• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1808 Guide courses in Belfast delivered Live Online

Introduction to Immigration Law

By Immigration Advice Service

Our Introduction to Immigration Law course is a full-day course designed for those who are interested in a career in immigration law. About the course Our introduction to UK Immigration Law course is aimed at those looking to venture into the increasingly popular and relevant world of immigration law. This exciting course will give you an overview of the various UK visa routes as well as looking into a “day in the life” of an immigration caseworker, with the opportunity to work through a real visa application form. During this course we’ll also guide you on the path to accreditation, providing valuable insights into the requirements and steps to become a recognised immigration professional. Course joining links, materials and instructions are sent out 24hours before the course starts.   Course information Course: Introduction to Immigration Law Duration: 1 day Delivery Method: Online Trainer: Expert Immigration Trainer CPD: 6 Points Career Path: Immigration Advisor Entry Requirements: None Why Study with Immigration Advice Service. Immigration Advice Service has been providing professional immigration services for over 10 years in the public, private and corporate sectors. Our Introduction to Immigration Law course will give you an insight into UK Law, covering key fundamentals as well as how to become an accredited advisor. Our qualified and OISC regulated trainer will guide you through the process and ensure you are competent with elements covered within the course.   Content covered in the course: General knowledge of immigration law A look at common visa routes:Entry clearanceFamily visasVisit visasPBS How to take instructions from a client Drafting letters for clients How to work through a visa application form How to become accredited

Introduction to Immigration Law
Delivered OnlineFlexible Dates
£150

Introduction to Project Management: Virtual In-House Training

By IIL Europe Ltd

Introduction to Project Management: Virtual In-House Training This course provides practical insights into what is project management and how it is performed in a structured manner. This course provides practical insights into what is project management and how it is performed in a structured manner. You will learn how projects are selected, initiated, planned, executed, monitored and control, as well as closed, which could serve you ubiquitously. The goal of this course is to provide a minimally essential orientation to practical project management concepts, tools, and techniques. You will be provided with enough of these that can be applied from both a project manager and a key stakeholder perspective. What you Will Learn You will learn how to: Articulate on the basics of the project management profession Explain project management terms and concepts in practice Speak on how projects originate in mature organizations Employ a disciplined approach to initiating, planning, and managing projects to closure Identify and describe the roles and responsibilities of key project stakeholders Consider standard project processes to implement based upon the PMBOK® Guide Getting Started Introductions Course orientation Participants' expectations Foundation Concepts Key terms and concepts Organizational framework Leadership framework Originating and Initiating Originating projects Initiating projects Planning Planning overview Scope and quality planning Resources and risk planning Schedule and cost planning Project baselining Executing and Controlling Executing Monitoring and Controlling Closing Project closing overview Closing administratively Closing financially Summary and Next Steps Review of goals, objectives, key concepts, and expectations Evaluations

Introduction to Project Management: Virtual In-House Training
Delivered OnlineFlexible Dates
£450

Journey of Your (JOY) Birth Hypnobirthing

5.0(22)

By The Northern College Of Clinical Hypnotherapy

Want to teach Hypnobirthing? My JOY hypnobirthing course will equip you with the skills to empower expectant mothers on their childbirth journey. Gain insights into how hypnotherapy fosters a calm mindset, alleviates discomfort, and prepares women for childbirth.

Journey of Your (JOY) Birth Hypnobirthing
Delivered OnlineJoin Waitlist
£150

Suicide First Aid

5.0(2)

By Changing Minds Training

This one-day Suicide First Aid training course gives learners the knowledge and tools to understand that suicide is one of the most preventable deaths and some basic skills can help someone with thoughts of suicide stay safe from their thoughts and stay alive.

Suicide First Aid
Delivered in London or UK Wide or OnlineFlexible Dates
£2,495

Which Video Editing Software Is Best For You? (FREE Webinar)

5.0(1)

By Clockwork Eye Video

Join our free webinar, "What Video Editing Software is Best For You?", to explore and compare top editing programs, find the best fit for your needs, and enhance your editing skills with expert guidance and live Q&A.

