• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

18041 Courses in Cardiff delivered Online

SEN Teaching

4.7(160)

By Janets

Discover the rewarding world of SEN teaching with comprehensive resources and insights. Explore effective strategies, inclusive learning techniques, and specialized support for students with special educational needs. Unlock the keys to creating an inclusive and supportive classroom environment for diverse learners. Whether you're a seasoned SEN teacher or just starting your journey, find valuable tips and resources to enhance your impact in the realm of special education.

SEN Teaching
Delivered Online On Demand1 hour
£9.99

Child & Adult Speech & Language Disorders Training

4.7(160)

By Janets

Unlock the keys to effective communication with our comprehensive Child & Adult Speech & Language Disorders Training. Equip yourself with the latest insights and techniques to address a range of speech and language challenges in both children and adults. Elevate your expertise, enhance therapeutic approaches, and make a positive impact on lives. Enroll now for a transformative learning experience in the field of speech and language disorders.

Child & Adult Speech & Language Disorders Training
Delivered Online On Demand1 hour
£9.99

Advanced sales negotiation skills (In-House)

By The In House Training Company

The 'golden rule' of negotiation is simple - don't! But life's rarely that simple and very often we do have to negotiate, particularly if we want to win the business and especially if we want to win it on our terms. Such negotiations are crucial. We need to prepare for them. We need a strategy, and the skills to execute it. Does your team have a structured approach? Is it flawlessly executed, every time? Or is there room for improvement? This programme will help them master the six fundamentals of closing better business: Manage all these elements well and you will win more business, more profitably. This course will help participants: Negotiate from a position of partnership, not competition Deal more effectively and profitably with price objections Identify and practise successful sales negotiating skills Identify strengths and weaknesses as a sales negotiator Understand different types of buyer behaviour Learn to recognise negotiating tactics and stances Apply a new and proven structure to their business negotiations Identify and adapt for different behavioural styles Be alert to unconscious (non-verbal) communication Prepare and present a proposal at a final business negotiation stage Project confidence and exercise assertiveness in all sales negotiations 1 Planning for successful business negotiations This session introduces the concept of business negotiation and looks at its importance in the context of the participants' roles and activities. It briefly examines why we negotiate and the dynamics involved. Session highlights: What kind of a negotiator are you? Negotiation skills self-assessment and best practice How to establish roles and responsibilities for both parties How to identify and set objectives for both buyer and seller How to research and establish the other person's position (business negotiation stance) 2 How to structure your negotiations This module presents an eight-step framework or structure for use in negotiations and considers how best to prepare and plan your negotiations within the context of a supplier/customer relationship or business cycle. It also includes a brief review of legal responsibilities and what constitutes a 'deal'. Session highlights: Learn and apply a formal structure to use when negotiating How to establish short- and longer-term objectives and opportunities How best to plan, prepare and co-ordinate a major business negotiation meeting, or on-going negotiations Understanding of basic legal and organisational requirements 3 Verbal negotiation skills This session examines the human and communication dynamics inherent in any negotiation situation. It emphasises the importance of professional skills in preparing for a negotiation by identifying needs, wants and requirements accurately and by qualifying the competitive and organisational influences present. Session highlights: How to fully 'qualify' the other party's needs, requirements and constraints during the negotiation process by using advanced questioning and listening skills How to pre-empt negotiation objections by promoting and gaining commitment to options, benefits, value and solutions How best to propose and suggest ideas, using drawing-out skills 4 Non-verbal negotiation skills This module highlights how different personal styles, corporate cultures and organisation positions can influence events, and demonstrates practical methods for dealing with and controlling these factors. It also examines key principles of body language and non-verbal communication in a practical way. Session highlights: Gaining rapport and influencing unconsciously Understanding the importance of non-verbal communication; reading other people's meaning and communicating effectively as a result Ensure that non-verbal behaviour is fully utilised and observed to create maximum impact and monitor progress (eg, buying signals) Recognising that business negotiations are precisely structured and agreements gained incrementally 5 Proposing and 'packaging' This session highlights how best to present and package your proposal. It looks at how to pre-empt the need for negotiating by creating minor-options and 'bargaining' points, as well as how to manage the expectations and perceptions of the customer or buyer. Session highlights: How to identify the key variables that can be negotiated The power and use of 'authority' within your negotiations How to structure and present your proposal, ideas or quotation to best effect The importance of when and how to identify and influence buyer's objections 6 Dealing with price This module highlights how to best present and package price within your proposal or negotiation. In most cases, price has more to do with psychology than affordability and preparation and careful handling are essential. Session highlights: The three reasons that people will pay your asking price How to set price in a competitive market The key differences between selling and negotiating Ten ways to present price more effectively and persuasively 7 Getting to 'Yes': tactics and strategies There are many different tactics and strategies common to successful negotiators. This session looks at those that are most appropriate to the participants' own personal styles and situations. The importance of 'follow-through' is also explained and how to deal with protracted or 'stale-mate' business negotiations. Session highlights: How to negotiate price and reduce discounting early in the process How to recognise negotiating tactics and strategies in your customer or supplier Key strategies, techniques and tactics to use in negotiation The importance of follow-through and watching the details How to deal with stalled business negotiations or competitor 'lock-out' 8 Case studies and review This session examines a number of different situations and participants discuss ways to approach each. This will allow learning to be consolidated and applied in a very practical way. There will also be a chance to have individual points raised in a question and answer session. Session highlights: Case studies Question and answer Planning worksheet Negotiation 'toolkit' and check-list 9 Personal action plans Session highlights: Identify the most important personal learning points from the programme Highlight specific actions and goals Flag topics for future personal development and improvement

