Brain Injury Rehabilitation Course Overview This "Brain Injury Rehabilitation" course provides an in-depth exploration of the human brain, its functions, and the impact of brain injuries. It covers a broad range of topics, including concussion, acquired brain injuries, and injuries resulting from sports. Learners will gain a comprehensive understanding of brain injury prevention, recovery, and rehabilitation processes. Designed to equip individuals with valuable knowledge, this course is essential for anyone aiming to understand brain health, and it provides key insights into how to support individuals recovering from brain injuries. Upon completion, learners will be well-equipped to engage in roles where brain injury management and rehabilitation are crucial. Course Description The course delves into various types of brain injuries, including concussions, acquired brain injuries, and sports-related brain trauma. It provides a detailed understanding of the human brain, the causes and effects of different brain injuries, and key rehabilitation strategies. Throughout the course, learners will explore prevention techniques and rehabilitation approaches, gaining essential skills to support brain injury recovery. The learning experience is designed to be informative and insightful, ensuring that participants can apply their knowledge to improve patient care and rehabilitation outcomes in clinical or supportive environments. By the end of the course, learners will be equipped with a robust understanding of brain injury rehabilitation and how to effectively contribute to the recovery process. Brain Injury Rehabilitation Curriculum Module 01: Understanding Human Brain and Related Injuries Module 02: Overview of Brain Concussion Module 03: All About Acquired Brain Injury Module 04: Brain Injuries Due to Sports Module 05: Prevention of Injury Module 06: Recovery and Rehabilitation (See full curriculum) Who is this course for? Individuals seeking to understand brain health and rehabilitation Professionals aiming to specialise in brain injury recovery Beginners with an interest in neuroscience or healthcare Healthcare workers wishing to enhance their knowledge in rehabilitation Career Path Rehabilitation Specialist Brain Injury Support Worker Sports Medicine Professional Neurological Rehabilitation Therapist Healthcare Practitioner specialising in Brain Injury Recovery
How to Become a Video Editor Course Overview: This course offers a comprehensive introduction to the world of video editing, providing learners with the knowledge and skills necessary to produce high-quality videos. Covering the fundamentals of editing software, video production techniques, and the creative aspects of storytelling, the course is designed for those looking to enter the video editing industry or enhance their existing skills. Learners will gain a solid understanding of the video editing process, including cutting, sequencing, colour correction, and audio management, enabling them to produce professional-level content. By the end of the course, participants will have the confidence and ability to create polished, engaging videos for various platforms, from social media to professional production environments. Course Description: In this course, learners will delve into the essential tools and techniques used by video editors, focusing on software such as Adobe Premiere Pro and Final Cut Pro. The course covers everything from basic editing techniques to more advanced concepts like motion graphics and video transitions. Learners will also explore key areas such as colour grading, sound design, and video rendering, all of which are crucial for creating visually appealing and cohesive videos. The learning experience is structured to provide clear guidance, allowing learners to develop their technical skills and creative abilities. By the end of the course, participants will be capable of producing polished video projects ready for distribution, with a thorough understanding of editing workflows and industry standards. How to Become a Video Editor Curriculum: Module 01: Introduction Module 02: Course Module 03: Class Project (See full curriculum) Who is this course for? Individuals seeking to develop video editing skills Professionals aiming to enhance their content creation abilities Beginners with an interest in the video production industry Anyone looking to transition into a creative media role Career Path: Video Editor Content Creator Motion Graphics Designer Film and Television Production Assistant Social Media Content Specialist
Translation: Freelance Translator Course Overview This course is designed to provide learners with a comprehensive understanding of freelance translation, from foundational concepts to professional practices. Participants will gain valuable insights into the world of freelancing, covering topics such as client acquisition, project management, and professional ethics. By the end of the course, learners will be equipped with the essential knowledge and skills to start and sustain a successful freelance translation career, ensuring they are well-prepared for the challenges of the industry. Course Description In this course, learners will explore the fundamental aspects of freelance translation, including an introduction to the industry, the roles and responsibilities of a freelance translator, and how to navigate the complexities of freelancing. Topics include setting up a home office, using computer-assisted translation (CAT) tools, marketing services, managing client relationships, and ensuring translation quality. Learners will also delve into the financial aspects of freelancing, including setting rates, invoicing, and getting paid for work. By the end of the course, participants will be well-equipped to start their own freelance translation business and build a sustainable career. Translation: Freelance