• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

29120 Development courses

The 4 Colour Energies - An Introduction

By colour-energies.com

For insights into how the four colour energies will transform your team dynamics and performance, join this virtual workshop and find out how to embed the four colour energies within your team. Find out your own communication preferences and how to work effectively with colleagues with a different preference.

The 4 Colour Energies - An Introduction
Delivered Online
£99 to £173.25

Occupational Health Immunisation Update - In Person

4.9(21)

By AB Health Group

A course designed for occupational health nurses. Updating on latest immunisation advice. giving a complete understanding of vaccinations, agendas, schedules, vaccine ingredients, contraindications and side effects.

Occupational Health Immunisation Update - In Person
Delivered In-Person in London
£230

Autumn Series 2024 - Organisation & Relationship Systems Coaching Training

By CRR UK

CRR UK equips professionals with the concepts, skills and tools to build conscious, intentional relationships, and to coach relationship systems of any size.

Autumn Series 2024 - Organisation & Relationship Systems Coaching Training
Delivered Online + more
£4,920

AWS Technical Essentials

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Individuals responsible for articulating the technical benefits of AWS services Individuals interested in learning how to get started with using AWS SysOps Administrators, Solution Architects and Developers interested in using AWS services Overview Recognize terminology and concepts as they relate to the AWS platform and navigate the AWS Management Console. Understand the foundational services, including Amazon Elastic Compute Cloud (EC2), Amazon Virtual Private Cloud (VPC), Amazon Simple Storage Service (S3), and Amazon Elastic Block Store (EBS). Understand the security measures AWS provides and key concepts of AWS Identity and Access Management (IAM). Understand AWS database services, including Amazon DynamoDB and Amazon Relational Database Service (RDS). Understand AWS management tools, including Auto Scaling, Amazon CloudWatch, Elastic Load Balancing (ELB), and AWS Trusted Advisor. AWS Technical Essentials introduces you to AWS services, and common solutions. It provides you with fundamental knowledge to become more proficient in identifying AWS services. It helps you make informed decisions about IT solutions based on your business requirements and get started working on AWS. Prerequisites Working knowledge of distributed systems Familiarity with general networking concepts Working knowledge of multi-tier architectures Familiarity with cloud computing concepts 1 - AWS introduction and history AWS Global Infrastructure Demonstration: AWS Management Console 2 - AWS Storage Identify key AWS storage options Describe Amazon EBS Create an Amazon S3 bucket and manage associated objects 3 - Compute, network and storage services Amazon Elastic Compute Cloud (EC2) Amazon Virtual Private Cloud (VPC) Amazon Simple Storage Service (S3) Amazon Elastic Block Store (EBS) Demonstration: Amazon Simple Storage Service (S3) Hands-on lab: Build your VPC and launch a web server 4 - AWS Security, AWS Identity and Access Management (IAM) AWS Identity and Access Management (IAM) Demonstration: AWS Identity and Access Management (IAM) 5 - Compute Services & Networking Identify the different AWS compute and networking options Describe an Amazon Virtual Private Cloud (VPC) Create an Amazon EC2 instance Use Amazon EBS with Amazon EC2 6 - Managed Services & Database Describe Amazon DynamoDB Understand key aspects of Amazon RDS Launch an Amazon RDS instance 7 - Databases (RDS, DynamoDB) SQL and NoSQL databases Data storage considerations Hands-on lab: Build your database server and connect to it 8 - AWS elasticity and management tools Auto scaling Load balancing Cloud Watch Trusted Advisor Hands-on lab: Scale and load balance your architecture 9 - Deployment and Management Identify what is CloudFormation Describe Amazon CloudWatch metrics and alarms Describe Amazon Identity and Access Management (IAM)

AWS Technical Essentials
Delivered Online
£675

Annual Online Safety Update for DSLs, including emerging risks and trends

By Brightcore Consultancy

In this masterclass we'll unravel the complexities of the online world, shedding light on the most pressing current and emerging risks and opportunities faced by children and young people, from the perspective of the DSL, as Online Safety Lead.

Annual Online Safety Update for DSLs, including emerging risks and trends
Delivered Online + more
£80

Makaton awareness: Taster session for museums 

By Kids in Museums

Makaton awareness: Taster session for museums  Tuesday 5 December, 10am-12pm  Are you interested in finding out more about Makaton and learning some useful everyday words to use in your museum?  About this training  According to The Makaton Charity, over 100,000 children and adults use Makaton symbols and signs, either as their main method of communication or a way to support speech. This includes young children and people with learning disabilities.   The Makaton Charity explain that, “Makaton is a unique language programme that uses symbols, signs and speech to enable people to communicate. It supports the development of essential communication skills such as attention and listening, comprehension, memory, recall and organisation of language and expression.”  During this virtual introduction session, The Makaton Charity trainer will:  provide general information about Makaton and how it may be used in different settings to support language development and communication, enable attendees to learn approximately 30 useful everyday signs and symbols, alongside 12 more words which have been tailored for museum settings. This virtual training session will be delivered over two hours by The Makaton Charity.  Who should attend?  This training is aimed at staff at museums, galleries and heritage sites who are interested in making their organisations more welcoming to Makaton users.  Please note this session is now sold out. Add your name to the waiting list if you are interested. If we have enough interest we will schedule an additional session that we will notify you about.

Makaton awareness: Taster session for museums 
Delivered Online
£20

Place in the Space

5.0(3)

By HoardingUK

Monthly free to attend support group for people with hoarding behaviour. Facilitated by Founder/Chair Megan Karnes. Provides both psychological and practical support.

Place in the Space
Delivered Online + more
FREE

EDGE WALKERS: How do we gracefully work ‘out of our depths’?

4.6(67)

By Spiritual Direction Forum UK

Creative and Courageous Conversation about Spiritual Direction in the 21st Century.  In this conversation, we will be pondering  How do we gracefully work ‘out of our depths’? Hosted by Chris Chapman

EDGE WALKERS: How do we gracefully work ‘out of our depths’?
Delivered Online
FREE

IV Management with TPN

4.8(50)

By EF Training & Consultancy Ltd

, The Intravenous Route, Bioavailability, the First Pass Effect, IV drug administration Vascular Access Devices Care & Management: Peripheral Cannula, Midline, Catheter, different Central Venous Access(care of Hickman line), PICC, Implantable Port, UVC and subcutaneous infusion, VAD Assessment, Risk & Complication of IV Therapy, Infection control, Allergy, Fluids & Electrolytes and Drug Calculations. Total Parenteral Nutrition –TP, Solution content, Administration, Routes for delivery,

IV Management with TPN
Delivered In-Person in London
£85

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites CompTIA Network+ Certification 1 - Security and Risk Management Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training 2 - Asset Security Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling 3 - Security Engineering Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities 4 - Information Security Management Goals Organizational Security The Application of Security Concepts 5 - Information Security Classification and Program Development Information Classification Security Program Development 6 - Risk Management and Ethics Risk Management Ethics 7 - Software Development Security Software Configuration Management Software Controls Database System Security 8 - Cryptography Ciphers and Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Hashing and Message Digests Email, Internet, and Wireless Security Cryptographic Weaknesses 9 - Physical Security Physical Access Control Physical Access Monitoring Physical Security Methods Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered Online
£3,395