• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

678 Identity courses in Sheffield delivered Online

11th June Emily MacDonald #Agent121. Looking for: ADULT FICTION, NON-FICTION

5.0(3)

By I Am In Print

LOOKING FOR: ADULT FICTION, NON-FICTION Emily MacDonald joined 42 management and production company in 2019, working with Eugenie Furniss across her clients. She is now an agent in the Books Department, and is building her own list. Send Emily a story with characters that just won't leave her and a narrative that pulls her in, keeping her immersed in the world well after she has finished reading. She reads across a wide-range and has a particular interest in: book club, high-concept crime/thriller, upmarket and literary fiction. In fiction, Emily would love to find a crime/thriller set within a subcult: a modern retelling of British folklore (think Kamila Shamsie’s Home Fire); an unconventional love story; and a character led journey of self-discovery (especially one set within a diasporic community). Emily is also looking for narrative non-fiction which immerses the reader into an untold true story (personal or historical), exploring a new point of view, and providing a compelling social commentary, with an investigative twist. Think the obsessive vein of Kirk W. Johnson or personal/political dispatches of Aidan Hartley. Emily wants her horizons to expand while she reads. In both fiction and non-fiction, Emily loves stories woven into their surroundings, where the setting is as central a character as those who drive the narrative. In both spheres, she is keen to hear from Scottish and regional voices with stories to tell. Please note, Emily is not currently accepting submissions for Children's lit/YA and SFF. Emily would like you to submit a covering letter, 1 - 2 page synopsis and the first 5,000 words of your manuscript in a single word document. (In addition to the paid sessions, Emily is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Wednesday 4th June 2025

11th June Emily MacDonald #Agent121. Looking for: ADULT FICTION, NON-FICTION
Delivered Online + more
£72

Data Protection Training

4.9(27)

By Apex Learning

Get Hard Copy + PDF Certificates + Transcript + Student ID Card worth £160 as a Gift - Enrol Now Know how to protect personal data and ensure that neither you nor your clients experience fraud or serious criminal acts. This comprehensive course delivers all the information needed to follow the UK's Data Protection Act and safeguard confidential details from exposure. The Data Protection Level 5 bundle is an invaluable overview of crucial data legislation for commercial businesses and individuals. You will be made aware of the latest threats and methods by which a computer can be illegally accessed, and vital material can be stolen. Alongside this, you will be enlightened as to the available security protocols, and the actions that you must legally take. With a single payment, you will gain access to Data Protection Level 5 including 10 premium courses, an original hardcopy certificate, transcript and a student ID card which will allow you to get discounts on things like music, food, travel and clothes etc. This Data Protection and Data Security Level 2 Bundle Consists of the following Premium courses: Course 01: GDPR Data Protection Level 5 Course 02: Data Protection and Data Security Level 2 Course 03: CompTIA Security+ (SY0-601) Course 04: Cyber Security Incident Handling and Incident Response Course 05: IT Support Technician Training Course 06: Encryption Course 07: CyberSecurity Law Online Course Course 08: Network Security Level 2 Course 09: Introduction to Data Analysis Course 10: Data Structures Complete Course Course 11: Criminal Law and Criminology Diploma Take this course anywhere and at any time. Don't let your lifestyle limit your learning or your potential. Data Protection and Data Security Level 2 will provide you with the CPD certificate that you'll need to succeed. Gain experience online and interact with experts. This can prove to be the perfect way to get noticed by a prospective employer and stand out from the crowd. Data Protection and Data Security Level 2 has been rated and reviewed highly by our learners and professionals alike. We have a passion for teaching, and it shows. All of our courses have interactive online modules that allow studying to take place where and when you want it to. The only thing you need to take Data Protection and Data Security Level 2 is Wi-Fi and a screen. You'll never be late for class again. Experienced tutors and mentors will be there for you whenever you need them, and solve all your queries through email and chat boxes. Data Protection Course Curriculum Data Protection: Course 01: GDPR Data Protection Level 5 Module 01: GDPR Basics Module 02: GDPR Explained Module 03: Lawful Basis for Preparation Module 04: Rights and Breaches Module 05: Responsibilities and Obligations Course 02: Data Protection and Data Security Level 2 GDPR Basics GDPR Explained Lawful Basis for Preparation Rights and Breaches Responsibilities and Obligations Course 03: CompTIA Security+ (SY0-601) Section 01: Introduction Section 02: Risk Management Section 03: Cryptography Section 04: Identity and Account Management Section 05: Tools of the Trade Section 06: Securing Individual Systems Section 07: The Basic LAN Course 04: Cyber Security Incident Handling and Incident Response Section 01: An Introduction to Incident Handling Section 02: Preparation for an Incident Section 03: Identification Section 04: Containment Section 05: Eradication Course 05: IT Support Technician Training Section 01: How People Use Computers Section 02: System Hardware Section 03: Device Ports and Peripherals Section 04: Data Storage and Sharing Section 05: Understanding Operating Systems Course 06: Encryption Section 01: Introduction Section 02: Basics of Common Encryption Section 03: Technical Aspects of Encryption Section 04: AES Basic Tech Demo Section 05: File and System Encryption Section 06: Conclusion Course 07: Cyber Security Law Online Course Module 01: Introduction to Cyber Law Module 02: Cyber Law, Cyber Ethics and Online Gambling Module 03: Cyber Crime, Cyber Security and Trust in Cyberspace Module 04: Threat Factors: Computer as a Target Course 08: Network Security Level 2 Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Course 09: Introduction to Data Analysis Module 01: Introduction Module 02: Agenda and Principles of Process Management Module 03: The Voice of the Process Module 04: Working as One Team for Improvement Module 05: Exercise: The Voice of the Customer Course 10: Data Structures Complete Course Unit 01: Introduction Unit 02: Arrays Unit 03: Liked List Unit 04: Stack Unit 05: Queues Course 11: Criminal Law and Criminology Diploma Module 1: Classification of Crime Module 2: UK Law & Legal System Module 3: Understanding Criminal Psychology Module 4: Dealing with Crime Module 5: Forensic Science How will I get my Certificate? After successfully completing the course you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificate: Free (Previously it was £6*11 = £66) Hard Copy Certificate: Free (For The Title Course: Previously it was £10) CPD 145 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this Data Protection bundle. Requirements This Data Protection course has been designed to be fully compatible with tablets and smartphones. Career path Having these various CPD certificate will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course (GDPR Data Protection Level 5) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The delivery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost

Data Protection Training
Delivered Online On Demand
£39

January 2025 Fundamentals Organisation & Relationship Systems Coaching Training

By CRR UK

CRRUK equips professionals with the concepts, skills and tools to build conscious, intentional relationships, and to coach relationship systems of any size.

January 2025 Fundamentals Organisation & Relationship Systems Coaching Training
Delivered OnlineFlexible Dates
£695

February 2025 Fundamentals Organisation & Relationship Systems Coaching Training

By CRR UK

CRRUK equips professionals with the concepts, skills and tools to build conscious, intentional relationships, and to coach relationship systems of any size.

February 2025 Fundamentals Organisation & Relationship Systems Coaching Training
Delivered OnlineFlexible Dates
£695

Global Power Shifts and China's Evolving Role in Africa | Live Online Learning

By https://gada-academy.cademy.io/

Explore China’s growing influence in Africa through this in-depth course. Weekly themes blend history, trends, and analysis to unpack the economic, political, and social layers of this evolving relationship. Gain a nuanced view of its impact on Africa’s global role

Global Power Shifts and China's Evolving Role in Africa | Live Online Learning
Delivered Online
$169 to $394

Cisco Configuring Cisco ISE Essentials for SD- Access v1.0 (ISESDA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is as follows: System engineers Network engineers Technical architects Technical support engineers Cisco integrators and partners Overview Upon successful completion of this course, students will be able to meet these overall objectives: Describe Cisco ISE policies and authentication and authorization process Understand different AAA protocols Understand how Cisco ISE fits into Cisco DNA Center architecture Provide configuration examples of Cisco ISE and TrustSec solutions Describe Cisco ISE integration with Cisco DNA Center and policy enforcement using Security Groups Provide configuration examples for wired, wireless, and VPN network access Understand how inline tagging and SGT Exchange Protocol (SXP) works This course shows you how to deploy the Cisco© Identity Services Engine (ISE) to support the Software-Defined Access (SD-Access) solution within your enterprise networks. You will gain an understanding of how Cisco ISE is utilized by the SD-Access solution to provide security policies across the organization. You will learn Cisco ISE fundamentals and get hands-on practice configuring ISE, policies, AAA client configuration, VPN access, integration, wireless guest access, and more. Cisco ISE Overview Exploring the Cisco Identity Services Engine Examining AAA protocols Examining Authentication Examining Authorization Cisco ISE Guest Access Examining Guest Portal Types Examining Guest User Types Examining AAA Policies for Guest Access Cisco ISE and SD-Access Exploring Cisco SD-Access Examining Cisco ISE for SD-Access Cisco ISE SGT Exchange Protocol SD-Access Fabric and Host Provisioning Security Group Exchange Protocol Additional course details: Nexus Humans Cisco Configuring Cisco ISE Essentials for SD- Access v1.0 (ISESDA) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Configuring Cisco ISE Essentials for SD- Access v1.0 (ISESDA) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Configuring Cisco ISE Essentials for SD- Access v1.0 (ISESDA)
Delivered OnlineFlexible Dates
Price on Enquiry

Hyperledger Fabric v1.4 - Architecting, Designing and Deploying a Network

By Nexus Human

Duration 3 Days 18 CPD hours This course is designed for Architects, and System Administrators interested in gathering a deeper understanding on how Hyperledger Fabric Networks are Architected and operated throughout. You will learn about the integral base files in which Fabric are built upon. You will learn about how identity, and permissions are administered throughout Membership Only networks. Additionally, you will gather the experience necessary to enter into and manage nodes/peer needs (i.e. chaincode installation, securing communication, etc).

