• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

300 Courses in Cardiff

Level 2 NVQ Certificate in Plant Operations - Extracting

By Dynamic Training and Assessments Ltd

Course Overview The Level 2 NVQ Diploma in Plant Operations -Extracting Plant qualification has been developed for achievement in a real workplace environment which means you need to be employed to undertake this qualification.  This qualification enables you, the learner, to demonstrate and recognise your skills, knowledge and understanding and to demonstrate your competence in a real workplace environment so you can work as a Plant Operator within the construction industry.  You will be assessed against a set of performance and knowledge statements which have been derived from National Occupational Standards for your occupational area. You will be assessed by an occupationally competent and qualified assessor whose job is to work with you and help you complete your qualification.  This qualification supports the learner to attain enabling, fundamental and transferable practical skills with associated underpinning knowledge.  The learner will learn key practical skills and knowledge in these mandatory units:  Conforming to General Health, Safety and Welfare in the Workplace Conforming to Productive Working Practices in the Workplace. The learner will also learn key practical skills and knowledge in one of the following optional units: Preparing and operating draglines to extract ground and/or loose materials in the workplace Preparing and operating 180 degree excavators to extract and excavate ground and loose materials in the workplace Preparing and operating tracked loading shovels to extract ground and loose materials in the workplace Preparing and operating tracked loading shovels to extract, transport and distribute materials in the workplace Preparing and operating 360 degree excavators to extract ground, face and/or loose materials in the workplace Preparing and operating trenchers to extract ground and/or loose materials in the workplace Preparing and operating crawler tractor dozers to carry out dozer operations in the workplace. Entry Requirements There are no formal entry requirements to take this qualification. This qualification can be undertaken without any previous training or qualifications in this subject area.

Level 2 NVQ Certificate in Plant Operations - Extracting
Delivered In-Person in Nottinghamshire or UK WideFlexible Dates
£695

Supporting Microsoft IIS

5.0(3)

By Systems & Network Training

Supporting Microsoft IIS training course description This course provides students with the fundamental knowledge and skills to configure and manage Internet Information Services. This course is intended to help provide pre-requisite skills supporting a broad range of Internet web applications, security, and knowledge to help support other products that use IIS such as Exchange and SharePoint. What will you learn Install IIS. Configure IIS. Secure websites. Maintain IIS. Supporting Microsoft IIS training course details Who will benefit: Technical staff working with Microsoft IIS. Prerequisites: TCP/IP foundation for engineerss Supporting Windows ( XP or 2000 or 2003) Duration 5 days Supporting Microsoft IIS course contents Overview and Installing IIS Web Server infrastructure, installing IIS. Hands on Default install of IIS, verify and test.. Configuring the default website Default website, IIS Manager, default IIS file structure, configuring DNS records for a website, creating virtual directories and Applications. Hands on Configuring the Default website for public access. Creating Virtual Directories and Applications. Application Pools Application Pool Architecture, Application Pool recycling. Hands on Creating and managing Application Pools. Creating additional websites Multiple websites on a single server, website bindings. Hands on Creating new websites. Website and Web application support Configuring Common features, adding support for web applications. Hands on Adding support for web applications. Securing Websites and applications Access control, sites, applications, authentication and permissions. URL authorization rules. Hands on Configuring Authentication and permissions. Securing Data Transmissions with SSL Certificates and SSL, creating certificates for a web server, adding a certificate to a website. Hands on Certificates and HTTPS. Using the Central Certificate Store The Central Certificate Store. Hands on Install and configure the Central Certificate Store. Configuring Remote Administration Installing and Configuring the Management Service. Connecting to remote web servers and websites. Delegating Management Access. Hands on Remote administration. Implementing FTP Implementing FTP, configuring an FTP site. Hands on Install and configure a secured FTP site. Monitoring IIS IMonitoring IIS logs with Log Parser. Hands on Analyze a set of IIS log files for possible issues using Log Parser. Analyze performance data for performance related problems using PerfMon. Backing up and Restoring IIS The IIS environment. Hands on Performing a backup and restore of a website. Building Load-Balanced Web Farms Load-balancing mechanisms, building a Load-Balanced Web Farm using ARR, sharing content to a Web Farm using a network share, Sharing content to a Web Farm using DFS-R, Sharing IIS Configurations in a Web Farm. Hands on Installing and configuring ARR, sharing content to a Web Farm using network share and DFS-R, sharing IIS Configurations in a Web Farm.

