• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

8512 ET courses in Cardiff delivered Online

Supervision and Managing Performance Course

By DG Legal

This course satisfies the supervision requirements in the LAA Standard Contract & covers the key skills needed to ensure compliance with the LAA Contract.

Supervision and Managing Performance Course
Delivered Online + more
£225 to £300

Public Relations, Protocal, Etiquette and Managing VIPS

5.0(10)

By GBA Corporate

Overview The course helps you attain the skills in managing VIPs and Public Relations. It enables participants to discuss a large diversity of encounters, characters, everyday situations, conversations, and sometimes some rough events as well.  

Public Relations, Protocal, Etiquette and Managing VIPS
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Advanced Ethernet switching

5.0(3)

By Systems & Network Training

Advanced Ethernet switching training course description An advanced hands on switching course for those already familiar with the basics such as STP and VLANs. The course starts with advanced diagnostics and network monitoring moving onto switch protocols. A large part of the second day is spent implementing QoS and security such as 802.1x. What will you learn Troubleshoot switching. Explain how a number of switch protocols work, including: UDLD LLDP LACP DTP VTP/MVRP Design redundancy into switched networks. Implement QoS on switches. Harden switches. Advanced Ethernet switching training course details Who will benefit: Technical staff working with Ethernet switches. Prerequisites: None Duration 2 days Advanced Ethernet switching training course contents Switches Switch review, troubleshooting, diagnostics, L2 traceroute, UDLD, message logging, Wireshark, port mirroring, Hands on: Troubleshooting. Network management SNMP, SNMPv3, RMON, Netflow, Sflow. System logging. Hands on: Managing switches with SNMP. Syslogd. Switches and automatic configuration Auto-MDIX, LLDP, CDP, Link aggregation, LACP, Link state tracking, VLANS and tags, DTP. Hands on: Discovery, dynamic configuration. RSTP 802.1w, new port roles and states, new BPDUs, rapid convergence, topology changes, compatibility issues. L3 redundancy, VRRP, GLBP. Design issues. Hands on: RSTP, VRRP. VLANS: Registration protocols Why VTP? VTP modes, how VTP works, VTP pruning. GVRP, MVRP. Hands on: Dynamic VLANs STP variations and alternatives 802.1s (multiple spanning tree), regions, rings, L2MP, TRILL. Hands on: 802.1s Multicasting What is multicasting, Static configuration, IGMP snooping, CGMP, MVR. IPv6 MLD snooping. Hands on: Multicast through switches QoS Storm control, DSCP, 802.1Q, 802.1p, mapping, classification, policy, Ingress queues, Egress queues. Dropping frames, limiting bandwidth. Hands on: Voice through switches. More VLANS Native VLANs, Voice VLANs Security Static MAC addresses, AAA, RADIUS, Port based authentication, 802.1x, Guest VLANs, L2 attacks, SSH, HTTPS. Hands on: Hardening switches. Miscellaneous NTP, managing the MAC address table, managing system resources, SDN

Advanced Ethernet switching
Delivered in Internationally or OnlineFlexible Dates
£1,727

