• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3331 Design courses in Swinton delivered Live Online

Technical Report Writing and Presentation Skills for Oil & Gas Engineers and Technical Professionals

By EnergyEdge - Training for a Sustainable Energy Future

Develop your technical report writing and presentation skills with EnergyEdge's course designed for oil & gas professionals. Sign up now!

Technical Report Writing and Presentation Skills for Oil & Gas Engineers and Technical Professionals
Delivered in Internationally or OnlineFlexible Dates
£1,399 to £1,499

Cisco Digital Learning Collaboration

By Nexus Human

Duration 48.125 Days 288.75 CPD hours Cisco Learning Library: Collaboration provides on-demand training to help your IT staff design, implement, manage, and troubleshoot your organization?s collaboration and video infrastructure based on Cisco collaboration and unified communications solutions.This comprehensive technical training library includes full-length interactive certification courses, product and technology courses with labs, and thousands of reference materials. Collaboration Library Certification Courses CCNP Collaboration Implementing Cisco Collaboration Core Technologies (CLCOR) v1.0 Implementing Cisco Collaboration Applications (CLICA) v1.0 Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) v1.0 Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI) v1.0 Implementing Automation for Cisco Collaboration Solutions (CLAUI) v1.0 CCIE Collaboration Implementing Cisco Collaboration Core Technologies (CLCOR) v1.0 Product and technology training Cisco Video Infrastructure Design (VID) v1.0 Developing Applications for Cisco Webex and Webex Devices (DEVWBX) v1.0 Implementing Automation for Cisco Collaboration Solutions (CLAUI) v1.0 Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) v1.0 Implementing Cisco Collaboration Applications (CLICA) v1.0 Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI) v1.0 Implementing Cisco Collaboration Core Technologies (CLCOR) v1.0 Understanding Cisco Collaboration Foundations (CLFNDU) v1.0

Cisco Digital Learning Collaboration
Delivered OnlineFlexible Dates
Price on Enquiry

Networking in Google Cloud

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This class is intended for network engineers and network admins that are either using Google Cloud Platform or are planning to do so. The class is also for individuals that want to be exposed to software-defined networking solutions in the cloud. Overview Configure Google VPC networks, subnets, and routers Control administrative access to VPC objects Control network access to endpoints in VPCsInterconnect networks among GCP projects Interconnect networks among GCP VPC networks and on-premises or other-cloud networks Choose among GCP load balancer and proxy options and configure them Use Cloud CDN to reduce latency and save money Optimize network spend using Network TiersConfigure Cloud NAT or Private Google Access to provide instances without public IP addresses access to other services Deploy networks declaratively using Cloud Deployment Manager or Terraform Design networks to meet common customer requirements Configure monitoring and logging to troubleshoot networks problems Learn about the broad variety of networking options on Google Cloud. This course uses lectures, demos, and hands-on labs to help you explore and deploy Google Cloud networking technologies, including Virtual Private Cloud (VPC) networks, subnets, and firewalls; interconnection among networks; load balancing; Cloud DNS; Cloud CDN; and Cloud NAT. You'll also learn about common network design patterns and automated deployment using Cloud Deployment Manager or Terraform. Google Cloud VPC Networking Fundamentals Recall that networks belong to projects. Explain the differences among default, auto, and custom networks. Create networks and subnets. Explain how IPv4 addresses are assigned to Compute Engine instances. Publish domain names using Google Cloud DNS. Create Compute Engine instances with IP aliases. Create Compute Engine instances with multiple virtual network. Controlling Access to VPC Networks Outline how IAM policies affect VPC networks. Control access to network resources using service accounts. Control access to Compute Engine instances with tag-based firewall rules. Sharing Networks across Projects Outline the overall workflow for configuring Shared VPC. Differentiate between the IAM roles that allow network resources to be managed. Configure peering between unrelated VPC Networks. Recall when to use Shared VPC and when to use VPC Network Peering. Load Balancing Recall the various load balancing services. Configure Layer 7 HTTP(S) load balancing. Whitelist and blacklist IP traffic with Cloud Armor. Cache content with Cloud CDN. Explain Layer 4 TCP or SSL proxy load balancing. Explain regional network load balancing. Configure internal load balancing. Recall the choices for enabling IPv6 Internet connectivity for Google Cloud load balancers. Determine which Google Cloud load balancer to use when. Hybrid Connectivity Recall the Google Cloud interconnect and peering services available to connect your infrastructure to Google Cloud. Explain Dedicated Interconnect and Partner Interconnect. Describe the workflow for configuring a Dedicated Interconnect. Build a connection over a VPN with Cloud Router. Determine which Google Cloud interconnect service to use when. Explain Direct Peering and Partner Peering. Determine which Google Cloud peering service to use when. Networking Pricing and Billing Recognize how networking features are charged for. Use Network Service Tiers to optimize spend. Determine which Network Service Tier to use when. Recall that labels can be used to understand networking spend. Network Design and Deployment Explain common network design patterns. Configure Private Google Access to allow access to certain Google Cloud services from VM instances with only internal IP addresses. Configure Cloud NAT to provide your instances without public IP addresses access to the internet. Automate the deployment of networks using Deployment Manager or Terraform. Launch networking solutions using Cloud Marketplace. Network Monitoring and Troubleshooting Configure uptime checks, alerting policies and charts for your network services. Use VPC Flow Logs to log and analyze network traffic behavior.

