• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3374 Management courses in Horsforth delivered Live Online

Microsoft Outlook Advanced - In-company (now with trainer led live online classes)

By Microsoft Office Training

Course Objectives At the end of this course you will be able to: Customise message settings Organise and locate Outlook messages Set Calendar options Manage their Contacts Work with activities using the Journal and Tasks Share their workspaces Manage their Outlook data files ' 1 year email support service Take a look at the consistent excellent feedback from our corporate clients visiting our site ms-officetraining co uk With more than 20 years experience, we deliver courses on all levels of the Desktop version of Microsoft Office and Office 365; ranging from Beginner, Intermediate, Advanced to the VBA level. Our trainers are Microsoft certified professionals with a proven track record with several years experience in delivering public, one to one, tailored and bespoke courses. Our competitive rates start from £550.00 per day of training Tailored training courses: You can choose to run the course exactly as they are outlined by us or we can customise it so that it meets your specific needs. A tailored or bespoke course will follow the standard outline but may be adapted to your specific organisational needs. Configure Advanced Message Options Delay delivery Insert Advanced Characters and Objects Modify Message Settings, Properties, and Options Use Automatic Replies Advanced Message Management Sort Messages Filter Messages Organise Messages Search Messages Manage Junk Mail Manage Your Mailbox Automate Repetitive Tasks Quick steps Rules Auto Archive Advanced Calendar Management Manage Advanced Calendar Options Create Calendar Groups Manage Meeting Responses Advanced Contact Management Edit an Electronic Business Card Manage Advanced Contacts Options Forward Contacts Export Contacts Managing Activities by Using Tasks and Journal Entries Assign and Manage Tasks Record and Modify Journal Entries Sharing Workspaces with Others Delegate Access to Mail Folders Share Your Calendar Share Your Contacts Managing Outlook Data Files Back Up Outlook Items Change Data File Settings Configuring Email Message Security Settings Who is this course for? Who is this course for? This course is designed for experienced Outlook users who need to increase their efficiency in the usage and manipulation of emails, tasks and the calendar. Requirements Requirements Preferably, delegates would have attended the MS Outlook Introduction course.

Microsoft Outlook Advanced - In-company (now with trainer led live online classes)
Delivered in London or UK Wide or OnlineFlexible Dates
£550

AWS Security Essentials

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Security IT business-level professionals interested in cloud security practices Security professionals with minimal to no working knowledge of AWS Overview Assimilate Identify security benefits and responsibilities of using the AWS Cloud Describe the access control and management features of AWS Explain the available methods for providing encryption of data in transit and data at rest when storing your data in AWS. Describe how to secure network access to your AWS resources Determine which AWS services can be used for monitoring and incident response This course covers fundamental AWS cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured. Based on the AWS Shared Security Model, you learn where you are responsible for implementing security in the AWS Cloud and what security-oriented services are available to you and why and how the security services can help meet the security needs of your organization. Prerequisites Working knowledge of IT security practices and infrastructure concepts, familiarity with cloud computing concepts 1 - Security on AWS Security design principles in the AWS Cloud AWS Shared Responsibility Model 2 - Security OF the Cloud AWS Global Infrastructure Data center security Compliance and governance 3 - Security IN the Cloud ? Part 1 Identity and access management Data protection essentials Lab 01 ? Introduction to security policies 4 - Security IN the Cloud ? Part 2 Securing your infrastructure Monitoring and detective controls Lab 02 ? Securing VPC resources with Security Groups 5 - Security IN the Cloud ? Part 3 DDoS mitigation Incident response essentials Lab 03 ? Remediating issues with AWS Config Conformance Packs 6 - Course Wrap Up AWS Well-Architected tool overview Next Steps Additional course details: Nexus Humans AWS Security Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Security Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AWS Security Essentials
Delivered OnlineFlexible Dates
£675

Bleeding And Catastrophic Bleeding

5.0(50)