Supporting Microsoft IIS
Delivered in Internationally or OnlineFlexible Dates
£3,697

Introduction to Agile and Scrum: In-House Training

By IIL Europe Ltd

Introduction to Agile and Scrum: In-House Training This half-day course provides an overview of Agile principles and mindset, and the Scrum framework as a key Agile approach. It will provide you with the key benefits of an Agile approach, and its differences with the traditional Waterfall method. Lastly, as Agile is looked upon more frequently as an alternative delivery method, you will review situations where Agile can be adapted outside of software development, where it is most commonly used. What you will Learn At the end of this program, you will be able to: Explain the basics and benefits of using an Agile approach Describe the Scrum framework, its events, artifacts and roles and responsibilities Illustrate Agile approaches outside of Software Development Getting Started Introduction Course structure Course goals and objectives Agile Introduction What is Agile? Agile Benefits Agile Methods Overview of Scrum Scrum Overview Scrum Events Scrum Artifacts Scrum Roles Definition of Done Agile Approaches Outside of Software Development Agile in other environments Product Development Course Development Marketing Agile Project Candidates Summary What Agile is not... Concerns and Pitfalls

Introduction to Agile and Scrum: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£350

Introduction to Forensic Science

4.6(39)

By Geopace Training

NATIONALLY RECOGNISED AND ACCREDITED FORENSIC SCIENCE COURSE Level Three (advanced), awarding 3 credits.   DUAL ACCREDITATION: Awarding Body: Open College Network (OCN Credit4Learning) Awarding Body: CPD (21 CPD Points)   A modular "hybrid" forensic science course - eLearning (online) theory and one full day classroom based practical training (Crime Scene Investigations). The practical day covers a wide range of CSI techniques with "hands-on" practical training. On completion awards an OCN Nationally Recognised and Accredited Certificate in Forensic Science. This course is additionally CPD Accredited and also awards 21 CPD points on completion.   PART 1 - THEORY Complete this part of your course online (eLearning Course) in the comfort of your own home or workplace. Please allow approx. 6-8 hours to complete the elearning modules. You do not need to complete Part 1 in one single "sitting” and can log on/off as many times as you wish and when convenient to you. You must complete both parts 1 and 2 to successfully pass this course.   PART 2 - CLASSROOM Attend your forensic science practical day in the classroom, covering a number of key CSI investigative processes and procedures. You will develop your crime scene investigator skills with "hands-on" training in a classroom environment at the training location you have selected. Please note that we will provide protective clothing (disposable aprons), goggles and gloves. As you will be participating in a range of forensic activities we would suggest you wear easy clothing, short-sleeved top and closed-toe shoes.   You can complete Part 1 before or after comleting Part 2.   DOWNLOAD A COURSE ITINERARY HERE Course Itinerary M01 - Overview and Historical Background: A look at definitions, historical perspective highlighting major forensic advancements covering since early times, the beginning of modern forensics including the advent of fingerprinting, toxicology and DNA, and how DNA solved the first case (a double murder). Understanding the services of Forensic Labs and the major disciplines.   M02 - Observational Skills Crime Scene Investigation & Recording Examination of the crime scene, photography, videography, sketch recording principles, using a CAD package.   M03 - Forensic Pathology Understanding the job role, working within hospitals, mortuaries, the pathological processes and manner of death.   M04 - Forensic Anthropology How does forensic anthropology help forensic scientists? Using physical markers present on a skeleton to determine age, sex, stature, and race. Bone anatomy and stages of development from foetal to elderly individual. Differentiating male and female: skull, pelvis, femur and humerus.   M05 - Forensic Entomology How entomologists determine time of death as well as advanced investigations involving abuse and neglect. The life cycle of the blowfly and environmental influences. Using insect gut DNA to help solve crimes.   CS01 - Case Study - Forensic Entomology - The Jigsaw Murders   M06 - Forensic Serology Understanding presumptive tests and confirmatory tests. Tests in detail - processes and methods with options for: Blood, Saliva, Semen, Urine.   M07 - Using the Microscope Correct procedures for using the light microscope. A look at the electron microscope and scanning probe microscope and their applications in forensic science. Detailed process guide including mounting slides.

