• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

36632 Courses in Liverpool delivered Online

Being an IT Business Partner - BCS Practitioner Certificate

5.0(12)

By Duco Digital Training

This Level 4 course aims to equip professionals with the knowledge about the skills and practical behaviours which are required for them to step into a leadership/management role. The demand for management roles is expected to grow in the coming years. This is due to a number of factors, including: The ageing population, which is leading to a shortage of skilled workers. The increasing complexity of businesses requires more managers to oversee operations. The growing importance of technology is creating new opportunities for managers to lead and innovate.

Being an IT Business Partner - BCS Practitioner Certificate
Delivered OnlineFlexible Dates
£2,500

AZ-801T00 Configuring Windows Server Hybrid Advanced Services

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators who already implement and manage on-premises core technologies want to secure and protect their environments, migrate virtual and physical workloads to Azure Iaas, enable a highly available, fully redundant environment, and perform monitoring and troubleshooting. This course teaches IT Professionals to configure advanced Windows Server services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to leverage the hybrid capabilities of Azure, how to migrate virtual and physical server workloads to Azure IaaS, and how to secure Azure VMs running Windows Server. The course also teaches IT Professionals how to perform tasks related to high availability, troubleshooting, and disaster recovery. The course highlights administrative tools and technologies including Windows Admin Center, PowerShell, Azure Arc, Azure Automation Update Management, Microsoft Defender for Identity, Azure Security Center, Azure Migrate, and Azure Monitor. Prerequisites An understanding of the following concepts as related to Windows Server technologies: High availability and disaster recovery Automation Monitoring Troubleshooting 1 - Secure Windows Server user accounts Configure user account rights Protect user accounts with the Protected Users group Describe Windows Defender Credential Guard Block NTLM authentication Locate problematic accounts 2 - Hardening Windows Server Describe Local Password Administrator Solution Configure Privileged Access Workstations Secure domain controllers Analyze security configuration with Security Compliance Toolkit Secure SMB traffic 3 - Windows Server update management Explore Windows Update Outline Windows Server Update Services server deployment options Define Windows Server Update Services update management process Describe the process of Update Management 4 - Secure Windows Server DNS Implement split-horizon DNS Create DNS policies Implement DNS policies Secure Windows Server DNS Implement DNSSEC 5 - Implement Windows Server IaaS VM network security Implement network security groups and Windows IaaS VMs Implement adaptive network hardening Implement Azure Firewall and Windows IaaS VMs Implement Windows firewall with Windows Server IaaS VMs Choose the appropriate filtering solution Deploy and configure Azure firewall using the Azure portal Capture network traffic with network watcher Log network traffic to and from a VM using the Azure portal 6 - Audit the security of Windows Server IaaS Virtual Machines Describe Azure Security Center Enable Azure Security Center in hybrid environments Implement and assess security policies Protect your resources with Azure Security Center Implement Azure Sentinel 7 - Manage Azure updates Describe update management Enable update management Deploy updates View update assessments Manage updates for your Azure Virtual Machines 8 - Create and implement application allowlists with adaptive application control Describe adaptive application control Implement adaptive application control policies 9 - Configure BitLocker disk encryption for Windows IaaS Virtual Machines Describe Azure Disk Encryption and server-side encryption Configure Key Vault for Azure Disk Encryption Encrypt Azure IaaS Virtual Machine hard disks Back up and recover data from encrypted disks Create and encrypt a Windows Virtual Machine 10 - Implement change tracking and file integrity monitoring for Windows IaaS VMs Implement Change Tracking and Inventory Manage Change Tracking and Inventory Manage tracked files Implement File Integrity Monitoring Select and monitor entities Use File Integrity Monitoring 11 - Introduction to Cluster Shared Volumes Determine the functionality of Cluster Shared Volumes Explore the architecture and components of Cluster Shared Volumes Implement Cluster Shared Volumes 12 - Implement Windows Server failover clustering Define Windows Server failover clustering Plan Windows Server failover clustering Implement Windows Server failover clustering Manage Windows Server failover clustering Implement stretch clusters