 31: MS SQL Constraints Module 32: MS SQL Backup and Restore (See full curriculum) Who is this course for? Individuals seeking to enhance their skills in data science. Professionals aiming to expand their knowledge in programming and database management. Beginners with an interest in Python, JavaScript, and SQL. Anyone looking to enter the field of data science or web development. Career Path Data Scientist Web Developer Database Administrator Data Analyst Front-End Developer Full Stack Developer Data Engineer

Learn Python, JavaScript, and Microsoft SQL for Data science
Delivered OnlineFlexible Dates
£9.99

Business Analysis Course Level 5

5.0(1)

By Course Gate

Fast track your career as a business analyst and get step-by-step training on how to assess organisational needs and requirements with the Business Analysis course. In this course, you will learn how to identify a business's needs and gain a solid understanding of process improvement. The role and responsibilities of a business analyst will also be explored in detail, as well as a breakdown of the improvement cycle. On successful completion, you will have a solid understanding of how to think strategically to be able to manage organisational change. This course is ideal for aspiring business analysts who want to gain a better understanding of the key concepts and principles of business analysis and develop the skills to kick-start their career. Learning Objectives Be able to accurately define a business's needs to boost project success Gain a solid understanding of the business improvement cycle Develop your skills in strategic thinking, communication and problem-solving Learn the fundamental principles of stakeholder management Understand the basics of budgeting and cash flow analysis Familiarise with the different stages in business analysis Get step-by-step training on how to write a business analysis report Learn how to establish realistic long-term organisational goals Discover a wide range of business analysis techniques and tools Who is this Course for? This certificate in Business Analysis is ideal for aspiring business analysts, project managers or professionals who are new to the field and wish to fine-tune their skills and knowledge to accelerate their professional development. Our distance learning courses include specially designed training units to ensure quality, flexible studying. This course is ideal for aspiring business analysts who want to gain a better understanding of the key concepts and principles of business analysis and develop the skills to kick-start their career. No prior knowledge or experience is necessary to take this course. Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the course. A good understanding of the English language, numeracy and ICT are required to attend this course. Certificate of Completion from Course Gate At the successful completion of the course, you can obtain your CPD certificate from us. You can order the PDF certificate for £9 and the hard copy for £15. Also, you can order both PDF and hardcopy certificates for £22. Career Path This Business Analysis course is a stepping stone to work your up to becoming a successful business analyst. Career opportunities and roles in this field include: Strategy & Business Analyst Junior Business Analyst Technical Business Analyst Course Curriculum Module 01: What is Business Analysis? What is Business Analysis? 00:10:00 Assessment Module 1 Module 01 Final Quiz Exam - Business Analysis 00:10:00 Module 02: Breaking Down the Different Levels of Business Analysis Breaking Down the Different Levels of Business Analysis 00:10:00 Assessment Module 2 Module 02 Final Quiz Exam - Business Analysis 00:10:00 Module 03: Business Analysis Key Concepts Business Analysis Key Concepts 00:05:00 Assessment Module 3 Module 03 Final Quiz Exam - Business Analysis 00:10:00 Module 04: Business Analysis Planning and Monitoring Business Analysis Planning and Monitoring 00:10:00 Assessment Module 4 Module 04 Final Quiz Exam - Business Analysis 00:10:00 Module 05: Elicitation and Collaboration Elicitation and Collaboration 00:10:00 Assessment Module 5 Module 05 Final Quiz Exam - Business Analysis 00:10:00 Module 06: Requirements Life Cycle Management Requirements Life Cycle Management 00:15:00 Assessment Module 6 Module 06 Final Quiz Exam - Business Analysis 00:10:00 Module 07: Strategy Analysis Strategy Analysis 00:15:00 Assessment Module 7 Module 07 Final Quiz Exam - Business Analysis 00:10:00 Module 08: Requirements Analysis and Design Definition Requirements Analysis and Design Definition 00:15:00 Assessment Module 8 Module 08 Final Quiz Exam - Business Analysis 00:10:00 Module 09: Solution Evaluation Solution Evaluation 00:10:00 Assessment Module 9 Module 09 Final Quiz Exam - Business Analysis 00:10:00 Module 10: Investigation Techniques Investigation Techniques 00:00:00 Assessment Module 10 Module 10 Final Quiz Exam - Business Analysis 00:10:00 Module 11: Develop Your Business Analysis Skills Develop Your Business Analysis Skills 00:15:00 Assessment Module 11 Module 11 Final Quiz Exam - Business Analysis 00:10:00 Module 12: Future Career Path and Scope of A Business Analyst Future Career Path and Scope of A Business Analyst 00:10:00 Assessment Module 12 Module 12 Final Quiz Exam - Business Analysis 00:10:00 Order Your Certificate

