• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

36607 Design courses in Reading delivered Online

Engineering & Work Practice Controls

4.3(43)

By John Academy

Explore the world of occupational safety with our comprehensive course, 'Engineering & Work Practice Controls.' Gain expertise in identifying and evaluating hazards, implementing effective engineering and work practice controls, and ensuring regulatory compliance. Discover sustainable practices, industry best practices, and real-world case studies. Elevate your skills in creating a safer and healthier work environment. Join us for a transformative learning experience in safety management, risk assessment, and environmental sustainability. Enroll today for a future where workplace well-being meets engineering excellence.

Engineering & Work Practice Controls
Delivered Online On Demand1 hour 30 minutes
£23.99

Definitive Nagios for engineers

5.0(1)

By Systems & Network Training

Definitive Nagios training course description Nagios is an open source application designed to provide system and network monitoring. This hands on course gives a comprehensive coverage of using Nagios to provide monitoring of Linux, Windows and network devices. The course is based on Nagios core but contact us if you would like Nagios XI. What will you learn Install Nagios. Configure Nagios. Monitor Windows, Linux and Cisco (and other network equipment) using Nagios. Configure notifications Definitive Nagios training course details Who will benefit: Technical staff working with Nagios. Prerequisites: None. Duration 2 days Definitive Nagios for engineers Nagios architecture Downloading Nagios, Installing Nagios, Nagios core, plugins, frontends, addons. Nagios XI. Nagios Fusion. Hands on Installing Nagios. Getting started with Nagios Nagios files, nagios.cfg, minimal.cfg. Starting and stopping Nagios. Hands on Controlling Nagios. Using Nagios Nagios web interface. Maps, Hosts, host groups, services, service groups, problems. Reports. Configuration. Hands on Using the web interface. Monitoring Linux systems SSH, NRPE. Hands on Monitoring Linux system health. Monitoring Windows systems Installing NSClient++, Configuring NSClient++, check_nt plugin, monitoring uptime, CPU, memory, disks, services, processes. Hands on Monitoring Windows system health. Monitoring network devices SNMP architecture, MIBs. Polling. Hands on Configuring Nagios for SNMP. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. Hands on Monitoring network devices. Nagios alerts and notifications SNMP traps. Email notifications, SMS alerts other messaging

Definitive Nagios for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Spring & Angular Material with Full Web Application

4.8(9)

By Skill Up

Build powerful web applications with Angular, an incredible frontend JavaScript and TypeScript framework. This Spring & Angular Material

Spring & Angular Material with Full Web Application
Delivered Online On Demand2 hours 45 minutes
£25

Focus Awards Level 4 Certificate for Higher Level Teaching Assistants (RQF)

4.7(160)

By Janets

Transform lives as a Home-Start Volunteer! Join our dedicated team to make a positive impact on families in need. Support and empower parents, offering a helping hand through challenging times. Become a beacon of hope as a Home-Start Volunteer today.

Focus Awards Level 4 Certificate for Higher Level Teaching Assistants (RQF)
Delivered Online On Demand4 days
£9.99

Site Supervisor Safety Training Scheme (SSSTS)

4.9(27)

By Apex Learning

Give a compliment to your career and take it to the next level. This Site Supervisor Safety Training Scheme (SSSTS) bundle will provide you with the essential knowledge to shine in your professional career. Whether you want to develop skills for your next job or elevate your skills for your next promotion, this Site Supervisor Safety Training Scheme (SSSTS)bundle will help you stay ahead of the pack. Throughout the Site Supervisor Safety Training Scheme (SSSTS)programme, it stresses how to improve your competency as a person in your chosen field while also outlining essential career insights in the relevant job sector. Along with this Site Supervisor Safety Training Scheme (SSSTS) course, you will get 10 premium courses, an original hardcopy, 11 PDF certificates (Main Course + Additional Courses) Student ID card as gifts. This Site Supervisor Safety Training Scheme (SSSTS) Bundle Consists of the following Premium courses: Course 01: Site Management Safety Training Scheme Course 02: Construction Site Management, Supervision and Safety Diploma Course 03: Working at Height Awareness Diploma Course 04: Construction Safety Course 05: Fire Safety | Online Course Course 06: Gas Safety Course 07: Asbestos Surveyor Training Level 4 Course 08: RIDDOR Training Course 09: Noise and Hearing Protection Training Course 10: Health and Safety in a Construction Environment - Route to CSCS Green Card Course 11: First Aid at Work Enrol now in Site Supervisor Safety Training Scheme (SSSTS) to advance your career, and use the premium study materials from Apex Learning. The bundle incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can strengthen your Site Supervisor Safety Training Scheme (SSSTS) expertise and essential knowledge, which will assist you in reaching your goal. Moreover, you can learn from any place in your own time without travelling for classes. Course Curriculum: Site Management Safety Training Scheme Module 01: Health and Safety at Work Module 02: Site Set-Up Module 03: Construction Design and Management (CDM) Regulations Module 04: Risk Identification, Assessment and Management Module 05: Behavioural Safety Module 06: Management of Occupational Health Module 07: Electricity Module 08: Working at Height Module 09: Scaffolding Module 10: Excavations and Confined Space Module 11: Demolition And 10 more courses ... CPD 110 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this Site Supervisor Safety Training Scheme (SSSTS) bundle. Requirements This Site Supervisor Safety Training Scheme (SSSTS) course has been designed to be fully compatible with tablets and smartphones. Career path Having this expertise will increase the value of your CV and open you up to multiple job sectors. Certificates Certificate of completion Digital certificate - Included Cost of PDF Certificates is included in course price Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course (Site Management Safety Training Scheme) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The delivery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost.