Define cluster sets 13 - Implement high availability of Windows Server VMs Select high-availability options for Hyper-V Consider network load balancing for Hyper-V VMs Implement Hyper-V VM live migration Implement Hyper-V VMs storage migration 14 - Implement Windows Server File Server high availability Explore the Windows Server File Server high-availability options Define Cluster Shared Volumes Implement Scale-Out File Server Implement Storage Replica 15 - Implement scale and high availability with Windows Server VM Describe virtual machine scale sets Implement scaling Implement load-balancing VMs Create a virtual machine scale set in the Azure portal Describe Azure Site Recovery Implement Azure Site Recovery 16 - Implement Hyper-V Replica Define Hyper-V Replica Plan for Hyper-V Replica Configure and implement Hyper-V Replica Define extended replication Define Azure Site Recovery Implement Site Recovery from on-premises site to Azure Implement Site Recovery from on-premises site to on-premises site 17 - Protect your on-premises infrastructure from disasters with Azure Site Recovery Azure Site Recovery overview Workloads supported for protection with Azure Site Recovery Run a disaster recovery drill Failover and failback 18 - Implement hybrid backup and recovery with Windows Server IaaS Describe Azure Backup Implement recovery vaults Implement Azure Backup policies Recover Windows IaaS Virtual Machines Perform file and folder recovery Perform backup and restore of on-premises workloads Manage Azure Virtual Machine backups with Azure Backup service 19 - Protect your Azure infrastructure with Azure Site Recovery What is Azure Site Recovery Prepare for disaster recovery with Azure Site Recovery Run a disaster recovery drill Failover and failback using Azure Site Recovery 20 - Protect your virtual machines by using Azure Backup Azure Backup features and scenarios Back up an Azure virtual machine by using Azure Backup Restore virtual machine data 21 - Active Directory Domain Services migration Examine upgrade vs. migration Upgrade a previous version of Active Directory Domain Services to Windows Server 2022 Migrate to Active Directory Domain Services in Windows Server 2022 from a previous version Explore the Active Directory Migration Tool 22 - Migrate file server workloads using Storage Migration Service Storage Migration Service overview and usage scenarios Storage migration requirements Migrate a server with Storage migration Evaluate storage migration considerations 23 - Migrate Windows Server roles Describe the Windows Server Migration Tools Install the Migration Tools Migrate roles using the Migration Tools 24 - Migrate on-premises Windows Server instances to Azure IaaS virtual machines Plan your migration Describe Azure Migrate Perform server assessment Assess physical servers with Azure Migrate Migrate Windows Server workloads by using Azure Migrate 25 - Upgrade and migrate Windows Server IaaS virtual machines Describe Azure Migrate Migrate Windows Server workloads by using Azure Migrate Describe storage migration Migrate file servers by using Storage Migration Service 26 - Containerize and migrate ASP.NET applications to Azure App Service Azure Migrate App Containerization overview 27 - Monitor Windows Server performance Use Performance Monitor to identify performance problems Use Resource Monitor to review current resource usage Review reliability with Reliability Monitor Implement a performance monitoring methodology Use Data Collector Sets to analyze server performance Monitor network infrastructure services Monitor virtual machines running Windows Server Monitor performance with Windows Admin Center Use System Insights to help predict future capacity issues Optimize the performance of Windows Server 28 - Manage and monitor Windows Server event logs Describe Windows Server event logs Use Windows Admin Center to review logs Use Server Manager to review logs Use custom views Implement event log subscriptions 29 - Implement Windows Server auditing and diagnostics Describe basic auditing categories Describe advanced categories Log user access Enable setup and boot event collection 30 - Troubleshoot Active Directory Recover objects from the AD recycle bin Recover the AD DS database Recover SYSVOL Troubleshoot AD DS replication Troubleshoot hybrid authentication issues 31 - Monitor Windows Server IaaS Virtual Machines and hybrid instances Enable Azure Monitor for Virtual Machines Monitor an Azure Virtual Machine with Azure Monitor Enable Azure Monitor in hybrid scenarios Collect data from a Windows computer in a hybrid environment Integrate Azure Monitor with Microsoft Operations Manager 32 - Monitor your Azure virtual machines with Azure Monitor Monitoring for Azure VMs Monitor VM host data Use Metrics Explorer to view detailed host metrics Collect client performance counters by using VM insights Collect VM client event logs 33 - Troubleshoot on-premises and hybrid networking Diagnose DHCP proble