Networking in Google Cloud
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Information Privacy Technologist (CIPT)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialist Anyone who builds and develops IT systems Overview Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to preempt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal The Principles of Privacy in Technology training is the how to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. The training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Technologist (CIPT) certification program. Fundamentals of information privacy Reviewing the modern history of privacy Foundational privacy concepts Data protection roles and fair information practices Exploring the impacts of privacy and data protection regulations on information management Privacy in the IT environment Compliance requirements IT risks Stakeholder privacy expectations Differentiating between privacy and security Core privacy concepts Foundational elements for embedding privacy in IT Common privacy principles Data protection by design and default Privacy considerations in the information life cycle Privacy considerations throughout the stages of the information life cycle Privacy in systems and applications Examining the risks inherent in the IT environment and options for addressing them Identity and access management Credit card information and processing Remote access BYOD and telecommuting Data encryption Additional privacy-enhancing technologies in the enterprise environment Privacy techniques Strengths and weaknesses of authentication techniques Using identifiers Privacy by design Online privacy issues Unique challenges that come from online privacy issues Laws and regulations Online threats Social media E-commerce Tracking technologies Web security protocols Technologies with privacy considerations Privacy considerations associated with a variety of technologies Cloud computing Wireless IDs Location-based services ?Smart? technologies Video/data/audio surveillance Biometric recognition

Certified Information Privacy Technologist (CIPT)
Delivered OnlineFlexible Dates
Price on Enquiry

Value Delivery System in Projects

By IIL Europe Ltd

This highly interactive program focuses on building the business focus on value to be achieved from initiatives. The practices in this program apply equally to projects and programs. Participants will gain insight into the capabilities needed to develop the culture, processes, and tools behind validation, what true initiatives' success looks like, which can be closely linked to achieving value. They will learn and experiment with a variety of value definition and management techniques. Working in small groups, they will collaborate with others to brainstorm, share experiences, and apply concepts to the ongoing value confirmation goal. Participants will also discover the importance of designing metrics around value and addressing blind spots that could happen when the focus is on the wrong metrics and how that could lead to the wrong behaviors being practiced. Participants will also gain insights into key skills for leading and working in the future. Hands-on experimentation activities enhance the theoretical learning, grounding it in real life and giving opportunities to practice creativity in capturing value.

Value Delivery System in Projects
Delivered OnlineFlexible Dates
£850 to £1,495

BCS Foundation Certificate in Agile

5.0(12)

By Duco Digital Training

The course is relevant to anyone requiring an understanding of the use of Agile or looking to adopt it. This includes, but is not limited to, organisational leaders and managers, marketing executives and managers, and/or all professionals working in an Agile environment, including software sesters, developers, business analysts, UX designers, project management office (PMO), project support and project coordinators.

BCS Foundation Certificate in Agile
Delivered OnlineFlexible Dates
£850

Learn how to make your own Macrame Dreamcatcher

5.0(13)

By Spiritual Vitality

Learn how to make your own Macrame Dreamcatcher Are you new to Macrame? No worries, it’s actually very easy to learn! Come and learn how to knot your own dreamcatcher. Learn basic macrame knots to create your own Macrame Dreamcatcher. Adding that Boho feel to your home has never been easier.

Learn how to make your own Macrame Dreamcatcher
Delivered in person or OnlineFlexible Dates
£25

