• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3314 Management courses in Formby delivered Live Online

Leadership & Wellbeing at Work

By Embrace Life Uk

Getting the most from employees - How to gain an understanding of where your employees/staff/teams are to enable communication and give ease to difficult conversations. Understanding the difference between competitive working and cooperative working where these skills are useful and useless. Discover how to retain your staff and improve performance of staff who are on the verge of underperformance. Gain an insight into what causes behavioural outcomes and how to encourage favourable outcomes over manipulating outcomes based on you meeting your needs.  45-60 min zoom workshop held on the last Wednesday of the month, every month at 7pm (limited spaces) Upon purchase you will be prompted to choose a date. You will receive email confirmation of the event via google calendar plus reminders as the event time approaches. Is your company culture a healthy one? Could you do better? Would you like to be less concerned over staff wellbeing & have more time to focus on CPD & growth? Improve Inductions, Onboarding and Recruitment Try this introductory workshop before committing to day event training options for your business

Leadership & Wellbeing at Work
Delivered OnlineFlexible Dates
£45

The GDPR Primer for Data Protection Officers

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for A prior understanding of EU Data Protection legislation is recommended. Candidates are typically management professionals and decision-makers who already have responsibility for data protection compliance within their organisation.Co-Requisite Subjects Candidates should have a good understanding of their own organisation?s data management activities through the life cycle from initial acquisition, through the various areas of processing and usage, to eventual removal or destruction. Overview To equip the learner with a foundational understanding of the principles of the General Data Protection Regulation (GDPR) and to provide constructive suggestions on implementing compliant processes. The social, historical and legal background leading to the General Data Protection Regulation (GDPR) The scope and global context of the GDPR The key concepts within the GDPR The definition of all key words and phrases relating to this Data Protection regulation Principle One: The criteria governing fair, open and transparent processing of personal data Principle Two: Purpose Limitation, the challenge of limiting the processing within the context of specified and lawful purposes Principle Three: Minimisation of processing, and ensuring that only that data is processed which is necessary to achieve the purpose. Principle Two: Purpose Limitation, the challenge of limiting the processing within the context of specified and lawful purposes Principle Three: Minimisation of processing, and ensuring that only that data is processed which is necessary to achieve the purpose. Principle Four: Ensuring that any personal data held by the organisation is kept accurate and current, and that any processing of such data is appropriate Principle Five: Management and storage of personal data in a manner that meets regulatory obligations, while minimising the time that the individual remains identifiable Principle Six: The criteria governing safe, secure and confidential processing of personal data in order to protect its integrity Principle Seven: The key roles, responsibilities and accountabilities of those involved in Data Management within an organisation Establishment within a single Member State Joint Controllers Privacy by Design and by Default Nominated Representatives Third-party Contracts and shared liability Logging of data management processes Data Breach Notification obligations Privacy Impact Assessments Overseas transfer of personal data L2.8 The Data Subject Rights, and their implications for the Data Controller and the Data Processor L2.8.1 The ?right to be forgotten? L2.8.2 The right to restriction of processing L2.8.3 The right to object to certain processing L2.8.4 The right to have inaccurate data amended or erased L2.8.5 The right to data portability L2.8.6 The right of access to one?s personal data L2.8.7 Rights in relation to automated decision-making and profiling The role of the Data Protection Officer (DPO) The role of the Data Protection Officer (DPO) Criteria for designating a DPO Tasks of the DPO Position of the DPO within the organisation The role of the Supervisory Authority within the Member State The Lead Supervisory Authority and independence Investigative, corrective and advisory powers Independence of the Supervisory Authority Collaboration with other Supervisory Authorities Codes of Conduct and Certification The role, powers and tasks of the European Data Protection Board (EDPB) The remedies, liabilities and penalties available under the GDPR Right to raise a complaint Right to representation Right to effective judicial remedy Right to compensation and liability Administrative fines of up to ?10m or 2% of GAT Administrative fines of up to ?20m or 4% of GAT Provisions for specific processing situations Freedom of Expression Processing of official documents Processing of National Identification Numbers Processing regarding employment Processing for archiving purposes Processing under obligations of official secrecy Processing of data by religious organisations Preparing for implementation of the GDPR Review of data management policies and procedures Review of data assets and security structures Training and Awareness-raising Data management governance structures Embedding Privacy By Design and Default Codes of Conduct and Certification against standards Breach detection and notification procedures Review of third-party agreements, contracts

The GDPR Primer for Data Protection Officers
Delivered OnlineFlexible Dates
Price on Enquiry