AZ-801T00 Configuring Windows Server Hybrid Advanced Services
Delivered OnlineFlexible Dates
£2,380

Access - Database Design and Reporting

By Underscore Group

Learn how to create fully relational databases and how to input, extract and report on data. Course overview Duration: 2 days (13 hours) Our Access Database Design and reporting course looks at the key elements to building fully relational databases and entering and extracting information from them. This course is designed for new users who need to build relational database systems. Objectives  By the end of the course you will be able to: Create a new database Create data tables Set field validation and properties Enter data and manage data Create forms Use queries to extract data Create parameter queries Create calculations in queries Build relational databases Use sub datasheets Build multi table queries Use advanced form and report design techniques Content Creating a database Creating a new database Database elements Creating a data table Setting field properties Using input masks Using input masks Validation rules Default values Setting a primary key Creating lookup fields Data entry Adding data Deleting data Quick keys for data entry Working with data Sorting data Filtering data Finding information Navigation Creating data form Creating quick forms The form wizard Amending forms Formatting Setting the tab order Entering data using forms Creating queries Creating a query Setting criteria Using the expression builder Creating parameter queries Using wildcards Using more than one parameter Using calculations in queries Adding a totals row Formatting results Adding calculations Printing and reporting Printing tables and queries Creating reports Building and amending reports Adding headers and footers Working with relational databases Relational database principles Importing data from other sources Linking information between tables One-to-one and one-to-many links Defining referential integrity Amending links Deleting links Sub datasheets Viewing a subdatasheet Removing a subdatasheet Connecting a subdatasheet Multiple table queries Deciding which tables to use Adding tables to the query Creating links between tables Setting join properties Advanced form design Field properties Creating lookup fields Adding calculated fields Applying conditional formatting Advanced report design Field properties Report properties Alternate colour bandings Concatenating fields Adding calculated fields Sorting and grouping Grouping settings Adding headers and footers Adding dates, times, page numbers

Access - Database Design and Reporting
Delivered in Horsham or OnlineFlexible Dates
Price on Enquiry

25th September Camille Burns #Agent121. Looking for: MG, YA inc YA/CROSSOVER ROMANCE, and ADULT FICTION; NON-FICTION FOR ALL AGES.

5.0(3)

By I Am In Print

LOOKING FOR:  MIDDLE GRADE, YOUNG ADULT & ADULT FICTION AS WELL AS NON-FICTION FOR ALL AGES Prior to joining DKW in 2023, Camille worked at David Higham Associates as Agent’s Assistant to Jane Gregory and in the Children’s Translation Rights team. She has also worked in editorial for an academic publisher, in rights and marketing for an audiobook publisher and as an intern at Felicity Bryan Literary Agency. Camille loves engaging with narratives on a structural level in order to draw out their best qualities. Camille has an MSc in Publishing from Edinburgh Napier University and an MA in English Literature from the University of Edinburgh. She was Secretary of the Association of Authors’ Agents, as well as Co-Chair for the AAA’s Bridge Committee for early career agents and assistants, from late 2021 to early 2024. She also previously volunteered at the Story Museum in Oxford. Camille is looking to grow her list with a particular focus on middle grade, young adult and adult/crossover fiction, as well as non-fiction for all ages. Books that she has loved and that speak to her taste include Lockwood and Co by Jonathan Stroud (MG), I’ll Give You The Sun by Jandy Nelson (YA), Fourth Wing by Rebecca Yarros (crossover) and Every Summer After by Carley Fortune (adult). For more information, please visit Camille's page on the Diamond Kahn Woods Literary Agency website. Camille would like you to submit a covering letter, 1 - 2 page synopsis and the first 5,000 words of your manuscript in a single Word document.  (In addition to the paid sessions, Camille is kindly offering one free session for low income/underrepresented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Wednesday 17th September 2025