Translator Curriculum Module 01: An Overview of Translation Module 02: Introduction to Freelancing Module 03: Introduction to Freelance Translator Module 04: Activities Before Getting Started Module 05: Finding Clients Module 06: Managing the Work Module 07: Marketing Module 08: CAT Tools in Translation Module 09: Getting Paid for The Work Module 10: Setting Up Home Office Module 11: Professional Ethics of Freelance Translators Module 12: Ensuring Quality (See full curriculum) Who is this course for? Individuals seeking to start a career in freelance translation. Professionals aiming to transition into freelancing or broaden their skillset. Beginners with an interest in translation and the freelancing industry. Anyone interested in developing the skills to work independently as a translator. Career Path Freelance Translator Translation Project Manager Language Specialist for Agencies Freelance Proofreader/Editor Content Localisation Expert
CBT for Abandonment Anxiety Course Overview: This course on CBT for Abandonment Anxiety explores the core principles of Cognitive Behavioural Therapy (CBT) as a tool for addressing abandonment anxiety. The programme is designed to provide learners with a comprehensive understanding of how CBT techniques can help individuals overcome fears related to abandonment, fostering emotional resilience and healthier relationships. Learners will gain insight into the underlying causes of abandonment anxiety, alongside methods for managing emotional distress, improving self-esteem, and building secure attachments. By completing this course, participants will be equipped to apply CBT strategies in both personal and professional settings, enhancing their ability to support others struggling with similar issues. Course Description: This course covers key topics such as the psychology behind abandonment anxiety, common behavioural patterns, and the role of cognitive distortions. Learners will delve into specific CBT techniques such as cognitive restructuring, exposure therapy, and emotion regulation strategies. Through structured learning, participants will explore how to identify and challenge irrational thoughts, manage emotional responses, and develop healthier relationship dynamics. Throughout the course, learners will also examine real-world case studies to better understand how CBT is applied to address abandonment anxiety. By the end of the course, learners will have gained valuable skills to manage anxiety and build lasting emotional resilience. CBT for Abandonment Anxiety Curriculum: Module 01: Introduction to Abandonment Anxiety Module 02: Understanding Cognitive Behavioural Therapy (CBT) Module 03: Cognitive Restructuring for Abandonment Anxiety Module 04: Exposure Therapy Techniques Module 05: Emotion Regulation and Mindfulness Module 06: Building Secure Attachments Module 07: CBT in Practice: Case Studies and Applications (See full curriculum) Who is this course for? Individuals seeking to manage abandonment anxiety Professionals aiming to enhance therapeutic skills in CBT Beginners with an interest in mental health and anxiety management Therapists looking to deepen their knowledge of CBT applications Career Path Cognitive Behavioural Therapist Mental Health Counsellor Clinical Psychologist Therapeutic Support Worker Anxiety Specialist in Healthcare
Duration 3 Days 18 CPD hours This course is intended for Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks. Overview Deploy the appropriate operation mode for your network. Use the GUI and CLI for administration. Identify the characteristics of the Fortinet security fabric. Control network access to configured networks using firewall policies. Apply port forwarding, source NAT, and destination NAT. Authenticate users using firewall policies. Understand encryption functions and certificates. Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies. Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites. Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports. Fight hacking and denial of service (DoS). Defend against data leaks by identifying files with sensitive data, and block them from leaving your private network. Offer an SSL VPN for secure access to your private network. Implement a dial-up IPsec VPN tunnel between FortiGate and FortiClient. Collect and interpret log entries. In this three-day course, you will learn how to use basic FortiGate features, including security profiles. Course Outline Module 1. Introduction to FortiGate and the Security Fabric Module 2. Firewall Policies Module 3. Network Address Translation (NAT) Module 4. Firewall Authentication Module 5. Logging and Monitoring Module 6. Certificate Operations Module 7. Web Filtering Module 8. Application Control Module 9. Antivirus Module 10. Intrusion Prevention and Denial of Service Module 11. SSL VPN Module 12. Dial-Up IPsec VPN Module 13. Data Leak Prevention (DLP)
Duration 2 Days 12 CPD hours This course is intended for SAP professionals Overview Explain the motivation and need for a next generation business suite and how SAP S/4HANA enables a digital organizationDescribe the SAP S/4HANA business and technical architectureGain basic knowledge about SAP Activate to accelerate SAP S/4HANA adoptionExplain how SAP S/4HANA supports the business users with a new user experience (e.g.: SAP Fiori UX)Describe key business processes of SAP S/4HANA Enterprise ManagementExplain SAP S/4HANA embedded analytics capabilitiesGain basic knowledge about SAP S/4HANA LoB solutions and add-on supportDescribe integration scenarios between SAP S/4HANA and SAP Cloud solutions In this course, students learn a broad range of topics including the motivation behind the development of SAP S/4HANA. Course Outline Introduction to SAP S/4HANA SAP S/4HANA user experience SAP HANA powers SAP S/4HANA SAP Activate for SAP S/4HANA SAP S/4HANA Enterprise Management, LoB solutions and add-ons SAP S/4HANA embedded analytics Integration between SAP S/4HANA Core and SAP Cloud solutions Additional course details: Nexus Humans S4H01 SAP Business Suite to SAP S/4HANA Delta training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the S4H01 SAP Business Suite to SAP S/4HANA Delta course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
