• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

11863 Guide courses

RYA Day Skipper Course

4.9(48)

By Go West Sailing

rya day skipper, sailing training uk, sailing licence

RYA Day Skipper Course
Delivered In-PersonFlexible Dates
£649

Introduction to Coaching - CPD Accredited

By Karen Blake Coaching

🚀 Introduction to Coaching Course: Unlock Your Coaching Potential! 🌟 Discover the art of coaching with our CPD Accredited 'Introduction to Coaching' course. 🎓 Gain insights into the GROW Model, motivation techniques, and advanced questioning skills. Ideal for aspiring coaches and professionals seeking career development.

Introduction to Coaching - CPD Accredited
Delivered Online On Demand
£120

Person Centred Planning using PATH and MAPs

By Inclusive Solutions

What is Person Centred Planning? How is it different to any other kind of meeting or planning? On this day all will become clear… Give your team the opportunity to pause and reflect on what matters most to them about the work they do. The act of listening to each other creates relationship and strengthens trust and inclusion within the team – in creating a shared vision, groups of people build a sense of commitment together. They develop images of ‘the future we want to create together’, along with the values that will be important in getting there and the goals they want to see achieved along the way. Unfortunately, many people still think ’vision’ is the top leader’s job. In schools, the ‘vision task’ usually falls to the Headteacher and/or the governors or it comes in a glossy document from the local authority or the DfES. But visions based on authority are not sustainable. Making inclusive action plans using full participation and graphic facilitation Drawing on the planning tools MAPS and PATH (Pearpoint, Forest and O’Brien 1997) and other facilitation sources we use both process and graphic facilitation to enable the group to build their picture of what they would love to see happening within their organisation/community in the future and we encourage this to be a positive naming, not just a list of the things they want to avoid. Jack Pearpoint, Marsha Forest and John O’Brien developed these innovative approaches in North America and they are being used successfully in many parts of the UK. The planning can focus on an individual, group or organisation and provides a powerful problem solving opportunity, which is flexible and robust enough for many occasions. Tell the story, find the dream, touch the nightmare, and explore who you are, what are the gifts and strengths of the person or group, what are the needs of those present and what is the action plan for the future? Learning objectives  Participants understand Person Centred Planning and its values and applications Participants have skills and confidence to facilitate PATH/MAP processes Participants learn graphic as well as process facilitation skills Strengthens practitioners inclusive practice Provides additional tools for those involved in inclusive work in schools and the community Further develop problem solving and planning skills Course Content The course answers the questions: Need to find new ways to bring Pathway Planning alive? Bored with annual reviews, transition plans and review meetings? Want to find a way of making meetings and planning feel more real and engaging? Need an approach, which engages a young person respectfully together with his or her family and friends? Want the ultimate visual record of the process of a meeting, which will help everyone, keep track? Want to problem solve and plan for the future of a small or large group, service or organisation up to the size of an LA? Inclusive Solutions offer an introductory day to person centred planning or a 3 – 10 session course which is practical as well as values based. Participants will receive direct individualised coaching and training. We will cover: The person being at the centre Family members and friends being full partners Planning reflecting the person’s capacities, what is important to the person and specifying the support they require to make a full contribution to their community Planning building a shared commitment to action that will uphold the person’s rights Planning leading to continual listening, learning and action and helping the person get what they want out of life. Essential Lifestyle Planning, PATH MAPS Personal Futures Planning.

Person Centred Planning using PATH and MAPs
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£2,500 to £6,900

CITB SMSTS (Webinar - 5 Days)

4.9(182)

By You Can Do It .Training

This course covers all relevant legislation affecting safe working in the building, construction...