Business Analysis Course Level 5
Delivered Online On Demand4 hours 5 minutes
£11.99

Operations and Supply Chain Management Diploma

4.3(43)

By John Academy

The Operations and Supply Chain Management Diploma course teaches the skills and techniques for managing operations and supply chain of your business. The course is split into two sections - Operation Management and Supply Chain Management. In the first section, the course illustrates the design and control process of production. You will also learn how to redesign a business operation for betterment. The next part of the course deals with supply chain management where you will know the management of the flow of goods and services, including the movement and storage of raw materials, of work-in-process inventory, and of finished goods from the point of origin to the point of consumption. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Operations and Supply Chain Management Diploma is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Operations and Supply Chain Management Diploma is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Module 01 Designing Your Organizational Structure 00:30:00 Introduction to Operations Management 00:15:00 Understanding Financial Terms 00:30:00 Getting the Right People in Place 00:15:00 Getting Your Product Together 00:15:00 Building a Corporate Brand 00:30:00 Marketing Your Product 01:00:00 Selling Your Product 00:15:00 Planning for the Future 00:15:00 Goal Setting and Goal Getting 00:30:00 Succession Planning 101 00:15:00 Managing Your Money 00:15:00 Ethics 101 00:15:00 Building a Strong Customer Care Team 00:15:00 Training Employees for Success 00:15:00 Leadership Essentials 00:15:00 Module 02 The Fundamentals of Business Process Management 00:30:00 Defining Business Process Management 00:30:00 The Business Process Life Cycle 00:15:00 The Vision Phase 00:15:00 The Design Phase 01:00:00 The Modeling Phase 00:30:00 The Execution Phase 01:00:00 The Monitoring Phase 00:30:00 The Optimizing Phase 01:00:00 Module 03 What is Gap Analysis? 00:30:00 The Gap Analysis Process 00:30:00 Supporting Tools 00:30:00 Creating a Gap Analysis Report 00:15:00 Understanding Lean 00:30:00 The Toyota Production System 00:30:00 The Toyota Production System House 00:15:00 The Five Critical Improvement Concepts 00:15:00 Understanding Value with the Kano Model 00:15:00 Types of Waste 00:15:00 Creating a Lean Enterprise 00:15:00 The Plan, Do, Study, Act (PDSA) Cycle 00:15:00 Using the R-DMAIC-S Model 00:15:00 Lean Thinking Tools 00:15:00 Kaizen Events 00:00:00 Data Gathering and Mapping 00:30:00 A Plan to Take Home 00:15:00 Defining Continuous Improvement 00:15:00 Stage One - Identify Areas For Improvement 00:15:00 Stage Two - Create a Plan for Improvement 00:15:00 Stage Three - Implement the Changes 00:15:00 Stage Four - Review the Impact 00:15:00 Test Driving 00:15:00 Module 04 Six Sigma Basics 00:15:00 Improvement Tools 00:30:00 Management Tools for Generating Ideas 00:15:00 Continuous Improvement 00:30:00 Customer Relationships 00:30:00 Module 05 The Evolution of the Supply Chain 00:15:00 The Basic Supply Chain Structure 00:15:00 Supply Chain Drivers 00:15:00 Aligning Your Supply Chain with Business Strategy 00:15:00 Managing Supply Chain Risks 00:15:00 Tracking and Evaluating Supply Chain Data 00:30:00 Troubleshooting Supply Chain Problems 00:15:00 Sharing Supply Chain Activities 00:15:00 Sustainable Supply Chain Strategies 00:15:00 Applying Lean Techniques to the Supply Chain 00:15:00 The Future of Supply Chain Management 00:15:00 Supply Chain Management Basics 00:30:00 The Purchasing Cycle 00:45:00 Purchasing Toolkit 01:00:00 Managing Competitive Bids 00:45:00 Improving Efficiency and Accuracy 00:30:00 Analyzing and Reducing Risk in the Supply Chain 00:30:00 Managing Internal Relationships 00:30:00 Tools of the Trade 00:30:00 Module 06 What is Inventory? 