Become a Certified User Experience Professional Build a career in UX with the world’s only university credit-rated online UX course. Acquire the mindset, the skills and the confidence that make UX designers so valuable. A rewarding and meaningful career awaits. Why become a UX designer? Be in demand UX is a high-growth sector. The demand for UX designers far outstrips the supply of qualified professionals. Get well paid UX designers are highly paid. The average entry-level salary for a UX designer in the United Kingdom is £35,465 (PayScale, 2019) Love your job UX designers make an impact. They solve real-world problems using an exciting mix of research, design, technology and psychology. Study method Online, self-paced Duration 6 months Access to content 12 months Qualification Level 8 Diploma - User Experience Design Awarded by Glasgow Caledonian University Regulated by SQA Additional info Exam(s) / assessment(s) is included in price Tutor is available to students Description Duration: 6 months Get certified in six months following a flexible, structured learning path. Delivery: Online The course is delivered entirely online, including video modules, mentor-led webinars and support. Assessment: 2-hour exam Before getting certified, you'll be assessed during a two-hour exam taken online. Outcomes for you Think like a UX designer; adopt the mindset that sets them apart Showcase your knowledge with a portfolio of project work Speak with the confidence that comes from a true, deep understanding of UX Advance your career with job-ready skills Complete a university credit-rated course, valued by employers globally Become a Certified UX Professional Learn with us We’ve worked hard to design the best possible online learning experience for you. As well as an unmatched syllabus, our approach includes: Projects & portfolio Learn by doing with a series of real-world projects ideal for your UX portfolio. Mentors & webinars Be guided by our hand-picked, world-class mentors during monthly webinars. Structure & support Stay motivated with a structured programme supported by fellow students and our customer success team. What you’ll learn We’ve put together a university credit-rated curriculum that’s deep, rigorous and covers everything you need to know to become a certified UX professional and turbocharge your career. Module 01 - Introduction to UX design Module 02 - User research Module 03 - User goals Module 04 - Structure and navigation Module 05 - Interactions Module 06 - Design principles Module 07 - Design patterns Module 08 - Mobile Module 09 - Workflows Module 10 - Prototyping and handover Module 11 - AI and UX Module 12 - Creating your portfolio Module 13 - Career guidance Hub Tutorials for Figma Projects and portfolio - Projects that build into a portfolio Exam - 2-hour final exam Requirements Background You don’t need experience in design or technology to enrol in our courses, although having one or both is a definite bonus. Our students come from a diverse array of backgrounds, including project management, development, graphic design, product management, business analysis and so on. Commitment You do need to be motivated and committed. We set a high bar. Studying for one of our professional qualifications requires a certain amount of time, energy and focus. Our team will be there to support you along every step of the way but success will come as a result of your own diligence. Career path The average salary for entry level user experience designers is £28,000 The average salary for user experience designers with 1-5 years experience ranges from £29,000 to £50,000 The average salary for user experience managers/leads is £80,000 Information from LinkedIn Salary Reports, based on real jobs listings.
Duration 3 Days 18 CPD hours This course is intended for This course is ideal for Professionals preparing to become CRISC certified. Risk practitioners Students or recent graduates Overview At course completions, students will understand the essential concepts in the 4 ISACA CRISC domains: Governance IT Risk Assessment Risk Response and Reporting Information Technology and Security This 3 Day CRISC course is geared towards preparing students to pass the ISACA Certified in Risk and Information Systems Control examination. The course covers all four of the CRISC domains, and each section corresponds directly to the CRISC job practice. CRISC validates your experience in building a well-defined, agile risk-management program, based on best practices to identify, analyze, evaluate, assess, prioritize and respond to risks. This enhances benefits realization and delivers optimal value to stakeholders. GOVERNANCE - a. Organizational Governance Organizational Strategy, Goals, and Objectives Organizational Structure, Roles, and Responsibilities Organizational Culture Policies and Standards Business Processes Organizational