• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

37383 Courses delivered Online

Head Protection Awareness

By OnlineCoursesLearning.com

Head Protection Awareness Certification More than 1,000,000 individuals in England and Wales look for crisis or pressing treatment for head wounds each year. A portion of these wounds happen in the working environment, especially in high-hazard businesses like development and mining. Accordingly, it is urgent that laborers are satisfactorily secured against the most well-known reasons for head injury. This course diagrams the down to earth steps you need to take when picking and utilizing head insurance at work, just as the lawful commitments which should be met by bosses and representatives under the law. You Will Learn Why managers should treat the issue of head insurance appropriately, the results of head injury, who is most in danger and the primary bits of enactment administering the utilization of head security at work. The most widely recognized sorts of defensive headgear utilized in the work environment, how wellbeing caps and knock covers lessen the danger of injury and how to pick the best kind of head security for your necessities. The normal life expectancy of defensive headgear, how to clean and store security caps and knock covers and the signs the propose you need to supplant them. Why laborers need to follow head and security rules in the work environment, how to assemble a wellbeing driven work culture, the part of preparing in advancing consistence and why a few representatives are excluded from the principles the expect them to wear head assurance. Advantages Of Taking This Course Anybody liable for undertaking hazard evaluations and drawing up wellbeing and security strategies in a working environment will profit by this outline of the appropriate use and care of head assurance. On the off chance that you are filling in as a wellbeing and security mentor, this course will assist you with creating thorough preparing materials for those working in high-hazard enterprises. This course will assist those in administrative parts with empowering consistence in the working environment, subsequently decreasing the quantity of mishaps that happen. In the event that you are a worker in an industry that expects you to wear head assurance, you will profit by getting familiar with how head insurance brings down your danger of injury. Anybody intrigued by the field of word related wellbeing will discover this course to be of interest, as it traces the causes and results of head injury in the work environment.

Head Protection Awareness
Delivered Online On Demand
£50

Computers and Internet for Beginners

By OnlineCoursesLearning.com

Computer and Internet for Beginners Certification This simple to-follow 10 module course is intended to assist staff in your business with a fundamental comprehension of how to work a PC and the web, to propel their insight and expert these apparatuses. This course will give colleagues a comprehension of how to utilize a PC, to work on their life and advance their profession. They will figure out how to utilize the web to investigate, utilize online media, deal with their messages, recover data and how to remain safe at the same time. This course is totally on the web, so your representatives can concentrate anyplace and whenever as long, as they have a web association. The course by and large takes around 15 hours to finish, yet, as everybody learns at various rates, a few people can finish the course sooner than others. Admittance to this course is accessible across all gadgets that have web access. What's Covered in the Course? Through this course, students will learn: The fundamental parts and how to work a PC; What programming is important, to empower a PC to work; The apparatuses that are accessible to address blunders, find records, fix and re-try activities or reorder; Console alternate routes and how you can utilize them, to work on their experience; The basics of the web, for example, how it works and how to discover a specialist organization and enact their administration; Instructions to utilize fundamental web capacities and devices and how to find and explore sites; The capacity to easily explore their email, in any event, utilizing progressed highlights; Acquaintance with online media, figuring out how to make a record, transfer photographs and how to utilize it, to expertly interface with individuals; The significance of web wellbeing and how to make a solid secret phrase, to shield their records. What are the Benefits of the Course? There are a scope of advantages to effectively finishing this course. These advantages include: Learning the fundamentals important to work a PC and start exploring the web; Getting an incredible beginning, to help advance your representative's profession; The course is accessible altogether on the web; Your colleagues can learn at that point and from the spot that best suits them; Study materials are accessible on all significant gadgets, and your colleagues can get to them every minute of every day.

