• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2080 Courses in Cardiff delivered Online

SNV1 IBM SAN Volume Controller (SVC) Planning and Implementation Workshop

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This intermediate course is for: Individuals who are assessing and/or planning to deploy storage network virtualization solutions Overview Create an implementation task list to integrate the SVC solution into the storage network fabric Establish or update zoning policies to enable the SVC to control storage device access and facilitate storage provisioning to host servers Utilize SVC user interfaces to manage the networked storage environment, assign storage to servers, migrate data, replicate data across storage systems, and monitor storage access activities Assess issues related to coexistence between the SVC and native disk storage access across host servers Migrate existing data to the virtualized SVC environment Implement SVC storage efficiency solutions including Easy Tier, Thin Provisioning, Volume Mirroring, and Real-time Compression Implement data replication services including FlashCopy and Remote Copy Leverage networked storage connectivity by integrating a layer of intelligence - the SAN Volume Controller (SVC) - to facilitate storage application data access independence from storage management functions and requirements ...and more. Introducing the SAN Volume Controller Storage provisioning with the SAN Volume Controller SAN Volume Controller clustering environment SVC Cluster Setup and Storage Provisioning SVC physical environment and management interfaces Storage systems and LUN assignments to SVC Cluster creation and storage provisioning Additional functions: Quorum disks, expand/shrink volumes, MDisk removal, MDisk multipathing Fabric Zoning, Non Disruptive Volume Move, and iSCSI Connectivity Host to SVC volume access infrastructure Fibre Channel host to SVC SAN fabric zoning Non Disruptive Volume Move (NDVM) iSCSI host to SVC IP connectivity Easy Tier, Thin Provisioning, Volume Mirroring, and Real-time Compression Easy Tier Thin Provisioning Volume Mirroring Real-time Compression and the Comprestimator Data Migration Pool Migration Migration Wizards (Import, Migration, Export) Storage system replacement Copy Services: FlashCopy and Remote Copy FlashCopy Remote Copy: Metro Mirror Copy Services: FlashCopy and Remote Copy FlashCopy Remote Copy: Metro Mirror Remote Copy: Global Mirror and Global Mirror with change volumes Managing the SVC Environment Logging and Directed Maintenance Procedures Code upgrades and node replacement Remote user authentication SVC configuration backup Additional course details: Nexus Humans SNV1 IBM SAN Volume Controller (SVC) Planning and Implementation Workshop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SNV1 IBM SAN Volume Controller (SVC) Planning and Implementation Workshop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SNV1 IBM SAN Volume Controller (SVC) Planning and Implementation Workshop
Delivered OnlineFlexible Dates
Price on Enquiry

Personal Resilience

By Underscore Group

Enhance your ability to apply a range of techniques and tools to help improve management of emotions under stress, make more effective decisions in difficult scenarios and manage your energy more effectively in stressful situations.

Personal Resilience
Delivered OnlineFlexible Dates
£425

VBA with Microsoft Excel

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is primarily designed for students who want to gain the skills necessary to use VBA to automate tasks in Excel such as collecting data from external sources, cleaning, and manipulating data. The target student may also want to learn how to create custom worksheet functions to streamline worksheet formulas and make complex worksheets easier to support, maintain, and understand. Overview Identify general components of VBA and their appropriate use in solving business solutions. Record VBA macros to automate repetitive tasks. Write VBA code to create VBA subroutines and functions. Use various programming elements to solve problems through code, including variables,objects, conditional statements, and loops. Eliminate, avoid, or handle errors in VBA code, and optimize its performance. VBA (Visual Basic for Applications) enables you to enhance and extend the capabilities of Microsoft Excel and other applications in the Microsoft 365 application suite. You can use VBA to perform tasks that would be difficult or impossible to do using only worksheet functions, and you can automate a wide range of tasks so they can be performed faster, more consistently, and with less effort than performing them manually. This course will give you a good foundation for understanding, creating, and using VBA in your own Excel workbooks. You will learn how to use the macro recorder effectively, as well as how to write your own VBA code from scratch. You will use tools built into Excel to explore and learn VBA's capabilities and to optimize and debug your code. Prerequisites To ensure your success in this course, you should be an experienced Excel user who is comfortable creating and working with Excel workbooks, including tasks such as entering worksheet formulas, using absolute and relative addressing, formatting cells, and creating pivot tables and charts. This level of skill could be acquired by taking the Microsoft Excel for Office 365 (Desktop or Online) courses, Parts 1, 2, and 3. 1. Using VBA to Solve Business Problems Use Macros to Automate Tasks in Excel Identify Components of Macro-Enabled Workbooks Configure the Excel VBA Environment 2. Recording a Macro Use the Macro Recorder to Create a VBA Macro Record a Macro with Relative Addressing Delete Macros and Modules Identify Strategies for Using the Macro Recorder 3. Writing VBA Code Directly Write VBA Code Discover Objects You Can Use Create a Custom Function 4. Solving Problems through Code Make Decisions in Code Work with Variables Perform Repetitive Tasks 5. Improving Your VBA Code Debug VBA Errors Deal with Errors Improve Macro Performance 6. Controlling How and When Macros Run Prompt the User for Information Configure Macros to Run Automatically Additional course details: Nexus Humans VBA with Microsoft Excel (v1.2) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VBA with Microsoft Excel (v1.2) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VBA with Microsoft Excel
Delivered OnlineFlexible Dates
£655

