• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

449 Courses in Cardiff delivered Online

SC-900: Microsoft Security, Compliance, and Identity Fundamentals

By Packt

This course will help you qualify for the Microsoft SC 900 exam, and this certification is targeted at those looking to familiarize themselves with the fundamentals of security, compliance, and identity across cloud-based and related Microsoft services.

SC-900: Microsoft Security, Compliance, and Identity Fundamentals
Delivered Online On Demand7 hours 7 minutes
£26.99

Cybersecurity Specialist

By SkillWise

Overview Uplift Your Career & Skill Up to Your Dream Job - Learning Simplified From Home! Kickstart your career & boost your employability by helping you discover your skills, talents, and interests with our special Cybersecurity Specialist Course. You'll create a pathway to your ideal job as this course is designed to uplift your career in the relevant industry. It provides the professional training that employers are looking for in today's workplaces. The Cybersecurity Specialist Course is one of the most prestigious training offered at Skillwise and is highly valued by employers for good reason. This Cybersecurity Specialist Course has been designed by industry experts to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Cybersecurity Specialist Course, like every one of Skillwise's courses, is meticulously developed and well-researched. Every one of the topics is divided into elementary modules, allowing our students to grasp each lesson quickly. At Skillwise, we don't just offer courses; we also provide a valuable teaching process. When you buy a course from Skillwise, you get unlimited Lifetime access with 24/7 dedicated tutor support. Why buy this Cybersecurity Specialist? Unlimited access to the course forever Digital Certificate, Transcript, and student ID are all included in the price Absolutely no hidden fees Directly receive CPD Quality Standard-accredited qualifications after course completion Receive one-to-one assistance every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Cybersecurity Specialist there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for free. Original Hard Copy certificates need to be ordered at an additional cost of £8. Who is this course for? This Cybersecurity Specialist course is ideal for Students Recent graduates Job Seekers Anyone interested in this topic People already working in the relevant fields and want to polish their knowledge and skills. Prerequisites This Cybersecurity Specialist does not require you to have any prior qualifications or experience. You can just enroll and start learning. This Cybersecurity Specialist was made by professionals and it is compatible with all PCs, Macs, tablets, and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path As this course comes with multiple courses included as a bonus, you will be able to pursue multiple occupations. This Cybersecurity Specialist is a great way for you to gain multiple skills from the comfort of your home.   Module 1: Introduction to Cyber Security Introduction to Cyber Security 00:20:00 Module 2: Cyber Security and Data Breaches Cyber Security and Data Breaches 00:15:00 Module 3: Cyber Attacks Cyber Attacks 00:20:00 Module 4: Cybercrimes Cybercrimes 00:20:00 Module 5: Device Management Device Management 00:20:00 Module 6: Internet Browsing Internet Browsing 00:15:00 Module 7: Office and Remote Work Security Office and Remote Work Security 00:15:00 Module 8: Password Management Password Management 00:20:00 Module 9: Preventative Measures Preventative Measures 00:15:00