AZ-304T00 - Microsoft Azure Architect Design

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for IT Professionals with expertise in designing and implementing solutions running on Microsoft Azure. They should have broad knowledge of IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platform, budgeting, and governance. Azure Solution Architects use the Azure Portal and as they become more adept they use the Command Line Interface. Candidates must have expert-level skills in Azure administration and have experience with Azure development processes and DevOps processes. Overview Recommend solutions to minimize costs Recommend a solution for Conditional Access, including multi-factor authentication Recommend a solution for a hybrid identity including Azure AD Connect and Azure AD Connect Recommend a solution for using Azure Policy Recommend a solution that includes KeyVault Recommend a solution that includes Azure AD Managed Identities Recommend a storage access solution Design an Azure Site Recovery solution Recommend a solution for autoscaling Recommend a solution for containers Recommend a solution for network security Recommend a solution for migrating applications and VMs Recommend a solution for migration of databases This course teaches Solutions Architects how to translate business requirements into secure, scalable, and reliable solutions. Lessons include design considerations related to logging, cost analysis, authentication and authorization, governance, security, storage, high availability, and migration. This role requires decisions in multiple areas that affect an overall design solution. Design a Compute Solution Recommend a Solution for Compute Provisioning Determine Appropriate Compute Technologies Recommend a Solution for Containers Recommend a Solution for Automating Compute Management Design a Network Solution Recommend a Solution for Network Addressing and Name Resolution Recommend a Solution for Network Provisioning Recommend a Solution for Network Security Recommend a Solution for iInternete Connectivity and On-Premises Networks Recommend a Solution for Automating Network Management Recommend a Solution for Load Balancing and Rraffic Routing Design for Migration Assess and On-Premises Servers and Applications for Migration Recommend a Solution for Migrating Applications and VMs Recommend a Solution for Migration of Databases Design Authentication and Authorization Tips for Identity and Access Management Recommend a Solution for Multi-Factor Authentication Five Steps for Securing Identity Infrastructure Recommend a Solution for Single-Sign On (SSO) Recommend a Solution for a Hybrid Identity Recommend a Solution for B2B Integration Recommend a Hierarchical Structure for Management Groups Design Governance Recommend a Solution for using Azure Policy Recommend a Solution for using Azure Blueprint Design a Solution for Databases Select an Appropriate Data Platform Based on Requirements Overview of Azure Data Storage Recommend Database Service Tier Sizing Dynamically Scale Azure SQL Database and Azure SQL Managed Instances Recommend a Solution for Encrypting Data at Rest, Transmission, and In Use Select an Appropriate Storage Account Understanding Storage Tiers Recommend a Storage Access Solution Recommend Storage Management Tools Design Data Integration Recommend a Data Flow Recommend a Solution for Data Integration Design a Solution for Logging and Monitoring Azure Monitoring Services Azure Monitor Design a Solution for Backup and Recovery Recommend a Recovery Solution for Hybrid and On-Premises Workloads Design and Azure Site Recovery Solution Recommend a Solution for Recovery in Different Regions Recommend a Solution for Azure Backup Management Design a Solution for Data Archiving and Retention Design for High Availability Recommend a Solution for Application and Workload Redundancy Recommend a Solution for Autoscaling Identify Resources that Require High Availability Identify Storage Tpes for High Availability Recommend a Solution for Geo-Redundancy of Workloads Design for Cost Optimization Recommend Solutions for Cost Management Recommended Viewpoints for Minimizing Costs Design an Application Architecture Recommend a Microservices Architecture Recommend an Orchestration Solution for Deployment of Applications Recommend a Solution for API Integration Design Security for Applications Security for Applications and Services Recommend a Solution using Key Vault Recommend Solutions using Azure AD Managed Identities

AZ-304T00 - Microsoft Azure Architect Design
Delivered OnlineFlexible Dates
Price on Enquiry

C)ISRM - Certified Information System Risk Manager Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Information Systems Risk Manager students will be prepared to pass the CISRM exam.  Certified Information Systems Risk Manager, CISRM, course is made for IT and IS professionals who are involved with all aspects of risk management. Requests for this particular area of certification is growing fast in the employment sector. Recent high-profile breaches in both the public and private sectors have increased awareness for the need for Risk Management professionals. Mile2?s CISRM certification exam will test your knowledge in all areas of risk management. If you would like some training and test preparation before taking the Certified Information System Risk Manager Exam we offer the CISRM course as both a live class and a self-study combo. First, you will learn to assess a system, then implement risk controls. Finally, you will be able to monitor and maintain risk procedures. With this training, you will be able to identify risks associated with specific industries. After course completion, you will be able to design, implement, monitor and maintain risk-based, efficient and effective IS controls. Knowledge of all of these areas will be required to pass the CISRM exam. Course Outline The Big Picture Domain 1 ? Risk Identification Assessment and Evaluation Domain 2 ? Risk Response Domain 3 ? Risk Monitoring Domain 4 ? IS Control Design and Implementation

C)ISRM - Certified Information System Risk Manager Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

Banking ALM & regulatory impact on the Balance Sheet

5.0(5)

