• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2034 Courses delivered Online

Secretary PA Training

By EduTech - Taylor Mason

During this 2 day course, you will develop a learning-based action plan to use in your workplace ensuring that you can put the learning into action.

Secretary PA Training
Delivered OnlineFlexible Dates
£595

Secretary PA Training

By EduTech - Taylor Mason

During this 2 day course, you will develop a learning-based action plan to use in your workplace ensuring that you can put the learning into action.

Secretary PA Training
Delivered OnlineFlexible Dates
£595

MACRAME - LEARN TO MAKE A PLANT HANGER

By Golden Rope

Learn to make your own bright and happy plant hangers in this beginner macrame class! No prior experience is needed. In this workshop, instructor Rahamatullah will lead as you learn: • How to begin a macrame piece, including an overview of necessary materials. • How to work several different macrame knots. • How to incorporate a wooden ring and wooden beads. • Leave with a finished plant hanger, and the know-how to design and create more pieces on your own. More benefits: no mistakes possible (you can always start over during the process), and great for reflexes and memory!

MACRAME - LEARN TO MAKE A PLANT HANGER
Delivered OnlineFlexible Dates
£40

MACRAME - LEARN TO MAKE A PLANT HANGER

By Golden Rope

Learn to make your own bright and happy plant hangers in this beginner macrame class! No prior experience is needed. In this workshop, instructor Rahamatullah will lead as you learn: • How to begin a macrame piece, including an overview of necessary materials. • How to work several different macrame knots. • How to incorporate a wooden ring and wooden beads. • Leave with a finished plant hanger, and the know-how to design and create more pieces on your own. More benefits: no mistakes possible (you can always start over during the process), and great for reflexes and memory!

MACRAME - LEARN TO MAKE A PLANT HANGER
Delivered OnlineFlexible Dates
£40

MACRAME - LEARN TO MAKE A PLANT HANGER

By Golden Rope

Learn to make your own bright and happy plant hangers in this beginner macrame class! No prior experience is needed. In this workshop, instructor Rahamatullah will lead as you learn: • How to begin a macrame piece, including an overview of necessary materials. • How to work several different macrame knots. • How to incorporate a wooden ring and wooden beads. • Leave with a finished plant hanger, and the know-how to design and create more pieces on your own. More benefits: no mistakes possible (you can always start over during the process), and great for reflexes and memory!

MACRAME - LEARN TO MAKE A PLANT HANGER
Delivered OnlineFlexible Dates
£40

FORENSIC ANALYSIS BOOTCAMP

By Behind The Balance Sheet

The Forensic Analysis Bootcamp is an 8-week deep-dive into forensic equity analysis, featuring a 90-minute Zoom workshop each week. The content includes extensive use of real-life case studies and covers stocks spanning a wide range of sectors and regions. You will learn how companies manipulate expenses and inflate profits, how to spot balance sheet issues, weaknesses of the cash flow statement and issues and more.

FORENSIC ANALYSIS BOOTCAMP
Delivered OnlineFlexible Dates
£1,499

Market Definition and Sizing Strategies

By Compete High

🚀 Unlock Market Success: Market Definition and Sizing Strategies Course! 🌐 Are you ready to revolutionize your approach to market strategy? Introducing our cutting-edge online course: Market Definition and Sizing Strategies. Whether you're a seasoned entrepreneur, a budding startup enthusiast, or a marketing maven looking to take your skills to the next level, this course is designed to equip you with the knowledge and tools needed to navigate the dynamic landscape of market analysis.   📚 Course Curriculum: Dive into the Essentials! Module 1: Introduction Get ready to embark on a transformative journey! We kick off with an in-depth overview of market dynamics, trends, and the crucial role market definition and sizing play in your business success. Module 2: The Market Funnel Framework Uncover the secrets of the market funnel - a strategic blueprint that will guide you through the entire customer journey. Learn how to identify key touchpoints and optimize your marketing efforts for maximum impact. Module 3: Define Your Market Craft a crystal-clear understanding of your target market. We delve into methods and frameworks to identify and segment your audience effectively, ensuring your products or services resonate with the right customers. Module 4: How to Size Your Market Size matters! Learn proven methodologies to estimate the size of your market accurately. Discover key metrics, tools, and techniques to assess market potential, giving you a competitive edge in strategic decision-making. Module 5: Workshop Put theory into practice! Engage in interactive workshops where you'll apply the knowledge gained in the previous modules to real-world scenarios. Receive personalized feedback from industry experts and fellow participants, ensuring you leave with actionable insights.   🎓 Why Choose Our Course? ✅ Expert-Led Learning: Our instructors bring a wealth of industry experience, providing practical insights and real-world examples. ✅ Interactive Workshops: Apply your knowledge in a hands-on environment, solidifying your understanding and boosting your confidence. ✅ Lifetime Access: Enjoy unlimited access to course materials, updates, and future additions to stay ahead in the ever-evolving world of market strategies. ✅ Networking Opportunities: Connect with like-minded professionals, exchange ideas, and build a valuable network within our exclusive community.   🌟 Join the Elite: Enroll Now! Don't miss this opportunity to elevate your market strategy game. Enroll in the Market Definition and Sizing Strategies course today and unlock the potential for unparalleled business success. Your journey to mastering market dynamics starts here! 🔗 [Enroll Now] #MarketSuccess #StrategicInsights #OnlineLearningSuccess Course Curriculum Module 1- Introduction Market Sizing Explained 01:54 Module 2- The Market Funnel Framework The Market Funnel Framework Described 04:13 Module 3- Define Your Market How Broadly Should You Define Your Market 02:25 Methods to Defining a Market 02:11 Market Definition Walk-Through Skincare 04:05 Market Definition Walk-Through Microbrewing 00:48 Module 4- How to Size Your Market TAM, SAM, and SOM 05:59 How Investors View Your Business 02:37 Sizing Your Market Walk-Through Skincare 06:08 Module 5- Workshop Workshop - Defining and Sizing Your Market Walk-Through 03:17