Site Supervisor Safety Training Scheme (SSSTS)
Delivered Online On Demand
£39

Hands on Machine Learning Project - Covid Mask Detector Course

By One Education

Machine learning isn’t just for self-driving cars and game-playing robots—it’s also helping identify whether someone’s wearing a mask or not. This course takes you through the full project lifecycle of building a Covid Mask Detector, using one of the most relevant applications of computer vision in recent years. Whether you're a data enthusiast or a coding hobbyist, you’ll enjoy diving into this machine learning challenge with a purpose that’s easy to relate to and timely. With clear, structured guidance, you'll explore how to prepare image data, train a neural network, and apply detection techniques—all from the comfort of your own screen. The content is delivered with clarity and a dash of wit, making the learning journey not just informative, but surprisingly enjoyable. You’ll walk away with confidence in building a full machine learning project, specifically tailored for image classification, and yes—taught in plain, human English (no jargon jungle here). Whether you're brushing up your Python skills or simply curious how AI spots face masks, this course offers an insightful experience in smart automation, delivered with a professional tone and just enough character to keep you grinning as you code. Learning Outcomes: Develop a Covid mask detector using machine learning. Master OpenCV, a popular computer vision library. Build models with TensorFlow. Design and build the app, upload files, and deploy it on AWS. Gain valuable experience in machine learning app development. The Hands-on Machine Learning Project - Covid Mask Detector course is designed to provide you with the skills and knowledge needed to develop a mask detector using deep learning. In this course, you'll learn how to master OpenCV, an open-source computer vision library used for image processing and face detection. You'll also learn how to build and train a deep learning model using Tensorflow, a popular machine learning framework. The course is perfect for aspiring data scientists, machine learning engineers, and developers who want to make a positive impact on society by contributing to public health and safety efforts. By the end of this course, you'll have a deep understanding of how to develop a mask detector app that can be used to detect whether individuals are wearing masks in public spaces. You'll be able to master OpenCV and use it to preprocess and detect faces in images. You'll also learn how to build and train a deep learning model using TensorFlow and how to deploy your mask detector app on AWS. This course provides a unique opportunity for individuals to gain real-world experience in developing cutting-edge technology that can make a positive impact on society. Hands on Machine Learning Project - Covid Mask Detector Course Curriculum Section 01: Introduction Introduction to Course Section 02: Mastering OpenCV Getting System Ready Read and Write Images Resize and Crop Working with Shapes Working with Text Section 03: Pre-Requisite for Face Detection Pre-Requisite for Face Detection Detect the Face Section 04: Deep Learning with Tensorflow Introduction to Deep Learning with Tensorflow Model Building Training the Mask Detector Saving the Best Model Basic Front End Design of App File Upload Interface for App App Prep App Build and Testing AWS Deployment AWS Deployment Continued How is the course assessed? Upon completing an online module, you will immediately be given access to a specifically crafted MCQ test. For each test, the pass mark will be set to 60%. Exam & Retakes: It is to inform our learners that the initial exam for this online course is provided at no additional cost. In the event of needing a retake, a nominal fee of £9.99 will be applicable. Certification Upon successful completion of the assessment procedure, learners can obtain their certification by placing an order and remitting a fee of __ GBP. £9 for PDF Certificate and £15 for the Hardcopy Certificate within the UK ( An additional £10 postal charge will be applicable for international delivery). CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Aspiring data scientists. Machine learning engineers. Developers interested in machine learning app development. Anyone interested in developing technology to fight the pandemic. Professionals looking to upskill in the latest technology. Career path Data Scientist: £40,000 to £80,000 per year. Machine Learning Engineer: £55,000 to £90,000 per year. Artificial Intelligence Developer: £40,000 to £80,000 per year. Computer Vision Engineer: £40,000 to £80,000 per year. Deep Learning Engineer: £55,000 to £90,000 per year. Certificates Certificate of completion Digital certificate - £9 You can apply for a CPD Accredited PDF Certificate at the cost of £9.