Computers and Internet for Beginners
Delivered Online On Demand
£50

Definitive Nagios for engineers

5.0(1)

By Systems & Network Training

Definitive Nagios training course description Nagios is an open source application designed to provide system and network monitoring. This hands on course gives a comprehensive coverage of using Nagios to provide monitoring of Linux, Windows and network devices. The course is based on Nagios core but contact us if you would like Nagios XI. What will you learn Install Nagios. Configure Nagios. Monitor Windows, Linux and Cisco (and other network equipment) using Nagios. Configure notifications Definitive Nagios training course details Who will benefit: Technical staff working with Nagios. Prerequisites: None. Duration 2 days Definitive Nagios for engineers Nagios architecture Downloading Nagios, Installing Nagios, Nagios core, plugins, frontends, addons. Nagios XI. Nagios Fusion. Hands on Installing Nagios. Getting started with Nagios Nagios files, nagios.cfg, minimal.cfg. Starting and stopping Nagios. Hands on Controlling Nagios. Using Nagios Nagios web interface. Maps, Hosts, host groups, services, service groups, problems. Reports. Configuration. Hands on Using the web interface. Monitoring Linux systems SSH, NRPE. Hands on Monitoring Linux system health. Monitoring Windows systems Installing NSClient++, Configuring NSClient++, check_nt plugin, monitoring uptime, CPU, memory, disks, services, processes. Hands on Monitoring Windows system health. Monitoring network devices SNMP architecture, MIBs. Polling. Hands on Configuring Nagios for SNMP. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. Hands on Monitoring network devices. Nagios alerts and notifications SNMP traps. Email notifications, SMS alerts other messaging

Definitive Nagios for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Python Programming for Beginners: Hands-on (Online Lab)

By Packt

This course will help you to learn the basic concepts of Python programming. From understanding variables to functions and debugging the programs to exception handling, you will master it all with the help of engaging exercises and projects.

Python Programming for Beginners: Hands-on (Online Lab)
Delivered Online On Demand15 hours 50 minutes
£93.99

Certified Data Centre Expert (CDCE)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is any IT, facilities or data centre professional, who are involved in the design/build, renovation or relocation of a mission-critical data centre. Overview This 5-day course is designed to prepare participants to analyse a given business case and perform technical evaluation for a project plan and a set of designs for the implementation of a mission critical data centre. The course also engages participants in product evaluations and demonstrates how to select equipment and develop equipment test scripts (IET) and integrated performance and validation testing (IPVT). CDCE© builds upon knowledge gained in CDCP and CDCS courses. Participants who pass the exam will join the industry's elite data centre project design experts. CDCE© is the highest level training in the EPI Design and Build training track under the EPI Data Centre Training Framework. Participants must hold a valid CDCS certificate in order to be able to register for the CDCE class. CDCE© is the premier certification for data centre professionals in the data centre design/build and related fields. Data Centre Life Cycle Data centre lifecycle stages and phases Exercise: Stage/Phase/Milestone/Document mapping Design Preparation Creation of a SON ? Statement Of Need Technology review Conceptual sizing How to calculate for computer room space How to calculate facility space How to calculate incoming power Exercise: Conceptual sizing building and power Analysing capacity of existing facility Analysing investment options Site selection Permits and approvals Exercise: Site selection Conceptual design Budget and project timeline Business case preparation Project delivery structure Project management options Project manager and team Design Planning OSRA?Operational Systems Requirement Analysis TFRA?Technical Facilities Requirement Analysis Operations and maintenance review RFP?Request For Proposal process Vendor selection Design Development Project planning Design development PDR ? Preliminary Design Review Equipment selection FDR/V ? Final Design Review/Validation Exercise: Full design validation of power, cooling, floor plans, fire suppression Design freeze and LLTI Creation of construction documents BOM/BOQ ? Bill Of Material/Bill Of Quantity Exercise: Equipment selection Acquire Requirements of purchase orders Shipping terms FWT/FAT ? Factory Witness Test/Factory Acceptance Test Sequencing Incoming goods inspection and handling Asset management Construct Temporary essential services Erection of the building Permanent essential services Building inspection Snag list COF?Certificate Of Fitness Fit-Out Fit-Out Builders cleaning As-Built Drawings Test & Commissioning IET?Individual Equipment Test IPVT/IST?Integrated Performance Verification Test/Integrated Systems Test Common mistakes with IET/IPVT Deep cleaning Exercise: IET/IPVT scripting Hand-Over Facility hand-over requirements and documents PCC?Practical Completion Certificate DLP?Defect Liability Period Defect Management ICT Systems Installation ICT Systems Testing Hand-Over/DLP Expiry FCC?Final Completion Certificate Retirement Reasons and definitions of retirement Building the business case and project plan Sequencing Transfer of site Demolishing of site Legal matters FCC?Final Completion Certificate Exam: Certified Data Centre Expert (CDCE©) The CDCE© exam is in two parts: Part A is a 90-minute closed book exam, with 60 multiple-choice questions. For Part A, the candidate requires a minimum of 45 correct answers to pass the exam. Part B is a 90-minute closed book exam, with 25 open questions. For Part B the candidate needs to obtain a minimum of 75% to pass. Additional course details: Nexus Humans Certified Data Centre Expert (CDCE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Data Centre Expert (CDCE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Data Centre Expert (CDCE)
Delivered OnlineFlexible Dates
£3,500