By Pochat Training

CPD Accredited, Interactive Short Course 1½ hr session Learn to deal with bleeding, from minor bleeds to catastrophic bleeds Become a life-saving hero if ever someone is seriously injured Course Contents: How to treat minor bleeding How to treat major bleeding Types of bleeding How to treat catastrophic bleeding Tourniquets Why to use a tourniquet How to use a tourniquet How to make an improvised tourniquet How to use a Tourni-Key Wound packing How to use Celox Z-Gauze How to improvise packing a wound How to treat gunshot wounds Practical elements: There is an option of learning how to deal with catastrophic bleeding in person, so you get to practice these skills (and play about with fake blood 😀). For that, see our Catastrophic Bleeding course module. Benefits of this Short Course: We all have regular injuries which cause us to bleed If not properly cared for, even a small cut can turn septic and kill or maim Serious car accidents, machinery accidents at work, weapon wounds, terrorist attacks and more can also lead to catastrophic bleeding Did you know that a person could bleed out in just five minutes..? You're got to act quick, decisive and correctly Please don't do what you see in the movies - you will kill the person even quicker...

Bleeding And Catastrophic Bleeding
Delivered Online + more
£20

Demystifying strategic planning

By Strategy Insights

This Strategy Insights Masterclass explores what strategic planning is really about and how to approach it effectively (including how to consider the uncertainty of the future).

Demystifying strategic planning
Delivered OnlineFlexible Dates
£120

Assertiveness and Conflict Management

4.9(9)

By Sterling Training

Understand what assertiveness really is and how to deal with challenging situations more confidently.

Assertiveness and Conflict Management
Delivered OnlineJoin Waitlist
£295

Contract Administration

5.0(10)

By GBA Corporate

Overview This course will take you through learning how and when a contract is formed, analysing various terms in the contract, identifying various factors that can quash the contract and ways to discharge the contract also ways to protect the company if there is a breach of contract. 

Contract Administration
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Introduction to Wound Care

By BBO Training

Introduction to Wound Care via ZoomJoin us via Zoom for this informative and interactive course designed for nurses, healthcare professionals, and healthcare assistants who are new to wound management in the primary care setting. This course will empower you with the knowledge and skills to confidently manage wound care for both adults and children, ensuring the highest standards of patient care in your practice.Day OneLearning Objectives:1. Develop a comprehensive understanding of wound care in the primary care setting.2. Explore the anatomy and physiology related to wound healing.3. Learn how to assess wounds, including the various stages of wound healing.4. Understand wound infections and their management.5. Familiarize yourself with wound closure techniques such as sutures, Steri-strips, and clips.6. Gain knowledge about emollients, barrier creams, and steroids.7. Discover commonly used dressings for wound care.8. Create an action plan, evaluate your learning, and access resources for further study.Day TwoLearning Objectives:1. Review the topics covered on Day One and explore wound care formularies and pathways.2. Differentiate between leg ulcers of arterial and venous origin.3. Understand exudate management in wound care.4. Learn about the theory behind compression therapy for wound management.5. Engage in case studies to apply your knowledge.6. Explore competencies that can be achieved in practice.7. Create an action plan for your next steps, evaluate your learning, and access additional resources.Learning Outcomes for Both Days:By the end of this 2-day Introduction to Wound Care course, participants will:1. Develop a solid understanding of the physiology of wound healing, including chronic venous and arterial insufficiency.2. Acquire knowledge about topical medications and emollients commonly used in wound care.3. Familiarize themselves with a range of dressings frequently employed in wound management.4. Recognize the importance of regular wound review and supervised self-management plans.5. Engage in discussions about relevant practice problems and work toward effective solutions.6. Understand the significance of ongoing professional development in wound care practice.

