• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2889 Intelligence courses

M.D.D DATING PROFILE SPECIALIST (SINGLES)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

Introducing the Dating Profile Specialist Package: Elevate Your Online Dating Experience with Expert Guidance Are you seeking professional assistance to create an exceptional online dating profile that stands out and captures the attention of potential matches? Miss Date Doctor’s Dating Profile Specialist Package offers you personalized guidance and support from experienced specialists who are dedicated to helping you present your best self in the online dating world. Crafting a standout dating profile requires expertise and insight into what makes a profile truly captivating. Our specialized dating profile experts are committed to helping you showcase your unique qualities and increase your chances of making meaningful connections. Here’s how the Dating Profile Specialist Package can support you: Personalized Assessment: Our dating profile specialists will conduct a thorough assessment to understand your personality, interests, and dating goals. Tailored Profile Creation: We’ll work with you to create a personalized and compelling dating profile that reflects your authentic self. Photo Selection: Our experts will provide guidance on selecting and arranging photos that highlight your best features and personality. Attention-Grabbing Bio: We’ll help you craft a captivating bio that effectively communicates your values, hobbies, and what you’re looking for in a partner. Showcasing Unique Qualities: Our specialists will assist in highlighting your unique qualities and qualities that set you apart from the crowd. Online Etiquette Guidance: We’ll provide insights into how to initiate conversations, maintain engaging communication, and build connections. Boosting Confidence: The Dating Profile Specialist Package can boost your confidence by providing expert support in creating an impressive and authentic profile. Attracting Compatible Matches: We’ll work towards attracting matches who resonate with your personality and are genuinely interested in connecting with you. The Dating Profile Specialist Package at Miss Date Doctor is designed to empower you with a standout online dating profile that captures your true essence. Our specialized dating profile experts provide tailored guidance and practical advice to help you make a lasting impression in the online dating community. Invest in your online dating success and take the first step towards a captivating dating profile with the Dating Profile Specialist Package. Embrace the opportunity to showcase your best self and attract matches that align with your values and aspirations. Let our experts guide you towards an enhanced online dating experience filled with meaningful connections. 4 sessions x 1 hour 20 new photos using Artificial intelligence approved https://relationshipsmdd.com/product/dating-profile-specialist/

M.D.D DATING PROFILE SPECIALIST (SINGLES)
Delivered in London or UK Wide or OnlineFlexible Dates
£800

Child Attachment at QLS Level 3

4.7(26)