CITB SMSTS (Webinar - 5 Days)
Delivered In-Person in Stoke on TrentFlexible Dates
£349

Recovering Troubled Projects: On-Demand

By IIL Europe Ltd

Recovering Troubled Projects: On-Demand Despite our best intentions, many of the projects that organizations undertake either don't achieve their intended business results or end in complete failure. Most seasoned project managers have had their share of experiences with difficult or troubled projects and unless they are careful, they will encounter more. This workshop does not focus on 'failed' projects but rather on those projects which without appropriate intervention would be headed for failure. Failed projects are those beyond help and which should be terminated. Here we focus on projects that are salvageable. It is an exercise-driven, no-nonsense, professional practice-focused workshop positioning the participant to immediately apply the tools and lessons learned in the classroom. The workshop employs the use of both illustrative and practical/working case studies. Illustrative case studies will examine insights from real-world troubled projects. Participants will be asked to bring descriptions of their own examples of troubled projects on which they're currently working or on which they have worked in the past. A number of these will be used as the basis for the practical/working case studies. The approach builds on and complements the disciplines addressed in Project Management Institute's PMBOK® Guide and also addresses issues that arise when managing projects in a complex environment. What You Will Learn You will learn to: Recognize the value of a structured project recovery process Explain the reasons most projects fail Analyze the causes of a project's troubles Construct a negotiation process to use with key stakeholders Apply an effective strategy to planning the recovery effort Manage, evaluate, and adjust the ongoing recovery effort Foundation Concepts Recognizing a troubled project Defining the project recovery process The Reasons Projects Fail Putting failure in perspective Reviewing management issues Analyzing planning issues Exploring complexity issues Assess the Project Stabilizing the project Determining preliminary Go / No-Go Conducting a detailed recovery assessment Negotiate the Recovery Reviewing the basics of negotiation Setting reasonable expectations Obtaining appropriate PM authority Securing key stakeholder support Plan the Recovery Planning for recoveries Rebuilding the project team Reshaping the project plan Managing parallel activities Planning for change management Implement and Adjust the Project Implementing project recoveries Facilitating change Enabling continuous learning Fostering the project team Sustaining stakeholder engagement

Recovering Troubled Projects: On-Demand
Delivered Online On Demand30 minutes
£1,050

Dermatology, Skincare with Nutrition and Hydration

By Imperial Academy

3 QLS Endorsed Diploma | QLS Hard Copy Certificate Included | 10 CPD Courses | Lifetime Access | 24/7 Tutor Support

Dermatology, Skincare with Nutrition and Hydration
Delivered Online On Demand
£399

Colourful Hare. A Step by Step Workshop for All Abilities

5.0(71)

By Green Man Ceramics

A step by step guide on how to draw and paint a hare using brusho paints. The workshop is suitable for total beginners as well as more experienced artists wanting to try something new, pause and fast forward at your leisure and practice as many times as you like.

Colourful Hare. A Step by Step Workshop for All Abilities
Delivered Online On Demand
£20

When to Remove and When (and How!) to Color Correct | Online Permanent Makeup Training

By ID Liner | Permanent Makeup Training & Supplies

YOUR ESSENTIAL GUIDE TO COLOUR CORRECTION. This Permanent Makeup webinar is aimed at addressing one of the common challenges we face in our practices daily - clients with previous PMU done elsewhere that requires correction.

When to Remove and When (and How!) to Color Correct | Online Permanent Makeup Training
Delivered Online On Demand
£150

GDPR Awareness Training

By Training Centre

  The GDPR came into effect in May 2018. This legislation is designed to guide organisations in their obligations relative to the processing of personal and sensitive data. About This Course   Organisations are required to comply with the GDPR regardless of their size of business. If you process 'personal data', there is a potential need to be compliant with the legislation. The scope of the GDPR considers how this information is collected, stored, used, transported, shared and disposed of. To ensure organisations' understand this obligation, this interactive one-day course considers both scoping and auditing of an organisations processing activities, as well as an understanding of compliance with GDPR.  Learning Outcomes; GDPR - what is it and how does it apply to us? Personal and sensitive data Lawful basis for processing Consent and the GDPR The Data Protection Act 2018 Data Subject rights The role of the ICO Data breach or Incident? Privacy by Design and by default GDPR Audit checklist Prerequisites   There are no prerequisites to attend this course, however all attendees are expected to have a basic understanding of the Data Protection principles. What's Included?   Refreshments & Lunch (Classroom courses only) Course Slide Deck Quizzes Who Should Attend?   The course is designed for any member of the organisation whose role includes processing personal data. Data Protection Officers, Information Security team members or Information Governance Leads who may also see benefit in attending. Accreditation Assessment    There is no exam with this course but delegates do receive a Course Attendance Certificate and an 8 hour CPD Certificate. Provided by   This course is Accredited by NACS and administered by the IECB

