• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

806 Courses in Cardiff delivered Online

Time to Listen - Welfare Officer Training

4.5(2)

By Active Lancashire

Course Summary: This workshop is designed for Club Welfare Officers and it is highly recommended that attendees complete UK Coaching's Safeguarding and Protecting Children Workshop first. Are you new to the Welfare Officer role or has it been three years since you last attended a Time to Listen workshop? The 3 hour workshop covers the following and learners will be able to: Describe how a club welfare officer works with others to create a child centered environment. Explain how the club welfare officer role fits into the wider safeguarding environment. Apply learning to case studies including sharing good safeguarding practice.

Time to Listen - Welfare Officer Training
Delivered Online + more
£42

Business Contract Law

5.0(10)

By GBA Corporate

Overview The course provides fundamentals of business contracts and changes that took place in business contracts. It will train you with the skills to avoid contract drawbacks and understand the documents, agreements or letters of intent and carefully review them before you enter into a contract. It will also train you with the skills required to secure clauses in the contracts to protect your business and to draft effective contracts or even to negotiate amendments with the ultimate aim of protecting your business.

Business Contract Law
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Child Protection Officer Course: Protecting Children from Maltreatment

4.3(43)

By John Academy

Explore our Child Protection Officer Course, a comprehensive program dedicated to empowering individuals with the knowledge and skills needed to safeguard children from maltreatment. From understanding the basics of child protection to responding effectively to abuses, navigating the UK legal framework, and addressing allegations against staff, this course covers critical topics in child protection. Join us to become a proficient Child Protection Officer, contributing to the safety and well-being of children across diverse settings. Enroll now for a fulfilling journey towards creating safer environments for our most vulnerable members of society.

Child Protection Officer Course: Protecting Children from Maltreatment
Delivered Online On Demand2 hours 30 minutes
£23.99

Principles and Practices of Cyber Security

5.0(10)

By GBA Corporate

Overview Cyber Security plays an important role in every business as it encompasses everything that relates to protecting sensitive data, personal information, intellectual property, data, and governmental and industry information systems from theft and damage attempted by criminals and adversaries. This course is designed to understand and gain practical skills to plan, deliver and monitor IT/cyber security to internal and external clients understanding a complete, knowledge in the areas of IT policies, Security-Operational-Run-Book, security/penetration testing, ethical hacking and black hat hacking including understanding the basics of Kali Operating System and its tools and techniques. It will also cover WiFi security, Website security, human factors, cyber forensics, and cyber security team management, including all other areas in relation to Cyber Security.

Principles and Practices of Cyber Security
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Strategic Corporate Governance

5.0(10)

By GBA Corporate

Overview Governance is now acknowledged as a core business function. Governance is not simply about compliance - whether with the law, regulation or guidance. Compliance provides a company with its 'licence to operate, but high-quality systems of governance lead to better-run companies which create, grow and protect value for all their stakeholders Objective Learn the best strategies for building a high-quality governance framework Define the role of the board of directors and your role within Explore different governance models across the globe and identify which of them works best for your organisation Recognise and deliver your obligations as a director Learn the strategies for creating and protecting value for your organisation Explore the tools to protect your organisation's reputation and brand value Gain an understanding of governance as a business-critical function Manage governance function within different business contexts - listed, private, state-owned, family-owned businesses Master the strategies for improving board effectiveness

Strategic Corporate Governance
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Security Engineering on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for security engineers, security architects, and information security professionals. Overview Identify security benefits and responsibilities of using the AWS Cloud Build secure application infrastructures Protect applications and data from common security threats Perform and automate security checks Configure authentication and permissions for applications and resources Monitor AWS resources and respond to incidents Capture and process logs Create and configure automated and repeatable deployments with tools such as AMIs and AWS CloudFormation This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents. Prerequisites We recommend that attendees of this course have: Working knowledge of IT security practices and infrastructure concepts Familiarity with cloud computing concepts Completed AWS Security Essentials and Architecting on AWS courses 1 - Security on AWS Security in the AWS cloud AWS Shared Responsibility Model Incident response overview DevOps with Security Engineering 2 - Identifying Entry Points on AWS Identify the different ways to access the AWS platform Understanding IAM policies IAM Permissions Boundary IAM Access Analyzer Multi-factor authentication AWS CloudTrail 3 - Security Considerations: Web Application Environments Threats in a three-tier architecture Common threats: user access Common threats: data access AWS Trusted Advisor 4 - Application Security Amazon Machine Images Amazon Inspector AWS Systems Manager 5 - Data Security Data protection strategies Encryption on AWS Protecting data at rest with Amazon S3, Amazon RDS, Amazon DynamoDB Protecting archived data with Amazon S3 Glacier Amazon S3 Access Analyzer Amazon S3 Access Points 6 - Securing Network Communications Amazon VPC security considerations Amazon VPC Traffic Mirroring Responding to compromised instances Elastic Load Balancing AWS Certificate Manager 7 - Monitoring and Collecting Logs on AWS Amazon CloudWatch and CloudWatch Logs AWS Config Amazon Macie Amazon VPC Flow Logs Amazon S3 Server Access Logs ELB Access Logs 8 - Processing Logs on AWS Amazon Kinesis Amazon Athena 9 - Security Considerations: Hybrid Environments AWS Site-to-Site and Client VPN connections AWS Direct Connect AWS Transit Gateway 10 - Out-Of-Region Protection Amazon Route 53 AWS WAF Amazon CloudFront AWS Shield AWS Firewall Manager DDoS mitigation on AWS 11 - Security Considerations: Serverless Environments Amazon Cognito Amazon API Gateway AWS Lambda 12 - Threat Detection and Investigation Amazon GuardDuty AWS Security Hub Amazon Detective 13 - Secrets Management on AWS AWS KMS AWS CloudHSM AWS Secrets Manager 14 - Automation and Security by Design AWS CloudFormation AWS Service Catalog 15 - Account Management and Provisioning on AWS AWS Organizations AWS Control Tower AWS SSO AWS Directory Service