By Academy for Health and Fitness

48-Hour Knowledge Knockdown! Prices Reduced Like Never Before! In the UK, over 70% of children have secure attachments to their caregivers. However, around 30% of children have insecure attachments, which can lead to a range of problems, including mental health difficulties, behavioral problems, and relationship difficulties. This Certificate in Child Attachment Training at QLS Level 3 course is endorsed by The Quality Licence Scheme and accredited by CPDQS (with 120 CPD points) to make your skill development & career progression more accessible than ever! Child attachment is a critical aspect of emotional and social development. Secure attachments provide children with a foundation of safety and trust, which enables them to explore the world and learn new things with confidence. In contrast, insecure attachments can lead to a variety of problems, including anxiety, depression, and difficulty forming relationships. This Child Attachment is a course designed to equip learners with a profound understanding of child attachment, a fundamental aspect of child psychology. Throughout the eight modules, participants will delve into the core concepts of attachment theory, explore assessments of attachment, and gain insights into attachment disorders. The Child Attachment course goes beyond theory by emphasising practical aspects, including attachment-focused parenting, emotional intelligence, and interventions. Learning Outcomes of Child Attachment Course: Analyse and apply foundational concepts of attachment theory in professional practice. Conduct comprehensive assessments of attachment to inform tailored intervention strategies. Understand and manage attachment disorders, fostering healthy emotional development in children. Implement effective attachment-focused parenting strategies to enhance parent-child relationships. Promote emotional intelligence and mind-mindedness, contributing to overall well-being in children. Demonstrate proficiency in intervention techniques, providing meaningful support for children and families. Seize the opportunity in a growing job market, where professionals with expertise are in high demand, experiencing a remarkable 20% increase in job opportunities in the past year alone. Enrol now and become a sought-after specialist in nurturing healthy attachments for a brighter future. Why Choose Our Child Attachment Course? FREE Child Attachment certificate endorsed by the Quality Licence Scheme. Get a free student ID card with Child Attachment Training Get instant access to this Child Attachment course. Learn Child Attachment from anywhere in the world The Child Attachment is affordable and simple to understand The Child Attachment is an entirely online, interactive lesson with voiceover audio Lifetime access to the Child Attachment course materials The Child Attachment comes with 24/7 tutor support So enrol now in this Child Attachment Today to advance your career! Take a step toward a brighter future with our Child Attachment course! *** Course Curriculum *** Here is the curriculum breakdown of the Child Attachment at QLS Level 3 course: Module 01: Introduction to Child Attachment Module 02: Introduction to Child Psychology Module 03: Fundamentals of Attachment Theory Module 04: Assessments of Attachment Module 05: Attachment Disorder Module 06: Attachment-Focused Parenting Module 07: Emotions and Mind-Mindedness Module 08: Interventions, Treatment and Support Assessment Process of Certificate in Child Attachment Training at QLS Level 3: You have to complete the assignment questions given at the end of the course and score a minimum of 60% to pass each exam. After passing the Certificate in Child Attachment Training at QLS Level 3 exam, you will be able to request a certificate endorsed by the Quality Licence Scheme absolutely FREE of cost. CPD 120 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Child Attachment at QLS Level 3 course is perfect for highly motivated people who want to improve their technical skills and prepare for the career they want! Requirements Child Attachment at QLS Level 3 You will not need any prior background or expertise in this Child Attachment at QLS Level 3 course. Career path This Child Attachment at QLS Level 3 will allow you to kickstart or take your career to the next stage in the related sector such as: Child psychologist. Childcare counselor. School counselor. Family therapist. Social worker. Attachment specialist. Certificates Certificate in Child Attachment Training at QLS Level 3 Hard copy certificate - Included CPDQS Accredited PDF Certificate Digital certificate - Included

Child Attachment at QLS Level 3
Delivered Online On Demand7 days
£100

Power BI - introduction to intermediate (2 days) (In-House)

By The In House Training Company

This course starts with the basics then moves seamlessly to an intermediate level. It includes a comprehensive yet balanced look at the four main components that make up Power BI Desktop: Report view, Data view, Model view, and the Power Query Editor. It also demonstrates how to use the online Power BI service. It looks at authoring tools that enables you to connect to and transform data from a variety of sources, allowing you to produce dynamic reports using a library of visualisations. Once you have those reports, the course looks at the seamless process of sharing those with your colleagues by publishing to the online Power BI service. The aim of this course is to provide a strong understanding of the Power BI analysis process, by working with real-world examples that will equip you with the necessary skills to start applying your knowledge straight away. 1 Getting started The Power BI process Launching Power BI Desktop The four views of Power BI Dashboard visuals 2 Connecting to files Connect to data sources Connect to an Excel file Connect to a CSV file Connect to a database Import vs. DirectQuery Connect to a web source Create a data table 3 Transforming data The process of cleaning data Column data types Remove rows with filters Add a custom column Append data to a table Fix error issues Basic maths operations 4 Build a data model Table relationships Manage table relationships 5 Merge queries Table join kinds Merging tables 6 Create report visualisations Creating map visuals Formatting maps Creating chart visuals Formatting chart Tables, matrixes, and cards Control formatting with themes Filter reports with slicers Reports for mobile devices Custom online visuals Export report data to Excel 7 The power query editor Fill data up and down Split columns by delimiter Add conditional columns Merging columns 8 The M formula Creating M functions Create an IF function Create a query group 9 Pivot and unpivot tables Pivot tables in the query editor Pivot and append tables Pivot but don't summarise Unpivot tables Append mismatched headers 10 Data modelling revisited Data model relationships Mark a calendar as a date table 11 Introduction to calculated columns New columns vs. measures Creating a new column calculation The SWITCH function 12 Introduction to DAX measures Common measure categories The SUM measure Adding measures to visuals COUNTROWS and DISINCTCOUNT functions DAX rules 13 The CALCULATE measure The syntax of CALCULATE Things of note about CALCULATE 14 The SUMX measure The SUMX measure X iterator functions Anatomy of SUMX 15 Introduction to time intelligence Importance of a calendar table A special lookup table The TOTALYTD measure Change year end in TOTALYTD 16 Hierarchy, groups and formatting Create a hierarchy to drill data Compare data in groups Add conditional formatting 17 Share reports on the web Publish to the BI online service Get quick insights Upload reports from BI service Exporting report data What is Q&A? Sharing your reports 18 Apply your learning Post training recap lesson

