• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

25831 Management courses in Huntingdon delivered Online

Professional Certificate Course in Navigating Social Vulnerability in Social Work Practice in London 2024

4.9(261)

By Metropolitan School of Business & Management UK

Embark on a transformative journey in social work with "Navigating Social Vulnerability." This course delves deep into understanding, identifying, and assessing vulnerabilities at various levels-individual, family, and community. Through a comprehensive exploration of situational, environmental, and intersecting factors, you will gain the skills to evaluate and apply holistic social work approaches. The course emphasizes Person-in-Environment (PIE) and ecological perspective theories to equip you with a nuanced understanding of social vulnerability. Embark on a transformative journey with the course "Navigating Social Vulnerability in Social Work Practice." This comprehensive program delves into the intricate dynamics of social vulnerability, offering a nuanced understanding of its various levels and manifestations. After the successful completion of this course, you will be able to: Define Social Vulnerability. Identify factors contributing to Community-Level Social Vulnerability. Recognize indicators of Individual-Level Social Vulnerability. Assess Family-Level Social Vulnerabilities and Strengths. Analyze how attributes intersect with vulnerabilities and strengths in clients' lives. Evaluate the impact of Situational and Environmental factors. Apply holistic social work approaches using Person-in-Environment (PIE) and ecological perspective theories. "Navigating Social Vulnerability in Social Work Practice" empowers you to understand, assess, and address vulnerability at various levels. From community factors to individual strengths, the course equips you with holistic approaches, making you adept at creating positive change in the lives of those you serve. Course Structure and Assessment Guidelines Watch this video to gain further insight. Navigating the MSBM Study Portal Watch this video to gain further insight. Interacting with Lectures/Learning Components Watch this video to gain further insight. Navigating Social Vulnerability in Social Work Practice Self-paced pre-recorded learning content on this topic. Navigating Social Vulnerability in Social Work Practice Put your knowledge to the test with this quiz. Read each question carefully and choose the response that you feel is correct. All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course. The certificate is designed to enhance the learner's knowledge in the field. This certificate is for everyone eager to know more and get updated on current ideas in their respective field. We recommend this certificate for the following audience. Vulnerability Assessment Specialist Community Resilience Advocate Individual and Family Support Coordinator Social Intersection Analyst Situational and Environmental Impact Evaluator Holistic Social Worker PIE Theorist Ecological Perspective Practitioner Average Completion Time 2 Weeks Accreditation 3 CPD Hours Level Advanced Start Time Anytime 100% Online Study online with ease. Unlimited Access 24/7 unlimited access with pre-recorded lectures. Low Fees Our fees are low and easy to pay online.

Professional Certificate Course in Navigating Social Vulnerability in Social Work Practice in London 2024
Delivered Online On Demand14 days
£29

Digital Marketing - Facebook and Instagram Advertising (Masterclass)

By St. Paul's College

This comprehensive digital marketing bundle course empowers you to unlock the potential of various online marketing channels. You'll explore the fundamentals of website creation, email marketing, and video marketing, providing a strong foundation for building an online presence. Delving deeper, you'll master the art of social media advertising, focusing on the two powerhouses - Facebook Ads and Instagram Ads.

Digital Marketing - Facebook and Instagram Advertising (Masterclass)
Delivered Online On Demand23 hours
£14.99

Writing Short Story and Character Creation Diploma

4.8(9)

By Skill Up

Craft compelling narratives with our Writing Short Story and Character Creation Diploma. Unleash your creativity and master the art of storytelling.

Writing Short Story and Character Creation Diploma
Delivered Online On Demand2 hours
£13.99

CertNexus Incident Response for Business Professionals (IRBIZ)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed primarily for IT leaders and company executives who are responsible for complying with incident response legislation. This course focuses on the knowledge, resources, and skills necessary to comply with incident response, and incident handling process requirements. Overview In this course, you will understand, assess and respond to security threats and operate a system and network security analysis platform. You will: Explain the importance of best practices in preparation for incident response Given a scenario, execute incident response process Explain general mitigation methods and devices Assess and comply with current incident response requirements. This course covers incident response methods and procedures are taught in alignment with industry frameworks such as US-CERT?s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with managing compliance with state legislation and other regulatory requirements regarding incident response, and for executing standardized responses to such incidents. The course introduces procedures and resources to comply with legislative requirements regarding incident response. This course is designed to assist students in preparing for the CertNexus Incident Responder Credential (CIR-110). What you learn and practice in this course can be a significant part of your preparation. Assessment of Information Security Risks The Importance of Risk Management Integrating Documentation into Risk Management Response to Cybersecurity Incidents Deployment of Incident Handling and Response Architecture Containment and Mitigation of Incidents Preparation for Forensic Investigation as a CSIRT Investigating Cybersecurity Incidents Use a Forensic Investigation Plan Securely Collect and Analyze Electronic Evidence Follow Up on the Results of an Investigation Complying with Legislation Examples of Legislation (if this is covered in above topics, no need to include here) GDPR, HIPPA, Elections Case study: Incident Response and GDPR (Using GDPR legislation, create a response that is compliant with it ? this could be discussion-based activity as well.) State Legislation Resources and Example Search terms to find state legislation Using NYS as example use the NYS Privacy Response act or other legislation to create a similar case study as previous. Provide answers on when to use federal versus state and do you have to follow both?