Security Engineering on AWS
Delivered OnlineFlexible Dates
£2,025

NCSP Foundation Certification Training

By IIL Europe Ltd

The NCSP® Foundation accredited (APMG International), certified (NCSC/GCHQ-UK) and recognized (DHS-CISA-USA) certification course introduces business, technology, auditing, and management professionals to the fundamentals of digital business, its risks, and the NIST Cybersecurity Framework's role in helping organizations manage and mitigate digital risk. This course also introduces candidates to an Affordable, Pragmatic, and Scalable Digital Value Management System (DVMS) Create, Protect, and Deliver (CPD) model designed to enable any size organization to quickly adopt and adapt the frameworks and models (NIST-CSF, NIST Privacy Framework, CMMC, etc.) that may be required to address internal, external (regulatory) and cyber threat landscape changes. The DVMS enables enterprises to become adaptive, cyber-resilient organizations capable of creating, protecting, and delivering trusted digital business value to their stakeholders.

NCSP Foundation Certification Training
Delivered OnlineFlexible Dates
£995 to £2,195

Hyper V for engineers

5.0(3)

By Systems & Network Training

Hyper V for engineers training course description This five day course will provide you with the knowledge and skills required to design and implement Microsoft Server Virtualization solutions using Hyper-V and System Center. Please note that due to the nature of the lab / environment build delegates may be required to work in pairs. What will you learn Install and configure the Hyper-V server role. Create virtual machines, create and manage virtual hard disks and work with snapshots. Create and configure virtual machine networks in a Hyper-V environment. Provide high availability for Hyper-V environment by implementing failover clustering. Use System Center 2012 R2 Virtual Machine Manager. Create and manage virtual machines by using VMM. Hyper V for engineers training course details Who will benefit: Anyone designing, implementing, managing and maintaining a virtualization infrastructure. Prerequisites: Supporting Windows server 2012 Duration 5 days Hyper V for engineers training course contents Evaluating the environment for virtualization Overview of Microsoft virtualization, Overview of system center 2012 R2 components, Evaluating current environment for virtualization, Extending virtualization to the cloud environment. Selecting the appropriate virtualization method, Assessing the environment by using MAP. Installing and configuring the Hyper-V role Installing the Hyper-V role, Managing Hyper-V, Configuring Hyper-V settings, Hyper-V Host storage and networking, Installing the Hyper-V server role, Configuring Hyper-V settings, Accessing and managing Hyper-V remotely. Creating and managing virtual hard disks, virtual machines, and checkpoints Creating and configuring virtual hard disks, Creating and configuring virtual machines, Installing and Importing virtual machines, Managing virtual machine checkpoints, Monitoring Hyper-V, Designing virtual machines for server roles and services, Creating and managing virtual hard disks, Creating and managing virtual machines, Importing virtual machines and working with checkpoints monitoring Hyper-V. Creating and configuring virtual machine networks Creating and using Hyper-V virtual switches, Advanced Hyper-V networking features, Configuring and using Hyper-V network virtualization, Creating and using Windows Server 2012 R2 Hyper-V virtual switches, Configuring and using advanced virtual switch features, Configuring Hyper-V Network virtualization. Virtual machine movement and Hyper-V replica Providing high availability and redundancy for virtualization, Implementing virtual machine movement, Implementing and managing Hyper-V replica, Moving Hyper-V storage and virtual machines, Configuring and managing Hyper-V replica. Implementing failover clustering with Hyper-V Overview of failover clustering, Configuring and using shared storage, Implementing and managing failover clustering with Hyper-V, Creating a Hyper-V failover cluster, Managing a Hyper-V failover cluster. Installing and configuring System Center 2012 R2 virtual machine manager Integrating system center and server virtualization, Overview of VMM, Installing VMM, Adding hosts and managing host groups, Installing and configuring System Center 2012 R2 VMM, Managing hosts and host groups. Managing the Networking and storage infrastructure in System Center 2012 R2 VMM Managing networking infrastructure managing storage infrastructure, Managing infrastructure updates, Implementing a network infrastructure, Implementing a storage infrastructure, Managing infrastructure updates. Creating and managing VM using MS System Center 2012 R2 VMM VMM tasks in VMM, Creating, cloning, and converting VMs, Overview of VM updating, Creating a VM and modifying it's properties, Cloning a VM. Configuring and managing the MS System Center 2012 R2 VMM library and library objects Overview of the VMM library, Working with profiles and templates, Configuring and managing the VMM library, Creating and managing profiles and templates. Managing clouds in MS System Center 2012 R2 VMM Introduction to clouds, Creating and managing a cloud, Working with user roles in VMM, Creating a cloud, Working with user roles, Deploying VMs to a private cloud. Managing services in MS System Center 2012 R2 VMM and app controller Understanding services in VMM, Creating and managing services in VMM, Using app controller Creating a service template, Deploying a service and updating a service template, Configuring app controller, Deploying a VM in app controller. Protecting and monitoring virtualization infrastructure Overview of backup and restore options for VM, Protecting virtualization Infrastructure using DPM, Using Operations Manager for monitoring and reporting, Integrating VMM with Operations Manager, Implementing MS System Center 2012 R2 Operations Manager agents, Configuring Operations Manager monitoring components, Configuring Operations Manager integration with System Center 2012 R2 VMM.