Healthcare Hero Instructor Training Certification: Level 1

By HFX Training

At HFX Training, we are passionate about business simulations because they bring learning to life through hands-on experience. This Level 1 Certification Program is the first step in our Instructor Training Certification Pathway, equipping you to confidently use the Healthcare Hero simulation in your teaching environment. In this program, you will experience the simulation as a student, navigating its complexities and dynamics. Upon successfully completing Level 1, you’ll be ready to advance to Level 2 Training, where you will deepen your expertise in simulation facilitation and administration. The program is cohort-based, and the timetable is coordinated in advance through discussions with the HFX team to ensure maximum participation. For more information on the program structure, instructional materials, and certification requirements, please read on. What to Expect: The Healthcare Hero simulation places you in charge of a fictional hospital. Over eight simulation rounds - each representing one quarter of business operations - you will make strategic decisions to optimize patient care while managing staffing, capacity, quality, and finances. Throughout the simulation, you’ll navigate challenges like healthcare and economic crises, all while balancing the needs of multiple stakeholders. Your ultimate goal is to outperform competing hospitals managed by other participants in the program. Program and Certification Requirements This program equips you to confidently lead the simulation by requiring more than attendance or participation. To earn certification, you must: Thoroughly Prepare: Review all instructional materials and the scenario manual before the course begins. Fully Participate: Attend all Zoom sessions and complete each simulation round with focus and effort. Demonstrate Mastery: Show a comprehensive understanding of the simulation’s dynamics, decision-making processes, and strategies during practice and live rounds. Engage in Reflection: Actively participate in debrief sessions, assess your performance, and identify strategies for improvement. This certification ensures you are equipped to facilitate this complex simulation with confidence. Auditing the course is an option, but participants who choose to audit will not receive certification. Program Format The program is delivered intensively over one or more Zoom sessions, totaling six hours. This compressed format demands your full attention and focus to successfully navigate the simulation’s complexities. Eligibility Requirements: By registering for this training program, you acknowledge the following: You have discussed your needs with the HFX team and confirmed that the simulation aligns with your class or program objectives. You are an instructor at an academic institution. You agree to the confidentiality terms and commit not to distribute, disclose, or replicate any program content for purposes outside of this training. This program is offered in goodwill to academic instructors as a resource to enhance their teaching. As part of this agreement, you understand that all materials, including the simulation itself, are proprietary to HFX and its partners. Any use of these materials for purposes beyond this program, such as developing similar tools or simulations, is strictly prohibited. Course Structure: After registering, you will gain immediate access to the simulation’s instructional materials. This includes: The Scenario Manual: Your guide to understanding the game. The Capacity Planner Worksheet and Financial Planning Worksheet: Tools to help you strategize. The Strategy Planning Exercise: Designed to align your decisions with overall objectives. The Portal Guide: A walkthrough of the simulation platform. The program unfolds in four key phases: Phase 1: Pre Zoom Call / Study / Set Up Register using the button at the bottom of this page. Review the instructional materials thoroughly. Once the cohort is finalized, you will be sent your login credentials for the simulation itself. Try to submit decisions for the first practice round using the simulation portal at www.simulationportal.com. Phase 2: Play We run two practice rounds over the first 2 hours of the zoom call. This allows you to familiarize yourself with the platform and decision-making process, and think through what your strategy might be in the live game. The simulation resets ("zeroed") after the practice rounds. A brief session will clarify lessons learned and expectations for the live rounds. Over eight rounds, you’ll compete against other participants while refining your strategic decisions. Phase 3: Feedback Reflect on your performance during a structured debrief, including: Strengths and areas for improvement. Insights into competitors’ strategies. Strategic lessons learned, and applicability to local healthcare organizations. Phase 4: Implementation Planning Work with the HFX team to plan your first application of the simulation in a teaching environment. Certification Outcome Upon completing this program, you will earn the HFX Instructor Training Certification: Level One, signifying your expertise in conducting impactful simulation-based training using Healthcare Hero.

Healthcare Hero Instructor Training Certification: Level 1
Delivered OnlineFlexible Dates
$2,000

Securing Cisco Networks with Open Source Snort (SSFSNORT) v2.1

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Security administrators Security consultants Network administrators System engineers Technical support personnel Channel partners and resellers Overview Upon completing this course, the learner will be able to meet these overall objectives: Define the use and placement IDS/IPS components. Identify Snort features and requirements. Compile and install Snort. Define and use different modes of Snort. Install and utilize Snort supporting software. Securing Cisco Networks with Open Source Snort (SSFSNORT) v3.0 is a 4-day course that shows you how to deploy Snort© in small to enterprise-scale implementations. You will learn how to install, configure, and operate Snort in Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) modes. You?ll practice installing and configuring Snort, utilize additional software tools and define rules to configure and improve the Snort environment, and more. The course qualifies for 32 Cisco Continuing Education credits (CE) towards recertification.This course will help you:Learning how to implement Snort, an open-source, rule-based, intrusion detection and prevention system. Gain leading-edge skills for high-demand responsibilities focused on security. Module 1: Detecting Intrusions with Snort 3.0 History of Snort IDS IPS IDS vs. IPS Examining Attack Vectors Application vs. Service Recognition Module 2: Sniffing the Network Protocol Analyzers Configuring Global Preferences Capture and Display Filters Capturing Packets Decrypting Secure Sockets Layer (SSL) Encrypted Packets Module 3: Architecting Nextgen Detection Snort 3.0 Design Modular Design Support Plug Holes with Plugins Process Packets Detect Interesting Traffic with Rules Output Data Module 4: Choosing a Snort Platform Provisioning and Placing Snort Installing Snort on Linux Module 5: Operating Snort 3.0 Start Snort Monitor the System for Intrusion Attempts Define Traffic to Monitor Log Intrusion Attempts Actions to Take When Snort Detects an Intrusion Attempt License Snort and Subscriptions Module 6: Examining Snort 3.0 Configuration Introducing Key Features Configure Sensors Lua Configuration Wizard Module 7: Managing Snort Pulled Pork Barnyard2 Elasticsearch, Logstash, and Kibana (ELK) Module 8: Analyzing Rule Syntax and Usage Anatomy of Snort Rules Understand Rule Headers Apply Rule Options Shared Object Rules Optimize Rules Analyze Statistics Module 9: Use Distributed Snort 3.0 Design a Distributed Snort System Sensor Placement Sensor Hardware Requirements Necessary Software Snort Configuration Monitor with Snort Module 10: Examining Lua Introduction to Lua Get Started with Lua