00:30:00 Types of Inventory 00:15:00 Key Players 00:30:00 Setting up the Warehouse 00:15:00 What Makes a Good Inventory Management System? 00:15:00 The Warehouse Inventory Cycle 00:15:00 Identifying Demand 00:15:00 The Receiving Process 00:15:00 Validating Inventory 00:15:00 The Put-Away Process 00:15:00 Maintaining Inventory Accuracy 00:30:00 The Outbound Process 00:30:00 Industry Trends 00:15:00 Module 07 Concept of Quality FREE 00:19:00 Key Terms 00:23:00 Categories 00:21:00 Customer Input 00:11:00 Plan Quality 00:08:00 Design of Experiments 00:07:00 Quality Control 00:11:00 Control Charts 00:11:00 Sampling 00:11:00 Six Sigma 00:08:00 The Steps 00:10:00 The 6 Six Sigma Challenges 00:05:00 Module : 08 Getting Started 00:15:00 The Basic Supply Chain Structure 00:15:00 Supply Chain Drivers 00:15:00 Aligning Your Supply Chain with Business Strategy 00:15:00 Managing Supply Chain Risks 00:15:00 Tracking and Evaluating Supply Chain Data 00:30:00 Troubleshooting Supply Chain Problems 00:15:00 Sharing Supply Chain Activities 00:15:00 Sustainable Supply Chain Strategies 00:15:00 Applying Lean Techniques to the Supply Chain 00:15:00 The Future of Supply Chain Management 00:15:00 Module: 09 Supply Chain Management Basics 00:30:00 The Purchasing Cycle 00:45:00 Purchasing Toolkit 01:00:00 Managing Competitive Bids 00:45:00 Improving Efficiency and Accuracy 00:30:00 Analyzing and Reducing Risk in the Supply Chain 00:30:00 Managing Internal Relationships 00:30:00 Tools of the Trade 00:30:00 Module: 10 What is Inventory? 00:30:00 Types of Inventory 00:15:00 Key Players 00:30:00 Setting up the Warehouse 00:15:00 What Makes a Good Inventory Management System? 00:15:00 The Warehouse Inventory Cycle 00:15:00 Identifying Demand 00:15:00 The Receiving Process 00:15:00 Validating Inventory 00:15:00 The Put-Away Process 00:15:00 Maintaining Inventory Accuracy 00:30:00 The Outbound Process 00:30:00 Industry Trends 00:15:00 Module: 11 Defining Continuous Improvement 00:15:00 Stage One - Identify Areas For Improvement 00:15:00 Stage Two - Create a Plan for Improvement 00:15:00 Stage Three - Implement the Changes 00:15:00 Stage Four - Review the Impact 00:15:00 Test Driving 00:15:00 Module: 12 Module One - Getting Started 00:30:00 Module Two - Why Supply Chain Management 01:00:00 Module Three - Key Terms (I) 01:00:00 Module Four - Key Terms (II) 01:00:00 Module Five - Three Levels of Supply Chain Management 01:00:00 Module Six - Five Stages of Supply Chain Management 01:00:00 Module Seven - The Flows of Supply Chain Management 01:00:00 Module Eight - Inventory Management 01:00:00 Module Nine - Supply Chain Groups 01:00:00 Module Ten - Tracking and Monitoring 01:00:00 Module Eleven - Supply Chain Event Management 01:00:00 Module Twelve - Wrapping Up 00:30:00 Mock Exam Mock Exam- Operations and Supply Chain Management Diploma 00:30:00 Final Exam Final Exam- Operations and Supply Chain Management Diploma 00:30:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Operations and Supply Chain Management Diploma
Delivered Online On Demand48 hours
£25

