• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

8692 ET courses in Cardiff delivered Online

Computer System Validation Training Course (ONLINE). Extend Your Role to CSV Projects. Get Certified and Become a CSV Professional

By Getreskilled (UK)

Has the Computer System Validation Engineer left and you’ve been handed their responsibilities? Do the thoughts of your next audit fill you with dread? CSV can be frustrating but this program will show you how to manage electronic data in a regulated manufacturing/laboratory/clinical environment using the GAMP framework and ensure compliance with FDA’s 21 CFR Part 11, EU Annex 11 or other regulatory guidelines.

Computer System Validation Training Course (ONLINE). Extend Your Role to CSV Projects. Get Certified and Become a CSV Professional
Delivered Online On Demand
£699 to £9,996

Advanced Junos Security

5.0(3)

By Systems & Network Training

Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in Internationally or OnlineFlexible Dates
£4,997

Securing UNIX systems

5.0(3)

By Systems & Network Training

Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in Internationally or OnlineFlexible Dates
£4,997

Mastering Harvard Referencing: A Comprehensive Guide for UK Students

By Sophia Baker

Introduction When it comes to academic writing, referencing is crucial. It’s not just about giving credit where it’s due, but also about enhancing the credibility of your work. Among the various referencing styles, Harvard referencing for word essays is one of the most widely used, especially in the UK. But why is it so popular, and how can you master it? Let’s dive in! Understanding Harvard Referencing Harvard referencing is a system of citation that allows you to acknowledge the sources you’ve used in your academic writing. It’s an author-date system, which means you include the author’s surname and the year of publication within the text, and provide full details in a reference list at the end. Despite its name, Harvard references didn’t originate from Harvard University. The style was first used by a zoologist named Edward Laurens Mark in a paper published in 1881. Over time, it has evolved and become one of the most recognized citation styles worldwide. Harvard referencing consists of two main components: in-text citations and a reference list. In-text citations are brief and are placed within the body of your text, while the reference list provides full details of all the sources you’ve cited. The Basics of Harvard Referencing In-text citations in Harvard referencing include the author’s surname and the year of publication. If you’re quoting directly, you should also include the page number. For example: (Smith, 2020, p. 23). The reference list is where you provide full details of each source cited in your work. Each entry should include the author’s name, year of publication, title of the work, and other relevant information, depending on the type of source. A reference list includes only the sources you’ve directly cited in your text, while a bibliography may include all sources you’ve consulted, whether or not you’ve cited them. How to Cite Different Types of Sources When citing a book, you should include the author’s name, year of publication, title (in italics), edition (if applicable), place of publication, and publisher. For example: Smith, J. (2020). The Art of Referencing (2nd ed.). London: Academic Press. Journal articles should include the author’s name, year of publication, title of the article, title of the journal (in italics), volume number, issue number, and page numbers. For example: Brown, A. (2019). ‘Understanding Harvard Referencing’, Journal of Academic Writing, 12(3), pp. 45-67. For websites, include the author (or organization), year of publication (or last update), title of the webpage (in italics), and the URL. For example: University of Oxford. (2021). Harvard Referencing Guide. Available at: https://www.ox.ac.uk/harvard (Accessed: 10 September 2024). When citing a newspaper article, include the author’s name, year of publication, title of the article, title of the newspaper (in italics), date, and page number. For example: Doe, J. (2022). ‘The Future of Academic Writing’, The Times, 5 May, p. 12. For government documents, include the name of the government department, year of publication, title of the document (in italics), place of publication, and publisher. For example: UK Department for Education. (2020). Education Policy Report. London: HMSO. Cite conference papers by including the author’s name, year of publication, title of the paper, title of the conference (in italics), location, and date of the conference. For example: Jones, M. (2023). ‘Innovations in Academic Writing’, International Writing Conference, Manchester, 10-12 April. Harvard Referencing for Electronic Sources When citing e-books, the format is similar to print books, but you should include the format (e.g., Kindle) or the platform where it’s available. For example: Adams, R. (2018). Digital Referencing (Kindle ed.). Available at: Amazon.co.uk. For online journals, follow the same format as print journals, but include the DOI or the URL where the article can be accessed. For example: Taylor, S. (2021). ‘Harvard Referencing in the Digital Age’, Journal of Modern Research, 15(4), pp. 33-50. DOI: 10.1234/jmr.2021.0987. The format for websites remains the same as mentioned earlier, with the inclusion of the URL and the access date. For social media, include the author (or username), year, content of the post (in italics), platform, and the date of the post. For example: @AcademicWriterUK. (2023). The key to successful referencing is consistency. Twitter, 15 March. Advanced Harvard Referencing Techniques When you can’t access the original source and need to cite a secondary source, mention both the original and secondary source. For example: (Smith, 1989, cited in Brown, 2019). For works with multiple authors, list up to three authors in the in-text citation. For more than three, use “et al.” after the first author’s name. For example: (Jones, Smith, and Brown, 2020) or (Jones et al., 2020). If you’re citing different editions of a book, mention the edition in your reference. For example: Brown, A. (2018). Theories of Learning (3rd ed.). Oxford: Oxford University Press. If some information is missing, like the author or date, use “Anon.” for anonymous authors and “n.d.” for no date. Common Harvard Referencing Mistakes and How to Avoid Them Incorrect formatting can easily occur if you’re not careful. Make sure to follow the correct structure for each type of source, as this can significantly impact your grade. Leaving out essential details like the author’s name or the year of publication is a common mistake. Always double-check your references before submitting your work. Punctuation is crucial in Harvard referencing. Misplacing a comma or period can change the meaning of your citation. Pay attention to the details! Tools and Resources for Harvard Referencing Online citation generators can save you time, but be cautious—always double-check the generated citations for accuracy. Tools like EndNote or Zotero can help you manage your references and ensure consistency throughout your work. Many universities provide specific guidelines for Harvard referencing. Always refer to your institution’s guidelines to ensure you’re following the correct format. The Importance of Consistency in Harvard Referencing Consistency is key in Harvard referencing. Uniformity in your citations not only makes your work look professional but also enhances readability. Inconsistent referencing can confuse readers and may lead to a lower grade. Make sure your citations follow a consistent style throughout your work. Tips for Mastering Harvard Referencing Always double-check your references before submission. Small errors can add up and impact your overall grade. Keep a record of all the sources you consult. This will make it easier to create your reference list and avoid missing any citations. Using a Harvard style guide can help ensure that you’re following the correct format. It’s a handy tool for quick reference. Conclusion Mastering Harvard referencing may seem daunting at first, but with practice and attention to detail, it becomes second nature. Remember, proper referencing not only supports your arguments but also adds credibility to your work. So, take your time, be consistent, and use the resources available to you.