Securing Cisco Networks with Open Source Snort (SSFSNORT) v2.1
Delivered OnlineFlexible Dates
Price on Enquiry

55242 Microsoft Dynamics 365 Customization and Configuration

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for Information workers, IT Professionals and Developers. Students should have an existing working knowledge of either Microsoft Dynamics 365 or Microsoft Dynamics CRM. Overview Understand the features and tools that exist in Microsoft Dynamics 365 for Customizers Be aware of integrating complimenting Microsoft products such as SharePoint, Skpe for Business and Exchange Undertake and carry out the initial setup and configuration required in a Microsoft Dynamics 365 deployment Design and configure a comprehensive Security model using the inbuilt tools in Microsoft Dynamics 365 Customize the Dynamics 365 schema by creating custom Entities, Fields and Relationships Design custom Information Forms, Quick View Forms, Quick Create Forms and System Views Create System Charts, Dashboards and Interactive Experience Dashboards Create and manage Business Rules using the Business Rule Designer Plan, design and implement best practice Workflow, Business Process Flows and Custom Actions Be able to apply best practice methodology using Unmanaged and Managed Solutions to deploy Microsoft Dynamics 365 customizations and patches This course provides students with a detailed hands-on experience of setting up, customizing, configuring and maintaining the CRM components of Microsoft Dynamics 365. Attendees of this course will gain an in-depth understanding of the Dynamics 365 security model, learn how to customize the Dynamics 365 framework, create and maintain powerful workflows and business process flows and use solutions to package and deploy customizations across multiple Dynamics 365 environments. The course applies to both Business and Enterprise Editions of Dynamics 365 as well as Online and On-premise deployments. Introduction Getting familiar with the versions of Microsoft Dynamics CRM\365 Get acquainted with the Dynamics 365 framework Review the Dynamics 365 interfaces, devices and apps Understand the tools for Dynamics 365 customizers A brief overview of Solutions Understand the differences between Dynamics 365 organisations and environments Review further reading and resources Set up the lab environment - Acme Enterprises Event Management Solution Initial Setup and Configuration An introduction to Dynamics 365 online setup An introduction to Dynamics 365 on premise setup Review the System Settings area Understand how to configure Auto Save Settings Understand how to configure Format Settings Understand how to configure Email Settings Understand how to configure Skype Integration Understand how to configure SharePoint Integration Security Design and configure Business Units Configure Security Roles Manage Users and Teams Implement Access Teams Configure Hierarchy Security Creating and Managing Entities Introduction to the Dynamics 365 schema Review the different Entity Types Create new Custom Entities Managing Entity Ownership Managing Entity Properties Custom Entity Security Review Entities and Solutions Customizing Fields Introduction to Field Customization Understand the different Field Types Review Field Formats Create a new Field Review Fields and Solutions Implement a Calculated Field Configure Field Level Security Customizing Relationships and Mappings Introduction to Relationships Review the different Relationship Types Create a Relationship Review Relationships and Solutions Understand Relationship Behavior Implement a Hierarchy Relationship Configure Field Mappings Customizing Forms, Views and Visualizations The process to create a new Form Review the different Form types Using the Form Designer Customizing the Main, Quick View and Quick Create Forms Configure Form Security Review the different View types Customizing System Views Customizing System Charts and Dashboards Workflows, Business Process Flows and Custom Actions Introduction to Processes Workflow Business Process Flows Custom Actions Solution Management An introduction to Solution Management How to add and administer components in a Solution The differences between unmanaged and managed Solutions How to export and import a Solution How to set Managed Properties for a Solution What happens when you delete a Solution How to Clone a Solution Patch How to Clone a Solution

55242 Microsoft Dynamics 365 Customization and Configuration
Delivered OnlineFlexible Dates
Price on Enquiry