KYC, AML, & GDPR Training Course Overview This KYC, AML, and GDPR Training course offers a comprehensive introduction to the regulatory frameworks governing financial institutions and businesses. Learners will gain in-depth knowledge of Know Your Customer (KYC) protocols, Anti-Money Laundering (AML) procedures, and GDPR compliance, understanding their importance in maintaining legal and ethical business operations. The course equips professionals with the necessary skills to navigate the regulatory landscape, safeguard businesses against financial crime, and ensure compliance with data privacy laws. By the end of the course, learners will be well-prepared to apply their knowledge in real-world business environments, contributing to secure and compliant operations. Course Description This course delves into the key principles of KYC, AML, and GDPR, exploring their relevance across different industries. Learners will understand the processes involved in customer due diligence, how to identify and prevent money laundering, and how businesses must comply with data privacy regulations. The course provides a structured learning experience, focusing on the practical application of compliance measures, exploring case studies, and providing insights into current and future trends in the industry. Upon completion, participants will possess the expertise to implement these regulations within their organisations, mitigate risks, and contribute to a culture of compliance. KYC, AML, & GDPR Training Curriculum Module 01: Introduction to KYC Module 02: Customer Due Diligence Module 03: AML (Anti-Money Laundering) Module 04: KYC, AML, and Data Privacy Regulations for Business Operations in the United Kingdom Module 05: Regulations to be Complied by Industries Module 06: Methods for Carrying out KYC and AML and the Future of KYC Compliance (See full curriculum) Who is this course for? Individuals seeking to understand financial regulations and compliance. Professionals aiming to develop their knowledge of KYC, AML, and GDPR in their career. Beginners with an interest in the financial services or regulatory compliance industry. Business owners or managers who want to ensure their organisation’s compliance. Career Path Compliance Officer Anti-Money Laundering Specialist KYC Analyst Data Protection Officer Regulatory Compliance Consultant Risk Management Professional
Duration 3 Days 18 CPD hours This course is intended for This course is designed for IoT practitioners who are looking to improve their skills and knowledge of IoT security and privacy. This course is also designed for students who are seeking the CertNexus Certified Internet of Things Security Practitioner (CIoTSP) certification and who want to prepare for Exam ITS-110. Overview This program will validate that the candidate has the knowledge, skills, and abilities to secure network environments for IoT devices, analyze vulnerabilities and determine reasonable controls against threats, and effectively monitor IoT devices and respond to incidents. This course is designed for practitioners who are seeking to demonstrate a vendor-neutral, cross-industry skill set that will enable them to design, implement, operate, and/or manage a secure IoT ecosystem. Managing IoT Risks Map the IoT Attack Surface Build in Security by Design Securing Web and Cloud Interfaces Identify Threats to IoT Web and Cloud Interfaces Prevent Injection Flaws Prevent Session Management Flaws Prevent Cross-Site Scripting Flaws Prevent Cross-Site Request Forgery Flaws Prevent Unvalidated Redirects and Forwards Securing Data Use Cryptography Appropriately Protect Data in Motion Protect Data at Rest Protect Data in Use Controlling Access to IoT Resources Identify the Need to Protect IoT Implement Secure Authentication Implement Secure Authorization Implement Security Monitoring on IoT Systems Securing IoT Networks Ensure the Security of IP Networks Ensure the Security of Wireless Networks Ensure the Security of Mobile Networks Ensure the Security of IoT Edge Networks Ensuring Privacy Improve Data Collection to Reduce Privacy Concerns Protect Sensitive Data Dispose of Sensitive Data Managing Software and Firmware Risks Manage General Software Risks Manage Risks Related to Software Installation and Configuration Manage Risks Related to Software Patches and Updates Manage Risks Related to IoT Device Operating Systems and Firmware Promoting Physical Security Protect Local Memory and Storage Prevent Physical Port Access
Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more. Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface References Comparing Cisco WSA Models Comparing Cisco SMA Models Overview of Connect, Install, and Configure Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks Connecting to the Cisco Web Security Virtual Appliance Enabling Layer 4 Traffic Monitor (L4TM) Accessing and Running the System Setup Wizard Reconnecting to the Cisco Web Security Appliance High Availability Overview Hardware Redundancy Introducing Common Address Redundancy Protocol (CARP) Configuring Failover Groups for High Availability Feature Comparison Across Traffic Redirection Options Architecture Scenarios When Deploying Cisco AnyConnect© Secure Mobility Additional course details: Nexus Humans SWSA v3.0-Securing the Web with Cisco Web Security Appliance training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SWSA v3.0-Securing the Web with Cisco Web Security Appliance course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.