• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3380 Management courses in Wetherby delivered Live Online

C)SLO-Certified Security Leadership Officer Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for C - Level Managers IT Managers Cyber Security Personelle Engineers Information Systems Owners ISSO's CISSP Students ISO's Overview Upon completion, the Certified Security Leadership Officer candidate be able to competently take the C)SLO exam. You will be versed in implementing strong security controls and managing an organization with an industry acceptable security posture. Certified Security Leadership Officerÿ course is designed for mid and upper-level managers.ÿ If you are an engineer, this course will increase your knowledge in the leading information system security teams. Plus, the C)SLO will give you an essential understanding of current security issues, best practices, and technology. With this knowledge you will then be prepared to manage the security component of an information technology project. As a Security Leadership Officer, you will be the bridge between cybersecurity and business operations. Course Outline Security Management Risk Management Encryption Information Security Access Control Concepts Incident Handling and Evidence Operations Security Network Security Additional course details: Nexus Humans C)SLO-Certified Security Leadership Officer Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)SLO-Certified Security Leadership Officer Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)SLO-Certified Security Leadership Officer Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

Palo Alto Networks : Cortex XDR 3.2: Investigation and Response (EDU-262)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Cybersecurity analysts and engineers and security operations specialists, as well as administrators and product deployers. Overview Successful completion of this instructor-led course with hands-on lab activities should enable you to: Describe the architecture and components of the Cortex XDR family Use the Cortex XDR management console Create Cortex XDR agent installation packages, endpoint groups, and policies Deploy Cortex XDR agents on endpoints Create and manage exploit and malware prevention profiles Investigate alerts and prioritize them using starring and exclusion policies Tune Security profiles using Cortex XDR exceptions Perform and track response actions in the Action Center Perform basic troubleshooting related to Cortex XDR agents Deploy a Broker VM and activate the Local Agents Settings applet Understand Cortex XDR deployment concepts and activation requirements Work with the Customer Support Portal and Cortex XDR Gateway for authentication and authorization This instructor-led training enables you to prevent attacks on your endpoints. After an overview of the Cortex XDR components, the training introduces the Cortex XDR management console and demonstrates how to install agents on your endpoints and how to create Security profiles and policies. The training enables you to perform and track response actions, tune profiles, and work with Cortex XDR alerts. The training concludes with discussions about basic troubleshooting of the agent, the on-premises Broker VM component, and Cortex XDR deployment. Course Outline This class is comprised of the following modules: Module 1 - Cortex XDR Family Overview Module 2 - Cortex XDR Main Components Module 3 - Cortex XDR Mangement Components Module 4 - Profiles and Policy Rules Module 5 - Malware Protection Module 6 - Exploit Protection Module 7 - Cortex XDR Alerts Module 8 - Tuning Policies using Exceptions Module 9 - - Response Actions Module 10 - Basic Agent Troubleshooting Module 11 - Broker VM Overview Module 12 - Deployment Consideration

Palo Alto Networks : Cortex XDR 3.2: Investigation and Response (EDU-262)
Delivered OnlineFlexible Dates
Price on Enquiry

Warehouse Safety

By NextGen Learning

Warehouse Safety Course Overview: This Warehouse Safety course is designed to equip learners with essential knowledge and skills for ensuring safety in warehouse environments. The course covers critical safety practices, identifying hazards, managing risks, and applying appropriate health and safety measures to maintain a safe workplace. Learners will gain a comprehensive understanding of warehouse safety protocols, including safe handling of materials, equipment usage, and site safety. By the end of the course, learners will be well-prepared to implement safety standards and reduce risks, ensuring compliance with industry regulations and creating safer working conditions in warehouses. Course Description: The course delves into the key aspects of warehouse safety, focusing on managing health and safety risks, identifying hazards, and complying with regulatory standards. Topics include an introduction to warehouse safety, health and safety management systems, common warehouse hazards, manual and mechanical handling, and site-specific safety requirements. Learners will explore best practices for creating a safe warehouse environment, from proper handling techniques to ensuring equipment is used safely. The course is structured to foster a deep understanding of warehouse safety protocols, with content delivered through clear, accessible modules designed to support learners in applying these practices effectively. Upon completion, learners will be equipped to contribute to safer, more efficient warehouse operations. Warehouse Safety Curriculum: Module 01: The Role of Warehouse Module 02: Introduction to Warehouse Safety Module 03: Health and Safety Management in Warehouses Module 04: General Warehouse Hazards Module 05: Manual and Mechanical Handling Module 06: Site Safety (See full curriculum) Who is this course for? Individuals seeking to enhance their warehouse safety knowledge. Professionals aiming to improve safety practices in warehouse operations. Beginners with an interest in warehouse safety and risk management. Warehouse staff and supervisors looking to update their safety skills. Career Path: Warehouse Safety Officer Health and Safety Manager Warehouse Supervisor Logistics Coordinator Risk Management Consultant Warehouse Operations Manager

