• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2122 Disc courses in Cardiff delivered Live Online

Online Postgraduate Certificate Business of Motorsport

5.0(1)

By National Motorsport Academy

The Postgraduate Certificate (PG Cert.) consists of the first four modules from the MA Business of Motorsport Master’s Degree. You can then achieve a Postgraduate Diploma (PG Dip.) Business of Motorsport by studying the PG Dip. Top-Up, a further three modules from the MA.

Online Postgraduate Certificate Business of Motorsport
Delivered OnlineFlexible Dates
£3,950 to £5,925

BRCGS Sécurité des Denrées Alimentaires Issue 9 | Exigences pour les Sites (2 jours)

5.0(43)

By ASK SONIA LTD

Formation officielle BRCGS Food v9 (Norme Mondiale pour la Sécurité des Denrées Alimentaires version 9) pour les sites en français. Dispensée en ligne (Zoom) en direct par un partenaire de formation agréé BRCGS. Frais d'examen et de certificat inclus dans le prix.

BRCGS Sécurité des Denrées Alimentaires Issue 9 | Exigences pour les Sites (2 jours)
Delivered Online
£610

Electronics Repair 2 Course

By Hi-Tech Training

Electronics Equipment Repair 2 (Online Virtual Classroom) is a follow on course to Electronics Equipment Repair 1. This course builds on the skills gained and enables participants to build, test and fault-find more complex Analogue Electronic circuits

Electronics Repair 2 Course
Delivered Online
£85 to £685

ONE SPACE LEFT! 19th September Alice Williams #Agent121. Looking for: PICTURE BOOKS, YOUNG FICTION, CHAPTER BOOKS, MG, YA

5.0(3)

By I Am In Print

LOOKING FOR: PICTURE BOOKS, YOUNG FICTION, CHAPTER BOOKS, MG, YA Alice set up Alice Williams Literary in 2018 after representing children's books for over ten years at David Higham Associates. She is especially keen to consider playful, funny books for all ages, and is on the lookout for heartwarming, empowering stories, whether in a realistic, contemporary setting, or a wildly imaginative fantasy world - or somewhere in-between. Alice is offering 121 sessions for young fiction, middle grade, YA and picture book writers. For chapter books, MG and YA fiction, please submit a covering letter, synopsis and the first three chapters of your manuscript in a single word document. For picture books, please submit a covering letter and two texts, or for illustrators one dummy and examples from your portfolio or a link to your website. Alice is only seeking to discuss texts/novels with writers living in the UK and Ireland. English does not need to be your first language, but you must be living within the UK or Ireland. (In addition to the paid sessions, Alice is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Thursday 11th September 2025

ONE SPACE LEFT! 19th September Alice Williams #Agent121. Looking for: PICTURE BOOKS, YOUNG FICTION, CHAPTER BOOKS, MG, YA
Delivered Online + more
£72

Climate Fresk workshop

5.0(1)

By Climate Clarity CIC

Climate Fresk workshop with Climate Clarity CIC

Climate Fresk workshop
Delivered in Internationally or OnlineFlexible Dates
£1,499 to £5,499

MEF Carrier Ethernet 2.0 Certification

5.0(3)