Power BI - introduction to intermediate (2 days) (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Close Protection Training

5.0(10)

By Apex Learning

***Limited Time Deal: Get Hard Copy + PDF Certificates + Transcript + Student ID Card worth £160 as a Gift - Enrol Close Protection Now*** Throughout the Close Protection programme it stresses how to improve your competency as a person in your profession while at the same time it outlines essential career insights in this job sector. Consequently, you'll strengthen your Close Protection knowledge and skills; on the other hand, see a clearer picture of your career growth in future. By the end of Close Protection, you can equip yourself with the essentials to keep you afloat into the competition. Along with this Close Protection Course, you will get 10 other premium courses. Also, you will get an original Hardcopy and PDF certificate for the title course and a student ID card absolutely free. This Close Protection Bundle Consists of the following Premium courses: Course 01: Close Protection Course 02: Lifeguard Training Course 03: Safeguarding and Protecting Children Level 4 Course 04: Security Management Advanced Diploma Course 05: Criminal Intelligence Training Course 06: Emotional Intelligence and Human Behaviour Course 07: TRX Bodyweight Workout - Fat Loss & Muscle Building Training Course 08: Driver Safety Awareness Certificate - CPD Certified Course 09: Decision Making and Critical Thinking Course 10: Stress Management Training Course 11: First Aid at Work Key features of this Close Protection course: This Close Protection bundle is CPD QS Accredited Learn from anywhere in the world Lifetime access Close Protection is entirely online 24/7 Learner support So, enrol now on this Close Protection Course and advance your career! The Close Protection bundle incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can strengthen your Close Protection expertise and essential knowledge, which will assist you in reaching your goal. Moreover, you can learn Close Protection from any place in your own time without travelling for classes. Course Curriculum: Course 01: Close Protection Introduction to Close Protection The Close Protection Team The Planning Threat Assessment Vehicle Drills: Embus and Debus Route Selection and Reconnaissance Legislation Regarding Close Protection How will I get my Close Protection Certificate? After successfully completing the Close Protection course you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificate: Free (Previously it was £6*11 = £66) Hard Copy Certificate: Free (For The Title Course: Previously it was £10) CPD 110 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this Close Protection Training bundle. Requirements This Close Protection Training course has been designed to be fully compatible with tablets and smartphones. Career path Having this Close Protection expertise will increase the value of your CV and open you up to multiple job sectors. Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course (Close Protection) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The de.livery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost

Close Protection Training
Delivered Online On Demand
£39

Women in Construction Management Course

By The Power Within Training & Development Ltd

Supporting Women in Leadership Throughout The UK Our women in leadership course is specifically designed to target challenges and support women in developing their leadership and management careers. AWARD WINNING LEADERSHIP DEVELOPMENT PROGRAMME Discover Our Women in Construction Management Course The Power Within is dedicated to helping women in construction across England and Scotland achieve business success through our Motivational Intelligence framework. Motivational Intelligence is the third level of intelligence, and the science behind it has won a Nobel Prize. Our women leadership in construction course supports women by improving their motivation, self-belief, decision-making, and leadership skills. This programme is designed to help female business leaders adapt more quickly to their environment, handle adversity more effectively, take productive action, and thrive during times of change. Each is a vital skill needed in today’s ever-changing business environment. When completed, you’ll have the skills needed to make decisions more effectively that help your business grow, become more resilient, and take opportunities when others are stuck. "This course has completely changed my outlook on my responsibilities as a manager/leader. In 26 years with Pfizer, I have never participated in a programme that has as profoundly changed my perspective on my role, my responsibilities and my ability to positively impact my team." FEMALE DIRECTOR OF BUSINESS SERVICES, PFIZER LEADING WITH MOTIVATIONAL INTELLIGENCE What is our Women in Construction Course? In the past five years, we’ve supported thousands of business leaders and managers in nurturing the skills and mindset needed to achieve and exceed their business goals. The Power Within knows women are incredibly effective and consistent at applying our Motivational Intelligence techniques to their lives and business. Our women in construction management course is designed to give you the skills you need to take charge of your business and ensure constant growth while future-proofing your business. The training is perfect for women in construction who are managers or leaders looking to: Quickly Adapt Their Team to Change Effectively Mentor Every Team Member Improve Communication and Collaboration Gain More Buy-In to New Goals or Strategies Transform Their Team Culture Increase Initiative and Self-Motivation Across Their Team How We Help Women in the Construction Industry Our course focuses on imparting fundamental skills, tactical best practices, and powerful insights into the human side of the business. You’ll be provided with valuable knowledge needed to be successful leaders and managers of all levels. We’ll focus on addressing the challenges new businesses around the world face, like leading teams and developing businesses in turbulent and transitional times as well as overcoming the challenges of being women in the construction industry. Throughout the course, particular emphasis is given to helping leaders raise motivational intelligence and foster a growth mindset within their team. LEADING WITH MOTIVATIONAL INTELLIGENCE Our Leading with Motivational Intelligence (MQ) Executive Diploma Programme is specifically designed to help participants create the “complete game” of leadership and management. Leveraged by more than 40% of the largest Fortune 500 companies and implemented around the world, the Leading with Motivational Intelligence (MQ) consistently receives a participant buy-in rate in excess of 97%. However, the most important statistic is: 12 months after completing the course more than 93% of participants continue to use the skills and techniques taught on a daily basis. SQA APPROVED EXECUTIVE DIPLOMA What Skills Do We Help Women in Construction Develop? The skills we teach through our women in construction management courses are delivered through seven modularised sessions, each between three and three-and-a-half hours per session, with all sessions starting at 9:30 am via Zoom. An additional two hours per week is spent working on the online training assignments and leadership development plan. Each session will provide the education and information needed to establish yourself in your business. Here is more information regarding each session and the skills taught: SESSION 1: SELF-LEADERSHIP & THE SECRET TO PERSONAL SUCCESS Our first module is focused on setting course expectations and creating the right environment for learning. We’ll introduce the format and logistics, then discuss leading through turbulent times and how we can take control of ourselves, our thoughts, and our actions to lead growth. There is also a discussion on adult learning techniques and how leaders can leverage them to improve the effectiveness of their teams. We’ll also explore how turbulence and transition have changed how we manage and lead our teams. SESSION 2: THE ROLE OF INTELLIGENCE WHEN LEADING In this session, we’ll discuss the three levels of human intelligence and show how they each play in an individual’s performance and behaviors. Through two distinct mindsets, you’ll be shown how an individual’s motivational intelligence ultimately influences their emotional intelligence and intelligence quotient (IQ). Depending on which mindset a person operates under ultimately dictates their view of themselves, opportunities, and the work at which they will allow themselves to succeed. Finally, we’ll discuss switching your team to a growth mindset. SESSION 3: THE PILLARS OF HUMAN PERFORMANCE Completing this session will allow you to deconstruct