Advanced sales negotiation skills (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Criminology, Profiling & Forensic

4.7(160)

By Janets

Explore the intricate world of criminology, profiling, and forensic science. Uncover the mysteries behind criminal behavior, delve into the art of profiling, and discover the cutting-edge techniques used in forensic investigations. From understanding crime patterns to decoding forensic evidence, embark on a journey that unravels the complexities of the criminal mind. Explore the intersection of science and justice in this captivating exploration of criminology, profiling, and forensic science.

Criminology, Profiling & Forensic
Delivered Online On Demand3 weeks
£9.99

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou

Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry

Digital Photography

4.7(160)

By Janets

Explore the world of digital photography with expert insights, tips, and techniques. Discover how to capture stunning moments, master camera settings, and unleash your creativity. Dive into the art and science of digital photography to elevate your skills and create visually captivating images. Unleash the potential of your camera and embark on a journey of visual storytelling in the digital realm. Elevate your photography game with our comprehensive guide to digital photography.

Digital Photography
Delivered Online On Demand1 hour
£9.99

Nail Art, Design And Manicure

4.7(160)

By Janets

Explore the latest trends in nail art, design, and manicure techniques. Discover expert tips, creative ideas, and step-by-step tutorials to elevate your nail game. Whether you're a nail enthusiast or a professional manicurist, find inspiration and guidance for stunning nail designs that make a statement. Dive into the world of nail artistry with our comprehensive resources and stay ahead of the curve in the ever-evolving realm of beautiful nails.

Nail Art, Design And Manicure
Delivered Online On Demand14 days
£9.99

Coaching And Mentoring Diploma

4.7(160)

By Janets

Unlock your full potential with our Coaching and Mentoring Diploma. Gain essential skills to guide, inspire, and empower others on their journey to success. This comprehensive program equips you with practical tools and techniques to become a proficient coach and mentor. Elevate your leadership capabilities and make a positive impact in both personal and professional spheres. Enroll now to embark on a transformative learning experience and chart a course for meaningful mentorship and coaching.

Coaching And Mentoring Diploma
Delivered Online On Demand14 days
£9.99

VMware vSAN: Install, Configure, Manage [V8]