NETCONF and YANG for engineers

5.0(3)

By Systems & Network Training

NETCONF and YANG training course description An introduction to NETCONF and YANG. The course progresses from what they are, why they are needed, and how to configure them onto a more detailed analysis of how NETCONF works and how to read YANG models. What will you learn Recognise the limits and problems of SNMP and the CLI. Describe the relationship between NETCONF and YANG. Configure NETCONF on network devices. Use NETCONF to configure devices. Read YANG models. NETCONF and YANG training course details Who will benefit: Network engineers. Prerequisites: Network management technologies Duration 1 day NETCONF and YANG training course content What are NETCONF and YANG? Network management and configuration issues. What is NETCONF? What is YANG? Protocols, data models, architecture. Hands on Configuring NETCONF on network devices, using NETCONF. NETCONF NETCONF layers, Secure transport: SSH, Messages: rpc, Operations, Content. Base operations: <get>, <get-config>, <edit-config>, <copy-config>, <delete-config>, <lock>,<unlock>, <close-session>, <kill-session> NETCONF datastores: :candidate, :startup, running. Hands on Retrieving a configuration with NETCONF, Editing a configuration with NETCONF. NETCONF more details NETCONF traffic flows, NETCONF capabilities, hello, capabilities exchange., Filtering data, atomic transactions, validating configurations. Hands on Using NETCONF. YANG YANG models, IETF standard YANG models, tree diagrams, an example: YANG interface management, Module header, Imports and includes, Containers, Lists, leaves, Data types, typedef, Instance data, XML. Hands on Reading YANG data models, creating a configuration instance.