Introduction to Wound Care
Delivered OnlineFlexible Dates
£300

Real Estate Developer (Development Cash Flow Modelling in Excel)

4.3(5)

By Bayfield Training

This course will show delegates how to appraise projects in Excel, incorporate and communicate updates as they happen and ultimately understand how to convert an opportunistic property investment into a core asset that can be sold on.

Real Estate Developer (Development Cash Flow Modelling in Excel)
Delivered in person or Online + more
£1,750

Agile project management (In-House)

By The In House Training Company

Agile project management, already widely used for software development, is increasingly recognised as having much more general application. Continuous improvement programmes, business change projects, new technology development, research and development and a variety of other scenarios characterised by rapid change and high uncertainty can all benefit from an Agile approach. This programme presents the concepts and methods of Agile project management, and shows how to apply them to a range of project and change management situations. Participants will learn: how Agile project management can help with project and change management the 4 values and 12 principles of the Agile 'manifesto' and the range of Agile methodologies how to apply Agile project management methods and techniques in a range of project scenarios alternative Agile project management methods and how they can be applied and adapted what makes Agile project teams succeed the key roles and responsibilities needed to enable Agile project teams to work effectively how to encourage an Agile mindset within their organisation and how to move toward an Agile approach to managing projects 1 Introduction to Agile project management Overview of 'classical' project management and methodologies The link between project success and management performance Limitations of classical approaches and the need for Agile methods The 4 values and 12 principles of the Agile manifesto explained Agile project management values:Individuals and interactions over processes and toolsWorking outputs over comprehensive documentationCustomer collaboration over contract negotiationResponding to change over following a plan The cultural challenges of using Agile project management Choosing when and how to adopt Agile project management 2 Initiating a project using Agile project management Some key Agile methodologies explained: SCRUM, XP, Crystal Identifying and engaging project stakeholders; defining roles and responsibilities Setting the project vision and goals; defining project scope The Agile approach to requirements capture and elicitation of needs Tools and techniques for capturing and characterising requirements The role of documentation, reporting and process management 3 The Agile approach to definition and planning Understanding Agile planning; the 'planning onion' concept Developing the culture needed for collaborative involvement and iterative planning Defining project deliverables; the 'product backlog' concept Tools and techniques for defining and prioritising requirements in Agile projects Understanding and applying Agile estimating techniques Dealing with uncertainty and managing risks 4 The Agile approach to execution and delivery The results orientated, fast adapting culture of Agile teams The monthly 'Sprint' process for project planning and review The disciplines needed for effective daily SCRUM meetings Reviewing progress, managing change and project reporting Testing, completing and handing over of work packages Managing the interface between the project team and the business 5 Leadership and teamwork in Agile project teams Why Agile teams are different: the importance of individuals and interactions The skills and attributes needed to lead an Agile project team The challenges faced and skills needed by Agile team members Recognising team development needs; adopting the right leadership style Making the transition from project manager to Agile coach Key coaching skills explored: mentoring, facilitating, managing conflict

Agile project management (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Essential 5G

5.0(3)