Warehouse Safety
Delivered OnlineFlexible Dates
£7.99

Legal Secretary and Office Skills Diploma

By NextGen Learning

Legal Secretary and Office Skills Diploma Course Overview The Legal Secretary and Office Skills Diploma is a comprehensive course designed for those aiming to pursue a career as a legal secretary or administrative professional. This course covers a wide range of essential office skills and legal secretarial duties, offering a strong foundation in the tools and techniques needed to succeed in the office environment. Learners will gain proficiency in Microsoft Office tools, including Word, PowerPoint, Outlook, and Excel, as well as essential knowledge of legal office practices. Upon completion, learners will be well-equipped to manage office operations, handle legal documentation, and assist with legal professionals' administrative tasks, enhancing their career prospects in both the legal and administrative fields. Course Description This diploma provides a structured learning experience, covering essential topics such as legal secretary duties, and Microsoft Office tools, including Word, PowerPoint, Outlook, and Excel. Learners will explore essential office management techniques, including document preparation, managing correspondence, organising meetings, and understanding legal terminology. The course also introduces top Excel keyboard shortcuts to boost efficiency in document management and office tasks. As learners progress through the modules, they will gain key skills required to assist legal teams in their day-to-day operations. The course is designed for those looking to enter the legal, administrative, or office management fields and offers in-depth exposure to both the technical and professional skills that employers seek. Legal Secretary and Office Skills Diploma Curriculum Module 01: Legal Secretary Module 02: Microsoft Word Essentials Module 03: Microsoft PowerPoint Essentials Module 04: Microsoft Outlook Essentials Module 05: Microsoft Excel - Top 50 Keyboard Shortcuts (See full curriculum) Who is this course for? Individuals seeking to become proficient in legal secretary and office management roles. Professionals aiming to advance in administrative careers within the legal sector. Beginners with an interest in learning essential office skills and legal office practices. Those who wish to work in law firms or corporate legal departments. Career Path Legal Secretary Office Administrator Executive Assistant Paralegal Administrative Assistant in Law Firms Office Manager in Corporate Settings

Legal Secretary and Office Skills Diploma
Delivered OnlineFlexible Dates
£7.99

PMI Agile Certified Practitioner (PMI-ACP)® Exam Preparation Course

By NextGen Learning

PMI Agile Certified Practitioner (PMI-ACP)® Exam Preparation Course Course Overview The PMI Agile Certified Practitioner (PMI-ACP)® Exam Preparation Course is designed to provide learners with the essential knowledge and tools to successfully prepare for the PMI-ACP® exam. This course focuses on the core concepts of agile methodologies, including Scrum, Kanban, Lean, and XP. Learners will engage with real-world scenarios and case studies to deepen their understanding of agile practices and principles. By completing this course, learners will develop the competencies required to become agile practitioners, improve project delivery, and excel in the PMI-ACP® certification exam. Course Description This course is specifically tailored to help learners grasp agile project management principles and pass the PMI-ACP® exam. It covers a wide range of topics, including agile frameworks, value-driven delivery, stakeholder engagement, adaptive planning, and continuous improvement. Learners will explore various agile approaches, methodologies, and tools, with a strong focus on team collaboration and delivering high-quality results. The course includes interactive lessons, quizzes, and self-assessment opportunities, ensuring a thorough understanding of the subject. Upon completion, learners will gain the confidence and expertise necessary to apply agile practices and pass the PMI-ACP® exam, enhancing their professional credentials in the field of agile project management. PMI Agile Certified Practitioner (PMI-ACP)® Exam Preparation Course Curriculum Module 01: Module 02: Module 03: Module 04: Module 05: Module 06: Module 07: Module 08: Module 09: (See full curriculum) Who is this course for? Individuals seeking to pass the PMI-ACP® exam and gain certification. Professionals aiming to advance their career in agile project management. Beginners with an interest in learning agile practices and methodologies. Project managers and team leaders seeking to enhance their agile knowledge. Career Path Agile Project Manager Scrum Master Agile Coach Project Management Consultant Agile Team Leader PMI-ACP® Certified Practitioner

