• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

568 ESC courses

Escape Your 9-5 Job

By Course Cloud

The innovative Escape Your 9-5 Job has been compiled with the assistance and expertise of industry professionals. It has been carefully crafted to meet the business requirements needed for an outstanding contribution to this role and the career path beyond it. By enrolling in this tutorial, a significant advantage can be gained by the student for securing their dream job and building an excellent reputation in this sector.  This popular Escape Your 9-5 Job has been designed to help dedicated individuals train to become the absolute best in this business field. Many other entrepreneurs and talented students have already completed this course, and others like it, empowering them to move onto satisfying and rewarding careers. This unique Escape Your 9-5 Job course is perfectly suited for those dedicated and ambitious individuals who are committed to genuinely becoming the best in the business.  The Escape Your 9-5 Job is recognised and accredited by CPD standards, so all contents are guaranteed to be accurate and reputable, adding valuable competencies and qualifications to a CV, making anyone stand out from other potential candidates or business rivals. For added convenience, the Escape Your 9-5 Job consists of a range of educational modules that allow study sessions to be organised at any time and any place When the final assessment of the Escape Your 9-5 Job has been completed, a certificate of completion is supplied to evidence newly acquired skills and knowledge. This will provide a significant boost for job-seeking or entry into a new and exciting career path. The valuable qualification from the Escape Your 9-5 Job course can help to make all the difference in a dynamic employment sector and can also be validated on our website. We are aware that a student's lifestyles and work ethics may not allow much time for a dedicated study session, so the Escape Your 9-5 Job has been specifically designed to be taken at a personally selected pace, and the hours that are suited to each individual. Full access is immediately available after registration, and this can be achieved via any online device, and at any global location you are sighted at. Our fully-trained tutors are committed to helping you throughout the course, and will instantly respond to any queries that are sent to them via email

Escape Your 9-5 Job
Delivered Online On Demand
£319

Foundations of Positive Behaviour Support

By Guardian Angels Training

Gain a comprehensive understanding of positive behavior support principles, strategies, and techniques with our course. Ideal for educators, caregivers, and professionals working with individuals with developmental disabilities, mental health issues, or behavioral challenges.

Foundations of Positive Behaviour Support
Delivered In-Person in InternationallyFlexible Dates
£1,175

Cyber Security demystified

5.0(3)

By Systems & Network Training

Cyber Security training course description The reliance of the world on the Internet and computer systems means the protection of information systems is vitally important. This is even more important smart devices and the Internet of Things increase the number of devices. This Cyber Security provides a concise overview on the threats and attacks that can happen along with the counter measures that can be taken. What will you learn Recognise the different types of attack. Describe the attacks that can be made against information systems. Describe the counter measures available. Cyber Security training course details Who will benefit: Non-technical staff working with computers. Prerequisites: None. Duration 1 day Cyber Security training course contents What is Cyber Security? Computer security, Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Attacks Physical access, Social engineering, Privilege escalation, Malware, Trojans, worms, viruses, rootkits, Backdoors, Denial of Service (DOS), Distributed DOS, Eavesdropping, Spoofing, Man the middle tampering. Countermeasures Prevention, detection, response. Physical, user accounts, Firewalls, IDS, AAA, authentication, cryptography, encryption, data integrity. Cyber security standards ETSI, ISO 27001, 27002, NIST, ISA/IEC 62443.

Cyber Security demystified
Delivered in Internationally or OnlineFlexible Dates
£967

Regular expressions for engineers

5.0(3)