Which Video Editing Software Is Best For You? (FREE Webinar)
Delivered Online + more
FREE

NQT TRAINING – BEHAVIOUR MANAGEMENT AND RELATIONSHIP BUILDING

By Inclusive Solutions

In line with OFSTED expectations make sure NQTs are up to speed on effective behaviour management and relationship building in the classroom. Course Category Behaviour and Relationships Meeting emotional needs Inclusion Description This is our lead workshop/training day on behaviour and relationship work aimed at NQTs. Recent OFSTED changes make Behaviour and Classroom management of NQTs a particular focus for inspections. Are your NQTs teaching the behaviours children need to succeed? Can they articulate these behaviours? This training provides a values primer and a practical guide to successful innovative strategies for improving behaviour and strengthening relationships for challenging children and young people of all ages. Not just another day on ‘Behaviour Management’ – our day goes well beyond a rewards and sanctions approach to ‘behaviour’. We will be focused on those young people for whom rewards and punishments do not always work and who confuse the adults who work with them. We aim to take a relationships based approach and to give those attending an opportunity to think more deeply about why young people do the things they do and what our part as adults is in creating, sustaining and changing these behaviours. The day gives those present opportunities to reflect on their attitudes and practice in relation to children’s behaviour and relationship building. If your usual approaches to managing behaviour aren’t working with particular individuals then take a tour through this range of cutting edge strategies for bringing about positive behaviour change, and for meeting challenging emotional needs. Learning Objectives Reinforce and affirm good practice Re-energise, stimulate and challenge thinking about inclusion of challenging young people and children Increased understanding about behaviour and emotions Increased confidence in managing challenging pupils in childcare settings mainstream schools Access to a wider range of practical strategies to impact on behaviour problems Opportunity to reflect on professional attitudes and behaviour towards families and children and young people Learn new skills and processes to make inclusion successful Who Is It For? Primary and secondary NQTs Course Content The course answers the questions: Are there any new ways to include our most challenging young people? Should we focus on behaviour or relationships? How do we go about including high profile children or young people? Can we find an alternative to exclusion? – What would a relationship policy look like? The following are some of the key themes and tools we are likely to explore during the day Getting the welcome right for the most challenging Encouraging Getting the best from the most challenging Circle of Courage Belonging Achievement Generosity Independence Active listeningV Listening to the person underneath the behaviour Compass of Shame – which directions do children and young people head when they feel shame? And what helps children work through these feelings in more healthy ways? Involving other children and young people in solutions and interventions Circles of friends:Peer supportCounselling and mediationTeam Problem Solving Solution Circles:A 30 minute group problem solving process to get Teams ‘unstuck’ and to generate positive first action steps

NQT TRAINING – BEHAVIOUR MANAGEMENT AND RELATIONSHIP BUILDING
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

GDPR Awareness Training

By Training Centre

  The GDPR came into effect in May 2018. This legislation is designed to guide organisations in their obligations relative to the processing of personal and sensitive data. About This Course   Organisations are required to comply with the GDPR regardless of their size of business. If you process 'personal data', there is a potential need to be compliant with the legislation. The scope of the GDPR considers how this information is collected, stored, used, transported, shared and disposed of. To ensure organisations' understand this obligation, this interactive one-day course considers both scoping and auditing of an organisations processing activities, as well as an understanding of compliance with GDPR.  Learning Outcomes; GDPR - what is it and how does it apply to us? Personal and sensitive data Lawful basis for processing Consent and the GDPR The Data Protection Act 2018 Data Subject rights The role of the ICO Data breach or Incident? Privacy by Design and by default GDPR Audit checklist Prerequisites   There are no prerequisites to attend this course, however all attendees are expected to have a basic understanding of the Data Protection principles. What's Included?   Refreshments & Lunch (Classroom courses only) Course Slide Deck Quizzes Who Should Attend?   The course is designed for any member of the organisation whose role includes processing personal data. Data Protection Officers, Information Security team members or Information Governance Leads who may also see benefit in attending. Accreditation Assessment    There is no exam with this course but delegates do receive a Course Attendance Certificate and an 8 hour CPD Certificate. Provided by   This course is Accredited by NACS and administered by the IECB

