• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3212 Courses in Cardiff delivered Online

RESILIA Foundation: In-House Training

By IIL Europe Ltd

RESILIA™ Foundation: In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls

RESILIA Foundation: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

Better Business Cases Foundation: In-House Training

By IIL Europe Ltd

Better Business Cases™ Foundation: In-House Training: In-House Training Better Business Cases™ is based on the Five Case Model - which is the UK government's best practice approach to structuring spending proposals and making effective business decisions. Using this best practice approach will allow organizations to reduce unnecessary spending and improve the decision-making process which gives you a greater chance of securing necessary funding and support for initiatives. The goal of the foundation course is to enable participants to work effectively with a team to develop a strong business case in their work environment. What You Will Learn At the end of this program, you will be able to: Describe the philosophy and the underlying rationale of the Five Case Model Identify different types of business case, their purpose, who is responsible for them Recognize when the different types are required in the development of a spending proposal Develop the business case in relation to other recognized and recommended best practices for programme and project management Overview of the Five Case Model Five key components of a business case and the order in which they are presented Three key stages in the development of a spending proposal Definition of a programme / project and the key differences between programmes and projects Purpose of a Business Justification Case (BJC) and in what circumstances it should be considered Purpose of a Strategic Outline Case (SOC) Purpose of an Outline Business Case (OBC) Purpose of a Full Business Case (FBC) Relationship between policies, strategies, programmes, and projects and their deliverables Developing the Strategic Case Purpose and core content of a Strategic Case Purpose of SMART robust spending objectives and the key objectives for spend: economy, efficiency, effectiveness, re-procurement, and statutory or regulatory compliance Four main categories of benefits criteria and the parties involved in their development Three key categories of risk Purpose of identifying constraints and dependencies Difference between direct and indirect benefits Developing the Economic Case Purpose and core content of an Economic Case Purpose of critical success factors and the key critical success factors based upon the Five Case Model Purpose of the long list options and how to generate options and undertake SWOT analysis Minimum of four short-list options, how they are derived, and what they should include (Reference Project / Public Sector Comparator [PSC]) Difference between the preferred way forward and the preferred option Purpose, objectives, key participants, and outputs of Workshop Stage 2 - identifying and assessing the options Rules that should be followed for the treatment of costs and benefits Key differences between economic appraisals and financial appraisals Factors considered when selecting the preferred option Developing the Commercial Case Purpose and core content of a Commercial Case Guiding principles when apportioning risk between the contractual parties Purpose of payment mechanisms Purpose of Step 9 in the development framework: Contracting for the deal Developing the Financial Case Purpose and core content of a Financial Case The financial statements required for all projects The possible impacts to consider Developing the Management Case Purpose and core content of a Management Case Purpose of a programme / project management strategy, framework, and plan Purpose of a change management strategy, framework, and plan Purpose of a benefits realization strategy, framework, and register / plan Purpose of a risk management strategy, framework and register / plan Purpose of a post programme / project evaluation strategy, framework, and plan

Better Business Cases Foundation: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

INTERNATIONAL TRADE

By Export Unlocked Limited

Introduction to International Trade This module provides a foundational understanding of the development and significance of international trade, focusing on the UK's trade strategy and its global role. Participants will explore key topics such as trade definitions, the World Trade Organization (WTO), the evolution of customs, and major post-WW2 trade developments. Additionally, the module covers the UK's entry into and exit from the EU, and the current UK Digital Strategy for International Trade. **Agenda Highlights**: - Definitions and importance of international trade - Overview of the WTO - Customs fundamentals - Post-WW2 global trade growth - Impact of EU membership and Brexit - UK Digital Strategy for international trade growth

INTERNATIONAL TRADE
Delivered OnlineFlexible Dates
£395

Tax Strategy: Financial Planning for Beginners

4.3(43)

By John Academy

Explore the intricacies of tax strategy and financial planning for beginners in this comprehensive course. From income tax to VAT, gain insights into key topics like accounting, capital gains tax, and self-assessment. Master tax compliance and optimize your financial decisions with expert guidance. Start planning your financial future today!