25th September Camille Burns #Agent121. Looking for: MG, YA inc YA/CROSSOVER ROMANCE, and ADULT FICTION; NON-FICTION FOR ALL AGES.
Delivered Online + more
£72

C++ Bootcamp Course, 2-Months

4.6(12)

By PCWorkshops

C++ Bootcamp is for coding beginners: You want all the basic stuff, all the advanced stuff and practical experience and get a fantastic job in C++

C++ Bootcamp Course, 2-Months
Delivered OnlineFlexible Dates
£2,000

ICA Diploma in Financial Crime Prevention

By International Compliance Association

ICA International Diploma in Financial Crime Prevention This advanced level qualification will better equip you to meet the many challenges associated with identifying, understanding, and mitigating financial crime risks including fraud, cybercrime, corruption, money laundering and terrorist financing. It will deepen your understanding and enhance your professional credibility. Benefits of studying with ICA: Flexible learning solutions that are suited to you Our learner-centric approach means that you will gain relevant practical and academic skills and knowledge that can be used in your current role Improve your career options by undertaking a globally recognised qualification that hiring managers look for as part of their hiring criteria Many students have stated that they have received a promotion and/or pay rise as a direct result of gaining their qualification The qualifications ensure that you are enabled to develop strategies to help manage and prevent risk within your firm, thus making you an invaluable asset within the current climate. This course is awarded in association with Alliance Manchester Business School, the University of Manchester. how will you learn 9-month course assessed by 3 written assignments (3,000 - 3,500 words) A mixture of guided online study and participation in live sessions:2 x virtual classrooms1 x immersive learning scenario (putting you at the centre of a story)3 x tutorials (a chance to discuss elements of the course in more depth)3 x assessment preparation sessions Videos covering the latest industry developments and case studies Access to the ICA members' portal containing additional reading and resources Proactive support throughout the course to help you stay on track Completion of the ICA Diploma in Financial Crime Prevention training course will produce the following outcomes: Professional qualification: ICA Diploma in Financial Crime Prevention-participants will be able to use the designation 'Dip (Fin.Crime).' Eligibility to apply for Professional membership of the ICA Detailed knowledge on the nature of financial crime Practical understanding of best practice and how to prevent financial crime This course is awarded in association with Alliance Manchester Business School, the University of Manchester. This ICA Diploma in Financial Crime Prevention provides Participants with in-depth knowledge and skills in the following areas: Understanding and managing financial crime Practical application of the International Standards The prevention and detection of specific financial crime risks Data and information security Bribery and corruption Electronic crime Investigation, prosecution and recovery.

ICA Diploma in Financial Crime Prevention
Delivered Online On Demand9 months
£3,900