Assets GOVERNANCE - b. Risk Governance Enterprise Risk Management and Risk Management Framework Three Lines of Defense Risk Profile Risk Appetite and Risk Tolerance Legal, Regulatory, and Contractual Requirements Professional Ethics of Risk Management IT RISK ASSESSMENT - a. IT Risk Identification Risk Events (e.g., contributing conditions, loss result) Threat Modelling and Threat Landscape Vulnerability and Control Deficiency Analysis (e.g., root cause analysis) Risk Scenario Development IT RISK ASSESSMENT - b. IT Risk Analysis and Evaluation Risk Assessment Concepts, Standards, and Frameworks Risk Register Risk Analysis Methodologies Business Impact Analysis Inherent and Residual Risk RISK RESPONSE AND REPORTING - a. Risk Response Risk Treatment / Risk Response Options Risk and Control Ownership Third-Party Risk Management Issue, Finding, and Exception Management Management of Emerging Risk RISK RESPONSE AND REPORTING - b. Control Design and Implementation Control Types, Standards, and Frameworks Control Design, Selection, and Analysis Control Implementation Control Testing and Effectiveness Evaluation RISK RESPONSE AND REPORTING - c. Risk Monitoring and Reporting Risk Treatment Plans Data Collection, Aggregation, Analysis, and Validation Risk and Control Monitoring Techniques Risk and Control Reporting Techniques (heatmap, scorecards, dashboards) Key Performance Indicators Key Risk Indicators (KRIs) Key Control Indicators (KCIs) INFORMATION TECHNOLOGY AND SECURITY - a. Information Technology Principles Enterprise Architecture IT Operations Management (e.g., change management, IT assets, problems, incidents) Project Management Disaster Recovery Management (DRM) Data Lifecycle Management System Development Life Cycle (SDLC) Emerging Technologies INFORMATION TECHNOLOGY AND SECURITY - b. Information Security Principles Information Security Concepts, Frameworks, and Standards Information Security Awareness Training Business Continuity Management Data Privacy and Data Protection Principles
A day of Data Governance, support, networking, and answering your questions. Join me for my 1 Day Data Governance Mastermind where you get allocated time to get specific advice on your current Data Governance challenges and get the chance to network with others in similar situations.
CRR UK equips professionals with the concepts, skills and tools to build conscious, intentional relationships, and to coach relationship systems of any size.
The industry standard course in UX research Master the research skills that make UX professionals so valuable. Become a confident, credible and effective user researcher with a globally recognised qualification. Who is it for? UX professionals Aspiring UX researchers Duration 16 weeks Commitment 3 hours per week Format Online, self-paced with live support and mentoring Why take this user research course: Gain the most in-demand skills* and boost your career in a thriving industry. Learn a complete range of UX research methods. Expand your toolkit to conduct high-quality research at pace. Become an insights expert. Translate findings into actionable insights and communicate them with conviction. Showcase your expertise. Build a professional user research portfolio and earn a university credit-rated qualification. Get the confidence to succeed. Count on our mentors, career advisors and student community throughout your journey. *Research is one of the top 10 most in-demand skills globally (LinkedIn, 2023). A comprehensive, in-depth curriculum This user research course has been created and validated by experts in UX research. It is credit-rated by Glasgow Caledonian University. Self-paced learning gives you the flexibility to study in your own time. Monthly deadlines and submissions give you structure and accountability. The best of both worlds. Module 1 Introduction to user research Understand the role of a UX researcher. Explore the types, methods and ethics of research. Module 2 Planning the research Learn how to build a research plan, collaborate with stakeholders, recruit participants and manage data. Module 3 Fundamental user research skills Master the core skills of interviewing and usability testing. Learn how to moderate and take notes. Module 4 Expanding your toolkit Explore qualitative research methods like ethnography, contextual enquiry, service safaris and diary studies. Module 5 Analysing qualitative research Learn to analyse research data and translate it into user goals, affinity diagrams, personas and journey maps. Module 6 Quantitative research Learn to design, conduct and analyse online surveys, A/B tests and more. Module 7 Communicating the research Learn how to report and present your findings with confidence. Module 8 AI for user research Explore how AI tools can assist researchers. Project Portfolio project Build a professional portfolio to showcase your research expertise.