Tax Strategy: Financial Planning for Beginners
Delivered Online On Demand2 hours 30 minutes
£23.99

RESILIA Foundation: Virtual In-House Training

By IIL Europe Ltd

RESILIA™ Foundation: Virtual In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls

RESILIA Foundation: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,850

Better Business Cases Foundation: Virtual In-House Training

By IIL Europe Ltd

Better Business Cases™ Foundation: Virtual In-House Training Better Business Cases™ is based on the Five Case Model - which is the UK government's best practice approach to structuring spending proposals and making effective business decisions. Using this best practice approach will allow organizations to reduce unnecessary spending and improve the decision-making process which gives you a greater chance of securing necessary funding and support for initiatives. The goal of the foundation course is to enable participants to work effectively with a team to develop a strong business case in their work environment. What You Will Learn At the end of this program, you will be able to: Describe the philosophy and the underlying rationale of the Five Case Model Identify different types of business case, their purpose, who is responsible for them Recognize when the different types are required in the development of a spending proposal Develop the business case in relation to other recognized and recommended best practices for programme and project management Overview of the Five Case Model Five key components of a business case and the order in which they are presented Three key stages in the development of a spending proposal Definition of a programme / project and the key differences between programmes and projects Purpose of a Business Justification Case (BJC) and in what circumstances it should be considered Purpose of a Strategic Outline Case (SOC) Purpose of an Outline Business Case (OBC) Purpose of a Full Business Case (FBC) Relationship between policies, strategies, programmes, and projects and their deliverables Developing the Strategic Case Purpose and core content of a Strategic Case Purpose of SMART robust spending objectives and the key objectives for spend: economy, efficiency, effectiveness, re-procurement, and statutory or regulatory compliance Four main categories of benefits criteria and the parties involved in their development Three key categories of risk Purpose of identifying constraints and dependencies Difference between direct and indirect benefits Developing the Economic Case Purpose and core content of an Economic Case Purpose of critical success factors and the key critical success factors based upon the Five Case Model Purpose of the long list options and how to generate options and undertake SWOT analysis Minimum of four short-list options, how they are derived, and what they should include (Reference Project / Public Sector Comparator [PSC]) Difference between the preferred way forward and the preferred option Purpose, objectives, key participants, and outputs of Workshop Stage 2 - identifying and assessing the options Rules that should be followed for the treatment of costs and benefits Key differences between economic appraisals and financial appraisals Factors considered when selecting the preferred option Developing the Commercial Case Purpose and core content of a Commercial Case Guiding principles when apportioning risk between the contractual parties Purpose of payment mechanisms Purpose of Step 9 in the development framework: Contracting for the deal Developing the Financial Case Purpose and core content of a Financial Case The financial statements required for all projects The possible impacts to consider Developing the Management Case Purpose and core content of a Management Case Purpose of a programme / project management strategy, framework, and plan Purpose of a change management strategy, framework, and plan Purpose of a benefits realization strategy, framework, and register / plan Purpose of a risk management strategy, framework and register / plan Purpose of a post programme / project evaluation strategy, framework, and plan

Better Business Cases Foundation: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,850

Certified Information Security Manager (CISM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification. Overview Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Identify and manage information security risks to achieve business objectives. Create a program to implement the information security strategy. Implement an information security program. Oversee and direct information security activities to execute the information security program. Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents. In this course, students will establish processes to ensure that information security measures align with established business needs. Prerequisites Information security governance Information risk management Information security program development Information security program management Incident management and response 1 - Information Security Governance Develop an Information Security Strategy Align Information Security Strategy with Corporate Governance Identify Legal and Regulatory Requirements Justify Investment in Information Security Identify Drivers Affecting the Organization Obtain Senior Management Commitment to Information Security Define Roles and Responsibilities for Information Security Establish Reporting and Communication Channels 2 - Information Risk Management Implement an Information Risk Assessment Process Determine Information Asset Classification and Ownership Conduct Ongoing Threat and Vulnerability Evaluations Conduct Periodic BIAs Identify and Evaluate Risk Mitigation Strategies Integrate Risk Management into Business Life Cycle Processes Report Changes in Information Risk 3 - Information Security Program Development Develop Plans to Implement an Information Security Strategy Security Technologies and Controls Specify Information Security Program Activities Coordinate Information Security Programs with Business Assurance Functions Identify Resources Needed for Information Security Program Implementation Develop Information Security Architectures Develop Information Security Policies Develop Information Security Awareness, Training, and Education Programs Develop Supporting Documentation for Information Security Policies 4 - Information Security Program Implementation Integrate Information Security Requirements into Organizational Processes Integrate Information Security Controls into Contracts Create Information Security Program Evaluation Metrics 5 - Information Security Program Management Manage Information Security Program Resources Enforce Policy and Standards Compliance Enforce Contractual Information Security Controls Enforce Information Security During Systems Development Maintain Information Security Within an Organization Provide Information Security Advice and Guidance Provide Information Security Awareness and Training Analyze the Effectiveness of Information Security Controls Resolve Noncompliance Issues 6 - Incident Management and Response Develop an Information Security Incident Response Plan Establish an Escalation Process Develop a Communication Process Integrate an IRP Develop IRTs Test an IRP Manage Responses to Information Security Incidents Perform an Information Security Incident Investigation Conduct Post-Incident Reviews