NETCONF and YANG for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,397

Advanced Diploma in UI/UX Design

By iStudy UK

Are you interested in learning more about UI/UX but don't know where to begin? This course will enable you to add UX designer to your resume and begin earning money for your new abilities. This course is for those who want to learn about UI/UX design. It begins from the very beginning and progresses in a step-by-step manner.  In this course, you will get clear instruction on all steps of the UI/UX development process, from user research to establishing a project's strategy, scope, and information architecture, to building sitemaps and wireframes, in this course. You will study current UX design best practices and standards and use them to create effective and appealing screen-based experiences for websites or applications. By the end of the course, you'll have a diverse set of abilities that will allow you to work in the UI/UX design sector. The valuable certificate that comes with the course will enhance your value and make you stand out in the job market. This is the perfect course to kick start your career in the UI/UX design industry. So, enrol now and fast track your career ladder. Course Highlights Advanced Diploma in UI/UX Design is an award winning and the best selling course that has been given the CPD Qualification Standards & IAO accreditation. It is the most suitable course anyone looking to work in this or relevant sector. It is considered one of the perfect courses in the UK that can help students/learners to get familiar with the topic and gain necessary skills to perform well in this field. We have packed Advanced Diploma in UI/UX Design into 110 modules for teaching you everything you need to become successful in this profession. To provide you ease of access, this course is designed for both part-time and full-time students. You can become accredited in just 12 hours, 52 minutes hours and it is also possible to study at your own pace. We have experienced tutors who will help you throughout the comprehensive syllabus of this course and answer all your queries through email. For further clarification, you will be able to recognize your qualification by checking the validity from our dedicated website. Why You Should Choose Advanced Diploma in UI/UX Design Lifetime access to the course No hidden fees or exam charges CPD Qualification Standards certification on successful completion Full Tutor support on weekdays (Monday - Friday) Efficient exam system, assessment and instant results Download Printable PDF certificate immediately after completion Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. Improve your chance of gaining professional skills and better earning potential. Who is this Course for? Advanced Diploma in UI/UX Design is CPD Qualification Standards and IAO accredited. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic backgrounds. Requirements Our Advanced Diploma in UI/UX Design is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path You will be ready to enter the relevant job market after completing this course. You will be able to gain necessary knowledge and skills required to succeed in this sector. All our Diplomas' are CPD Qualification Standards and IAO accredited so you will be able to stand out in the crowd by adding our qualifications to your CV and Resume. UX/UI Course Introduction Learn UX/UI Course Overview 00:05:00 Section Overview 00:04:00 UX vs UI 00:04:00 UX/UI Designer Marketplace 00:05:00 Overview of UX Roles 00:06:00 Introduction To The Web Industry Web Industry Section Overview 00:03:00 The Phases of Web Development 00:13:00 Designer Responsibilities (working in a team) 00:09:00 Roles & Descriptions (working in a team) 00:05:00 Agile Approach To Project Management 00:12:00 Scrum - Flexible Framework 00:06:00 Project Management Apps 00:13:00 XD Lesson - Introduction 00:13:00 Foundations of Graphic Design Graphic Design Section Overview 00:02:00 