CertNexus Incident Response for Business Professionals (IRBIZ)
Delivered OnlineFlexible Dates
Price on Enquiry

Pathological Demand Avoidance

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step

Pathological Demand Avoidance
Delivered Online On Demand1 hour 35 minutes
£25

Understanding and Preventing the Bystander Effect

5.0(1)

By Enspark

Discover the pivotal role of bystanders in addressing and preventing inappropriate behavior, bullying, harassment, and discrimination in the workplace. Recognize the significance of fostering workplace civility by acknowledging the damaging consequences of the bystander effect and acquire proactive strategies to cultivate a safer and more inclusive work environment. By identifying behaviors that contribute to workplace issues and taking on the role of active bystanders, individuals will develop the skills necessary to promote positive workplace norms and provide support to those impacted by inappropriate behavior. Learning Objectives Analyze the importance of workplace civility and its impact on employee well-being and team dynamics, emphasizing the role of bystanders in creating a safe and productive work environment.;Evaluate the steps to avoid the bystander effect, from interrupting problematic behavior to reporting incidents, fostering a culture where inappropriate behavior is not tolerated, and understanding the snowball effect of collective action.;Apply proactive strategies to prevent and address inappropriate behavior, harassment, and discrimination by becoming active bystanders, including recognizing unacceptable behaviors and supporting colleagues affected by them.

Understanding and Preventing the Bystander Effect
Delivered Online On Demand12 minutes
£9.95

Fraud Detection, Mitigation & Prevention

By Course Cloud

Discover the exciting area of fraud detection, mitigation, and prevention with our engaging online course, designed for tomorrow's digital defenders.

Fraud Detection, Mitigation & Prevention
Delivered Online On Demand1 hour 30 minutes
£5.99

Acceptance and Commitment Therapy (ACT) - ACCREDITED CERT

By SkillWise

Overview Uplift Your Career & Skill Up to Your Dream Job - Learning Simplified From Home! Kickstart your career & boost your employability by helping you discover your skills, talents, and interests with our special Acceptance and Commitment Therapy (ACT) - ACCREDITED CERT Course. You'll create a pathway to your ideal job as this course is designed to uplift your career in the relevant industry. It provides the professional training that employers are looking for in today's workplaces. The Acceptance and Commitment Therapy (ACT) - ACCREDITED CERT Course is one of the most prestigious training offered at Skillwise and is highly valued by employers for good reason. This Acceptance and Commitment Therapy (ACT) - ACCREDITED CERT Course has been designed by industry experts to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Acceptance and Commitment Therapy (ACT) - ACCREDITED CERT Course, like every one of Skillwise's courses, is meticulously developed and well-researched. Every one of the topics is divided into elementary modules, allowing our students to grasp each lesson quickly. At Skillwise, we don't just offer courses; we also provide a valuable teaching process. When you buy a course from Skillwise, you get unlimited Lifetime access with 24/7 dedicated tutor support. Why buy this Acceptance and Commitment Therapy (ACT) - ACCREDITED CERT ? Lifetime access to the course forever Digital Certificate, Transcript, and student ID are all included in the price Absolutely no hidden fees Directly receive CPD Quality Standard-accredited qualifications after course completion Receive one-to-one assistance every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Acceptance and Commitment Therapy (ACT) - ACCREDITED CERT there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the PDF certificate for free. Original Hard Copy certificates need to be ordered at an additional cost of £8. Who is this course for? This Acceptance and Commitment Therapy (ACT) - ACCREDITED CERT course is ideal for Students Recent graduates Job Seekers Anyone interested in this topic People already work in relevant fields and want to polish their knowledge and skills. Prerequisites This Acceptance and Commitment Therapy (ACT) - ACCREDITED CERT does not require you to have any prior qualifications or experience. You can just enrol and start learning. This Acceptance and Commitment Therapy (ACT) - ACCREDITED CERT was made by professionals and it is compatible with all PCs, Macs, tablets, and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path As this course comes with multiple courses included as a bonus, you will be able to pursue multiple occupations. This Acceptance and Commitment Therapy (ACT) - ACCREDITED CERT is a great way for you to gain multiple skills from the comfort of your home. Module 1 Understanding Acceptance and Commitment Therapy (ACT) Understanding Acceptance and Commitment Therapy (ACT) 00:03:00 Module 2 The Six Core Processes of ACT The Six Core Processes of ACT 00:04:00 Module 3 Dilemma of Human Suffering Dilemma of Human Suffering 00:05:00 Module 4 Developing Psychological Flexibility Developing Psychological Flexibility 00:04:00 Module 5 ACT for Managing Mental Health ACT for Managing Mental Health 00:04:00 Module 6 ACT-Based Exercises for Daily Practice ACT-Based Exercises for Daily Practice 00:06:00

Acceptance and Commitment Therapy (ACT) - ACCREDITED CERT
Delivered Online On Demand1 hour
£29

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

C)SLO-Certified Security Leadership Officer Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for C - Level Managers IT Managers Cyber Security Personelle Engineers Information Systems Owners ISSO's CISSP Students ISO's Overview Upon completion, the Certified Security Leadership Officer candidate be able to competently take the C)SLO exam. You will be versed in implementing strong security controls and managing an organization with an industry acceptable security posture. Certified Security Leadership Officerÿ course is designed for mid and upper-level managers.ÿ If you are an engineer, this course will increase your knowledge in the leading information system security teams. Plus, the C)SLO will give you an essential understanding of current security issues, best practices, and technology. With this knowledge you will then be prepared to manage the security component of an information technology project. As a Security Leadership Officer, you will be the bridge between cybersecurity and business operations. Course Outline Security Management Risk Management Encryption Information Security Access Control Concepts Incident Handling and Evidence Operations Security Network Security Additional course details: Nexus Humans C)SLO-Certified Security Leadership Officer Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)SLO-Certified Security Leadership Officer Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)SLO-Certified Security Leadership Officer Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry