• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

7778 Mode courses delivered Online

CND - EC Council Official Certified Network Defender

5.0(12)

By Nemstar Ltd

This is the perfect launch pad for a technical career in Cyber Security and fully prepares every delegate for the prestigious Certified Ethical Hacking (CEH) Course that comes next on the Cyber & Hacking Learning Pathways by Nemstar.

CND - EC Council Official Certified Network Defender
Delivered OnlineFlexible Dates
£3,294

Pharmaceutical Validation Training Course (ONLINE) – For More Senior Validation, CQV and C&Q Roles

By Getreskilled (UK)

Take our part-time online “Conversion Course into Pharmaceutical Manufacturing“ NO Previous Industry Experience or Science Qualifications Required

Pharmaceutical Validation Training Course (ONLINE)  – For More Senior Validation, CQV and C&Q Roles
Delivered Online On Demand
£699 to £6,499

CertNexus Certified CyberSec First Responder (CFR-410)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners preparing for or who currently perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for those roles within federal contracting companies and private sector firms whose mission or strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD Information Network (DoDIN) operation and incident handling. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. Overview In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will: Assess cybersecurity risks to the organization. Analyze the threat landscape. Analyze various reconnaissance threats to computing and network environments. Analyze various attacks on computing and network environments. Analyze various post-attack techniques. Assess the organization's security posture through auditing, vulnerability management, and penetration testing. Collect cybersecurity intelligence from various network-based and host-based sources. Analyze log data to reveal evidence of threats and incidents. Perform active asset and network analysis to detect incidents. Respond to cybersecurity incidents using containment, mitigation, and recovery tactics. Investigate cybersecurity incidents using forensic analysis techniques. This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation. In addition, this course and subsequent certification (CFR-410) meet all requirements for personnel requiring DoD directive 8570.01-M position certification baselines: CSSP Analyst CSSP Infrastructure Support CSSP Incident Responder CSSP Auditor The course and certification also meet all criteria for the following Cybersecurity Maturity Model Certification (CMMC) domains: Incident Response (IR) Audit and Accountability (AU) Risk Management (RM) Lesson 1: Assessing Cybersecurity Risk Topic A: Identify the Importance of Risk Management Topic B: Assess Risk Topic C: Mitigate Risk Topic D: Integrate Documentation into Risk Management Lesson 2: Analyzing the Threat Landscape Topic A: Classify Threats Topic B: Analyze Trends Affecting Security Posture Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments Topic A: Implement Threat Modeling Topic B: Assess the Impact of Reconnaissance Topic C: Assess the Impact of Social Engineering Lesson 4: Analyzing Attacks on Computing and Network Environments Topic A: Assess the Impact of System Hacking Attacks Topic B: Assess the Impact of Web-Based Attacks Topic C: Assess the Impact of Malware Topic D: Assess the Impact of Hijacking and Impersonation Attacks Topic E: Assess the Impact of DoS Incidents Topic F: Assess the Impact of Threats to Mobile Security Topic G: Assess the Impact of Threats to Cloud Security Lesson 5: Analyzing Post-Attack Techniques Topic A: Assess Command and Control Techniques Topic B: Assess Persistence Techniques Topic C: Assess Lateral Movement and Pivoting Techniques Topic D: Assess Data Exfiltration Techniques Topic E: Assess Anti-Forensics Techniques Lesson 6: Assessing the Organization's Security Posture Topic A: Implement Cybersecurity Auditing Topic B: Implement a Vulnerability Management Plan Topic C: Assess Vulnerabilities Topic D: Conduct Penetration Testing Lesson 7: Collecting Cybersecurity Intelligence Topic A: Deploy a Security Intelligence Collection and Analysis Platform Topic B: Collect Data from Network-Based Intelligence Sources Topic C: Collect Data from Host-Based Intelligence Sources Lesson 8: Analyzing Log Data Topic A: Use Common Tools to Analyze Logs Topic B: Use SIEM Tools for Analysis Lesson 9: Performing Active Asset and Network Analysis Topic A: Analyze Incidents with Windows-Based Tools Topic B: Analyze Incidents with Linux-Based Tools Topic C: Analyze Indicators of Compromise Lesson 10: Responding to Cybersecurity Incidents Topic A: Deploy an Incident Handling and Response Architecture Topic B: Mitigate Incidents Topic C: Hand Over Incident Information to a Forensic Investigation Lesson 11: Investigating Cybersecurity Incidents Topic A: Apply a Forensic Investigation Plan Topic B: Securely Collect and Analyze Electronic Evidence Topic C: Follow Up on the Results of an Investigation Additional course details: Nexus Humans CertNexus Certified CyberSec First Responder (CFR-410) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified CyberSec First Responder (CFR-410) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Certified CyberSec First Responder (CFR-410)
Delivered OnlineFlexible Dates
£3,495