Hyper V for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Safeguarding for Teachers

By OnlineCoursesLearning.com

Protecting for Teachers Finding out about protecting for instructors is fundamental for all teachers to guarantee the security and prosperity of the understudies for whom they are capable. Understudies, all things considered, and in all instructive offices reserve the option to security, and educators have a fundamental task to carry out in guaranteeing that wellbeing. We will start by learning the objectives of protecting and examining what educators need to know to guarantee their understudies' wellbeing. At that point, we will zero in on the best way to spot early notice signs and recognize and secure the high-hazard understudy gatherings. We will likewise take an inside and out take a gander at the various kinds of misuse and disregard and how instructors can remember them and give help to those understudies out of luck, utilizing the assets and frameworks that are accessible to them. At last, we build up the systems needed for successful activity and give a bit by bit control for educators to handle the different degrees of risk that understudies face. This is a definitive manual for defending for instructors! What You Will Learn: The objectives of defending and what educators need to know and do to protect understudies Instructions to distinguish early notice signs and the high-hazard understudy gatherings The various sorts of misuse and disregard and how to remember them Building up the security systems and a bit by bit manual for making a move at different levels The Benefits of Taking This Course: You will guarantee the wellbeing of your understudies and conceivably save lives You will comprehend the school's obligations and give master guidance to the central participants You will interface profoundly and adequately with your understudies and their families You will enjoy harmony of brain with regards to being genuinely answerable for youthful lives

Safeguarding for Teachers
Delivered Online On Demand
£50

Safeguarding Vulnerable Adults

By OnlineCoursesLearning.com

Safeguarding Vulnerable Adults As society ages, and progressions in clinical medicines guarantee longer life expectancies, the danger of grown-ups being helpless against misuse, disregard, and abuse increments. This is the reason protecting weak grown-ups is significant, on both an individual level and a local area level. It is essential to learn and comprehend the various kinds of misuse that weak grown-ups may confront, how to recognize these sorts of misuse, and how to keep them from happening. Individuals who set aside the effort to find out about how to defend weak grown-ups advantage by figuring out how to secure a weak piece of society and guarantee that it gets ideal consideration. In this course, we will broadly expound on how great protecting contrasts from poor defending and patient consideration, the various sorts of misuse, and what makes up each kind of misuse. We start by clarifying the contrasts among great and terrible protecting techniques. Then, we clarify the various kinds of misuse, how to detect the different types of misuse and the advantages of good shielding rehearses. At last, we give a few stages to assist you with defending weak grown-ups and offer tips and counsel on what to do.   You Will Learn with this Online Course: The importance of safeguarding vulnerable adult patients The types of abuse and neglect How to spot and prevent these types of abuse The benefits of good safeguarding methods and tips to help improve safeguarding practices in various healthcare settings   Video Review about Adult Safeguarding   The Benefits of Taking This Course: You will see how certain groups are often harmed You will learn how to assess and prevent these types of abuse You will be able to determine how to implement good safeguarding practices You will learn the importance of patients' rights

Safeguarding Vulnerable Adults
Delivered Online On Demand
£50