the components that create a motivational intelligence growth mindset. Through discussion, you’ll see how most organizational challenges can be directly tied back to lapses in these components. We’ll review the leaders who’ve had the most significant influence on the meeting participants and shows the commonalities that make these leaders stand out. Lastly, we’ll introduce terminology, tools, and techniques that leaders can leverage to better coach and mentor their team. SESSION 4: MANAGEMENT VERSUS LEADERSHIP: THE TWO CRITICAL AND CO-DEPENDENT SKILLSETS FOR CREATING TEAM SUCCESS We’ll discuss the difference between a manager’s and a leader’s focus. The discussion focuses on the two most common management mistakes and how they undermine team culture and individual performance. The final debate focuses on the five critical best practices of excellent management, including clearly defining and communicating goals, creating alignment and buy-in, setting proper expectations, monitoring performance, and recognizing and rewarding performance. Our final portion will work to define what management is. Session 5: Exploring and Defining Leadership: Dispelling the Myths that Surround It Session 5 strives to define leadership. Building on this definition is a follow-up discussion regarding how people develop their leadership abilities. We’ll explore the underpinnings of what creates a successful leader. It also includes the importance of asking questions and active listening. We’ll review the five behavioral characteristics associated with motivational intelligence and how leaders can assess the relative strengths or weaknesses of the characteristics within their team. Lastly, we’ll explore great leaders’ five critical best practices, including communicating a compelling vision, modeling the correct behaviors, establishing a team culture anchored in responsibility, consistently building team confidence and self-esteem, and proactively coaching and mentoring. SESSION 6: BUILDING A LEADERSHIP TOOLBOX FOSTERING ADAPTABILITY, RESILIENCE, AND COURAGE We’ll provide information regarding tools and techniques that leaders can utilize to foster greater accountability and ownership win their teams. The Power Within will explore self-esteem’s critical role in the relative strength or weakness of a person’s motivational intelligence and adaptability in life. We’ll discuss how self-esteem has formed and how it will influence how a person interprets feedback in life. Lastly, we’ll explore levels of self-esteem and the associated behaviors of each. SESSION 7: HELPING EMPLOYEES DEVELOP A HEALTHY PERSPECTIVE AND RESILIENT ATTITUDE During the final session, we’ll explore self-esteem’s critical role in the relative strength or weakness of a person’s motivational intelligence and adaptability in life. We’ll talk about how self-esteem is formed and how it influences how a person interprets feedback. Finally, we’ll explore levels of self-esteem and the behaviors of each and the influence of comfort zones, and the tools that leaders can use to help people escape the fear of change. Our Course Leaders The Power Within was founded by husband and wife team James and Enas Fleming, to inspire people worldwide to think bigger, be better, and achieve more. They both work on a personal level with individuals, businesses, and organisations to help them create leaders and build environments where they can thrive. James and Enas challenge the limits with the Motivational Intelligence formula to help you broaden your perspective and create a future on your terms. Here is more about your course instructors: James Fleming James Fleming – James Fleming, the co-creator of The Power Within. He wanted to inspire people around the world to think better, be better, and achieve more. James believes everyone can do whatever they set their minds to. Founding The Power Within allowed James to turn that deep knowledge into a business that helps others think bigger, better, and achieve more daily. He strives to give leaders the tools and knowledge to achieve their full potential while increasing their self-confidence and self-belief through the Motivational Intelligence Revolution. James wants to support today’s businesses to become tomorrow’s leaders. Mari Steyn Mari is the go-to person for building self-esteem, offering new perspectives and stepping up in Life. With an endless abundance of excitement and love for all people, combined with degrees in Psychology, Knowledge and Information Management and is a Master NLP and Transformation Coach and International NLP and Coaching Trainer and Executive Coach, Mari offers an attractive, fresh, expert approach to Emotional Freedom, Motivational Intelligence, Leadership Development and ReWriting your Story. We undoubtedly have the power within to alchemize ourselves and any situation! Seeing the light go on in someone’s eyes is my ultimate joy. Take Charge with Our Women in Construction Course The Power Within is a Motivational Intelligence company dedicated to helping businesses and leaders become more accountable, resilient, adaptable, and capable of handling all challenges, regardless of the complexity. Our women in construction management course build upon best practices, strategic insights, and lessons learned over three decades of building leadership universities for Fortune 500 companies. Throughout the course, emphasis is given to helping leaders raise their motivational intelligence and foster a growth mindset within their team. You’ll gain the skills you need to successfully lead your team and overcome adversity while ensuring your company is profitable. To learn more about our course or to register, reach out today.