Level 3 Assessor Certificate CAVA Course

By Canary Wharf Academy

Become a proficient assessor with our Level 3 Assessor CAVA course, designed to equip you with the essential skills to assess vocational competence effectively. Whether you're evaluating skills in a workshop, classroom, or training environment, this comprehensive course prepares you to guide learners through their learning journey with precision and feedback. Course Outline: Unit 301: Understanding the Principles and Practices of Assessment Unit 302: Assess Occupational Competence in the Work Environment Unit 303: Assess Vocational Skills, Knowledge, and Understanding Entry Requirements: No formal prerequisites are needed, but candidates should work in or aspire to quality assurance roles. This course is a solid foundation for those venturing into quality assurance responsibilities. Access to two learners is required for the full Award. Course Assessment: Under the guidance of your assessor, you'll compile a portfolio of evidence throughout the course. Your assessor will mark this portfolio, which will be internally quality-assured by the centre and authority. Course Fee: Online/Distance Learning: £359.99 Zoom Classroom-based Course: £479.99 Corporate or Group Booking: Benefit from special discounts on corporate or group bookings, allowing our experienced trainers to deliver tailored training at your location. How to Book: Book online via PayPal, debit/credit card, invoice, or bank transfer. You can also book over the phone or visit our office for assistance. Instant booking confirmation will be sent via email. Need Assistance? For any queries or assistance, our dedicated team is just a phone call or email away. We're here to support you every step of the way. Contact us today to embark on your journey towards becoming a certified assessor. Book Now

Level 3 Assessor Certificate CAVA Course
Delivered OnlineFlexible Dates
£479.99

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

Project Leadership Skills (On-Demand)

By IIL Europe Ltd

Project Leadership Skills (On-Demand) To be effective within an organization, project managers need to have a wide variety of skills and abilities. Included among these are: creating and executing on a vision; motivating others; influencing without authority; networking; communicating up, down and laterally; negotiating; managing stakeholders; and managing conflict. This highly interactive workshop focuses on building the soft skills that are critical to leading a team and creating sustainable business change. Participants will gain insight into the social science as well as the brain science behind motivating and empowering others. They will learn and experiment with a variety of influencing strategies and tactics. Working in pairs as well as small groups, they will collaborate with others to brainstorm, share experiences, and apply concepts to everyday challenges. Participants will also discover their personal communication preferences, strengths, and blind spots and will gain insight into how best to communicate with others they find 'difficult.' They will gain insight into managing the people side of change, learning strategies for dealing with each step in the process. Hands-on negotiation and conflict management activities enhance the theoretical learning, grounding it in real life and making it actionable. Interweaving role play with experiential learning and group activities, this course will help participants refine a skill set that is invaluable to their organization, and one that transfers easily across their professional and personal lives. What You Will Learn At the end of this course, you will be able to: Explain the importance of vision in driving motivation and engagement Apply science-based research to better motivate those around you Strategically leverage both personal and positional power to achieve positive project results Determine influencing and networking strategies needed for personal growth Identify ways to problem solve communication challenges when others have different personality styles Connect stakeholder expectations to project success criteria Assess key stakeholders across various dimensions of complexity Apply the four rules of principled negotiation to a real-life conflict situation Recognize key aspects of a physiological response to conflict Utilize selected tools and techniques to 'defuse' an emotional situation Leverage various strategies and tactics to successfully deal with ambiguity at work Getting Started / Foundation Concepts Introductions Course structure, goals, and objectives Beginning a personal action plan Managing Vision and Purpose / Motivating Others Communicating and aligning around vision Tying the present to the future The importance of purpose The art and science of motivation Networking and Influencing Positive politics and project success Types of power within organizations Power and influence Networking best practices Communication The medium and the message Personality and communication styles Communication challenges Stakeholder Management and Negotiation Identifying stakeholders Analyzing stakeholders Negotiation basics Principled negotiation Conflict Management Dynamics of conflict The anatomy of conflict Conflict management approaches and tools Dealing with ambiguity Summary and Next Steps Key concepts review Creating your personal action plan

Project Leadership Skills (On-Demand)
Delivered Online On Demand15 minutes
£650

Creating an Unresourced Project with Oracle Primavera P6 PPM

By Packt

This course is designed for project managers and planners who need to plan and manage projects without resources in Oracle Primavera P6 PPM. You will learn how to navigate the user interface, create project plans, define activities, and manage project timelines without relying on resource constraints.

Creating an Unresourced Project with Oracle Primavera P6 PPM
Delivered Online On Demand6 hours 26 minutes
£26.99

Secretary PA Training

By EduTech - Taylor Mason

During this 2 day course, you will develop a learning-based action plan to use in your workplace ensuring that you can put the learning into action.

Secretary PA Training
Delivered OnlineFlexible Dates
£595

Secretary PA Training

By EduTech - Taylor Mason

During this 2 day course, you will develop a learning-based action plan to use in your workplace ensuring that you can put the learning into action.

Secretary PA Training
Delivered OnlineFlexible Dates
£595

Secretary PA Training

By EduTech - Taylor Mason

During this 2 day course, you will develop a learning-based action plan to use in your workplace ensuring that you can put the learning into action.

Secretary PA Training
Delivered OnlineFlexible Dates
£595