• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

71 Courses delivered Online

Source of Funds and Source of Wealth Checks Course

By DG Legal

Source of funds and source of wealth are two important verification steps a firm can take to identify potential money laundering activities or other financial crime. The Money Laundering Regulations 2017 (MLR 2017) require firms, where necessary, to scrutinise the source of funds of a transaction to ensure they are consistent with their knowledge of the customer, their business and risk profile. In addition, where a matter is considered to be higher risk and therefore subject to enhanced due diligence, firms must also investigate the client’s overall source of wealth. Law firm staff must be able to differentiate between source of funds and source of wealth, having knowledge of how to verify each and identify any anomalies that do not align with their understanding of the client or the matter. Staff must have the knowledge and confidence to challenge clients and seek further clarification where the source may be unclear or highlight concerns. A number of firms who failed to sufficiently identify the source of funds and/or source of wealth have recently been fined by the SRA. In the year August 2024 to July 2025, fines in excess of £475,000 were recorded for AML breaches that included source of funds and source of wealth failings. This course will assist fee earners and support staff in understanding the difference between source of funds and source of wealth, enabling them to capably identify and verify funds in a matter. Where the SRA has found failings at firms in respect of source of funds or source of wealth, it has almost unanimously also found shortcomings in other areas of AML compliance. Where concerns are raised regarding a firm’s compliance with any aspect of the MLR 2017, the SRA will probe further and look into all areas of AML compliance. For information about DG Legal’s full range of AML training courses, please visit: https://dglegal.co.uk/training/upcoming-premier-training-courses/. Target Audience This online course is suitable for staff of all levels, from support staff to senior partners. Resources Comprehensive and up to date course notes will be provided to all delegates which may be useful for ongoing reference or cascade training. Please note a recording of the course will not be made available. Speaker Paul Wightman, Consultant, DG Legal A qualified barrister, Paul graduated in Law from Birmingham University and was called to the Bar in 1994. He subsequently spent almost 20 years working for the Law Society of England and Wales, initially within the Office for the Supervision of Solicitors, then the Legal Complaints Service (LCS), and ultimately the Solicitors Regulation Authority (SRA). Paul is adept at undertaking audits and providing succinct reports on areas for improvement and can assist firms with advice on all aspects of SRA compliance and Anti-Money Laundering procedures.

Source of Funds and Source of Wealth Checks Course
Delivered Online + more
£56.25 to £75

Exam MS-100 Microsoft 365 Identity and Services Course

By Packt

This course will help you pass the Microsoft 365 Identity and Services (Exam MS-100) certification and demonstrate a detailed understanding of evaluating, planning, migrating, deploying, and managing Microsoft 365 services.

Exam MS-100 Microsoft 365 Identity and Services Course
Delivered Online On Demand7 hours 3 minutes
£93.99

Safeguarding for Lawyers Course

By DG Legal

This training is for lawyers who may come into contact with vulnerable people through their work. In particular, it is aimed at those who hold legal aid contracts and must meet the requirements of the Specialist Quality Mark (SQM) standard in respect of safeguarding. Everyone has the right to be kept safe from harm, abuse or neglect. We all have obligations to ensure that vulnerable people are protected and that we have appropriate procedures in place to ensure that abuse is identified and reported.  We will help you to understand the following; What is safeguarding? The different types of abuse Example signs of abuse, harm and neglect What action should be taken if abuse is suspected The SQM requirements What a Safeguarding Policy should include Target Audience The online course is suitable for staff of all levels, from support staff to senior partners and is aimed at firms maintaining or wishing to obtain the Specialist Quality Mark. Resources Comprehensive and up to date course notes will be provided to all delegates which may be useful for ongoing reference or cascade training. Please note a recording of the course will not be made available. Speaker Amie Higgins, Consultant, DG Legal Amie is a Senior Solicitor, qualified under the Law Society’s Immigration & Asylum Accreditation Scheme (IAAS) as an Advanced Caseworker and Supervisor. Amie specialises in all aspects of Immigration, Asylum and Human Rights work, with a specialism in human trafficking/modern slavery cases and working with vulnerable clients. Amie is an experienced trainer, delivering a range of training on both legal and practice management topics.

Safeguarding for Lawyers Course
Delivered Online + more
£56.25 to £75

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered OnlineFlexible Dates
£2,380

Getting Started with Cloud Computing - Level 1

By Packt

Start your journey in the cloud computing revolution-what, why, and how!