Build a rewarding career in content design Build a rewarding career in content design with a globally recognised, industry-approved qualification. Get the mindset, the confidence and the skills that will help you stand out in a rapidly growing industry. Why take this course: Be in demand. Certified qualifications will help you stand out in a fast-growing industry Build a career with impact. Design content experiences that will influence users worldwide Broaden your opportunities. Optimise your skills to get hired at leading companies Get qualified. Earn a university credit-rated certification approved by industry leaders Gain the confidence you need to succeed. Our mentors, career advisors and student community will support you all the way University credit-rated, industry-approved Our content design course is credit-rated by Glasgow Caledonian University and has been reviewed and endorsed by leaders in the tech industry. It covers everything you need to become a certified content design professional. Study method Online, self-paced Duration 10 weeks Access to content 12 months Qualification Professional Certificate in Content Design Awarded by Scottish Qualifications Authority trading as SQA Additional info Exam(s) / assessment(s) is included in price Tutor is available to students Description In this Professional Certificate in Content Design course you will learn: An introduction to content design. Understand what content design is and the role of a content designer. Principles of good content design Learn the core principles of content design and why it matters. Voice, tone and style Learn how voice, tone, and style can create a cohesive product experience. Understanding your users Uncover your audience's goals and content needs. Writing for interfaces Learn to write microcopy for buttons, notifications and other UI elements. The product mindset Develop a product mindset by learning about product design systems and tools. Testing content Learn how to test, evaluate and improve your content. AI for content design Learn how to use AI tools to become a more effective content designer. Working in content design Learn how to be the content champion within your organisation. Support at every step From day one, you’ll be part of a lively community of tutors, mentors and fellow students that support each other along the way. Student Success team Our friendly and responsive team will help you stay on track and keep you accountable. Course mentor Your course mentor is an expert content designer who brings years of practical insight. Student community Collaborate, share tips and build connections on our lively student Slack channels. Who is this course for? Writers and journalists who want to enhance their skills for the digital world UX and UI designers who want to become more rounded professionals Content designers looking for a formal qualification that validates their expertise Digital marketers who need content design skills to succeed in their roles Anybody with a writing, content or design background looking for a creative tech job Requirements Background You don’t need experience in design or technology to enrol in our courses. To get the most value from this course, you will need some experience in writing and a genuine interest in words and language. Commitment You do need to be motivated and committed. We set a high bar. Studying for one of our professional qualifications requires a certain amount of time, energy and focus. English language To take this course, you should be fluent in verbal and written English. If English is not your first language, you should have a proficiency of C1 as defined by the CEFRL (Common European Framework of Reference for Languages).
This course offers insights into the art and science of goal setting within a business environment. It delves into the significance of defining and tailoring goals using various methodologies. Additionally, it explores personalizing goal setting for personal development and career advancement. Key Topics Covered: 1. Understanding the principles of effective goal setting. 2. Identifying different goal-setting techniques. 3. Applying personalized goal-setting strategies to enhance professional growth. 4. Leveraging goals to drive success in both personal and professional spheres. Setting clear and well-defined goals is essential for achieving success in any area of life. Whether you’re aiming for career advancement, personal growth, or skill development, having a structured approach to goal setting can make a significant difference!
Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites CompTIA Network+ Certification 1 - Security and Risk Management Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training 2 - Asset Security Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling 3 - Security Engineering Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities 4 - Information Security Management Goals Organizational Security The Application of Security Concepts 5 - Information Security Classification and Program Development Information Classification Security Program Development 6 - Risk Management and Ethics Risk Management Ethics 7 - Software Development Security Software Configuration Management Software Controls Database System Security 8 - Cryptography Ciphers and Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Hashing and Message Digests Email, Internet, and Wireless Security Cryptographic Weaknesses 9 - Physical Security Physical Access Control Physical Access Monitoring Physical Security Methods Facilities Security