Mastering Harvard Referencing: A Comprehensive Guide for UK Students
Delivered Online On Demand1 hour
FREE

ONE SPACE LEFT! 24th September Lucy Brownridge #Agent121. Looking for: PICTURE BOOKS

5.0(3)

By I Am In Print

LOOKING FOR: CHILDREN'S: PICTURE BOOK TEXTS, NON-FICTION, POETRY Lucy Brownridge is Editorial Director at Wide Eyed Editions and Frances Lincoln Children’s Books, and formerly Thames & Hudson where she helped to establish the Children’s list. She specialises in highly illustrated picture books and non-fiction (including poetry) for children. She has commissioned and edited books which have gone on to win the Carnegie Awards, The British Book Awards, the Klaus Flugge Prize, the Blue Peter Prize and have been translated into over 30 languages. She has been editor to Alan Ahlberg, Quentin Blake, Mariajo Ilustrajo, Yuval Zommer and Children’s Laureate Joseph Coelho among many others. She is the author of The Fantastical Safari and The Cat Family series, and many other books for children. She is interested in the history of illustrated children’s books and is always looking for innovative ways to use the book format. ABOUT YOU Include a covering letter, in a Word document, telling Lucy about yourself and your sources of inspiration. If you have one, include a link to your website. She is keen to read stories she hasn't seen before or see artwork with a distinctive style rather than something that fits with trends. She has particular experience with picture books and illustrated narrative non-fiction. PICTURE BOOKS Please send one or two (max) full manuscripts, in a Word document, starting with a short summary/blurb. Make the summary punchy and engaging. Remember that the best picture book stories are simple and every word should count. Do you see this book as part of a series? NON-FICTION PROPOSALS Please send a paragraph explaining your idea, a contents list, if appropriate, and a sample piece of text. (In addition to the paid sessions, Lucy is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Monday 15th September 2025 at 10:00am UK BST

ONE SPACE LEFT! 24th September Lucy Brownridge #Agent121. Looking for: PICTURE BOOKS
Delivered Online + more
£72

Human Resource Management

5.0(10)

By GBA Corporate

Overview The course curriculum covers human resource planning; recruitment and selection; employee training and development; employee health and safety etc. Based on the fact that knowledge is the gateway to engagement, the 'HR Management course' is designed to build participants' awareness and knowledge of the major functions that make up a modern HR department. 

Human Resource Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

UI/UX Design Using Adobe XD

5.0(10)

By GBA Corporate

Overview This course will give you a whole tour of how to enhance your skills as a UI/UX Design using Adobe. It is very important to master the basics of web and visual design because that is important for UI design eg designing buttons, typography, drop shadow etc. With having a good foundation in visual and web design become an essential key to become a skilled UI/UX Designer.

UI/UX Design Using Adobe XD
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Public Sector Asset Management

5.0(10)

By GBA Corporate

Overview This course is designed to support the governments, public sector, state-owned enterprises and other entities to strategically understand how to plan the asset management and worth of their physical assets like buildings, infrastructure, transportation etc. The course will also highlight how the public sector can improve asset performance, reduce costs and increase returns generated from the assets by using well-planned asset management tools and techniques.

Public Sector Asset Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Principles and Practices of Cyber Security

5.0(10)

By GBA Corporate

Overview Cyber Security plays an important role in every business as it encompasses everything that relates to protecting sensitive data, personal information, intellectual property, data, and governmental and industry information systems from theft and damage attempted by criminals and adversaries. This course is designed to understand and gain practical skills to plan, deliver and monitor IT/cyber security to internal and external clients understanding a complete, knowledge in the areas of IT policies, Security-Operational-Run-Book, security/penetration testing, ethical hacking and black hat hacking including understanding the basics of Kali Operating System and its tools and techniques. It will also cover WiFi security, Website security, human factors, cyber forensics, and cyber security team management, including all other areas in relation to Cyber Security.

Principles and Practices of Cyber Security
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Compliance and Risk Management

5.0(10)

By GBA Corporate

Overview This Compliance and Risk Management Course is designed for anyone looking for a pathway into this profession and wanting to develop their industry knowledge and skills. It covers the role of the Compliance Officer and compliance department in detail, with step-by-step training in compliance auditing and risk management. This Compliance and Risk Management Training Course will equip you with the fundamental skills needed to identify and manage regulatory risk in your organization, taking you through key topics such as how to implement an efficient Compliance Management System, ethics and compliance, risk types and classifications, and how to design a solid risk management strategy. By the end of this Compliance and Risk Management Training Course, you'll have an excellent understanding of core compliance issues, as well as how to promote a positive compliance culture for your organization, which will give you a head start when it comes to standing out in the relevant job market. 

Compliance and Risk Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626