Women in Construction Management Course
Delivered in Motherwell or UK Wide or OnlineFlexible Dates
Price on Enquiry

Cisco Securing Networks with Cisco Firepower Next Generation Firewall v1.0 (SSNGFW)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security administrators Security consultants Network administrators System engineers Technical support personnel Cisco integrators and partners Overview After taking this course, you should be able to: Describe key concepts of NGIPS and NGFW technology and the Cisco Firepower Threat Defense system, and identify deployment scenarios Perform initial Cisco Firepower Threat Defense device configuration and setup tasks Describe how to manage traffic and implement Quality of Service (QoS) using Cisco Firepower Threat Defense Describe how to implement NAT by using Cisco Firepower Threat Defense Perform an initial network discovery, using Cisco Firepower to identify hosts, applications, and services Describe the behavior, usage, and implementation procedure for access control policies Describe the concepts and procedures for implementing security intelligence features This course gives you knowledge and skills to use and configure Cisco© Firepower Threat Defense technology, beginning with initial device setup and configuration and including routing, high availability, Cisco Adaptive Security Appliance (ASA) to Cisco Firepower Threat Defense migration, traffic control, and Network Address Translation (NAT). You will learn how to implement advanced Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network-based malware detection, and deep packet inspection. You will also learn how to configure site-to-site VPN, remote-access VPN, and Secure Sockets Layer (SSL) decryption before moving on to detailed analysis, system administration, and troubleshooting. Cisco Firepower Threat Defense Overview Examining Firewall and IPS Technology Firepower Threat Defense Features and Components Examining Firepower Platforms Examining Firepower Threat Defense Licensing Cisco Firepower Implementation Use Cases Cisco Firepower NGFW Device Configuration Firepower Threat Defense Device Registration FXOS and Firepower Device Manager Initial Device Setup Managing NGFW Devices Examining Firepower Management Center Policies Examining Objects Examining System Configuration and Health Monitoring Device Management Examining Firepower High Availability Configuring High Availability Cisco ASA to Firepower Migration Migrating from Cisco ASA to Firepower Threat Defense Cisco Firepower NGFW Traffic Control Firepower Threat Defense Packet Processing Implementing QoS Bypassing Traffic Cisco Firepower NGFW Address Translation NAT Basics Implementing NAT NAT Rule Examples Implementing NAT Cisco Firepower Discovery Examining Network Discovery Configuring Network Discovery Implementing Access Control Policies Examining Access Control Policies Examining Access Control Policy Rules and Default Action Implementing Further Inspection Examining Connection Events Access Control Policy Advanced Settings Access Control Policy Considerations Implementing an Access Control Policy Security Intelligence Examining Security Intelligence Examining Security Intelligence Objects Security Intelligence Deployment and Logging Implementing Security Intelligence File Control and Advanced Malware Protection Examining Malware and File Policy Examining Advanced Malware Protection Next-Generation Intrusion Prevention Systems Examining Intrusion Prevention and Snort Rules Examining Variables and Variable Sets Examining Intrusion Policies Site-to-Site VPN Examining IPsec Site-to-Site VPN Configuration Site-to-Site VPN Troubleshooting Implementing Site-to-Site VPN Remote-Access VPN Examining Remote-Access VPN Examining Public-Key Cryptography and Certificates Examining Certificate Enrollment Remote-Access VPN Configuration Implementing Remote-Access VPN SSL Decryption Examining SSL Decryption Configuring SSL Policies SSL Decryption Best Practices and Monitoring Detailed Analysis Techniques Examining Event Analysis Examining Event Types Examining Contextual Data Examining Analysis Tools Threat Analysis System Administration Managing Updates Examining User Account Management Features Configuring User Accounts System Administration Cisco Firepower Troubleshooting Examining Common Misconfigurations Examining Troubleshooting Commands Firepower Troubleshooting

Cisco Securing Networks with Cisco Firepower Next Generation Firewall v1.0 (SSNGFW)
Delivered OnlineFlexible Dates
Price on Enquiry

Resilience: Staying adaptable and resilient

5.0(9)

By Chart Learning Solutions

Cultivate the ability to remain flexible and resilient in the face of adversity, change, and uncertainty. This involves developing strategies and practices that enable individuals to bounce back from setbacks, adapt to new circumstances, and thrive amidst challenges. By focusing on building skills such as emotional intelligence, problem-solving, and maintaining a positive mindset, the goal is to empower individuals to embrace change, learn from setbacks, and emerge stronger and more resilient in the face of future challenges. Learning Objectives The following are some of the key outcomes in this course: Learn about adaptability at work and why it matters, Five key skills that every adaptable person needs and get tips to boost your adaptability, Understand how to gain the courage to take the first step out of your comfort zone Target Audience Managers, Team Leaders, Young Professionals

Resilience: Staying adaptable and resilient
Delivered Online On Demand18 minutes
£34.95

Cognicert ISO 7101 Healthcare Quality Lead Auditor Course

5.0(1)

By Cognicert Limited

ISO 7101 Healthcare Quality Management System Lead Auditor Course provides participants with the knowledge and skills necessary to lead audits of quality management systems within healthcare organizations. This comprehensive training program covers the principles, processes, and practices of auditing healthcare quality management systems, focusing on key standards and regulations applicable to the healthcare industry.