Cybersecurity Specialist
Delivered Online On Demand
£49

Access 2016 Advanced

By iStudy UK

If you have already done with the basic functions of Microsoft Office Access 2016, then now you're ready to learn advanced Access features such as database management, advanced form design, packaging a database, encrypting a database, preparing a database for multi-user access, and more. Access is Microsoft's flagship database application that allows you to create and manage databases for all sorts of different purposes. This new version of Access incorporates a few new features and connectivity options in order to make databases more accessible to the everyday user. This Access 2016 Advanced is intended to help all users get up to speed on the different features of Access and to become familiar with its more advanced features. The course covers how to complete advanced form design tasks, add field and record validation, create and manage macros, conduct advanced database management, distribute and secure a database, and manage switchboards. What Will I Learn? Improve the Structure of a Database Maintain a Database Work with Access Switchboards Configure Access for Multiple Users Automate Processed with VBA Use Table Events Requirements Access Introduction and Intermediate courses or equivalent experience. Who is the target audience? Students who wish to learn the more advanced capabilities of Access. Introduction Introduction FREE 00:01:00 Improving the Structure of a Database Using the Table Analyzer Wizard 00:05:00 Append Querying to Normalize a Table 00:09:00 Creating a Junction Table 00:06:00 Maintaining a Database Backing Up a Database 00:02:00 Using the Compact and Repair Database Tool 00:03:00 Using the Object Dependencies Tool 00:02:00 Using the Database Documenter Too 00:02:00 Using the Performance Analyzer Tool 00:02:00 Working with Access Switchboards Understanding the Access Switchboard 00:03:00 Using The Switchboard Manager 00:09:00 Modifying a Switchboard 00:05:00 Setting the Startup Options 00:04:00 Configuring Access for Multiple Users Using the database Splitter 00:04:00 Configuring Trusted Locations 00:02:00 Password Protecting a Database 00:03:00 Password Protecting Modules 00:01:00 Converting a Database to an ACCDE file 00:02:00 Automating Processes with VBA Understanding VBA Basics 00:06:00 Exploring Variables and Control Flow Statements 00:10:00 Exporting a Table or Query with VBA 00:06:00 Converting a Macro to VBA 00:02:00 Using Table Events Understanding Table Events 00:02:00 Using the Before Change Event Command 00:04:00 Using the After Change Event Command 00:04:00 Conclusion Course Recap 00:01:00 Resources Resources - Access 2016 Advanced 00:00:00 Course Certification

Access 2016 Advanced
Delivered Online On Demand1 hour 40 minutes
£25

VMware Spring Security

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Application developers who want to increase their understanding of Spring Security with hands-on experience and build secure Spring and Spring Boot applications. Overview By the end of the course, you should be able to meet the following objectives: Use Spring Security in Spring and Spring Boot applications Configure the Spring Security filter chain Protect HTTP endpoints with expression-based access control and the AuthorizationManager API Protect method execution Use different authentication mechanisms Handle passwords in an efficient way Integrate Spring Security with Junit 5 and MockMVC to test HTTP and method security Protect against common vulnerabilities and threats Understand what OAuth2 is Use and configure the Spring Authorization Server Implement a resource server and client This 2-day course offers hands-on experience with the major features of Spring Security, which includes configuration, authentication, authorization, password handling, testing, protecting against security threats, and the OAuth2 support to secure applications. On completion, participants will have a foundation for securing enterprise and microservices applications. Security Introduction Need for security Basic security concepts Common security vulnerabilities Spring Security Basics Introduction to Spring Security High-level architecture Overview of SecurityContext Spring Security with Spring Boot Customizing Authentication Building blocks for authentication Authentication mechanisms based on user name and password Other authentication mechanisms Authentication events Securing Web Applications Configuring authorization Using AccessDecisionsManager for authorization Using AuthorizationManager for authorization Bypassing security Method Security Method security architecture Declarative method security with annotations Security Testing Spring Security Testing Support Security mock annotations and meta-annotations Using MockMvc to test security Handling Passwords Password hashing Upgrading passwords (Optional) Protecting Against Common Vulnerabilities Hardening web applications with security headers Preventing cross-site request forgery Encrypting data in transit OAuth5 and OIDC Concepts Need for OAuth Overview of OAuth5 and OIDC OAuth5 grant types Types of tokens Spring Security OAuth5 support and OAuth5 login Spring Authorization Server Introduction to Authorization Server Spring Authorization Server endpoints Spring Authorization Server configuration Protecting and accessing resources with OAuth5 Resource server Using JWT tokens Using opaque tokens Configuring an OAuth5 client Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Spring Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Spring Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Spring Security
Delivered OnlineFlexible Dates
Price on Enquiry

Tapping Out of Trauma 1.0

By EFT Tapping Training Institute

Working with trauma requires advanced knowledge and skills beyond basic tapping training. While tapping produces amazing results, trauma requires a higher level of training in order to be both safe and effective.