GDPR Awareness Training
Delivered OnlineFlexible Dates
£425

CertNexus Certified CyberSec First Responder (CFR-410)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners preparing for or who currently perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for those roles within federal contracting companies and private sector firms whose mission or strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD Information Network (DoDIN) operation and incident handling. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. Overview In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will: Assess cybersecurity risks to the organization. Analyze the threat landscape. Analyze various reconnaissance threats to computing and network environments. Analyze various attacks on computing and network environments. Analyze various post-attack techniques. Assess the organization's security posture through auditing, vulnerability management, and penetration testing. Collect cybersecurity intelligence from various network-based and host-based sources. Analyze log data to reveal evidence of threats and incidents. Perform active asset and network analysis to detect incidents. Respond to cybersecurity incidents using containment, mitigation, and recovery tactics. Investigate cybersecurity incidents using forensic analysis techniques. This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation. In addition, this course and subsequent certification (CFR-410) meet all requirements for personnel requiring DoD directive 8570.01-M position certification baselines: CSSP Analyst CSSP Infrastructure Support CSSP Incident Responder CSSP Auditor The course and certification also meet all criteria for the following Cybersecurity Maturity Model Certification (CMMC) domains: Incident Response (IR) Audit and Accountability (AU) Risk Management (RM) Lesson 1: Assessing Cybersecurity Risk Topic A: Identify the Importance of Risk Management Topic B: Assess Risk Topic C: Mitigate Risk Topic D: Integrate Documentation into Risk Management Lesson 2: Analyzing the Threat Landscape Topic A: Classify Threats Topic B: Analyze Trends Affecting Security Posture Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments Topic A: Implement Threat Modeling Topic B: Assess the Impact of Reconnaissance Topic C: Assess the Impact of Social Engineering Lesson 4: Analyzing Attacks on Computing and Network Environments Topic A: Assess the Impact of System Hacking Attacks Topic B: Assess the Impact of Web-Based Attacks Topic C: Assess the Impact of Malware Topic D: Assess the Impact of Hijacking and Impersonation Attacks Topic E: Assess the Impact of DoS Incidents Topic F: Assess the Impact of Threats to Mobile Security Topic G: Assess the Impact of Threats to Cloud Security Lesson 5: Analyzing Post-Attack Techniques Topic A: Assess Command and Control Techniques Topic B: Assess Persistence Techniques Topic C: Assess Lateral Movement and Pivoting Techniques Topic D: Assess Data Exfiltration Techniques Topic E: Assess Anti-Forensics Techniques Lesson 6: Assessing the Organization's Security Posture Topic A: Implement Cybersecurity Auditing Topic B: Implement a Vulnerability Management Plan Topic C: Assess Vulnerabilities Topic D: Conduct Penetration Testing Lesson 7: Collecting Cybersecurity Intelligence Topic A: Deploy a Security Intelligence Collection and Analysis Platform Topic B: Collect Data from Network-Based Intelligence Sources Topic C: Collect Data from Host-Based Intelligence Sources Lesson 8: Analyzing Log Data Topic A: Use Common Tools to Analyze Logs Topic B: Use SIEM Tools for Analysis Lesson 9: Performing Active Asset and Network Analysis Topic A: Analyze Incidents with Windows-Based Tools Topic B: Analyze Incidents with Linux-Based Tools Topic C: Analyze Indicators of Compromise Lesson 10: Responding to Cybersecurity Incidents Topic A: Deploy an Incident Handling and Response Architecture Topic B: Mitigate Incidents Topic C: Hand Over Incident Information to a Forensic Investigation Lesson 11: Investigating Cybersecurity Incidents Topic A: Apply a Forensic Investigation Plan Topic B: Securely Collect and Analyze Electronic Evidence Topic C: Follow Up on the Results of an Investigation Additional course details: Nexus Humans CertNexus Certified CyberSec First Responder (CFR-410) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified CyberSec First Responder (CFR-410) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Certified CyberSec First Responder (CFR-410)
Delivered OnlineFlexible Dates
£3,495