British Citizenship and International Law - QLS Level 4 & 5

By Imperial Academy

Level 4 & 5 Endorsed Diploma | QLS Hard Copy Certificate Included | Plus 5 CPD Courses | Lifetime Access

British Citizenship and International Law - QLS Level 4 & 5
Delivered Online On Demand
£199

Rescuing Difficult Customers

By OnlineCoursesLearning.com

Saving Difficult Customers Certification Indeed, even fruitful associations should manage disappointed clients or customers every once in a while. A portion of these clients will be hostile, regularly on the grounds that they feel irate or upset and battle to control their feelings. As such, they are "troublesome clients". Taking care of these clients requires solid relational abilities, a quiet way and an eagerness to work with the client. In this course, you will figure out how to determine tense circumstances and resolve protests rapidly and proficiently. You Will Learn: The reasons why a client might be disappointed with an item or administration The most effective method to utilize your voice to stop a strained circumstance, and how trying to avoid panicking can improve a client's disposition Why you ought to never endeavor to reject obligation Why you should zero in on the client first, at that point the difficult that has incited their grumbling Why you ought to circle back to a client after you have tackled their concern Advantages of Taking This Course: In the event that you work in client benefits, this course will help you manage troublesome clients and, thus, decrease your feelings of anxiety On the off chance that you work in an office, this course will help you handle troublesome guests In the event that you work in deals, this course will assist you with stopping tense or off-kilter minutes that may emerge during an attempt to sell something On the off chance that you work in an occupation whereby you regularly come into contact with people in general, for example, the crisis benefits, this course will help you stay quiet in testing circumstances

Rescuing Difficult Customers
Delivered Online On Demand
£50

The HMT Sanctions List

By OnlineCoursesLearning.com

Introduction: HM Treasury maintains comprehensive records of all persons and entities currently subject to sanctions. This means that they face financial restrictions, usually on the basis of their links with terrorist activity or human rights abuse. If you run a business, you need to make sure that you do not handle money or assets owned by sanctioned parties, or enter into an arrangement whereby you grant them access to funds. To do so is a criminal offence. In this course, you will learn how financial sanctions work and how to meet your duties under the law.   What You Will Learn: How financial sanctions work and the purpose and scope of the UK financial sanctions regime The scope and purpose of the Consolidated List and the UK Investment Ban List The parties responsible for maintaining these lists and how to use target and name matches to ensure that you do not engage in any transactions with individuals and entities named on the list How to verify customers' identity, and the information you should collect when undertaking transactions Benefits of Taking This Course: If you are a business owner, you will benefit from learning how to avoid conducting business with sanctioned parties If you are responsible for financial transactions as part of your job, you will benefit from learning how to verify a customer's identity and check whether they are currently facing sanctions If you work in the financial sector, this course will provide you with a good introduction to sanctions If you work in the public sector, you may benefit from furthering your understanding of how the Financial Conduct Authority (FCA), the Treasury and other bodies work together to combat crime

The HMT Sanctions List
Delivered Online On Demand
£50

Office Ergonomics Training: Improving Workplace Comfort

4.3(43)

By John Academy

Enhance workplace comfort and productivity with our Office Ergonomics Training course. Learn essential ergonomic principles, set up ergonomic workstations, prevent injuries, and comply with legislation. Explore remote work ergonomics for a healthier, more efficient workforce. Enroll now!