Tapping Out of Trauma 1.0
Delivered OnlineFlexible Dates
£312

Microsoft OneNote for Windows 10

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for people in a variety of roles and fields who have a basic understanding of Microsoft Office and want to incorporate digital note-taking and note collaboration by using OneNote for Windows 10. In addition to creating and modifying OneNote notebooks, this course will introduce you to inserting images and files into notebooks, managing notebooks, and sharing content. Overview In this course, you will develop digital note-taking skills by creating, modifying, and managing OneNote notebooks. You will: Navigate and customize the OneNote for Windows 10 environment. Add and format text, images, tables, and drawing objects in a notebook. Use tags, organize notebooks, and search notebook content. Send and share notebook content. Configure password protection and restore deleted notebook content. In our fast-paced digital world, the need to capture ideas, meeting notes, and to-do items is ever present. Microsoft© OneNote© for Windows© 10 provides a way for you to efficiently create and collect your notes in an electronic notebook. This course will introduce you to using OneNote notebooks to store a wide variety of content in an organized structure, access the content from anywhere, and also share it with others. Getting Started with OneNote Topic A: Navigate the OneNote for Windows 10 Environment Topic B: Customize the OneNote User Interface Adding and Formatting Notebook Content Topic A: Apply Formatting to Notebook Content Topic B: Insert Files Topic C: Insert Tables Topic D: Use Drawing Tools Organizing and Searching Notebooks Topic A: Use Tags Topic B: Organize and Search Notebooks Sending and Sharing OneNote Content Topic A: Share OneNote Content Topic B: Share OneNote Content Using OneDrive Managing Notebook Content Topic A: Configure Password Protection Topic B: Restore Notebook Content

Microsoft OneNote for Windows 10
Delivered OnlineFlexible Dates
Price on Enquiry

Mac OS Support Essentials 10.15 (Catalina)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for individuals who want to learn how to update, upgrade, and reinstall macOS Catalina, then set up and configure the new macOS. Overview Upon successful completion of this course, students in this course will learn how to update, upgrade, and reinstall macOS Catalina, then set up and configure the new macOS. They will also be introduced to the command-line interface and macOS Recovery. Other course topics include: managing user accounts, system resources, Time Machine, user home folders managing file systems, storage, encryption, permissions, using hidden items, shortcuts, file archiving file sharing, metadata, Spotlight, network services, host sharing, and creating a personal firewall and much more. The students will also learn all about macOS security and password changes. In this course, students will be introduced to the command-line interface and mac OS Recovery. They will also manage user accounts and system resources. Installation and Configuration Update, Upgrade, or Reinstall macOS Set Up and Configure macOS Use the Command-Line Interface Use macOS Recovery Update macOS User Accounts Manage User Accounts Manage User Home Folders Manage Security and Privacy Manage Password Changes File Systems Manage File Systems and Storage Manage File Vault Manage Permissions and Sharing Use Hidden Items, Shortcuts, and File Archives Data Management Manage System Resources Use Metadata, Spotlight, and Siri Manage Time Machine Apps and Processes Install Apps Manage Files Manage and Troubleshoot Apps Network Configuration Manage Basic Network Settings Manage Advanced Network Settings Troubleshoot Network Issues Network Services Manage Network Services Manage Host Sharing and Personal Firewall System Management Troubleshoot Peripherals Manage Printers and Scanners Troubleshoot Startup and System Issues

Mac OS Support Essentials 10.15 (Catalina)
Delivered OnlineFlexible Dates
Price on Enquiry

Linux Troubleshooting Course with Real Life Examples

By Packt

Linux Troubleshooting and Administration

Linux Troubleshooting Course with Real Life Examples
Delivered Online On Demand17 hours 30 minutes
£37.99

AWS IAM: The Cloud Engineer's Security Handbook

By Packt

Understand how to use AWS IAM to run AWS resources securely against cloud hacks

AWS IAM: The Cloud Engineer's Security Handbook
Delivered Online On Demand2 hours 47 minutes
£137.99

The Complete Ethical Hacking Bootcamp: Beginner To Advanced

By Packt

This video course takes you through the basic and advanced concepts of penetration testing. From setting up your own virtual lab to developing brute force attacking tools using Python, you'll learn it all with the help of engaging activities.

The Complete Ethical Hacking Bootcamp: Beginner To Advanced
Delivered Online On Demand27 hours 12 minutes
£33.99
1...678910...45