By Finex Learning

Overview This 2 day course focuses on best practice bank ALM in today’s environment of a multiplicity of regulatory constraints on the balance sheet Who the course is for Asset Liability Committee (ALCO) members Treasury Risk Finance and internal audit capital management Funding management Liquidity buffer investment team Derivative structurers and salespeople; IT software providers Regulators Course Content To learn more about the day by day course content please click here To learn more about schedule, pricing & delivery options, book a meeting with a course specialist now

Banking ALM & regulatory impact on the Balance Sheet
Delivered in Internationally or OnlineFlexible Dates
Price on Enquiry

Salesforce Build System Architect Expertise (ARC902)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This class is designed for enterprise architects, solution architects, and business analysts working to earn their Salesforce System Architect credential, for consultants or technical experts working to earn their individual Architect Designer credential, and for Salesforce Developers and Administrators looking to expand their overall capabilities with the Salesforce Platform. Overview Recommend appropriate integration patterns (Remote Process Invocation - Request and Reply, Remote Process Invocation - Fire and Forget, Batch Data Synchronization, Remote Call-In, and UI Update Based on Data Changes) to address integration requirements. Recommend appropriate integration capabilities (SOAP, REST, bulk, streaming, canvas, Workflow outbound, Apex, and Salesforce Connect) to address integration requirements. Recommend the appropriate SSO Flow or OAuth flow to address identity and access management requirements. Dive into the two cornerstone domains of being a System Architect: Integration Architecture, and Identity and Access Management. In this 4-day workshop, our Architect experts will present you with a case study scenario that will be broken down and digested through iterative exploration. Learn how to design and build secure, scalable, and high-performing integration and identity solutions through a combination of lecture, demos, hands-on exercises, and workshop presentations and discussions. Integration Capabilities Create, Retrieve, Update, or Delete Records with SOAP API Integrate with Salesforce Using REST API Insert, Update, Upsert, or Delete Large Volumes of Data with BULK API Push Relevant Data to Users in Real Time with Streaming API Send Information to a Designated Endpoint with Outbound Message Integrate Your Apex with an External Service Using Callouts Integrate Data from an External Data Source Using Salesforce Connect Synchronize Data with Heroku Connect Connect Business Processes in Salesforce with Platform Events Publish Change Events with Change Data Capture Integration Patterns Invoke Remote Call-In Patterns Invoke Request and Reply Patterns Invoke Fire and Forget Patterns Synchronize Batch Data Update UI Based on Data Changes Visualize Data Identity Management Review SSO Fundamentals Review Identity Management Review Identity Management Concepts Understand Salesforce as an Identity Provider Accept Third-Party Identity in Salesforce Understand Social Sign-On and Open ID Connect Enable Users to Authenticate with SSO Flows Initiate Flows with IDP Initiate Flows with SP Troubleshoot Identity Issues Authentication Grant Client Application Access with OAuth Flow Generate Access Tokens with Username Password Flow Initiate Web Server Flow Grant Application Access with User Agent Flow Connect to Salesforce Using JWT Flow

Salesforce Build System Architect Expertise (ARC902)
Delivered OnlineFlexible Dates
Price on Enquiry