AWS Technical Essentials

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Individuals responsible for articulating the technical benefits of AWS services Individuals interested in learning how to get started with using AWS SysOps Administrators, Solution Architects and Developers interested in using AWS services Overview Recognize terminology and concepts as they relate to the AWS platform and navigate the AWS Management Console. Understand the foundational services, including Amazon Elastic Compute Cloud (EC2), Amazon Virtual Private Cloud (VPC), Amazon Simple Storage Service (S3), and Amazon Elastic Block Store (EBS). Understand the security measures AWS provides and key concepts of AWS Identity and Access Management (IAM). Understand AWS database services, including Amazon DynamoDB and Amazon Relational Database Service (RDS). Understand AWS management tools, including Auto Scaling, Amazon CloudWatch, Elastic Load Balancing (ELB), and AWS Trusted Advisor. AWS Technical Essentials introduces you to AWS services, and common solutions. It provides you with fundamental knowledge to become more proficient in identifying AWS services. It helps you make informed decisions about IT solutions based on your business requirements and get started working on AWS. Prerequisites Working knowledge of distributed systems Familiarity with general networking concepts Working knowledge of multi-tier architectures Familiarity with cloud computing concepts 1 - AWS introduction and history AWS Global Infrastructure Demonstration: AWS Management Console 2 - AWS Storage Identify key AWS storage options Describe Amazon EBS Create an Amazon S3 bucket and manage associated objects 3 - Compute, network and storage services Amazon Elastic Compute Cloud (EC2) Amazon Virtual Private Cloud (VPC) Amazon Simple Storage Service (S3) Amazon Elastic Block Store (EBS) Demonstration: Amazon Simple Storage Service (S3) Hands-on lab: Build your VPC and launch a web server 4 - AWS Security, AWS Identity and Access Management (IAM) AWS Identity and Access Management (IAM) Demonstration: AWS Identity and Access Management (IAM) 5 - Compute Services & Networking Identify the different AWS compute and networking options Describe an Amazon Virtual Private Cloud (VPC) Create an Amazon EC2 instance Use Amazon EBS with Amazon EC2 6 - Managed Services & Database Describe Amazon DynamoDB Understand key aspects of Amazon RDS Launch an Amazon RDS instance 7 - Databases (RDS, DynamoDB) SQL and NoSQL databases Data storage considerations Hands-on lab: Build your database server and connect to it 8 - AWS elasticity and management tools Auto scaling Load balancing Cloud Watch Trusted Advisor Hands-on lab: Scale and load balance your architecture 9 - Deployment and Management Identify what is CloudFormation Describe Amazon CloudWatch metrics and alarms Describe Amazon Identity and Access Management (IAM)

AWS Technical Essentials
Delivered OnlineFlexible Dates
£675

Cisco Configuring Cisco ISE Essentials for SD- Access v1.0 (ISESDA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is as follows: System engineers Network engineers Technical architects Technical support engineers Cisco integrators and partners Overview Upon successful completion of this course, students will be able to meet these overall objectives: Describe Cisco ISE policies and authentication and authorization process Understand different AAA protocols Understand how Cisco ISE fits into Cisco DNA Center architecture Provide configuration examples of Cisco ISE and TrustSec solutions Describe Cisco ISE integration with Cisco DNA Center and policy enforcement using Security Groups Provide configuration examples for wired, wireless, and VPN network access Understand how inline tagging and SGT Exchange Protocol (SXP) works This course shows you how to deploy the Cisco© Identity Services Engine (ISE) to support the Software-Defined Access (SD-Access) solution within your enterprise networks. You will gain an understanding of how Cisco ISE is utilized by the SD-Access solution to provide security policies across the organization. You will learn Cisco ISE fundamentals and get hands-on practice configuring ISE, policies, AAA client configuration, VPN access, integration, wireless guest access, and more. Cisco ISE Overview Exploring the Cisco Identity Services Engine Examining AAA protocols Examining Authentication Examining Authorization Cisco ISE Guest Access Examining Guest Portal Types Examining Guest User Types Examining AAA Policies for Guest Access Cisco ISE and SD-Access Exploring Cisco SD-Access Examining Cisco ISE for SD-Access Cisco ISE SGT Exchange Protocol SD-Access Fabric and Host Provisioning Security Group Exchange Protocol Additional course details: Nexus Humans Cisco Configuring Cisco ISE Essentials for SD- Access v1.0 (ISESDA) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Configuring Cisco ISE Essentials for SD- Access v1.0 (ISESDA) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Configuring Cisco ISE Essentials for SD- Access v1.0 (ISESDA)
Delivered OnlineFlexible Dates
Price on Enquiry