Duration 4 Days 24 CPD hours This course is intended for The information protection administrator translates an organization?s risk and compliance requirements into technical implementation. They are responsible for implementing and managing solutions for content classification, data loss prevention (DLP), information protection, data lifecycle management, records management, privacy, risk, and compliance. They also work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization's risk reduction and compliance goals. This role assists workload administrators, business application owners, human resources departments, and legal stakeholders to implement technology solutions that support the necessary policies and controls. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400). Prerequisites Foundational knowledge of Microsoft security and compliance technologies. Basic knowledge of information protection concepts. Understanding of cloud computing concepts. Understanding of Microsoft 365 products and services. 1 - Introduction to information protection and data lifecycle management in Microsoft Purview Know your data Protect your data Prevent data loss Govern your data 2 - Classify data for protection and governance Data classification overview Classify data using sensitive information types Classify data using trainable classifiers Review sensitive information and label usage Explore labeled and sensitive content Understand activities related to your data 3 - Create and manage sensitive information types Compare built-in versus custom sensitive information types Create and manage custom sensitive information types Describe custom sensitive information types with exact data match Implement document fingerprinting Create keyword dictionary 4 - Understand Microsoft 365 encryption Learn how Microsoft 365 data is encrypted at rest Understand service encryption in Microsoft Purview Explore customer key management using Customer Key Learn how data is encrypted in-transit 5 - Deploy Microsoft Purview Message Encryption Implement Microsoft Purview Message Encryption Implement Microsoft Purview Advanced Message Encryption Use Microsoft Purview Message Encryption templates in mail flow rules 6 - Protect information in Microsoft Purview Information protection overview Configure sensitivity labels Configure sensitivity label policies Configure auto-labeling policies Manage, monitor, and remediate information protection 7 - Apply and manage sensitivity labels Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites Plan on-premises labeling Configure on-premises labeling for the Unified Labeling Scanner Apply protections and restrictions to email and files Monitor label performance using label analytics 8 - Prevent data loss in Microsoft Purview Data loss prevention overview Identify content to protect Define policy settings for your DLP policy Test and create your DLP policy Prepare Endpoint DLP Manage DLP alerts in the Microsoft Purview compliance portal View data loss prevention reports Implement the Microsoft Purview Extension 9 - Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform Configure data loss prevention policies for Power Platform Integrate data loss prevention in Microsoft Defender for Cloud Apps Configure policies in Microsoft Defender for Cloud Apps Manage data loss prevention violations in Microsoft Defender for Cloud Apps 10 - Manage data loss prevention policies and reports in Microsoft 365 Configure data loss prevention for policy precedence Implement data loss prevention policies in test mode Explain data loss prevention reporting capabilities Manage permissions for data loss prevention reports Manage and respond to data loss prevention policy violations 11 - Manage the data lifecycle in Microsoft Purview Data Lifecycle Management overview Configure retention policies Configure retention labels Configure manual retention label policies Configure auto-apply retention label policies Import data for Data Lifecycle Management Manage, monitor, and remediate Data Lifecycle Management 12 - Manage data retention in Microsoft 365 workloads Explain retention in Exchange Online Explain retention in SharePoint Online and OneDrive Explain retention in Microsoft Yammer Activate archive mailboxes in Microsoft Exchange Apply mailbox holds in Microsoft Exchange Recover content in Microsoft Exchange 13 - Manage records in Microsoft Purview Records management overview Import a file plan Configure retention labels Configure event driven retention Manage, monitor, and remediate records 14 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 15 - Search for content in the Microsoft Purview compliance portal Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 16 - Manage Microsoft Purview eDiscovery (Standard) Explore Microsoft Purview eDiscovery solutions Implement Microsoft Purview eDiscovery (Standard) Create eDiscovery holds Search for content in a case Export content from a case Close, reopen, and delete a case 17 - Manage Microsoft Purview eDiscovery (Premium) Explore Microsoft Purview eDiscovery (Premium) Implement Microsoft Purview eDiscovery (Premium) Create and manage an eDiscovery (Premium) case Manage custodians and non-custodial data sources Analyze case content 18 - Manage Microsoft Purview Audit (Standard) Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Search the audit log Export, configure, and view audit log records Use audit log searching to investigate common support issues 19 - Prepare Microsoft Purview Communication Compliance Plan for communication compliance Identify and resolve communication compliance workflow Case study--Configure an offensive language policy Investigate and remediate communication compliance alerts 20 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 21 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 22 - Manage regulatory and privacy requirements with Microsoft Priva Create and manage risk management policies Investigate and remediate risk management alerts Create rights requests Manage data estimate and retrieval for rights requests Review data from rights requests Get reports from rights requests 23 - Implement privileged access management Case study--Implementing privileged access management 24 - Manage Customer Lockbox Manage Customer Lockbox requests
Discover the keys to thriving in your social connections with our comprehensive course, 'Social Relationships: Goals and Strategies.' From effective communication and conflict resolution to establishing healthy boundaries, learn the essential skills needed to cultivate and sustain meaningful relationships. Navigate the digital age with confidence, embrace diversity, and set personalized goals for lasting connections. Elevate your interpersonal skills and embark on a journey towards fulfilling social connections. Enroll now to unlock the secrets to successful and satisfying relationships.