Cognicert ISO 7101 Healthcare Quality Lead Auditor Course
Delivered in person or OnlineFlexible Dates
£400 to £800

CompTIA CySA+ Cybersecurity Analyst Course

4.5(3)

By Studyhub UK

Embark on a transformative journey with the 'CompTIA CySA+ Cybersecurity Analyst Course,' designed to fortify the digital frontiers of business. This comprehensive training program begins with an immersive introduction to the cybersecurity realm, setting the stage for a deep dive into the sophisticated world of threat data and intelligence. With an emphasis on real-world application, participants will gain invaluable insights into organizational security, developing the acumen to anticipate, identify, and neutralize digital threats. Mastery over vulnerability assessment tools and mitigation strategies forms the bedrock of this curriculum, providing learners with a robust skill set pivotal for the modern cybersecurity landscape. Learning Outcomes Interpret threat data to reinforce organizational security frameworks. Assess vulnerabilities using state-of-the-art tools and methodologies. Apply best practices for ensuring software and hardware assurance. Analyze security solutions for robust infrastructure management. Implement and manage incident response protocols to address potential compromises effectively. Why choose this CompTIA CySA+ Cybersecurity Analyst Course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the CompTIA CySA+ Cybersecurity Analyst Course Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this CompTIA CySA+ Cybersecurity Analyst Course for? Individuals aiming to specialize in cybersecurity analysis. IT professionals seeking to broaden their cybersecurity knowledge. Organizational staff responsible for managing digital security risks. Security consultants requiring up-to-date threat intelligence expertise. System administrators looking to implement enhanced security measures. Career path Cybersecurity Analyst - £25,000 to £60,000 Vulnerability Analyst - £30,000 to £65,000 Security Operations Centre (SOC) Analyst - £32,000 to £70,000 Incident Responder - £27,000 to £68,000 Digital Forensics Specialist - £35,000 to £75,000 Information Security Consultant - £40,000 to £80,000 Prerequisites This CompTIA CySA+ Cybersecurity Analyst Course does not require you to have any prior qualifications or experience. You can just enrol and start learning.This CompTIA CySA+ Cybersecurity Analyst Course was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Section 01: Introduction Introduction 00:02:00 All about the Exam 00:08:00 What's New on the CompTIA CySA+ Exam? 00:05:00 Meet the Instructors 00:02:00 Thinking like the Enemy 00:09:00 Section 02: The Importance of Threat Data and Intelligence Intelligence Sources and Confidence Levels 00:08:00 Threat Indicators and Actors 00:08:00 Threat Trends 00:07:00 Intelligence Cycle and ISACs 00:06:00 Section 03: Threat Intelligence in Support of Organizational Security Attack Frameworks 00:06:00 Threat Research 00:11:00 Threat Modeling and Intelligence Sharing 00:06:00 Section 04: Vulnerability Assessment Tools Vulnerability Identification 00:07:00 Scanning Parameters and Criteria 00:09:00 Scanning Special Considerations 00:06:00 Validation 00:03:00 Remediation and Mitigation 00:08:00 Inhibitors to Remediation 00:07:00 Section 05: Threats and Vulnerabilities Associated with Specialized Technology Web Applications Scanners, Part 1 00:10:00 Web Applications Scanners, Part 2 00:05:00 Scanning 00:06:00 Configuring and Executing Scans 00:08:00 Vulnerability Scanning 00:10:00 Reverse Engineering 00:08:00 Enumeration 00:06:00 Wireless Assessment Tools 00:08:00 Cloud Assessment Tools 00:04:00 Section 06: Threats and Vulnerabilities Associated with Specialized Technology Mobile and IoT 00:10:00 Embedded and Firmware Systems (RTOS, SoC, and FPGA) 00:09:00 