Market Definition and Sizing Strategies
Delivered Online On Demand1 hour
£25

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

Couples Therapy: Beyond Foundations - Full Recording

By Practical CBT

Full recording of the workshop: Couples Therapy - Beyond Foundations You will have access to the recording for 14 days. 

Couples Therapy: Beyond Foundations - Full Recording
Delivered Online On Demand2 hours
£25

Crafting Persuasive Business Profiles for Investor Engagement

By Compete High

🚀 Unlock the Power of Persuasion: Crafting Persuasive Business Profiles for Investor Engagement Online Course 🚀   Are you ready to captivate investors and skyrocket your business success? Introducing our comprehensive online course: 'Crafting Persuasive Business Profiles for Investor Engagement.' This course is meticulously designed to empower entrepreneurs like you to master the art of creating compelling business profiles that will leave investors eager to be a part of your journey.   🌟 Module 1: Introduction Dive into the world of persuasive business profiles with a solid foundation. Understand the psychology behind investor engagement and learn the essential elements that make a business profile irresistible. Set the stage for success as you embark on a transformative learning journey. 📚 Module 2: Write Your Company Overview Crafting a compelling company overview is an art, and in this module, we break it down for you step by step. Discover how to communicate your business's unique value proposition, highlight key achievements, and showcase your vision in a way that resonates with potential investors. Elevate your narrative and create a profile that stands out from the crowd. 🔧 Module 3: Workshop Put your newfound knowledge into action with hands-on workshops. Receive personalized feedback and guidance as you work through real-life scenarios. Develop your skills in real-time and gain the confidence to create business profiles that not only capture attention but also inspire investment.   🎓 What You'll Gain: ✅ In-depth understanding of investor psychology ✅ Mastery in crafting persuasive business profiles ✅ Techniques to highlight your company's strengths ✅ Skills to articulate your vision and mission effectively ✅ Confidence to engage with potential investors   🎯 Who Should Enroll: 🚀 Entrepreneurs seeking investment 📈 Small business owners looking to scale 💼 Professionals aiming to enhance their business communication skills   💡 BONUS: Exclusive templates and resources to kickstart your business profile creation process!   🌐 Don't miss this opportunity to transform your business narrative and attract the investment you deserve. Enroll now and unlock the door to a future filled with success!   🚀 Join the revolution in business storytelling! Craft your compelling business profile today! 🚀 [Enroll Now] [Limited Seats Available]   Course Curriculum Module 1- Introduction What to Cover in Your Company Overview 02:29 Module 2- Write Your Company Overview Questions Your Company Overview Must Cover 01:44 5 Things Your Company Overview Must Cover 04:19 Executive Summary vs Company Overview 00:52 Why Investors Look For 01:25 Avoid Exaggeration in Your Company Overview 01:40 The Who, What, Where, When and How of Your Company Overview 04:33 Reflex Case Study 01:38 Writing a Great Company Profile 08:57 Company Profile 01:39 The Team 10:32 Staffing Strategy 01:47 Business Model 09:10 Current Status 05:27 Additional Topics to Include in the Company Overview 03:47 Common Mistakes 03:05 Module 3- Workshop Workshop Write Your Company Overview 03:11

Crafting Persuasive Business Profiles for Investor Engagement
Delivered Online On Demand1 hour
£25