PMI Agile Certified Practitioner (PMI-ACP)® Exam Preparation Course
Delivered OnlineFlexible Dates
£7.99

Safe Handling of Medicines

By NextGen Learning

Safe Handling of Medicines Course Overview: The "Safe Handling of Medicines" course provides learners with a comprehensive understanding of the legal, professional, and safety considerations involved in handling medications. This course covers essential topics such as legislation, safe administration practices, patient involvement, and the safe handling of hazardous drugs. By the end of the course, learners will gain the knowledge required to manage medication in a safe and efficient manner while ensuring compliance with UK regulations. The course is designed to equip learners with the skills necessary to contribute to safer healthcare practices and improve medication management in various settings. Course Description: This course dives into the core aspects of safe medicine handling, exploring key principles such as medication management, storage, disposal, and the importance of communication in ensuring safety. Learners will explore legislation and licensing requirements, alongside strategies for administering medications safely, including the handling of hazardous substances. They will also gain insights into the role of patient involvement in medication safety and learn about the audit process and record-keeping. Additionally, learners will review how medication use was managed during the COVID-19 pandemic. Upon completion, participants will be well-prepared to implement safe medication practices in a variety of healthcare environments while ensuring regulatory compliance. Safe Handling of Medicines Curriculum: Module 01: Introduction to Medicines Module 02: Legislation and Licensing Module 03: Key Principles of Medication Management Module 04: Professional Communication and Medication Safety Module 05: Safe Administration of Medicines Module 06: Patient Involvement in Medication Safety Module 07: Storage, Supply and Disposal of Medication Module 08: Safe Handling of Hazardous Drugs Module 09: Record-Keeping and Audit Process Module 10: The Safe Use of Medication during the COVID-19 Pandemic (See full curriculum) Who is this course for? Individuals seeking to enhance their knowledge in medication safety. Professionals aiming to advance in healthcare settings or roles. Beginners with an interest in healthcare and medication management. Healthcare workers responsible for medication administration. Career Path: Healthcare Assistant Pharmacy Technician Medication Safety Officer Clinical Pharmacist Healthcare Administrator Medical Records Specialist

Safe Handling of Medicines
Delivered OnlineFlexible Dates
£7.99

xVA - Counterparty Risk, Collateral, Funding and Capital in Derivatives

5.0(5)

By Finex Learning

Overview Understand the role of corporate structure, dividends and equity indices in equity markets. Become familiar with the building blocks of repos / stock lending, futures and forwards – and how to use these products. Understand how to price, and risk manage equity swaps and dividend swaps. Gain experience in their uses in trading, corporate finance and portfolio management. Learn how to price equity options and the features that make them different from other asset classes, explore how to use these products for taking equity risk, yield enhancement and portfolio protection. Understand strategies designed to trade / hedge volatility using options. Who the course is for Risk management Finance Sales and trading Treasury Technology Financial Engineering Course Content To learn more about the day by day course content please click here To learn more about schedule, pricing & delivery options, book a meeting with a course specialist now

xVA - Counterparty Risk, Collateral, Funding and Capital in Derivatives
Delivered in Internationally or OnlineFlexible Dates
Price on Enquiry