Access and Vehicles Risk 00:08:00 Automation and Control Risk 00:10:00 Section 07: Threats and Vulnerabilities Associated with Operating in the Cloud Cloud Models 00:07:00 Remote Service Invocation (FaaS, IaC, API) 00:10:00 Cloud Vulnerabilities 00:06:00 Section 08: Mitigating Controls for Attacks and Software Vulnerabilities Injection and Overflow Attacks 00:09:00 Authentication Attacks 00:07:00 Exploits 00:08:00 Application Vulnerabilities, Part 1 00:08:00 Application Vulnerabilities, Part 2 00:07:00 Section 09: Security Solutions for Infrastructure Management Network Architecture and Asset Management 00:09:00 Protecting Your Territory 00:05:00 Identity and Access Management 00:11:00 Encryption and Active Defense 00:08:00 Section 10: Software Assurance Best Practices Platforms 00:07:00 SOA and DevSecOps 00:09:00 Secure Software Development 00:08:00 Best Coding Practices 00:04:00 Section 11: Hardware Assurance Best Practices Trusted Hardware 00:10:00 Hardware Encryption 00:04:00 Hardware Security 00:08:00 Section 12: Data Analysis in Security Monitoring Activities Data Analytics 00:10:00 Endpoint Security 00:08:00 Recon Results, Part 1 00:13:00 Recon Results, Part 2 00:05:00 Impact Analysis 00:05:00 Collective Tools 00:09:00 Query Writing 00:07:00 E-mail Analysis, Part 1 00:10:00 E-mail Analysis, Part 2 00:08:00 Section 13: Implement Configuration Changes to Existing Controls to Improve Security Permissions 00:09:00 Firewalls 00:08:00 Intrusion Prevention Rules 00:05:00 DLP and Endpoint Detection 00:05:00 Section 14: The Importance of Proactive Threat Hunting Threat Hunting and the Hypothesis 00:06:00 Threat Hunting Process 00:07:00 Results and Benefits 00:05:00 Section 15: Compare and Contrast Automation Concepts and Technologies Workflow and Scripting 00:07:00 API and Malware Signature Creation 00:08:00 Threat Feeds and Machine Learning 00:06:00 Protocols, Standards, and Software Engineering 00:05:00 Section 16: The Importance of the Incident Response Process IR Roles and Responsibilities 00:08:00 IR Active Preparation 00:10:00 Section 17: Appropriate Incident Response Procedures Incident Response Process 00:07:00 Section 18: Analyze Potential Indicators of Compromise Network Symptoms 00:04:00 Host Symptoms 00:08:00 Application Symptoms 00:04:00 Section 19: Utilize Basic Digital Forensics Techniques Digital Forensics 00:10:00 Seizure and Acquisitions 00:05:00 Forensics Acquisition Tools 00:09:00 Mobile, Virtualization, and Cloud 00:06:00 Forensics Analysis, Part 1 00:04:00 Forensics Analysis, Part 2 00:08:00 Packet Capture 00:12:00 Section 20: The Importance of Data Privacy and Protection Data Privacy and Security 00:06:00 Nontechnical Controls 00:09:00 Technical Controls 00:08:00 Section 21: Security Concepts in Support of Organizational Risk Mitigation Business Impact Analysis 00:05:00 Risk Identification 00:05:00 Risk Calculation and Communication 00:06:00 Training 00:04:00 Supply Chain Assessment 00:04:00 Section 22: The Importance of Frameworks, Policies, Procedures, and Controls Frameworks 00:13:00 Policies and Procedures 00:05:00 Controls and Procedures 00:08:00 Verification 00:06:00 Assignment Assignment - CompTIA CySA+ Cybersecurity Analyst Course 00:00:00

CompTIA CySA+ Cybersecurity Analyst Course
Delivered Online On Demand11 hours 25 minutes
£10.99

Digital Oilfield: Managing Integrated and Digitalized Oil and Gas Assets – Digital Transformation from Theory to Practical Application

By EnergyEdge - Training for a Sustainable Energy Future

Gain expertise in managing digitalized oil and gas assets with EnergyEdge's course, focusing on practical applications of digital transformation.

Digital Oilfield: Managing Integrated and Digitalized Oil and Gas Assets – Digital Transformation from Theory to Practical Application
Delivered In-PersonFlexible Dates
£2,999 to £3,199