Office Ergonomics Training: Improving Workplace Comfort
Delivered Online On Demand1 hour
£11.99

CertNexus Certified CyberSec First Responder (CFR-410)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners preparing for or who currently perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for those roles within federal contracting companies and private sector firms whose mission or strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD Information Network (DoDIN) operation and incident handling. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. Overview In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will: Assess cybersecurity risks to the organization. Analyze the threat landscape. Analyze various reconnaissance threats to computing and network environments. Analyze various attacks on computing and network environments. Analyze various post-attack techniques. Assess the organization's security posture through auditing, vulnerability management, and penetration testing. Collect cybersecurity intelligence from various network-based and host-based sources. Analyze log data to reveal evidence of threats and incidents. Perform active asset and network analysis to detect incidents. Respond to cybersecurity incidents using containment, mitigation, and recovery tactics. Investigate cybersecurity incidents using forensic analysis techniques. This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation. In addition, this course and subsequent certification (CFR-410) meet all requirements for personnel requiring DoD directive 8570.01-M position certification baselines: CSSP Analyst CSSP Infrastructure Support CSSP Incident Responder CSSP Auditor The course and certification also meet all criteria for the following Cybersecurity Maturity Model Certification (CMMC) domains: Incident Response (IR) Audit and Accountability (AU) Risk Management (RM) Lesson 1: Assessing Cybersecurity Risk Topic A: Identify the Importance of Risk Management Topic B: Assess Risk Topic C: Mitigate Risk Topic D: Integrate Documentation into Risk Management Lesson 2: Analyzing the Threat Landscape Topic A: Classify Threats Topic B: Analyze Trends Affecting Security Posture Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments Topic A: Implement Threat Modeling Topic B: Assess the Impact of Reconnaissance Topic C: Assess the Impact of Social Engineering Lesson 4: Analyzing Attacks on Computing and Network Environments Topic A: Assess the Impact of System Hacking Attacks Topic B: Assess the Impact of Web-Based Attacks Topic C: Assess the Impact of Malware Topic D: Assess the Impact of Hijacking and Impersonation Attacks Topic E: Assess the Impact of DoS Incidents Topic F: Assess the Impact of Threats to Mobile Security Topic G: Assess the Impact of Threats to Cloud Security Lesson 5: Analyzing Post-Attack Techniques Topic A: Assess Command and Control Techniques Topic B: Assess Persistence Techniques Topic C: Assess Lateral Movement and Pivoting Techniques Topic D: Assess Data Exfiltration Techniques Topic E: Assess Anti-Forensics Techniques Lesson 6: Assessing the Organization's Security Posture Topic A: Implement Cybersecurity Auditing Topic B: Implement a Vulnerability Management Plan Topic C: Assess Vulnerabilities Topic D: Conduct Penetration Testing Lesson 7: Collecting Cybersecurity Intelligence Topic A: Deploy a Security Intelligence Collection and Analysis Platform Topic B: Collect Data from Network-Based Intelligence Sources Topic C: Collect Data from Host-Based Intelligence Sources Lesson 8: Analyzing Log Data Topic A: Use Common Tools to Analyze Logs Topic B: Use SIEM Tools for Analysis Lesson 9: Performing Active Asset and Network Analysis Topic A: Analyze Incidents with Windows-Based Tools Topic B: Analyze Incidents with Linux-Based Tools Topic C: Analyze Indicators of Compromise Lesson 10: Responding to Cybersecurity Incidents Topic A: Deploy an Incident Handling and Response Architecture Topic B: Mitigate Incidents Topic C: Hand Over Incident Information to a Forensic Investigation Lesson 11: Investigating Cybersecurity Incidents Topic A: Apply a Forensic Investigation Plan Topic B: Securely Collect and Analyze Electronic Evidence Topic C: Follow Up on the Results of an Investigation Additional course details: Nexus Humans CertNexus Certified CyberSec First Responder (CFR-410) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified CyberSec First Responder (CFR-410) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Certified CyberSec First Responder (CFR-410)
Delivered OnlineFlexible Dates
£3,495