Certified Information Security Manager (CISM)
Delivered OnlineFlexible Dates
£1,995

PMI-RMP Exam Prep: In-House Training

By IIL Europe Ltd

PMI-RMP® Exam Prep: In-House Training This course is aimed at preparing the participant to pass the PMI-RMP® (Risk Management Professional) exam. The course will also provide practical tips and tools that can be used in any organization's project management risk practices. In this expanded session, you will also have time to practice your exam taking skills with coaching from a credentialed instructor. The course includes the tool RMP-IQ, with sample exam questions to practice for the exam and allow participants to see their knowledge level in the various domains. What You Will Learn At the end of this course, participants will be able to: Explain the value and benefits of the PMI-RMP® credential Perform a self-assessment of your knowledge and skills Prepare a study plan that will allow you to pass the exam Foundation Concepts The Risk Management Professional (PMI-RMP®) Exam PMI's Standard for Risk Management Portfolios, Programs and Projects Key risk definitions Risk management life cycle Levels of Risk Management Enterprise Risk Management Portfolio Risk Management Program Risk Management Project Risk Management Risk Strategy and Planning: Part 1 Task 1: Perform a preliminary document analysis Task 2: Assess project environment for threats and opportunities Task 3: Confirm risk thresholds based on risk appetites Risk Strategy and Planning: Part 2 Task 4: Establish risk management strategy Task 5: Document the risk management plan Task 6: Plan and lead risk management activities with stakeholders Agile, programs, and portfolio aspects of risk strategy and planning Risk Identification: Part 1 Objectivity and bias Task 1: Conduct risk identification exercises Risk Identification: Part 2 Task 2: Examine assumption and constraint analysis Task 3: Document risk triggers and thresholds based on context / environment Task 4: Develop risk register Agile, programs, and portfolio aspects of risk identification Risk Analysis: Part 1 Task 1: Perform qualitative analysis Risk analysis in an agile environment Risk Analysis: Part 2 Task 2: Perform quantitative analysis Task 3: Identify threats and opportunities Program and portfolio aspects of risk analysis Risk Response Task 1: Plan risk responses Agile, programs, and portfolio aspects of risk response planning Task 2: Implement risk responses Monitor and Close Risks: Part 1 Task 1: Gather and analyze performance data Monitor and Close Risks: Part 2 Task 2: Monitor residual and secondary risks Task 4: Monitor project risk levels Task 3: Provide information required to update relevant project documents Agile, programs, and portfolio aspects of monitoring and closing risks

PMI-RMP Exam Prep: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

LEVEL 4 ENDORSED CERTIFICATION DIPLOMA

By Export Unlocked Limited

Level 4 Endorsed Diploma - International Trade Qualification Complete all 15 modules and 3 assessments, from a choice of 7 to earn a Level 4 Diploma in International Trade.

LEVEL 4 ENDORSED CERTIFICATION DIPLOMA
Delivered OnlineFlexible Dates
£3,995

Digital Transformation: Things to Consider Before Making Changes

5.0(1)

By Enspark

How well do you know your client base? How can upgrading your technology or digitally streamlining serve them? Some companies undergo a digital transformation beginning with reviewing software and then growing frustrated when the impact is hard to find. This microlearning video outlines how to achieve the best results for your customers and organization by starting with exploring intended outcomes. This video is great for anyone involved in strategic planning at your organization. Length: 3:56 Length: 4:21 Learning Objectives Examine the importance of comprehensive audience research, eliminating assumptions and gaining a deep understanding of client behaviors and preferences, to lay the foundation for a data-driven digital transformation strategy.;Articulate clear and strategic objectives, addressing how digital transformation can advance overall business objectives and enhance customer engagement and experiences.;Shift the focus from technology to user impact, emphasizing the significance of reducing costs, saving time, and delivering superior customer experiences in the digital transformation strategy formulation.

Digital Transformation: Things to Consider Before Making Changes
Delivered Online On Demand7 minutes
£4.95