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Storage and virtual infrastructure consultants, solution architects, and administrators who are responsible for production support and administration of VMware vSAN 8.0. Overview By the end of the course, you should be able to meet the following objectives: Describe vSAN concepts Detail the underlying vSAN architecture and components Explain the key features and use cases for vSAN Identify requirements and planning considerations for vSAN clusters Explain the importance vSAN node hardware compatibility Describe the different vSAN deployment options Explain how to configure vSAN fault domains Detail how to define and create a VM storage policy Discuss the impact of vSAN storage policy changes Detail vSAN resilience and data availability Describe vSAN storage space efficiency Explain how vSAN encryption works Detail VMware HCI Mesh™ technology and architecture Detail vSAN File Service architecture and configuration Describe how to setup a stretched and a two-node vSAN cluster Describe vSAN maintenance mode and data evacuation options Define the steps to shut down a vSAN cluster for maintenance Explain how to use proactive tests to check the integrity of a vSAN cluster Use VMware Skyline Health™ for monitoring vSAN health Use VMware Skyline Health to investigate and help determine failure conditions Discuss vSAN troubleshooting best practices Describe vSAN Express Storage Architecture™ concepts During this course, you will gain the knowledge, skills, and tools to plan and deploy a VMware vSAN? cluster. You will learn about managing and operating vSAN. This course focuses on building the required skills for common Day-2 vSAN administrator tasks such as vSAN node management, cluster maintenance, security operations, troubleshooting and advanced vSAN cluster operations. You will learn these skills through the completion of instructor-led activities and hands-on lab exercises. Course Introduction Introduction and course logistics Course objectives Introduction to vSAN Describe vSAN architecture Describe the vSAN software components: CLOM, DOM, LSOM, CMMDS, and RDT Identify vSAN objects and components Describe the advantages of object-based storage Describe the difference between All-Flash and Hybrid vSAN architecture Explain the key features and use cases for vSAN Discuss the vSAN integration and compatibility with other VMware technologies Planning a vSAN Cluster Identify requirements and planning considerations for vSAN clusters Apply vSAN cluster planning and deployment best practices Determine and plan for storage consumption by data growth and failure tolerance Design vSAN hosts for operational needs Identify vSAN networking features and requirements Describe ways of controlling traffic in a vSAN environment Recognize best practices for vSAN network configurations Deploying a vSAN Cluster Recognize the importance of hardware compatibility Ensure the compatibility of driver and firmware versioning Use tools to automate driver validation and installation Apply host hardware settings for optimum performance Use VMware vSphere© Lifecycle ManagerTM to perform upgrades Deploy and configure a vSAN Cluster using the Cluster QuickStart wizard Manually configure a vSAN Cluster using VMware vSphere© Client? Explain and configure vSAN fault domains Using VMware vSphere© High Availability with vSAN Understand vSAN Cluster maintenance capabilities Describe the difference between implicit and explicit fault domains Create explicit fault domains vSAN Storage Policies Describe a vSAN object Describe how objects are split into components Explain the purpose of witness components Explain how vSAN stores large objects View object and component placement on the vSAN datastore Explain how storage policies work with vSAN Define and create a virtual machine storage policy Apply and modify virtual machine storage policies Change virtual machine storage policies dynamically Identify virtual machine storage policy compliance status vSAN Resilience and Data Availability Describe and configure the Object Repair Timer advanced option Plan disk replacement in a vSAN cluster Plan maintenance tasks to avoid vSAN object failures Recognize the importance of managing snapshot utilization in a vSAN cluster Managing vSAN Storage Space Efficiency Discuss deduplication and compression techniques Understand deduplication and compression overhead Discuss compression only mode Configure erasure coding Configure swap object thin provisioning Discuss reclaiming storage space with SCSI UNMAP Configure TRIM/UNMAP vSAN Security Operations Identify differences between VM encryption and vSAN encryption Perform ongoing operations to maintain data security Describe the workflow of data-in transit encryption Identify the steps involved in replacing Key Management Server vSAN HCI Mesh Understand the purpose of vSAN HCI Mesh Detail vSAN HCI Mesh technology and architecture Perform mount and unmount of a remote datastore vSAN File Service and iSCSI Target Service Understand the purpose of vSAN File Services Detail vSAN File Services architecture Configure vSAN File Shares Describe vSAN iSCSI Target Service vSAN Stretched and Two Node Clusters Describe the architecture and uses case for stretched clusters Detail the deployment and replacement of a vSAN witness node Describe the architecture and uses case for two-node clusters Explain storage policies for vSAN stretched cluster vSAN Cluster Maintenance Perform typical vSAN maintenance operations Describe vSAN maintenance modes and data evacuation options Assess the impact on cluster objects of entering maintenance mode Determine the specific data actions required after exiting maintenance mode Define the steps to shut down and reboot hosts and vSAN clusters Use best practices for boot devices Replace vSAN nodes vSAN Cluster Monitoring Describe how the Customer Experience Improvement Program (CEIP) enables VMware to improve products and services Use VMware Skyline Health for monitoring vSAN cluster health Manage alerts, alarms, and notifications related to vSAN in VMware vSphere© Client? Create and configure custom alarms to trigger vSAN health issues Use IOInsight metrics for monitoring vSAN performance Use a vSAN proactive test to detect and diagnose cluster issues vSAN Troubleshooting Use a structured approach to solve configuration and operational problems Apply troubleshooting methodology to logically diagnose faults and optimize troubleshooting efficiency Use VMware Skyline Health to investigate and help determine failure conditions Explain which log files are useful for vSAN troubleshooting vSAN Express Storage Architecture Understand the purpose of vSAN Express Storage Architecture Describe the vSAN Express Storage Architecture components Identify Storage Policy differences Understand compression and encryption operation differences

VMware vSAN: Install, Configure, Manage [V8]
Delivered OnlineFlexible Dates
Price on Enquiry

Dealing with Troubled Children Diploma

4.7(160)

By Janets

Gain the essential skills and knowledge to make a positive impact on troubled children's lives with our comprehensive 'Dealing with Troubled Children Diploma.' This specialized program equips you with proven strategies, practical insights, and empathy-driven techniques to effectively address behavioral challenges in children. Enroll now to empower yourself with the tools needed to create a supportive and nurturing environment, fostering emotional well-being and positive development for children facing difficulties. Make a difference in their lives by earning your diploma today.

Dealing with Troubled Children Diploma
Delivered Online On Demand10 hours
£9.99