Hands on Machine Learning Project - Covid Mask Detector Course
Delivered Online On Demand2 hours
£12

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

SHRM-CP/SHRM-SCP Certification Preparation

By Nexus Human

Duration 5 Days 30 CPD hours Earning your SHRM Certified Professional (SHRM-CP) or SHRM Senior Certified Professional (SHRM-SCP) credential makes you a recognized expert and leader in the HR field and a valuable asset to your organization, keeping you and your organization more competitive in today's economy. This professional distinction sets you apart from your colleagues, proving your high level of knowledge and skills. Students will be able to identify areas of strength and build on them. They will also see where they will need further concentrated study in preparation for their exam. 1 - INTRODUCTION The SHRM Body of Competency and Knowledge? (BoCK) The SHRM-CP and SHRM-SCP Certifications The SHRM Learning System© for SHRM-CP/SHRM-SCP 2 - HR COMPETENCIES Behavioral Competencies 3 - DOMAIN 1: PEOPLE Functional Area #1: HR Strategic Planning Functional Area #2: Talent Acquisition Functional Area #3: Employee Engagement and Retention Functional Area #4: Learning and Development Functional Area #5: Total Rewards 4 - DOMAIN 2: ORGANIZATION Functional Area #6: Structure of the HR Function Functional Area #7: Organizational Effectiveness and Development Functional Area #8: Workforce Management Functional Area #9: Employee and Labor Relations Functional Area #10: Technology Management 5 - DOMAIN 3: WORKPLACE Functional Area #11: HR in the Global Context Functional Area #12: Diversity and Inclusion Functional Area #13: Risk Management Functional Area #14: Corporate Social Responsibly Functional Area #15: U.S. Employment Law and Regulations 6 - FINAL EXAM/REVIEW/DISCUSSION Additional course details: Nexus Humans SHRM-CP/SHRM-SCP Certification Preparation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SHRM-CP/SHRM-SCP Certification Preparation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SHRM-CP/SHRM-SCP Certification Preparation
Delivered OnlineFlexible Dates
£3,475

ICA International Diploma in Governance, Risk and Compliance

By International Compliance Association

ICA International Diploma in Governance, Risk and Compliance New technologies are changing the role of a compliance professional. Fintech and Regtech are now embedded in compliance lexicon, but what do the terms mean, and what are the practical impacts, both positive and negative, that we need to understand and manage? The ICA International Diploma in Governance, Risk and Compliance helps you to answer these questions and apply the answers directly within your organisation. Gain a broad understanding of the regulatory environment as well as the specialist skills and knowledge to be able to identify and manage key regulatory risks today and in the future. Get to grips with the nuances of the regulatory environment and the impact to your organisation. Understand why promoting a positive compliance culture is not just good for compliance but good for business. Explore how to maximise the benefits of emerging technologies. Develop your inter-personal skills so you can be the best Compliance Manager. Learn from the experiences of compliance professionals from other firms and sectors and share ideas. This governance, risk and compliance course is awarded in association with Alliance Manchester Business School, the University of Manchester. Benefits of studying with ICA: Flexible learning solutions that are suited to you Our learner-centric approach means that you will gain relevant practical and academic skills and knowledge that can be used in your current role Improve your career options by undertaking a globally recognised qualification that hiring managers look for as part of their hiring criteria Many students have stated that they have received a promotion and/or pay rise as a direct result of gaining their qualification The qualifications ensure that you are enabled to develop strategies to help manage and prevent risk within your firm, thus making you an invaluable asset within the current climate Completion of this training course will provide participants with the following professional qualification: ICA Diploma in Governance, Risk and Compliance. In addition, participants will be entitled to use the following designation 'Dip (Comp).' These qualifications are awarded in association with Alliance Manchester Business School, the University of Manchester. What will you learn? Understanding governance, risk and regulatory compliance Why we need to understand the regulated environment Why are governance and culture essential for effective regulatory compliance risk management? The role of the compliance department and the compliance professional Risk management as the key to effective compliance Case Studies

ICA International Diploma in Governance, Risk and Compliance
Delivered OnlineFlexible Dates
£3,900

Kubernetes - Certified Kubernetes Administrator (CKA) 2022

By Packt

Learn Kubernetes and prepare yourself for CKA and CKAD certifications. This course helps you gain the knowledge required to design and deploy cloud-native applications on a Kubernetes cluster. All you need is a good understanding of the Docker fundamentals to get started.

Kubernetes - Certified Kubernetes Administrator (CKA) 2022
Delivered Online On Demand6 hours 54 minutes
£37.99