GDPR Awareness Training
Delivered OnlineFlexible Dates
£425

CertNexus Certified CyberSec First Responder (CFR-410)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners preparing for or who currently perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for those roles within federal contracting companies and private sector firms whose mission or strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD Information Network (DoDIN) operation and incident handling. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. Overview In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will: Assess cybersecurity risks to the organization. Analyze the threat landscape. Analyze various reconnaissance threats to computing and network environments. Analyze various attacks on computing and network environments. Analyze various post-attack techniques. Assess the organization's security posture through auditing, vulnerability management, and penetration testing. Collect cybersecurity intelligence from various network-based and host-based sources. Analyze log data to reveal evidence of threats and incidents. Perform active asset and network analysis to detect incidents. Respond to cybersecurity incidents using containment, mitigation, and recovery tactics. Investigate cybersecurity incidents using forensic analysis techniques. This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation. In addition, this course and subsequent certification (CFR-410) meet all requirements for personnel requiring DoD directive 8570.01-M position certification baselines: CSSP Analyst CSSP Infrastructure Support CSSP Incident Responder CSSP Auditor The course and certification also meet all criteria for the following Cybersecurity Maturity Model Certification (CMMC) domains: Incident Response (IR) Audit and Accountability (AU) Risk Management (RM) Lesson 1: Assessing Cybersecurity Risk Topic A: Identify the Importance of Risk Management Topic B: Assess Risk Topic C: Mitigate Risk Topic D: Integrate Documentation into Risk Management Lesson 2: Analyzing the Threat Landscape Topic A: Classify Threats Topic B: Analyze Trends Affecting Security Posture Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments Topic A: Implement Threat Modeling Topic B: Assess the Impact of Reconnaissance Topic C: Assess the Impact of Social Engineering Lesson 4: Analyzing Attacks on Computing and Network Environments Topic A: Assess the Impact of System Hacking Attacks Topic B: Assess the Impact of Web-Based Attacks Topic C: Assess the Impact of Malware Topic D: Assess the Impact of Hijacking and Impersonation Attacks Topic E: Assess the Impact of DoS Incidents Topic F: Assess the Impact of Threats to Mobile Security Topic G: Assess the Impact of Threats to Cloud Security Lesson 5: Analyzing Post-Attack Techniques Topic A: Assess Command and Control Techniques Topic B: Assess Persistence Techniques Topic C: Assess Lateral Movement and Pivoting Techniques Topic D: Assess Data Exfiltration Techniques Topic E: Assess Anti-Forensics Techniques Lesson 6: Assessing the Organization's Security Posture Topic A: Implement Cybersecurity Auditing Topic B: Implement a Vulnerability Management Plan Topic C: Assess Vulnerabilities Topic D: Conduct Penetration Testing Lesson 7: Collecting Cybersecurity Intelligence Topic A: Deploy a Security Intelligence Collection and Analysis Platform Topic B: Collect Data from Network-Based Intelligence Sources Topic C: Collect Data from Host-Based Intelligence Sources Lesson 8: Analyzing Log Data Topic A: Use Common Tools to Analyze Logs Topic B: Use SIEM Tools for Analysis Lesson 9: Performing Active Asset and Network Analysis Topic A: Analyze Incidents with Windows-Based Tools Topic B: Analyze Incidents with Linux-Based Tools Topic C: Analyze Indicators of Compromise Lesson 10: Responding to Cybersecurity Incidents Topic A: Deploy an Incident Handling and Response Architecture Topic B: Mitigate Incidents Topic C: Hand Over Incident Information to a Forensic Investigation Lesson 11: Investigating Cybersecurity Incidents Topic A: Apply a Forensic Investigation Plan Topic B: Securely Collect and Analyze Electronic Evidence Topic C: Follow Up on the Results of an Investigation Additional course details: Nexus Humans CertNexus Certified CyberSec First Responder (CFR-410) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified CyberSec First Responder (CFR-410) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Certified CyberSec First Responder (CFR-410)
Delivered OnlineFlexible Dates
£3,495