By Systems & Network Training

MEF Carrier Ethernet training course description The course progresses from a overview of the Carrier Ethernet service and how it works onto looking at the concepts in depth. Service attributes and management follow with the course finishing with studies of practical Carrier Ethernet. What will you learn Discuss and understand key Carrier Ethernet Concepts. Understand tasks related to designing, deploying and maintaining a Carrier Ethernet network. Offer effective solutions to implementing a Carrier Ethernet enterprise network given available customer resources and requirements. Carry out informed discussions using industry Carrier Ethernet 'vocabulary. Pass the MEF CECP 2.0 professional accreditation exam. MEF Carrier Ethernet training course details Who will benefit: Anyone working with Carrier Ethernet Prerequisites: The course attendees need to be conversant with data networks, as well as Ethernet and IP technologies. Duration 5 days MEF Carrier Ethernet training course contents Section One: Introduction to Carrier Ethernet Introduction to Carrier Ethernet: What is Carrier Ethernet? Evolution, advantages, The MEF, MEF specifications; UNI, EVC, OVC, EPL/EVPL, EP-LAN/ EVP-LAN, EP-Tree/EVP-Tree, etc, overview. How Carrier Ethernet Works: Service Frame Handling. Carrier Ethernet at Customer Premises, metro and core. Carrier Ethernet Workings, UNI attributes, Service Attributes (EVC and EVC per UNI attributes), Bandwidth Profiles, service multiplexing, L2 protocol processing; Carrier Ethernet equipment, CPE, aggregation and homing nodes, core equipment; management systems. The Setting Up of a Carrier Ethernet Service: Step 1: Choose service type, EPL/EVPL, EP-LAN/EVP-LAN, EPTree/EVP-Tree, EVLine...; Step 2: CPE tasks, UNI-C tasks (UNI attributes, service attributes (EVC and EVC per UNI) and bandwidth profiles), UNI-N tasks (L2 protocol handling). Step 3: Non-CPE tasks, Access, metro and core connections set up. Section Two: Carrier Ethernet Concepts in depth Carrier Ethernet Definitions in Depth: UNI, UNI I & II, UNI-N and UNI-C, etc.; NNI/ENNI; EVC; OVC, OVC type (P2P, M2M, Rooted MP), OVC end point (root, leaf, trunk), OVC end point map, OVC end point bundling; Service types in detail, EPL/EVPL, EP-LAN/EVP-LAN, EP-Tree/EVP-Tree, EVLine, Access EPL, Access EVPL . Carrier Ethernet Service Frame Handling: Unicast, multicast and broadcast frame delivery, Tagged, untagged and priority; Tagging, C and S-Tags, 802.3, 802.1d, 802.1q, 802.1ad, 802.1ah evolution, VLAN ID translation/preservation. CoS preservation. Other Key Carrier Ethernet Concepts: MTU, MTU at UNI, MTU at ENNI; Physical Layer Attributes, FE, GbE and 10GbE, Service Multiplexing and Bundling Concept and detail, rules and implications; Hairpin Switching Managing Bandwidth in a Carrier Ethernet Network: Token Bucket Algorithm, EIR, CIR, CBS, EBS, Coupling Flag; Frame Colors, recoloring, Color Awareness attribute, Color Forwarding; Bandwidth Profiles, rules and concepts. MEF CoS identifiers, DEI bit (in S-Tag), PCP bit (in C-Tag or S-Tag), or DSCP (in IP header), Multiflow bandwidth concepts; CoS Label/Color Identification. Section Three: Carrier Ethernet Service Attributes Overview: Carrier Ethernet 2.0; Blueprint C Service Attributes: Per UNI, Physical interfaces, Frame format, Ingress/egress Bandwidth Profiles, CEVLAN ID/EVC Map, UNI protection. EVC per UNI, Ingress/egress Bandwidth Profiles, etc.; Per EVC, CEVLAN ID Preservation, CoS ID Preservation, Relationship between SLA and SLP, Class of Service, etc. OVC, ENNI, OVC End Point per UNI and OVC End Point per ENNI, Ingress/egress bandwidth profiles, etc. Section Four: Managing Carrier Ethernet Networks Overview: MEF Service Lifecycle.Carrier Ethernet maintenance: Port, Link & NE failure, Service Protection Technologies, Fault Identification and Recovery, LAG, Active/Standby EVC, Single EVC with transport protection, G.8031, G.8032, MPLS FRR. SOAMs: Connectivity fault management, connectivity Monitoring, Loopback, Linktrace; Performance Management, Frame Delay, Inter Frame Delay Variation, Availability, Frame Loss Ratio, Resiliency, HLI, DMM, DMR, SLM, SLR; Key Concepts, Single vs dual ended, ordered UNI pair calculations. LOAMs: Link discovery, link monitoring, etc. Terminology and Concepts: MEG levels, MIPs. Section Five: Practical Carrier Ethernet Carrier Ethernet Transport Technologies:Layer 1: SDH. Layer 2: Bridging, provider bridging, PBB, PBBTE. Layer 2.5: MPLS VPWS, MPLS VPLS, MPLS-TP. Carrier Ethernet Access Technologies: fiber, SDH, active fiber, PON, GPON, 10G PON, OTN, WDM; copper, PDH, G-SDSL, 10Pass-TS, HFC; packet radio. Optimising mobile backhaul with Carrier Ethernet Key challenges solutions: Market pressure, LTE evolution, elements and architecture (RAN BS, NC, GWIF.), synchronization, bandwidth management. Circuit Emulation over Ethernet: Purpose, needs and applications. Synchronization: Phased, ToD, External Reference source, SynchE ,NTP, IEEE-1588 v2/ PTP, ACR; MEF Service Definitions for emulated circuits. Applying what you know: Practical examples and scenarios, Carrier Ethernet solutions; Practice Scenarios, Given a scenario, determine appropriate Ethernet services

MEF Carrier Ethernet 2.0 Certification
Delivered in Internationally or OnlineFlexible Dates
£4,997

23rd September Laura Bennett #Agent121. Looking for: YA, ADULT FICTION

5.0(3)

By I Am In Print

LOOKING FOR: YA, ADULT FICTION Laura Bennett developed a love of writing early, attending her first Creative Writing course at college. She then decided to study Writing at Liverpool John Moores University, obtaining a BA before pursuing a career in teaching. She began work at a college for young adults with special needs, and then moved to a vocational college while studying for a post-compulsory PGCE. Laura taught English for a few years, and also ran several Creative Writing courses before returning to LJMU to obtain an MA in Writing. She then worked as a teaching assistant at a local secondary school, before leaving that job to pursue a career at the Liverpool Literary Agency. She has worked as a private tutor, written for tabletop roleplaying games, and is the narrative writer for an Indie video game. She was also the judge for the I Am Writing Science Fiction / Fantasy category in 2025! Laura is looking for adult and YA science fiction and fantasy of all stripes, including steampunk, post-apocalyptic, urban fantasy, supernatural, and dystopian. She loves diverse casts and complicated relationships. Stories that focus on realistic characters with strong voices are a definite hit, no matter how fantastical their worlds. Laura would like you to submit a covering letter, 1 page synopsis and the first 5,000 words of your manuscript in a single word document. (In addition to the paid sessions, Laura is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Tuesday 16th September 2025