By Systems & Network Training

Regular expressions training course description Regular expressions are an extremely powerful tool for manipulating text and data. They are now standard features in a wide range of languages and popular tools, including Python and MySQL. Regular expressions allow you to code complex and subtle text processing that you never imagined could be automated. Once you've mastered regular expressions, they'll become an invaluable part of your toolkit. You will wonder how you ever got by without them. What will you learn Use Regular Expressions. Troubleshoot Regular Expressions. Compare RE features among different versions. Explain how the regular expression engine works. Optimize REs. Match what you want, not what you don't want. Regular expressions training course details Who will benefit: Anyone looking to use regular expressions. Prerequisites: None. Duration 1 day Regular expressions training course contents Introduction to Regular Expressions Solving real problems, REs as a language, the filename analogy, language analogy, RE frame of mind, searching text files: egrep, egrep metacharacters, start and end of the line, character classes, matching any character with dot, alternation, ignoring differences in capitalization, word boundaries, optional items, other quantifiers: repetition, parentheses and backreferences, the great escape, expanding the foundation, linguistic diversification, the goal of a RE, more examples, RE nomenclature, Improving on the status quo. Extended introductory examples A short introduction to Perl, matching text with regular expressions, toward a more real-world example, side effects of a successful match, Intertwined regular expression, intermission, modifying text with regular expressions, example: form letter, example: prettifying a stock price, automated editing, a small mail utility, adding commas to a number with lookaround, text-to-HTML conversion, that doubled-word thing. Regular expression features and flavours The regex landscape, origins of REs, care and handling of REs, Integrated handling, procedural and object-oriented handling, search-and-replace example. strings character encodings and modes, strings as REs, character-encoding issues, unicode, regex modes and match modes, common metacharacters and features, character representations, character classes and class-like constructs, anchors and other 'zero-width assertions', comments and mode modifiers, grouping capturing conditionals and control. The mechanics of expression processing Two kinds of engines, new standards, regex engine types, from the department of redundancy department, testing the engine type, match basics, about the examples, rule 1: the match that begins earliest wins, engine pieces and parts, rule 2: the standard quantifiers are greedy, regex-directed versus text-directed, NFA engine: regex-directed, DFA engine: text-directed, first thoughts: NFA and DFA in comparison, backtracking, two important points on backtracking, saved states, backtracking and greediness, more about greediness and backtracking, problems of greediness, multi-character 'quotes', lazy quantifiers, greediness and laziness, laziness and backtracking, possessive quantifiers and atomic grouping, possessive quantifiers ?, +, *+, ++ and {m,n}+, the backtracking of lookaround, is alternation greedy? taking advantage of ordered alternation, NFA DFA and posix, the longest-leftmost', posix and the longest-leftmost rule, speed and efficiency. Practical regex techniques Continuation lines, matching an IP address, working with filenames, matching balanced sets of parentheses, watching out for unwanted matches, matching delimited text, knowing your data and making assumptions, stripping leading and trailing whitespace, matching and HTML tag, matching an HTML link, examining an HTTP URL, validating a hostname, plucking a hostname, plucking a URL, parsing CSV files. Crafting an efficient expression Efficiency vs. correctness, localizing greediness, global view of backtracking, more work for POSIX NFA, work required during a non-match, being more specific, alternation can be expensive, benchmarking, know what you re measuring, benchmarking with Python, common optimisations, the mechanics of regex application, pre-application optimizations, optimizations with the transmission, optimization of the regex itself, techniques for faster expressions, common sense techniques, expose literal text, expose anchors, lazy versus greedy: be specific, split into multiple REs, mimic initial-character discrimination, use atomic grouping and possessive quantifiers, lead the engine to a match, unrolling the loop, observations, using atomic grouping and possessive quantifiers, short unrolling examples, unrolling C comments, the free flowing regex, a helping hand to guide the match, a well-guided regex is a fast regex.

Regular expressions for engineers
Delivered in Internationally or OnlineFlexible Dates
£967

Confined Space Entry Low-Risk (NPORS)

4.9(182)

By You Can Do It .Training

Group Course (Max 6 Delegates)

Confined Space Entry Low-Risk (NPORS)
Delivered In-Person in Stoke on TrentFlexible Dates
£895

Peering at LINX

5.0(3)

By Systems & Network Training

Peering at LINX training course description A one or two day induction course covering the technical procedures of LINX along with correct interaction with LINX and LINX members. This course focuses on the implementation of the technologies within the LINX network. For those already competent in BGP the one day version of this course is sufficient. What will you learn Explain the role of LINX in the Internet. Correctly connect to LINX. Recognise the correct procedures for peering at LINX. Use the current Best Current Practices. Peering at LINX training course details Who will benefit: Technical staff of new LINX members. Technical staff of companies preparing to join LINX. Non technical staff may also benefit from this course. Prerequisites: None. (For technical staff with BGP knowledge 1 day) Duration 1 to 2 days Peering at LINX training course contents Introduction and review Networks, The Internet, IP, routers, Autonomous systems, the structure of the Internet, the role of Internet Exchanges. BGP and peering. LINX, EuroIX, RIPE. What you get when you join LINX. LINX products: Connexions, Virtual PoPs, Colocation resales, LINX from anywhere. LINX infrastructure The original architecture, The growth of LINX, the current topology. LINX London locations. Dual LAN topology. LON1, LON2. Use of MPLS to connect London sites. Regional peering: LINX NoVa, LINX Manchester, LINX Wales, LINX Scotland, ManxIX, JEDIX. Connecting with LINX nnecting with LINX Locations. 1/10/100/400G. Interface specifications. Link aggregation. The racks and space provided, access to the racks, connecting WAN circuits into LINX. The connection form, How to link your ISP with LINX, switch assignments, limits on traffic, average measured traffic, getting statistics from LINX, Using looking glass. Allowed traffic. Port security Configuration hints LINX IP details, IPv4, IPv6, PTR records, Cisco base configuration, Juniper base configuration. Peering with other LINX members Preparing for peering, the peering template, setting up the peering, RFC 2142, the RIPE database, contacts, peeringdb.net, solving downed BGP sessions, escalation procedures. Peering configuration hints Cisco BGP configuration, Juniper BGP configuration. LINX additional services Private interconnect, LINX time service. NTP, Strata. The LINX route server Bi lateral peering, Multi lateral peering. How the LINX route server is configured. Use of communities on the route server, template for peering with the route server. Summary Getting further information, the LINX website, the LINX mailing lists.

Peering at LINX
Delivered in Internationally or OnlineFlexible Dates
£867

PRINCE2® Foundation and Practitioner

By London School of Science and Technology

PRINCE2® Foundation and Practitioner are process-based project management approaches that can be easily customised and scaled. PRINCE2® Foundation and Practitioner course aim to provide delegates with a comprehensive knowledge of project management methodologies. Course Overview PRINCE2 Foundation and Practitioner are process-based project management approaches that can be easily customised and scaled. PRINCE2® Foundation and Practitioner course aim to provide delegates with a comprehensive knowledge of project management methodologies. At the end of this PRINCE2® Foundation and Practitioner course, delegates will be able to delegate tolerances and report actual and forecast progress effectively. They will also be able to quickly prepare the risk management, change control, quality management, and communication management approaches. Attaining this PRINCE2® certification enables candidates to demonstrate and enhance their project management proficiency – contributing to elevated business acumen and career prospects. Concepts covered: • Project management • Levels of management • Authorise initiation • Tailoring the IP process • Project and stage plans • Analysing risks to a plan • Escalate issues and risks PRINCE2® Foundation Training: This introductory PRINCE2® certification will help candidates understand the fundamentals of the PRINCE2® project management methodology and develop an appreciation of the constituents that contribute to a project’s success – underpinned by the PRINCE2® principles, processes, and themes. The foundation element of the combined course lasts for 3 days. During the course, candidates will gain a basic understanding of how to work in part of a PRINCE2® team. PRINCE2® Practitioner Training: The PRINCE2® Practitioner element of the combined course forms the final part of the training where the candidate learns to apply their acquired knowledge. Candidates will be educated on how to apply the methodology to a set of scenarios and how to efficaciously lead a project. What’s Included in this PRINCE2® Course? The following is included in this PRINCE2® Course: • The PRINCE2® Foundation Examination • The PRINCE2® Practitioner Examination • Pre-course material • PRINCE2® Workbook • PDUs • Experienced PRINCE2® Instructor • Certificate • Refreshments • PRINCE2 Homework – Set by your PRINCE2 Instructor at the end of each day. Prerequisites for PRINCE2® Course: In this PRINCE2® Foundation and Practitioner course, there are no formal prerequisites. This PRINCE2® Course is designed for anyone who wants to gain in-depth knowledge about project management methodologies. This Course is more beneficial for: • Project Managers • Aspiring Project Managers • Team Leaders • Directors • Senior Responsible Owners PRINCE2® Foundation and Practitioner 6th Edition Training Course Outline: Module 1: Introduction to Projects and the PRINCE2® Methodology: • PRINCE2® “Project” Definition • Project Characteristics • Project Management • What is PRINCE2®? • Four Integrated Elements • What PRINCE2® Does Not Provide • What Makes a Project a PRINCE2® Project? Module 2: Project Manager Activities: • Customer/Supplier Environment • Projects in Context • Commercial Environment • Applying PRINCE2® • Delivery Approaches • Measuring Success • Organisational Capability • Seven Processes Module 3: Seven Themes: • Business Case • Organisation • Quality • Plans • Risk • Change • Progress Module 4: Seven Principles: • Continued Business Justification • Learn from Experience • Defined Roles and Responsibilities • Manage by Stages • Manage by Exception • Focus on Products • Tailor to Suit the Project Module 5: Organisation Theme: • Four Levels of Management • PRINCE2® Organisation Requirements • Project Management Team • Project Management Team Roles • Project Board • Project Assurance • Change Authority • Project Support • Communication Management Approach Module 6: Starting Up a Project (SU): • Process Overview • Feasibility Study and Mandate • Appoint the Executive and the Project Manager • Capture Previous Lessons • Design and Appoint the Project Management Team • Prepare the Outline Business Case • Project Product Description • Select the Project Approach and Assemble the Project Brief • Plan the Initiation Stage • Tailoring the SU Process Module 7: Directing a Project (DP): • Authorise Initiation • Authorise the Project • Authorise a Stage or Exception Plan • Authorise Project Closure • Give Ad Hoc Direction • Tailoring the DP Process • Theme Overview • Balance of Justification • Continued Business Justification • PRINCE2® Requirements • Contents of a Business Case • Business Case Development • Benefits Management Approach • Key Responsibilities Module 8: Initiating a Project (IP): • Agree to the Tailoring Requirements • Prepare the Risk Management Approach • Prepare the Change Control Approach • Prepare the Quality Management Approach • Prepare the Communication Management Approach • Set up the Project Controls • Create the Project Plan • Prepare the Benefits Management Approach • Assemble the Project Initiation Documentation • Tailoring the IP Process Module 9: Risk Theme: • Risk Definition • Effective Risk Management • PRINCE2® Risk Requirements • Risk Management Approach • Probability/Impact Grid • Risk Register • Risk Management Procedure • Identify Step • Risk Budget • Key Responsibilities Module 10: Quality Theme: • Quality Definitions • Quality Management • Quality Planning and Control • What is Quality Assurance? • PRINCE2® Quality Requirements • PRINCE2® Quality Documentation Requirements • Quality Management Approach • Quality Audit Trail • Project Product Description • Product Description • Quality Review Technique • Quality Review Roles/Responsibilities • Quality Review Meeting • Off-Specifications and Concessions • Review Follow-Up • Quality Review Benefits • Key Responsibilities • Communication Management Approach Module 11: Plans Theme: • Dealing with the Planning Horizon • PRINCE2® Planning Requirements • Documentation Requirements • Project and Stage Plans • Team Plans and Work Packages • Plans Relationship • What is in a Plan? • PRINCE2® Approach to Plans • Designing a Plan • Delivery Approaches • Defining and Analysing the Products • Product Breakdown Structures • Product Description • Product Flow Diagram • Identify the Activities and Dependencies • Preparing Estimates • Preparing a Schedule • Documenting the Plan • Analysing Risks to a Plan • Gantt Chart and Tailoring • Key Responsibilities Module 12: Progress Theme: • Progress Definition • PRINCE2® Requirements • Progress Control • Management by Exception • Delegating Tolerances and Reporting Actual and Forecast Progress • Types of Control • Management Products and Progress Control Module 13: Change Theme: • Issue Definition • PRINCE2® Approach to Change • PRINCE2® Change Documentation • Issue Register • Change Control Approach • Change Budget • Issue and Change Control Procedure • Issue Report • Exception Report Module 14: Controlling a Stage (CS): • Activity Breakdown • Authorise a Work Package • Work Package • Review Work Package Status • Receive Completed Work Packages • Review the Management Stage Status • Report Highlights • Highlight Report • Capture and Assess Issues and Risks • Escalate Issues and Risks • Take Corrective Action • Tailoring CS Module 15: Managing Product Delivery (MP): • Accept a Work Package • Execute a Work Package • Checkpoint Report • Deliver a Work Package • Tailoring MP Module 16: Managing a Stage Boundary (SB): • Plan the Next Management Stage • What is in a Plan? • Update the Project Plan • Update the Business Case • Report the Management Stage End • End-Stage Report • Produce an Exception Plan • Tailoring SB Module 17: Closing a Project (CP): • Prepare Planned Closure • Hand Over Products • Evaluate the Project • End Project Report • Recommend Project Closure • Tailoring CP Module 18: Considerations for Organisational Adoption: • Creating a PRINCE2® Based Project Management Method • Creating Tailoring Rules and Guidelines • Rating the Complexity of Projects • Embedding PRINCE2® • Tailoring • What Should Be Tailored? • Tailoring Constraints and Influences • Creating an Organisation’s Method DURATION 6 days WHATS INCLUDED Course Material Case Study Experienced Lecturer Refreshments Certificate