Hyperledger Fabric v1.4 - Architecting, Designing and Deploying a Network
Delivered OnlineFlexible Dates
Price on Enquiry

CompTIA Security+ (SY0-501): Complete Course and Practice Exam

By Packt

CompTIA Security+ Bootcamp: Your preparation course for the most popular cyber security certification in the world!

CompTIA Security+ (SY0-501): Complete Course and Practice Exam
Delivered Online On Demand15 hours 10 minutes
£53.99

VMware NSX: Install, Configure, Manage [V4.x]

By Nexus Human

Duration 5 Days 30 CPD hours Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture and main components of NSX Explain the features and benefits of NSX Deploy the NSX Management cluster and VMware NSX Edge™ nodes Prepare VMware ESXi™ hosts to participate in NSX networking Create and configure segments for layer 2 forwarding Create and configure Tier-0 and Tier-1 gateways for logical routing Use distributed and gateway firewall policies to filter east-west and north-south traffic in NSX Configure Advanced Threat Prevention features Configure network services on NSX Edge nodes Use VMware Identity Manager™ and LDAP to manage users and access Explain the use cases, importance, and architecture of Federation This five-day, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX© environment. This course covers key features and functionality offered in the NSX 4.0.0.1 and NSX 4.0.1 releases, including the overall infrastructure, logical switching, logical routing, networking and security services, firewalls and advanced threat prevention, and more. Course Introduction Introductions and course logistics Course objectives VMware Virtual Cloud Network and VMware NSX Introduce the VMware Virtual Cloud Network vision Describe the NSX product portfolio Discuss NSX features, use cases, and benefits Explain NSX architecture and components Explain the management, control, data, and consumption planes and their functions. Preparing the NSX Infrastructure Deploy VMware NSX© ManagerTM nodes on ESXi hypervisors Navigate through the NSX UI Explain data plane components such as N-VDS/VDS, transport nodes, transport zones, profiles, and more Perform transport node preparation and configure the data plane infrastructure Verify transport node status and connectivity Explain DPU-based acceleration in NSX Install NSX using DPUs NSX Logical Switching Introduce key components and terminology in logical switching Describe the function and types of L2 segments Explain tunneling and the Geneve encapsulation Configure logical segments and attach hosts using NSX UI Describe the function and types of segment profiles Create segment profiles and apply them to segments and ports Explain the function of MAC, ARP, and TEP tables used in packet forwarding Demonstrate L2 unicast packet flow Explain ARP suppression and BUM traffic handling NSX Logical Routing Describe the logical routing function and use cases Introduce the two-tier routing architecture, topologies, and components Explain the Tier-0 and Tier-1 gateway functions Describe the logical router components: Service Router and Distributed Router Discuss the architecture and function of NSX Edge nodes Discuss deployment options of NSX Edge nodes Configure NSX Edge nodes and create NSX Edge clusters Configure Tier-0 and Tier-1 gateways Examine single-tier and multitier packet flows Configure static routing and dynamic routing, including BGP and OSPF Enable ECMP on a Tier-0 gateway Describe NSX Edge HA, failure detection, and failback modes Configure VRF Lite NSX Bridging Describe the function of logical bridging Discuss the logical bridging use cases Compare routing and bridging solutions Explain the components of logical bridging Create bridge clusters and bridge profiles NSX Firewalls Describe NSX segmentation Identify the steps to enforce Zero-Trust with NSX segmentation Describe the Distributed Firewall architecture, components, and function Configure Distributed Firewall sections and rules Configure the Distributed Firewall on VDS Describe the Gateway Firewall architecture, components, and function Configure Gateway Firewall sections and rules NSX Advanced Threat Prevention Explain NSX IDS/IPS and its use cases Configure NSX IDS/IPS Deploy NSX Application Platform Identify the components and architecture of NSX Malware Prevention Configure NSX Malware Prevention for east-west and north-south traffic Describe the use cases and architecture of VMware NSX© Intelligence? Identify the components and architecture of VMware NSX© Network Detection and Response? Use NSX Network Detection and Response to analyze network traffic events. NSX Services Explain and configure Network Address Translation (NAT) Explain and configure DNS and DHCP services Describe VMware NSX© Advanced Load Balancer? architecture, components, topologies, and use cases. Configure NSX Advanced Load Balancer Discuss the IPSec VPN and L2 VPN function and use cases Configure IPSec VPN and L2 VPN using the NSX UI NSX User and Role Management Describe the function and benefits of VMware Identity Manager? in NSX Integrate VMware Identity Manager with NSX Integrate LDAP with NSX Identify the various types of users, authentication policies, and permissions Use role-based access control to restrict user access Explain object-based access control in NSX NSX Federation Introduce the NSX Federation key concepts, terminology, and use cases. Explain the onboarding process of NSX Federation Describe the NSX Federation switching and routing functions. Describe the NSX Federation security concepts.