Getting Started with Cloud Computing - Level 1
Delivered Online On Demand2 hours 40 minutes
£95.99

Essential Cloud Technologies

5.0(3)

By Systems & Network Training

Cloud technologies training course description This course provides an introduction to cloud technologies, including, configuration and deployment, security, maintenance, and management. It covers all aspects of cloud computing infrastructure. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. . What will you learn Contrast and compare AWS, GCP and Azure. Explain the different cloud services, models and characteristics. Explain cloud virtualization components and options. Explain cloud security options. Describe cloud automation, orchestration, monitoring and performance options. Cloud technologies training course details Who will benefit: Anyone working with or looking to work with cloud technologies. Prerequisites: None. Duration 2 days Cloud technologies training course contents What is the cloud? The Internet Cloud computing Benefits Disadvantages Cloud services IaaS, PaaS, SaaS, others. Cloud service providers AWS, GCP Microsoft Azure, others Cloud architectures Private, public, hybrid others Cloud based delivery The cloud and virtualization Virtual Machines, networks, storage, deployment. Accessing the Virtual Machine Secure cloud environments Security considerations. Data privacy considerations Automation and orchestration Monitoring and performance Performance Cost issues Cost containment

Essential Cloud Technologies
Delivered in Internationally or OnlineFlexible Dates
£1,497

Essential NFV

5.0(3)

By Systems & Network Training

NFV training course description Network Functions Virtualization (NFV) brings many benefits, this training course cuts through the hype and looks at the technology, architecture and products available for NFV. What will you learn Explain how NFV works. Describe the architecture of NFV. Explain the relationship between NFV and SDN. Recognise the impact NFV will have on existing networks. NFV training course details Who will benefit: Anyone wishing to know more about NFV. Prerequisites: Introduction to Virtualization. Duration 2 days NFV training course content Introduction What is NfV? What are network Functions? NfV benefits, NfV market drivers. ETSI NfV framework. Virtualization review Server, storage and network virtualization and NfV. Virtual machines, containers and docker. Data centres, clouds, SaaS, IaaS, PaaS. Virtualization of Network Functions Network virtualization versus Network Function virtualization. ETSI NfV architecture ETSI documents, Architecture overview, compute domain, hypervisor domain, infrastructure network domain. IETF and NfV Creating services, Service Functions, Service Function Chaining. SPRING and source packet routing. YANG and NetConf. RESTCONF. VLANs, VPNs, VXLAN. MANO Management and Orchestration. OpenStack, OpenDaylight PaaS and NfV. The VNF domain. Service graphs, MANO descriptors, Open orchestration. The virtualization layer VM centric model, containers versus hypervisors, FD.io. Summary Deploying NfV, performance, testing. Futures.

Essential NFV
Delivered in Internationally or OnlineFlexible Dates
£1,727

Equality, Diversity & Inclusion for Lawyers Course

By DG Legal

There are a number of reasons why it is important to actively promote equality and diversity within your business and the wider community, not only to ensure compliance with anti-discrimination legislation and professional regulations, including the SRA Standards & Regulations. There will also be business benefits to the organisation including attracting and retaining talented staff, improving staff morale, potentially accessing a wider client base and enhancing service levels and client satisfaction. Join us for this useful overview session on equality, diversity & inclusion which will cover the following points; The Meaning of Equality Discrimination Harassment & Victimisation Unconscious Bias The Equality Act & the Protected Characteristics Reasonable Adjustments Complying with E&D requirements Target Audience This online course is suitable for staff of all levels, from support staff to senior partners. Resources Comprehensive and up to date course notes will be provided to all delegates which may be useful for ongoing reference or cascade training. Please note a recording of the course will not be made available. Speaker Amie Higgins, Consultant, DG Legal Amie is a Senior Solicitor, qualified under the Law Society’s Immigration & Asylum Accreditation Scheme (IAAS) as an Advanced Caseworker and Supervisor. Amie specialises in all aspects of Immigration, Asylum and Human Rights work, with a specialism in human trafficking/modern slavery cases and working with vulnerable clients. Amie is an experienced trainer, delivering a range of training on both legal and practice management topics.

Equality, Diversity & Inclusion for Lawyers Course
Delivered Online
£56.25 to £75

Introduction to Cloud Security with Microsoft Azure

By Packt

Get up to speed with effectively securing your cloud systems

Introduction to Cloud Security with Microsoft Azure
Delivered Online On Demand2 hours 14 minutes
£93.99

IAAS: Casework Assistant Exam Preparation Course

By DG Legal

This half day online course will assist candidates in preparing for the forthcoming initial Casework Assistant exam.

IAAS: Casework Assistant Exam Preparation Course
Delivered Online + more
£86.25 to £115