PRINCE2® Foundation and Practitioner
Delivered In-PersonFlexible Dates
£1,000

M.D.D ONLINE DATING COACHING PACKAGE (ONLINE DATING COACHING)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

Self esteem building Improve social anxiety Learning what to say and do in text and dates Education on modern dating techniques Online messages formatting and wording Confidence Coaching Online dating tips Online dating Coaching with your own personal dating coach Kino escalation Introspection and characteristic testing https://relationshipsmdd.com/product/online-dating-coaching-package/

M.D.D ONLINE DATING COACHING PACKAGE (ONLINE DATING COACHING)
Delivered in London or UK Wide or OnlineFlexible Dates
£850

Handling Difficult Situations & People

By Challenge Consulting

Handing Difficult Situations & People - 1 day training course delivered in Nottingham Enables participants to explore their own behaviour and to rationalise the behaviour in others. Often individuals are not in themselves “difficult”, it is the situation that presents itself that leads to this. This course will provide practical ways to maintain positive relationships and to avoid hostile situations which could escalate.

Handling Difficult Situations & People
Delivered In-PersonFlexible Dates
£294

An Understanding of Pressure Area Care

By Guardian Angels Training

Enhance your knowledge and skills in pressure area care with our comprehensive course. Ideal for healthcare professionals, caregivers, and nurses.

An Understanding of Pressure Area Care
Delivered In-Person in InternationallyFlexible Dates
£875
1...45678...57