Financial Engineering Courses - 8 Courses Bundle

By NextGen Learning

Course Overview The Financial Engineering Courses – 8 Courses Bundle is a comprehensive training package designed to equip learners with a robust understanding of the mathematical, statistical, and analytical foundations of modern finance. This bundle merges core financial theories with quantitative models to support strategic financial decision-making. Learners will explore concepts ranging from derivatives pricing and risk modelling to portfolio optimisation and stochastic processes, gaining a solid foundation in the methodologies used in financial institutions and investment firms. By the end of the course, participants will be able to interpret financial models, assess risk frameworks, and contribute effectively to quantitative analysis roles. This course is particularly valuable for those aiming to strengthen their understanding of finance through an analytical lens, aligning with roles in investment banking, financial consultancy, or quantitative research. Course Description This course bundle offers eight interconnected modules covering a wide array of financial engineering topics. Learners will be introduced to financial mathematics, stochastic calculus, fixed income securities, options pricing, quantitative risk management, and algorithmic trading strategies. The programme provides an in-depth look into the mechanics of financial markets and the computational tools that underpin asset valuation and portfolio structuring. Through clear instruction and structured content, learners will build confidence in applying quantitative techniques and economic theory to real-world financial challenges. Emphasis is placed on theoretical rigour, analytical accuracy, and strategic application. Ideal for learners with a background or interest in finance, mathematics, or economics, this course supports a deeper understanding of financial markets and prepares participants for roles that require data-driven financial modelling and risk assessment skills. Course Modules Module 01: Introduction to Financial Engineering Module 02: Financial Mathematics and Modelling Techniques Module 03: Fixed Income Securities and Yield Curves Module 04: Derivatives and Options Pricing Theory Module 05: Quantitative Risk Management Fundamentals Module 06: Stochastic Processes in Finance Module 07: Portfolio Theory and Investment Analysis Module 08: Algorithmic and Computational Finance (See full curriculum) Bundle Instructions Access all eight courses through a single enrolment. Courses are self-paced and available online 24/7. Learners receive a certificate for each completed module. Support is available throughout the learning journey. Who is this course for? Individuals seeking to build a strong foundation in quantitative finance. Professionals aiming to advance their knowledge in financial modelling and analysis. Beginners with an interest in finance, mathematics, or data-driven investment theory. Graduates or career changers targeting roles in banking, analytics, or asset management. Career Path Quantitative Analyst Financial Risk Manager Investment Banking Analyst Asset or Portfolio Manager Financial Modelling Consultant Data Analyst in Financial Services Derivatives Pricing Specialist Economic Research Associate

Financial Engineering Courses - 8 Courses Bundle
Delivered OnlineFlexible Dates
£9.99

Dog Behaviour and Training

By NextGen Learning

Course Overview The Dog Behaviour and Training course offers a comprehensive insight into canine psychology, behaviour management, and effective training techniques. Designed to build confidence and understanding, this course equips learners with the knowledge needed to address common dog behaviours and establish positive habits. Through focused modules, participants will develop skills in interpreting dog body language, managing feeding behaviours, addressing separation anxiety, and conducting training consultations. Whether supporting pet owners or advancing towards a professional role, learners will emerge with the ability to apply behavioural theories and strategies in real-world settings. By the end of the course, participants will understand how to create positive environments for dogs and promote lasting behavioural change, making them valuable assets in both domestic and professional contexts. Course Description The Dog Behaviour and Training course delves into the fascinating world of canine behaviour, offering learners a structured exploration of topics such as food aggression, appropriate greeting methods, and separation anxiety management. Learners will gain insights into interpreting dog communication signals, answering common client questions, and guiding puppy development. The course also covers consultation practices, preparing participants to engage confidently with dog owners seeking advice. Designed to foster a deep understanding of behavioural patterns, the curriculum blends theoretical frameworks with real-world applications, ensuring that learners develop a well-rounded skill set. By completing this course, individuals will strengthen their ability to assess behavioural issues, recommend appropriate training strategies, and support the welfare and development of dogs across various settings. Course Modules Module 01: Introduction Module 02: Feeding Time - Aggression and Stealing Food Module 03: The Right Way to Greet a Dog Module 04: Separation Anxiety Module 05: Dog Language - What They're Really Saying! Module 06: The Answers To 10 Popular Dog Questions You Are Likely To Be Asked Module 07: The Answers To 10 Common Puppy Training Questions That You'll Likely To Be Asked Module 08: Dog Training Consultations With Clients (See full curriculum) Who is this course for? Individuals seeking to build a deeper understanding of dog behaviour and training techniques. Professionals aiming to expand their expertise in animal behaviour consultancy or dog training services. Beginners with an interest in canine psychology and behaviour management. Dog owners wishing to enhance their relationships and communication with their pets. Animal care workers looking to broaden their knowledge for career development. Career Path Dog Behaviour Specialist Dog Trainer Animal Welfare Officer Veterinary Assistant (Behaviour Support Role) Pet Care Consultant Animal Shelter Worker Behavioural Advisor in Animal Charities

Dog Behaviour and Training
Delivered OnlineFlexible Dates
£9.99