ANXIETY – UNDERSTANDING AND INCLUDING CHILDREN AND YOUNG PEOPLE

By Inclusive Solutions

In this practical workshop session we will explore ways of including young people of all ages who experience anxiety some of whom may well be on the autism spectrum. The session will be values based and practical and will aim to allow the sharing of experiences and good practice as well as promoting innovative approaches to inclusion through the design of best practice. Course Category Autism and Communication Inclusion Parents and Carers Behaviour and Relationships Meeting emotional needs Description In this practical workshop session we will explore ways of including anxious children in mainstream schools and settings. The session will be values based and practical and will aim to allow the sharing of experiences and good practice as well as promoting innovative approaches to inclusion through the design of best practice. Family perspectives and experiences will also be explored. This is not a ‘medical model’ day on anxiety.  Testimonials ‘Really gave me an idea of how people feel and helped me think how to plan to meet their needs.’ ‘Really useful insights’  Learning Objectives Increased confidence and understanding regarding including anxious children Access to a wider range of practical strategies to impact on anxiety Deeper understanding of core values surrounding inclusion New skills and processes to strengthen the inclusion of anxious children Insights and understanding of sensory sensitivities Understanding increased in area of movement differences Who Is It For? Personal Assistants Teachers Heads and deputies Guidance staff Learning support teams SENCOs Primary and secondary teachers Parents Brothers and sisters Local authority support services Community workers and carers Course Content The course answers the questions : What is anxiety? How do we go about including anxious children? Can we understand more deeply what is going on underneath concerning behaviours? Key themes include: Movement differences Supports and Accommodations for Sensory Sensitivities Developing Friendships and Peer Support Learning to Listen

ANXIETY – UNDERSTANDING AND INCLUDING CHILDREN AND YOUNG PEOPLE
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

Introduction to Parent Carer Trauma for Teams/Organisations

5.0(1)

By Born at the Right Time

A Born at the Right Time e-learning course Rooted in lived experience. Informed by research. Designed for action. Born at the Right Time's passion for changing the landscape for people with disabilities includes being determined to change the reality of parent carer trauma, how it impacts parent carers, practitioners and services. With that in mind, this short 1-hour e-learning awareness course is especially for teams and organisations determined to understand Parent Carer trauma as part of their trauma informed services to disabled children and their families. What’s this course about? Parent carers of disabled children and young people are often navigating not just the complexities of care—but the cumulative trauma of doing so in overstretched systems built on passionate and often under-resourced practitioners. It is about having a shared language to understand more fully the seen and unseen factors at play. This evidence-informed, lived-experience-led course helps professionals in SEN, health, and social care recognise and respond to the trauma parent carers experience—improving outcomes, communication, and collaboration. Its is available for group bookings of over 20 delegates. 👥 Who is this course for? SENCOs, teachers, and education staff Health professionals and therapists Social workers and family support teams Early help, keyworkers, and voluntary sector staff Anyone working with families of disabled children and young people If you engage with or impact families in your role, this course is for you. What you’ll learn By the end of the course, you will be able to: Define Parent Carer Trauma (PCT) Understand the impact of trauma on families, professionals, and services Define Systems Generated Trauma (SGT) Start to build safe, compassionate, and effective communication with families Develop a personal action plan to support trauma-responsive practice 💡 Why it matters When trauma goes unrecognised, it shows up as: Misunderstanding and mistrust Escalated needs and complaints Avoidable conflict between families and professionals Burnout and frustration for everyone involved This course helps organisations to take steps in changing that story and create a different kind of culture. Teams will leave with a shared language, clearer understanding , and practical tools to reduce harm, build trust, and support better experiences. 🧭 What’s included ✅ 3 interactive modules (approx. 1 hour total) ✅ Videos, lived experience stories, and real-world scenarios ✅ Reflective questions ✅ Certificate of completion ✅ Access to further resources Enrol now and take the next step in empathic practice Become a safer, more compassionate, and more effective organisation. 📅 Available now · 💻 100% online · 🧾 Certificate of attendance provided Group bookings, multi-user licenses, and in-house facilitation options available.

Introduction to Parent Carer Trauma for Teams/Organisations
Delivered Online On Demand1 hour
£500 to £7,000