The Psychology of Color 00:13:00 Color Wheel & Color Schemes 00:06:00 Working with Fonts 00:10:00 Working With Icons 00:04:00 XD Lesson - Tools, Object Manipulation and Components 00:13:00 XD Lesson - Font Styles and Artboard Settings 00:07:00 Graphic Design Software Tools 00:03:00 Adobe XD lesson 4 - Icons & Vector Graphics 00:14:00 UX Design (User Experience Design) UX Design Section Overview 00:04:00 What is User Experience Design? (UX) 00:09:00 UX Design Process 00:03:00 The UX Analysis Process 00:08:00 Working with User Profiles 00:03:00 Understanding User Pain Points 00:03:00 XD Lesson 5 Class Project: Сompetitive Analysis 00:10:00 Developing a Persona Part 1 00:05:00 Developing a Persona Part 2 00:05:00 Customer Journey 00:04:00 Customer Journey vs Sales Funnel 00:04:00 3 Phases of a Sales Funnel 00:07:00 4 Stages of a Sales Funnel 00:06:00 Macro/Micro Conversions 00:05:00 Stages of Market Sophistication 00:06:00 Lead Generation Funnel 00:06:00 Digital Product Sales Funnel 00:05:00 7 Principles of Influence 00:12:00 Age Based Influence Triggers 00:06:00 Gender Influence Triggers 00:06:00 Interest Based Marketing 00:04:00 Understanding User Flow 00:08:00 XD Lesson 6 Class Project: Userflow - Your first UX deliverable 00:07:00 Working with Story Boards 00:05:00 XD Lesson 7 Class Project: Crafting a Story board 00:09:00 Working with Moodboards 00:04:00 XD Lesson 8 Class Project: Creating Moodboard 00:11:00 Sitemap & Information Architecture 00:07:00 XD Lesson - Class Project: App Architecture 00:09:00 Low and Hi Fidelity Wireframes 00:03:00 XD Lesson - Class Project: Login Screen Wireframe Using Material Design 00:08:00 Working with Prototypes 00:04:00 XD Lesson - Class Project: Home Screen Wireframe and Linking 00:07:00 XD Lesson - Class Project: Adding Interaction to Wireframes 00:10:00 Testing and Evaluating 00:11:00 UX Deliverables 00:03:00 UX Design Conclusion 00:01:00 UI Design (User Interface Design) UI Design Section Overview 00:03:00 UI Design Overview 00:03:00 Types of Interfaces 00:10:00 Landing Pages Overview 00:10:00 XD Lesson - Using Grids in XD 00:08:00 XD Lesson - Single Card design 00:13:00 UI Controls 00:07:00 UI Components 00:12:00 Navigational Components 00:12:00 Header Design Overview 00:07:00 XD Lesson - Mobile & Desktop: Header Design 00:10:00 XD Lesson - Mobile & Desktop: Dropdown Design 00:06:00 Common Layouts Overview 00:08:00 XD Lesson - Common Layouts 00:07:00 Mobile & Desktop Footer Design Overview 00:07:00 XD Lesson - Mobile & Desktop: Footer Design 00:06:00 Mobile & Desktop Button Design Overview 00:05:00 XD Lesson - Mobile & Desktop: Button Design 00:10:00 XD Lesson - Mobile & Desktop: Input Design 00:07:00 Mobile & Desktop Filter Search Bar Design Overview 00:06:00 Adobe XD Lesson - Mobile & Desktop: Filter Design 00:07:00 Adobe XD Lesson - Mobile & Desktop: Search Design 00:03:00 UI Kit Overview 00:05:00 Adobe XD Lesson - Desktop and Mobile: UI Kit 00:06:00 Microinteractions Overview 00:05:00 Adobe XD lesson - Microinteractions 00:07:00 Optimization Optimization Section Overview 00:02:00 Feedback Review & Getting Referrals 00:04:00 'Above the Fold' Rule 00:04:00 Adobe XD lesson - Designing a Powerful Above the Fold 00:08:00 Using Analytics For Optimization 00:05:00 Heat Maps & Element Placements 00:04:00 Crafting A Usability Report Overview 00:08:00 Adobe XD lesson - Crafting Reports in XD 00:20:00 Starting a Career in UX/UI Design Careers in UX/UI Section Overview 00:06:00 Your Daily Productivity Hub 00:14:00 How To Start Freelancing 00:08:00 Client Consulting 00:04:00 Building a Brand 00:10:00 Personal Branding 00:06:00 The Importance of Having a Website 00:08:00 Creating a Logo 00:05:00 Step by Step Website Setup 00:17:00 UI Templates 00:06:00 Logo Templates 00:04:00 Creating a Business Email 00:06:00 Networking Do's and Don'ts 00:04:00 Top Freelance Websites 00:10:00 UX/UI Project Scope Questions 00:10:00 Laser Focus & Productivity Tools 00:06:00 The Places to Find UX Jobs 00:05:00