M.D.D STUDENTS BREAKUP PACKAGE (STUDENTS)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

£169.99 for 1 week of coaching Have you just broken up with your girlfriend/boyfriend? Or has one of your friends or colleagues broken up with someone recently send them a package to cheer them up The package includes: Breakup guide, Biscuits, Drink, Breakup quotes, Face mask, Chocolate Treat, 3 x 20 mins calls per week to talk about your situation https://relationshipsmdd.com/product/m-d-d-students-breakup-package/

M.D.D STUDENTS BREAKUP PACKAGE (STUDENTS)
Delivered in London or UK Wide or OnlineFlexible Dates
£169.99

Microsoft Project Orange Belt 2013: Virtual In-House Training

By IIL Europe Ltd

Microsoft Project Orange Belt® 2013: Virtual In-House Training This workshop gives participants a full insight into creating effective schedules using Microsoft® Project 2013, allowing you to estimate, coordinate, budget, staff, and control projects and support other users. This workshop gives participants a full insight into creating effective schedules using Microsoft® Project 2013, allowing you to estimate, coordinate, budget, staff, and control projects and support other users. This workshop provides the eBook Dynamic Scheduling with Microsoft® Project 2013, and is kept up to date with the framework of knowledge outlined by the Project Management Institute's PMBOK® Guide and the Practice Standard for Scheduling. What you Will Learn You'll learn how to: Understand what's new in Project 2013 Explain where Project 2013 fits in the Microsoft® EPM solution Initialize Project 2013 to start project planning Create a well-formed project schedule Understand task types and the schedule formula Assign resources and costs to tasks Analyze resource utilization and optimize the schedule Set a baseline and track progress Create and manage project reports Customize views and fields Apply Earned Value Management Understand the basics of managing multiple projects Getting Started Introductions Course structure Course goals and objectives Enterprise Project Management Concepts and Framework Getting Started with Project 2013 Project 2013: What's New and General Overview Setting Up a New Project Schedule (templates, options, save, etc.) Setting the Project Calendar Entering Tasks The Planning Processes Importing Tasks (Word, Excel, SharePoint) Synchronizing with SharePoint Tasks List Creating and managing the WBS (include tasks, manually scheduled tasks, summary tasks and milestones, as well as custom WBS coding) Entering Estimates Tendencies in Estimating The Rolling Wave Approach Entering Duration and Work Estimates Types of Tasks Entering Dependencies The Principle of Dynamic Scheduling Choosing the Right Type of Dependency Entering Dependencies in Project 2013 Different Applications of Dependencies Entering Deadlines, Constraints, and Task Calendars Use of Deadlines and Constraints Entering Deadlines and Constraints in Project 2013 Entering Resources and Costs Types of Resources Entering Resources in Project 2013 Calendars and Resources Entering Costs in Project 2013 Entering Assignments Assignments in a Schedule Assignments and Task Types Entering Assignments in Project 2013 Assignments, Budgets, and Costs Optimizing the Schedule The Critical Path Method and the Resource Critical Path Resource Leveling Optimizing Time, Cost, and Resources in Project 2013 Updating the Schedule The Baseline Updating Strategies and Situations Prepare the Status and Forecast Report in Project 2013 Reporting Using Reports Using Visual Reports Formatting and Printing in Project 2013 Customizing Fields in Project 2013 Earned Value Management (EVM) Overview of EVM Applying EVM with Project 2013 Evaluating the Project Evaluating the Project Performance Project Benefits and Results Templates for Future Projects Summary Tools and Checklist Best Practices Checklist Consolidated Schedules Creating Consolidated Schedules Using a Resource Pool Links across Projects Solving common problems Analyzing the Critical Path across Projects

Microsoft Project Orange Belt 2013: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,250