VMware NSX: Install, Configure, Manage [V4.x]
Delivered OnlineFlexible Dates
Price on Enquiry

Diversity, Equity, and Inclusion at Workplace

By Xpert Learning

About Course Create a safe workspace by increasing and respecting Diversity Equity and Inclusion at Workplace with this online DEI course. In today's global business environment, organizations striving for diversity equity and inclusion at workplace are achieving intended results. They provide proof that diversity, equity, and inclusion are much more than a legal or moral requirement. They're also a competitive advantage. This DEI course outlines the role of corporate policy in promoting cultural, racial, gender or any other differences based on identity in the workforce. Enroll to learn how to participate in constructive conversations on diversity and frame meaningful DEI strategies. Imagine that you work as part of a team with colleagues from different cultural backgrounds. How can your team quickly and seamlessly embrace diversity to boost productivity and have a positive experience? What is meant by 'diversity, equity and inclusion'? This course begins by introducing these interlinked values, commonly referred to as 'DEI'. We show you how to stage engaging and interactive training sessions that help employees to overcome any conflict or issues arising out of differences in culture, beliefs, socio-economic backgrounds, orientation or ideologies.DEI: Not Just a Buzzword, a Blueprint for a Better Workplace This course delivers valuable insights for any professional eager to build a more inclusive environment. However, it truly shines for those in leadership roles like managers and business owners. As the shapers of organizational culture, they'll find the content instrumental in championing DEI values within their teams. What are some examples of biases and stereotypes? This DEI course provides case studies and explains how to overcome prejudice in the workplace. We lay out the components of an inclusive workplace to show you how to establish trust and safety for everyone in your organization. Do you seek to initiate grassroots diversity and inclusion movement at your organization? Or maybe you're simply searching for effective strategies for commencing such initiatives. Whatever your goals, our course can help you to initiate a successful start. How does leadership help diversity? This course discusses the role that managers and leaders can play in championing diversity and inclusion. Our exercises are crafted to cultivate empathy and compassion, enabling you to connect with colleagues on a deeper level. Accordingly, you'll foster self-awareness among your team, encouraging thoughtful reflection and personal growth. While valuable for any professional, this course shines brightest for managers and business owners. As leaders tasked with shaping organizational culture, they will find the content instrumental in championing DEI values within their teams. This DEI sensitivity course provides exercises and techniques you can use to manage conflict and keep your workplace free of identity-related prejudice. Sign up to gain important contemporary skills you can use in any workplace. What Will You Learn? Distinguish between diversity and inclusion and how equity fits into your diversity and inclusion goals Identify the components of an inclusive workplace Discuss the importance of diversity, equity and inclusion in the workplace Analyze issues critical to of diversity, equity and inclusion Discuss various biases and stereotypes that affect workplace productivity Describe the role of leadership in cultivating and supporting a more diverse and inclusive organization Explain how to create a more diverse and inclusive workplace Course Content Introduction to Diversity, Equity, and Inclusion at Work Introduction Diversity, Equity, and Inclusion at Work Diversity, Equity, and Inclusion Diversity, Equity, and Inclusion Understanding Bias and Stereotypes Understanding Bias and Stereotypes Part 1 Understanding Bias and Stereotypes Part 2 Understanding Bias and Stereotypes Part 3 Creating a Safe and Inclusive Workplace Part 1 Part 2 The Role of Leadership in DEI The Role of Leadership in DEI part 1 The Role of Leadership in DEI part 2 DEI Exercises for Workplace Exercise 1 Exercise 2 Exercise 3 Exercise 4 Conclusion and Next Steps Conclusion and Next Steps A course by Xpert Learning Audience Individual contributors and managers interested in getting diversity initiatives started in their organization Executives responsible for strategic culture efforts Team managers and supervisors Anyone interested in creating an inclusive and supportive culture that promotes equal opportunities and treatment of employees

Diversity, Equity, and Inclusion at Workplace
Delivered Online On Demand1 hour 30 minutes
£9.99