Advanced Diploma in UI/UX Design
Delivered Online On Demand12 hours 52 minutes
£25

The Flo Sessions - Short Flo

5.0(2)

By The Flo Coach

Boost your productivity and focus with The Flo Sessions

The Flo Sessions - Short Flo
Delivered OnlineFlexible Dates
£10.50

JSEC - Junos Security

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audiences for this course are the following: • Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers. Overview After successfully completing this course, you should be able to: Identify security challenges in today's networks. Identify products that are incorporated into the Juniper Connected Security solution. Explain the value of implementing security solutions. Explain how Juniper Connected Security solves the cyber security challenges of the future. Explain SRX Series session management. Explain Junos ALG functions and when to use them. Describe policy logging on the SRX series device. Explain security policy scheduling. Describe application security theory. Explain application signature usage in AppID. Describe the AppTrack service. Describe the AppFW service. Describe the AppQoS service. Configure security policies using the AppSecure suite of services. Explain unified security policies. Describe IPS signatures. Configure an IPS policy using pre-defined templates. Describe how to update the IPS attack object database. Describe IPS rules and rule bases. Configure custom attack objects. Describe Junos Space and Security Director. Configure policy management using Security Director. Describe Security Director objects. Explain the different licensing options for Sky ATP List Sky ATP's features and benefits. Configure Sky ATP profiles and enroll an SRX Series device. Configure file scanning on Sky ATP. Configure Sky ATP to scan email Configure GeoIP on Sky ATP. Describe the JATP features and benefits List the JATP device options. Explain the JATP architecture. List 3rd party support options for JATP. Explain JATP SmartCore analytics processes. Describe Policy Enforcer configuration options. Describe Policy Enforcer integration with Sky ATP. Configure Policy Enforcer to block lateral malware movement. Explain Juniper Secure Analytics features and benefits. Describe JSA log collection. Describe JSA network flow collection. Describe the JSA Offense Management workspace. Explain the JSA Risk Manager features. Configure JSA to collect network and log collection. Explain the features of JIMS. Describe JIMS integration into the current AD network. Describe the Sky Enterprise service and how it can save resources. Explain the Sky Enterprise monitoring service. Explain the vSRX Series device benefits. Describe use cases for the vSRX. Explain the cSRX Series device benefits. Describe use cases for the cSRX. Describe SSL Proxy Concepts. Explain Forward and Reverse Proxy and the limitations of each. Configure both Forward and Reverse Proxy. This five-day course uses the Junos J-Web, CLI, Junos Space, and other user interfaces to introduce students to the concept of Juniper Connected Security. Chapter 1: Course Introduction Course Introduction Chapter 2: CLI Overview User Interface Options Command-Line Interface Initial Configuration Interface Configuration Lab 1: CLI Overview Chapter 3: Advanced Security Policy Session Management Junos ALGs Policy Scheduling Policy Logging Lab 2: Advanced Security Policy Chapter 4: Application Security Theory Application ID Application Signatures App Track App Firewall App QoS App QoE Chapter 5: Application Security Implementation AppTrack Implementation AppFW Implementation AppQos Implementation APBR Implementation Lab 3: Application Security Chapter 6: Intrusion Detection and Prevention IPS Overview IPS Policy Attack Objects IPS Configuration IPS Monitoring Lab 4: Implementing IPS Chapter 7: Security Director Overview Security Director Objects Security Director Policy Management Lab 5: Security Director Chapter 8: Sky ATP Implementation Architecture and Key Components Features and Benefits Configuration Compromised Hosts Command and Control File Scanning E-mail Scanning Geo IP Security Policy Integration Troubleshooting Lab 6: Sky ATP Implementation Chapter 9: Policy Enforcer Policy Enforcer Concepts Configuration Options Policy Enforcer Installation Lab 7: Policy Enforcer Chapter 10: JATP Overview Traffic Inspection Threat Detection Threat Analysis JATP Architecture Chapter 11: JATP Implementation Data Collectors Configure SmartCore Analytics Engine Log Ingestion Incident Management SRX Threat Prevention 3rd Party support for Threat Prevention Reporting Lab 8: JATP Chapter 12: Juniper Secure Analytics (JSA) JSA Overview Data Collection Log Analytics Threat Analytics Vulnerability Management Risk Management Lab 9: JSA Chapter 13: JIMS JIMS Overview JIMS Integration Lab 10: JIMS Chapter 14: vSRX and cSRX vSRX Overview vSRX Supported Features vSRX Use Cases cSRX Overview Lab 11: vSRX Installation Chapter 15: SSL Proxy SSL Proxy Overview SSL Concepts SSL Proxy Configurations Troubleshooting Lab 12: SSL Proxy Chapter 16: Cluster Concepts Chassis Cluster Concepts Chassis Cluster Operation Chapter 17: Chassis Cluster Implementation Chassis Cluster Configuration Chassis Cluster Advanced Options Lab 13: Chassis Cluster Implementation Chapter 18: Chassis Cluster Troubleshooting Chassis Cluster Case Studies Troubleshooting Examples Lab 14: Chassis Cluster Troubleshooting Additional course details: Nexus Humans JSEC - Junos Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JSEC - Junos Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