23rd September Laura Bennett #Agent121. Looking for: YA, ADULT FICTION
Delivered Online + more
£72

23rd September John Baker #Agent121. Looking for: YA/NA FANTASY, SFF, HORROR, ADULT FICTION

5.0(3)

By I Am In Print

LOOKING FOR: YA/NA FANTASY, SFF, HORROR, ADULT FICTION John Baker (he/him) joined the Bell Lomax Moreton agency in 2019, cultivating a list shaped around his passion for science fiction, fantasy, and horror, though has lately also branched out into action/adventure fiction. John focuses on authors writing in the Adult, New Adult, and YA spaces. John leads the wider agency's film & TV desk, is the Secretary of the Association of Author’s Agents, and the co-chair of the AAA’s Bridge Committee. He also serves on the Kingston University MA Publishing Advisory Board. Under the umbrella of speculative fiction, John is looking for fantasy, science fiction, horror, romantasy, or literary speculative fiction. He has built a reputation as a champion of underrepresented voices and stories, be it from creators hailing from the global majority and their diasporas or neurodiverse authors, and naturally gravitates towards this kind of storytelling. In short, if he’s never read a story like yours before, he wants to see it. Adult fantasy: John loves beefy epic fantasy, especially non-Anglo Christian-inspired. Give him an immersive world, a fresh magical or mythic system, and an exciting cast of characters and he’ll be happy. He is a broad church in the genre so loves a political fantasy, swords and sorcery, courtly intrigue, monster hunting and dastardly villains. John is keen to find an urban fantasy that feels fresh and fun and he’s a sucker for a heroic quest narrative. He’s also very open to fantasy that isn’t easily categorised, but it is playing in that world. John is keenly hunting for more historical fantasy, especially inspired by modern history. He’s had fun with mythological retellings in the past, but as ever, let’s make sure it’s shining the spotlight on new stories. He would also love fantasy that centres on types of relationships less celebrated in fantasy, such as established and secure married couples, or siblings. NA/YA fantasy: In this genre, most importantly, John wants to have a good time, whether it’s swoon-worthy kisses in lush ball gowns, or gruesome gore and monsters, so send him pacy, plot-filled adventures. He’d love more books that teenage boys would love: Skullduggery Pleasant forever! Romantasy: The thriving new romantasy genre comes with its own set of challenges, so John wants to know what makes your romantasy different; what will set it out from the (very crowded!) market. Give it completely barmy stakes, cool and unique new settings, or a love story that will make your jaw drop. To be clear, he’s happily sorted for a human person meets a fae creature in the spooky woods. Also, cosmic romance is the genre of the future. Give him romantasy in space. Easy. Horror: John and horror are old friends. He loves horror inspired by myth and folklore, subversive weird horror that leaves your eyebrows in your hairline, historical horror that pulls from ghastly true stories, and anything that you’ll be reading with the light on. He also loves a gothic element and is particularly looking for horror with a strong romantic throughline, fun YA horror, and female & NB horror authors. Science fiction: SF is coming back! And John has been shouting about that. He loves to see an adventurous found-family romp through space or an epic, crunchy space opera. Speculative near-future is fun too, in the vein of Black Mirror’s more uplifting episodes, (e.g. San Junipero). He loves YA science fiction as well; the more creative the better. Literary: John is open to finding more rich magical realism or something character-led yet supernatural and would love a high-concept mystery, in the vein of Stuart Turton. He also loves spec fic that uses the speculative lightly as a way of confronting a deeper truth in society today. Weird stuff: John wants books that will blow people’s minds and defy categorisation. This is hard to describe, but think Gideon The Ninth, The Library At Mount Char, This Is How You Lose The Time War. John loves a pitch that leaves the editors baffled but intrigued. Action/Adventure, Historical Adventure, Espionage: John is branching out into non-speculative adventures, such as John Le Carré, Lee Child, Ian Flemming, and Mick Herron. More as his taste develops, but the hunt is on! Not looking for: military sci-fi or hard SF, or anything with biblical “character wakes up in purgatory/heaven/hell” narratives. The right comedic fantasy has yet to hit his inbox, but please don’t comp Douglas Adams or Sir Terry. John would like you to submit a covering letter, 1-2 page synopsis and the first two chapters of your manuscript in a single word document. (In addition to the paid sessions, John is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Tuesday 16th September 2025

23rd September John Baker #Agent121. Looking for: YA/NA FANTASY, SFF, HORROR, ADULT FICTION
Delivered Online + more
£72

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

Securing UNIX systems

5.0(3)

By Systems & Network Training

Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in Internationally or OnlineFlexible Dates
£4,997