Mastering Harvard Referencing: A Comprehensive Guide for UK Students

By Sophia Baker

Introduction When it comes to academic writing, referencing is crucial. It’s not just about giving credit where it’s due, but also about enhancing the credibility of your work. Among the various referencing styles, Harvard referencing for word essays is one of the most widely used, especially in the UK. But why is it so popular, and how can you master it? Let’s dive in! Understanding Harvard Referencing Harvard referencing is a system of citation that allows you to acknowledge the sources you’ve used in your academic writing. It’s an author-date system, which means you include the author’s surname and the year of publication within the text, and provide full details in a reference list at the end. Despite its name, Harvard references didn’t originate from Harvard University. The style was first used by a zoologist named Edward Laurens Mark in a paper published in 1881. Over time, it has evolved and become one of the most recognized citation styles worldwide. Harvard referencing consists of two main components: in-text citations and a reference list. In-text citations are brief and are placed within the body of your text, while the reference list provides full details of all the sources you’ve cited. The Basics of Harvard Referencing In-text citations in Harvard referencing include the author’s surname and the year of publication. If you’re quoting directly, you should also include the page number. For example: (Smith, 2020, p. 23). The reference list is where you provide full details of each source cited in your work. Each entry should include the author’s name, year of publication, title of the work, and other relevant information, depending on the type of source. A reference list includes only the sources you’ve directly cited in your text, while a bibliography may include all sources you’ve consulted, whether or not you’ve cited them. How to Cite Different Types of Sources When citing a book, you should include the author’s name, year of publication, title (in italics), edition (if applicable), place of publication, and publisher. For example: Smith, J. (2020). The Art of Referencing (2nd ed.). London: Academic Press. Journal articles should include the author’s name, year of publication, title of the article, title of the journal (in italics), volume number, issue number, and page numbers. For example: Brown, A. (2019). ‘Understanding Harvard Referencing’, Journal of Academic Writing, 12(3), pp. 45-67. For websites, include the author (or organization), year of publication (or last update), title of the webpage (in italics), and the URL. For example: University of Oxford. (2021). Harvard Referencing Guide. Available at: https://www.ox.ac.uk/harvard (Accessed: 10 September 2024). When citing a newspaper article, include the author’s name, year of publication, title of the article, title of the newspaper (in italics), date, and page number. For example: Doe, J. (2022). ‘The Future of Academic Writing’, The Times, 5 May, p. 12. For government documents, include the name of the government department, year of publication, title of the document (in italics), place of publication, and publisher. For example: UK Department for Education. (2020). Education Policy Report. London: HMSO. Cite conference papers by including the author’s name, year of publication, title of the paper, title of the conference (in italics), location, and date of the conference. For example: Jones, M. (2023). ‘Innovations in Academic Writing’, International Writing Conference, Manchester, 10-12 April. Harvard Referencing for Electronic Sources When citing e-books, the format is similar to print books, but you should include the format (e.g., Kindle) or the platform where it’s available. For example: Adams, R. (2018). Digital Referencing (Kindle ed.). Available at: Amazon.co.uk. For online journals, follow the same format as print journals, but include the DOI or the URL where the article can be accessed. For example: Taylor, S. (2021). ‘Harvard Referencing in the Digital Age’, Journal of Modern Research, 15(4), pp. 33-50. DOI: 10.1234/jmr.2021.0987. The format for websites remains the same as mentioned earlier, with the inclusion of the URL and the access date. For social media, include the author (or username), year, content of the post (in italics), platform, and the date of the post. For example: @AcademicWriterUK. (2023). The key to successful referencing is consistency. Twitter, 15 March. Advanced Harvard Referencing Techniques When you can’t access the original source and need to cite a secondary source, mention both the original and secondary source. For example: (Smith, 1989, cited in Brown, 2019). For works with multiple authors, list up to three authors in the in-text citation. For more than three, use “et al.” after the first author’s name. For example: (Jones, Smith, and Brown, 2020) or (Jones et al., 2020). If you’re citing different editions of a book, mention the edition in your reference. For example: Brown, A. (2018). Theories of Learning (3rd ed.). Oxford: Oxford University Press. If some information is missing, like the author or date, use “Anon.” for anonymous authors and “n.d.” for no date. Common Harvard Referencing Mistakes and How to Avoid Them Incorrect formatting can easily occur if you’re not careful. Make sure to follow the correct structure for each type of source, as this can significantly impact your grade. Leaving out essential details like the author’s name or the year of publication is a common mistake. Always double-check your references before submitting your work. Punctuation is crucial in Harvard referencing. Misplacing a comma or period can change the meaning of your citation. Pay attention to the details! Tools and Resources for Harvard Referencing Online citation generators can save you time, but be cautious—always double-check the generated citations for accuracy. Tools like EndNote or Zotero can help you manage your references and ensure consistency throughout your work. Many universities provide specific guidelines for Harvard referencing. Always refer to your institution’s guidelines to ensure you’re following the correct format. The Importance of Consistency in Harvard Referencing Consistency is key in Harvard referencing. Uniformity in your citations not only makes your work look professional but also enhances readability. Inconsistent referencing can confuse readers and may lead to a lower grade. Make sure your citations follow a consistent style throughout your work. Tips for Mastering Harvard Referencing Always double-check your references before submission. Small errors can add up and impact your overall grade. Keep a record of all the sources you consult. This will make it easier to create your reference list and avoid missing any citations. Using a Harvard style guide can help ensure that you’re following the correct format. It’s a handy tool for quick reference. Conclusion Mastering Harvard referencing may seem daunting at first, but with practice and attention to detail, it becomes second nature. Remember, proper referencing not only supports your arguments but also adds credibility to your work. So, take your time, be consistent, and use the resources available to you.

Mastering Harvard Referencing: A Comprehensive Guide for UK Students
Delivered Online On Demand1 hour
FREE

Computer System Validation Training Course (ONLINE). Extend Your Role to CSV Projects. Get Certified and Become a CSV Professional

By Getreskilled (UK)

Has the Computer System Validation Engineer left and you’ve been handed their responsibilities? Do the thoughts of your next audit fill you with dread? CSV can be frustrating but this program will show you how to manage electronic data in a regulated manufacturing/laboratory/clinical environment using the GAMP framework and ensure compliance with FDA’s 21 CFR Part 11, EU Annex 11 or other regulatory guidelines.

Computer System Validation Training Course (ONLINE). Extend Your Role to CSV Projects. Get Certified and Become a CSV Professional
Delivered Online On Demand
£699 to £9,996

Advanced Junos Security

5.0(3)

By Systems & Network Training

Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in Internationally or OnlineFlexible Dates
£4,997

Securing UNIX systems

5.0(3)

By Systems & Network Training

Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in Internationally or OnlineFlexible Dates
£4,997

Preliminary Electronic Security Course

By Hi-Tech Training

The Preliminary Electronic Security Course is an introductory (or revision) course designed to provide participants who have no previous Electrical or Electronics experience with the background skills required to attend the CCTV Installation Course, Access Control Course or Fire Alarm Foundation Course. The course gives both an introduction to electronics and electronic security and shows how the two fields merge together. Ideal for a beginner wishing to learn more about this fascinating area. A large practical content is guaranteed. The day will be an excellent learning experience with a skilled instructor. It is a great introduction to the other courses we provide.

Preliminary Electronic Security Course
Delivered Online
£85 to £685

IT System Support Course

By Hi-Tech Training

The IT System Support Technician (Online Virtual Classroom) Course will equip candidates with the skills and knowledge to competently carry out routine customer support to a range of Computer users, communicate effectively with support managers, supporting colleagues and external clients.

IT System Support Course
Delivered Online
£85 to £685

CCTV Installation Course

By Hi-Tech Training

Hi-Tech Training Closed Circuit Television (CCTV) Installation Course is designed to give participants a practical knowledge of the operation and installation of CCTV systems at a foundation level.

CCTV Installation Course
Delivered Online
£85 to £685