JSEC - Junos Security
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Security engineers Security administrators Security architects Operations engineers Network engineers Network administrators Network or security technicians Network managers System designers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and administer the Cisco Email Security Appliance (ESA) Control sender and recipient domains Control spam with Talos SenderBase and anti-spam Use anti-virus and outbreak filters Use mail policies Use content filters Use message filters to enforce email policies Prevent data loss Perform LDAP queries Authenticate Simple Mail Transfer Protocol (SMTP) sessions Authenticate email Encrypt email Use system quarantines and delivery methods Perform centralized management using clusters Test and troubleshoot This course shows you how to deploy and use Cisco© Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA). Describing the Cisco Email Security Appliance Cisco Email Security Appliance Overview Technology Use Case Cisco Email Security Appliance Data Sheet SMTP Overview Email Pipeline Overview Installation Scenarios Initial Cisco Email Security Appliance Configuration Centralizing Services on a Cisco Administering the Cisco Email Security Appliance Distributing Administrative Tasks System Administration Managing and Monitoring Using the Command Line Interface (CLI) Other Tasks in the GUI Advanced Network Configuration Using Email Security Monitor Tracking Messages Logging Controlling Sender and Recipient Domains Public and Private Listeners Configuring the Gateway to Receive Email Host Access Table Overview Recipient Access Table Overview Configuring Routing and Delivery Features Controlling Spam with Talos SenderBase and Anti-Spam SenderBase Overview Anti-Spam Managing Graymail Protecting Against Malicious or Undesirable URLs File Reputation Filtering and File Analysis Bounce Verification Using Anti-Virus and Outbreak Filters Anti-Virus Scanning Overview Sophos Anti-Virus Filtering McAfee Anti-Virus Filtering Configuring the Appliance to Scan for Viruses Outbreak Filters How the Outbreak Filters Feature Works Managing Outbreak Filters Using Mail Policies Email Security Manager Overview Mail Policies Overview Handling Incoming and Outgoing Messages Differently Matching Users to a Mail Policy Message Splintering Configuring Mail Policies Using Content Filters Content Filters Overview Content Filter Conditions Content Filter Actions Filter Messages Based on Content Text Resources Overview Using and Testing the Content Dictionaries Filter Rules Understanding Text Resources Text Resource Management Using Text Resources Using Message Filters to Enforce Email Policies Message Filters Overview Components of a Message Filter Message Filter Processing Message Filter Rules Message Filter Actions Attachment Scanning Examples of Attachment Scanning Message Filters Using the CLI to Manage Message Filters Message Filter Examples Configuring Scan Behavior Preventing Data Loss Overview of the Data Loss Prevention (DLP) Scanning Process Setting Up Data Loss Prevention Policies for Data Loss Prevention Message Actions Updating the DLP Engine and Content Matching Classifiers Using LDAP Overview of LDAP Working with LDAP Using LDAP Queries Authenticating End-Users of the Spam Quarantine Configuring External LDAP Authentication for Users Testing Servers and Queries Using LDAP for Directory Harvest Attack Prevention Spam Quarantine Alias Consolidation Queries Validating Recipients Using an SMTP Server SMTP Session Authentication Configuring AsyncOS for SMTP Authentication Authenticating SMTP Sessions Using Client Certificates Checking the Validity of a Client Certificate Authenticating User Using LDAP Directory Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate Establishing a TLS Connection from the Appliance Updating a List of Revoked Certificates Email Authentication Email Authentication Overview Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing Verifying Incoming Messages Using DKIM Overview of Sender Policy Framework (SPF) and SIDF Veri?cation Domain-based Message Authentication Reporting and Conformance (DMARC) Verification Forged Email Detection Email Encryption Overview of Cisco Email Encryption Encrypting Messages Determining Which Messages to Encrypt Inserting Encryption Headers into Messages Encrypting Communication with Other Message Transfer Agents (MTAs) Working with Certificates Managing Lists of Certificate Authorities Enabling TLS on a Listener?s Host Access Table (HAT) Enabling TLS and Certi?cate Verification on Delivery Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services Using System Quarantines and Delivery Methods Describing Quarantines Spam Quarantine Setting Up the Centralized Spam Quarantine Using Safelists and Blocklists to Control Email Delivery Based on Sender Configuring Spam Management Features for End Users Managing Messages in the Spam Quarantine Policy, Virus, and Outbreak Quarantines Managing Policy, Virus, and Outbreak Quarantines Working with Messages in Policy, Virus, or Outbreak Quarantines Delivery Methods Centralized Management Using Clusters Overview of Centralized Management Using Clusters Cluster Organization Creating and Joining a Cluster Managing Clusters Cluster Communication Loading a Configuration in Clustered Appliances Best Practices Testing and Troubleshooting Debugging Mail Flow Using Test Messages: Trace Using the Listener to Test the Appliance Troubleshooting the Network Troubleshooting the Listener Troubleshooting Email Delivery Troubleshooting Performance Web Interface Appearance and Rendering Issues Responding to Alerts Troubleshooting Hardware Issues Working with Technical Support References Model Specifications for Large Enterprises Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch O?ces Cisco Email Security Appliance Model Specifications for Virtual Appliances

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)
Delivered OnlineFlexible Dates
Price on Enquiry