By Systems & Network Training

Essential 5G training course description This course is designed to give delegates an explanation of the technologies and interworking requirements of the next generation of cellular communications. It is not a definitive set of descriptions but a possibility of the final deployment. we will investigate the 10 pillars for 5G which will include various Radio Access Technologies that are required to interwork smoothly. We will look at the 4G Pro features and other RATs. What will you learn List the ten pillars of 5G deployment. Describe the 5G Internet. Explain virtualization and RAT virtulization. Describe Software Defined Networks (SDN). Explain carrier aggregation. Describe the mobile cloud. Explain an overall picture of 5G architecture. Essential 5G training course details Who will benefit: Anyone looking for an understanding of the technologies and interworking requirements of the next generation of cellular communications. Prerequisites: None. Duration 3 days Essential 5G training course contents Drivers for 5G 5G Road Map, 10 Pillars of 5G, evolving RATs, oSON, MTCm, mm-wave, backhaul, EE, new spectrum, spectrum sharing, RAN virtualisation. 4G LTE Advanced MIMO technology in release 8, Downlink & uplink MIMO R8, MIMO technology in LTE advanced, Downlink 8-layer SU-MIMO, Downlink MU-MIMO, Uplink MU-MIMO, Uplink transmit diversity, Coordinated multi-point operation (CoMP), Independent eNB & remote base station configurations, Downlink CoMP. ICIC & eICIC ICIC, Homogeneous to heterogeneous network evolution, Introduction to eICIC, Macro-pico scenario, Macro-femto scenario, Time orthogonal frequencies. Almost Blank Subframe (ABS). Carrier aggregation Component carriers (CC), CC aggregation deployments, Intra-band contiguous solutions, Intra-band non-contiguous solutions, Inter-band non-contiguous solutions, CA bandwidth classes, Aggregated transmission bandwidth configurations (ATBC), Possible carrier aggregation configs. eIMTA TDD UL-DL reconfig. for traffic adaptation, Reconfig. mechanisms, Interference mitigation schemes, Dynamic & flexible resource allocation. 5G architectures 5G in Europe, horizon 2020 framework, 5G infrastructure PPP, METIS project, 5G in North America, academy research, company R&D, 5G specifications. The 5G internet High-level view of Cloud Services, The Internet of Things & context awareness, Network reconfiguration & virtualization support, server proliferation, how VMs fix underutilised server problem, enter the hypervisor, why are VM such a big deal? SDN, evolution of the data centre network, high availability, low latency, scalability, security, cost model explodes, service-oriented API. OpenFlow switches, OpenFlow controllers, how SDN works. The big picture, pulling it all together, why the network had to change, how SDN & NFV tie together. Evolutionary approach to the internet, architectures for distributed mobility management, MEDIEVAL & MEDIVO projects, a clean slate approach, mobility first architecture. VNet, INM, NetInf, ForMux, MEEM. Generic Path (GP) & anchorless mobility (AM), Quality of Service support, network resource provisioning, resourcing inside a network. IntServ, RSVP, DiffServ, CoS. Emerging approach for resource over- provisioning, example use case architecture for scalable resource control scenarios in the 5G internet. Integrating SDN/NFV for efficient resource over-reservation control, control information repository, service admission control policies, network resource provisioning, control enforcement functions, network configurations & operations. Small cells for 5G Average spectral efficiency evolution, WiFi & Femto cells, Capacity limits. Achievable gains with densifications, multi-antenna techniques, small cells. Mobile data demand, approach & methodology, subscriber density and traffic demand projections to 2020. Demand versus capacity, global mobile data traffic increase modelling, country level backhaul traffic projections, Small cell challenges, backhaul, spectrum, automation. Cooperation for next gen wireless networks Diversity & relaying strategies, cooperation & network coding, ARQ & MAC protocols, NCCARQ & PRCSMA packet exchange, Physical layer impact on MAC protocol analysis, NCCARQ overview, PHY layer impact, Case study on NCCARQ. Mobile clouds Mobile cloud, Mobile cloud enablers, mobile user domain, wireless technologies, WWAN WLAN and WPAN range, Bluetooth, IEEE.802.15.4 & software stacks, infrared, near field communications (NFC). Network coding, store & forward vs compute & forward, linear network coding, random linear coding. Security for 5G communications Potential 5G communication systems architectures, Security issues & challenges. Mobile malware attacks targeting the UE, 5G mobile botnets, access networks, attacks on 4G networks, C-RNTI & packet sequence number based UE location tracking, false buffer status reports attacks, message insertion attacks, HeNB attacks, physical attacks, credential attacks, configuration and protocol attacks, attacks on MON, user data & identity attacks, mobile operator's core network, DDoS attacks targeting MON, signalling amplification, HSS saturation, external IP networks.

Essential 5G
Delivered in Internationally or OnlineFlexible Dates
£2,367