Introduction to Forensic Science
Delivered In-Person in Manchester + 6 more + more
£195

Strategic Human Resource Management

5.0(10)

By GBA Corporate

Overview The course introduces the participants to the importance of personnel in any organisation, and the systematic processes of handling personnel to bring out the best in them in order to achieve the objectives of the organisation is the responsibility of the holder of this certificate. The course curriculum covers human resource planning; recruitment and selection; employee training and development; employee health and safety etc. 

Strategic Human Resource Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Securing UNIX systems

5.0(3)

By Systems & Network Training

Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in Internationally or OnlineFlexible Dates
£4,997

Mental Health First Aid - 2 day

5.0(1)

By Strongmind Resiliency Training Ltd

Mental Health First Aiders (MHFAiders®) are vital to helping boost employee wellbeing as we adjust to a completely changed workplace environment.

Mental Health First Aid - 2 day
Delivered In-Person in Andover + 1 more or UK WideFlexible Dates
£3,800

Definitive OpenSSL for engineers

5.0(3)

By Systems & Network Training

OpenSSL for engineers training course description A hands on course covering OpenSSL. The course focusses on the use of OpenSSL from the command line as opposed to using its extensive libraries. Certificate authorities are configured along with key generation, HTTPS and a SSL VPN. What will you learn Describe OpenSSL. Use OpenSSL. Describe and implement: Explain how the various technologies involved in an OpenSSL work. OpenSSL for engineers training course details Who will benefit: Network personnel. Prerequisites: IP security foundation for engineers Duration 2 days OpenSSL for engineers training course contents What is OpenSSL? What is SSL? SSL versions, TLS, TLS negotiation, TLS authentication, What is OpenSSL, Command line tool, SSL library. OpenSSH, OpenVPN. Hands on TLS packet analysis. Getting started with OpenSSL Downloading, source code, packages, installing, versions, configuration, openssl command. Cipher suite selection. Hands on Encrypting a file with openssl. Public and private keys Algorithms, creating keys, public keys, private keys, encrypting the private key. Hands on Encrypting a file with keys. Digital signatures Creating signatures, checking validity of signatures, Self signing SSL certificates. Viewing certificates. Certificate files. Converting between formats. Hands on Securing a web server with HTTPS. Simple PKI with OpenSSL Root CA, signing CA, configuration files, Certificate signing requests. Email certificates, TLS server certificates. Hands on Implementing a simple PKI with OpenSSL.

Definitive OpenSSL for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Diploma in Architecture and Interior Design Diploma 1-2-1

By Real Animation Works

Face to face One to one.

Diploma in Architecture and Interior Design Diploma 1-2-1
Delivered in Internationally or OnlineFlexible Dates
£4,000

Securing Microsoft systems

5.0(3)

By Systems & Network Training

Microsoft security training course description A hands on training course focusing on security in the Microsoft environment. The course progresses from patch management onto the use of Microsoft security tools. Then server, desktop and network security are studied in the Microsoft environment. What will you learn Use Microsoft security tools. Secure Microsoft servers. Secure Microsoft desktops. Secure Microsoft networks. Microsoft security training course details Who will benefit: Technical server support staff. Technical desktop support staff. Technical network staff. Technical security staff. Prerequisites: Supporting Windows server 2016 Networking Microsoft systems. Duration 3 days Microsoft security training course contents Introduction Security threats, Microsoft defaults, admin accounts, security patches, patch management, patch tools. Hands on: Studying Microsoft defaults, applying security patches. Microsoft security tools Microsoft updates, WSUS, Inventory tool, baseline security analyser, URLscan, EventCombMT, Cipher security tool, Port reporter, PortQry. Tools hackers use. Hands on: Using Microsoft security tools. Server security Checklists, core server security, AD, Member server security, Domain controller security, Specific roles. Hands on Hardening Microsoft servers, security templates. Active Directory Admin authority in AD, group policy, trust and authentication. Desktop security Checklists, core client security, anti virus software, anti spyware software, firewalls, securing clients with AD, securing clients with group policy, software restriction policies. Hands on Securing Microsoft desktops. Network security Checklist, IP security, VPNs, PKI, certificate authorities, RAS, RRAS, IAS. Hands on: VPN configuration, IAS configuration. Monitoring Auditing, authorisation and logons, tracking, system monitoring, detecting attacks. Hands on: Monitoring Microsoft systems. Summary Microsoft security response centre, security advisories.

Securing Microsoft systems
Delivered in Internationally or OnlineFlexible Dates
£3,497
1...45678...30