Stress Management and Preventing Burnout in a 24/7 World

By Elite Forums AU

Course Duration: Half-day or full-day program (with options for virtual delivery) Target Audience: Professionals, managers, leaders, and HR teams looking to build resilience, manage stress effectively, and prevent burnout in today’s always-on, high-pressure work environment. Course Objectives By the end of this course, participants will be able to: Recognise the signs and symptoms of stress and burnout. Understand the impact of chronic stress on health, performance, and well-being. Learn effective strategies for stress management and emotional regulation. Identify personal and workplace practices that reduce the risk of burnout. Develop a personal action plan for building resilience and maintaining well-being. Course Outline Module 1: Understanding Stress and Burnout What is stress? Types of stress (acute, chronic, eustress, distress) Defining burnout: symptoms, causes, and long-term effects The impact of a 24/7 world on mental health and performance How stress and burnout affect physical health, cognition, and relationships The role of work culture, technology, and societal expectations in stress Module 2: The Physiology of Stress and Burnout Understanding the body's stress response: fight or flight, cortisol, and adrenaline The effects of prolonged stress on the nervous system and health How burnout manifests in the brain and body The difference between stress and burnout: a deeper dive into emotional exhaustion, depersonalisation, and reduced personal accomplishment Module 3: Identifying Personal Stress Triggers and Early Warning Signs Conducting a stress audit: when and where does stress show up? Personal stress triggers: how work, environment, and relationships contribute Warning signs of burnout: physical, emotional, and behavioural red flags Self-assessment: Are you at risk of burnout? Understanding your personal stress responses and coping mechanisms Module 4: Effective Stress Management Techniques Mindfulness and relaxation practices: breathing exercises, meditation, and guided imagery Cognitive reframing: challenging negative thoughts and building resilience Time management and prioritisation: setting boundaries, saying no, and avoiding overwhelm Progressive muscle relaxation: tension release for mind and body Movement and exercise: how physical activity reduces stress Sleep hygiene: strategies for better rest and recovery Module 5: Building Resilience and Preventing Burnout The concept of resilience: bouncing back and growing stronger from adversity Strategies for emotional regulation: staying calm under pressure The role of social support: leaning on peers, mentors, and family Building psychological flexibility: accepting what we can’t change and focusing on what we can Creating work-life boundaries in a 24/7 world: disconnecting from work and technology Cultivating gratitude, positive psychology, and self-compassion in daily life Module 6: Creating a Sustainable Work Culture How leaders can foster a culture of well-being and prevent burnout Encouraging breaks, time off, and restorative work habits Organisational practices that support mental health: workload management, flexibility, and support resources Role of HR and leadership in promoting a healthy work-life balance The importance of feedback, recognition, and regular check-ins to prevent stress escalation Module 7: Personal Action Plan for Stress Management and Burnout Prevention Reflecting on key learnings and takeaways Developing a personal stress management toolkit Building a balanced daily routine that integrates self-care practices Creating a self-care action plan for the next 30 days Accountability partners and follow-up strategies to track progress Final thoughts: Small changes for big impact Delivery Style Interactive and experiential with a mix of individual reflection, small group discussions, and practical exercises Case studies and real-life examples to illustrate stress management strategies Guided relaxation techniques and mindfulness practices Personal assessments and action planning for immediate application Course Materials Provided Stress Management Handbook Personal Stress Audit Worksheet Relaxation and Breathing Exercise Guide Resilience Building Tools and Templates Self-Care Action Plan Template Resource list: Apps, podcasts, and books for stress management Optional Add-ons One-on-one coaching or follow-up sessions to discuss personal stress management strategies Leadership or team coaching to create a stress-resilient culture A series of wellness webinars focused on specific stress-management tools (e.g., sleep hygiene, mindfulness, movement, etc.) Ongoing email support or resource sharing to reinforce learning

Stress Management and Preventing Burnout in a 24/7 World
Delivered OnlineFlexible Dates
Price on Enquiry

EXIN Cloud Computing Foundation

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Diese Zertifizierung richtet sich an Experten aus Geschäftsbetrieben aller Branchen, die mit der Cloud-Technologie arbeiten oder an dieser Technologie und ihrem Nutzen für Unternehmen interessiert sind: Alle Mitarbeiter von internen oder externen Service Providern, Ihre Kunden Manager, Auditoren Overview Die Zertifizierung EXIN Cloud Computing Foundation validiert das Wissen von Kandidaten in folgenden Bereichen: Cloud - Prinzipien Implementierung von Management des Cloud Computing Nutzung von Cloud Computing Sicherheit, Identität und Privatsphäre im Cloud Computing Bewertung des Cloud Computing Unter Cloud Computing versteht man die Implementierung und Nutzung der Cloud - Technologie um IT - Services bereitzustellen, die an einem andren Standort gehostet werden. Cloud-Prinzipien Das Cloud - Konzept Entwicklung des Cloud Computing Cloud - Architektur Vorteile und Beschr„nkungen des Cloud Computing Implementierung und Management des Cloud Computing Aufbau lokaler Cloud - Umgebungen Management - Prinzipien fr Cloud - Services Nutzung von Cloud Computing Zugriff auf die Cloud Untersttzung von Business - Prozessen durch Cloud Computing Cloud - Nutzung durch Service Provider Sicherheit, Identit„t und Privatsph„re im Cloud Computing Sicherheit im Cloud Computing Identit„ts- und Privatsph„renmanagement Bewertung des Cloud Computing Business Cas fr das Cloud Computing Bewertung von Cloud - Implementierungen

EXIN Cloud Computing Foundation
Delivered OnlineFlexible Dates
Price on Enquiry

Giving colleagues constructive feedback

5.0(3)

By The Self Leadership Initiative

Give feedback that helps your team to grow

Giving colleagues constructive feedback
Delivered OnlineFlexible Dates
£10

Louise Tremayne - Stress and Anxiety Specialist

By Free Flowing Energy

I am an experienced EFT Practitioner, Mindfulness Teacher, Therapist and Coach who specialises in helping women eliminate stress and anxiety. I offer sessions worldwide via the internet, or face to face in Halwill Junction, Okehampton and Exeter, Devon, UK. I also teach classes and run retreats. I love to empower my clients so that they can help themselves. I would love to hear from you, so please do get in touch.

Louise Tremayne - Stress and Anxiety Specialist
Delivered OnlineFlexible Dates
£40 to £165