Virtual November Alchemy 2025

By CRR UK

CRRUK equips professionals with the concepts, skills and tools to build conscious, intentional relationships, and to coach relationship systems of any size.

Virtual November Alchemy 2025
Delivered Online
£1,200

Better Business Cases Foundation & Practitioner: In-House

By IIL Europe Ltd

Better Business Cases™ Foundation and Practitioner: In-House Training Using this best-practice approach will allow organizations to reduce unnecessary spending and improve the decision-making process which gives you a greater chance of securing necessary funding and support for initiatives. The goal of the combined foundation and practitioner course is to develop a candidate's ability to deliver a comprehensive business case through encouraging expanded knowledge to guide the practical application of theoretical foundations. Upon the completion of this course, a candidate will be able to start applying the model to a real business case development project. The outline presented in the course overview will be addressed in the first 2 days, with the Foundation exam conducted on the morning of Day 3. Then the topics will be revisited at a deeper level, for 2 more days, with the Practitioner exam conducted on the afternoon of Day 5. What you will Learn At the end of this program, you will be able to: Develop the lifecycle of a business case and establish the relationships between the five cases Apply the steps in the business case development framework, in order to support the production of a business case, using the Five Case Model, for a given scenario. Overview of Better Business Cases Alignment with the strategic planning process Importance of the Business Case using the Five Case Model Overview of the Five Case Model Purpose of the key stages in the development of a spending proposal Purpose of a Business Justification Case Business Case Development Process Purpose of project / programme assurance and assurance reviews Responsibility for producing the Business Case Determining the Strategic Context and Undertaking the Strategic Assessment Scoping the Scheme and Preparing the Strategic Outline Case Planning the Scheme and Preparing the Outline Business Case Procuring the Solution and Preparing the Full Business Case Implementation and monitoring Evaluation and feedback Making the Case for Change Agree on the strategic context Determine spending objectives, existing arrangements, and business needs Determine potential business scope and key service requirements Determine benefits, risks, constraints, and dependencies Exploring the Preferred Way Forward Agree on critical success factors Determine long list options and SWOT analysis Recommend a preferred way forward Determining Potential Value for Money Revisit the short list Prepare the economic appraisal for short-listed options Undertake benefits appraisal Undertake risk appraisal Select preferred option and undertake sensitivity analysis Preparing for the Potential Deal Determine the procurement strategy Determine service streams and required outputs Outline potential risk apportionment Outline potential payment mechanisms Ascertain contractual issues and accountancy treatment Ascertaining Affordability and Funding Requirement Prepare the financial model Prepare the financial appraisals Planning for Successful Delivery Plan programme / project management Plan change and contract management Plan benefits realization Plan risk management Plan programme / project assurance and post-project evaluation Procuring the Value for Money Solution Revisit the case for change Revisit the OBC options Detail procurement process and evaluation of best and final offers (BAFOs) Contracting for the Deal Set out the negotiated deal and contractual arrangements Set out the financial implications of the deal Ensuring Successful Delivery Finalize project management arrangements and plans Finalize change management arrangements and plans Finalize benefits realization arrangements and plans Finalize risk management arrangements and plans Finalize contract management arrangements and plans Finalize post-project evaluation arrangements and plans

Better Business Cases Foundation & Practitioner: In-House
Delivered in London or UK Wide or OnlineFlexible Dates
£3,990

Application of Structural Geology in Seismic Interpretation

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course  Seismic interpretation requires an understanding of structural development and its interrelation with the stratigraphic system. Bias and misunderstanding have unfortunately resulted in countless dry holes. So go beyond tracing horizons and understand their context within the structural system by extracting key information from seismic surveys and other datasets. In this 5 full-day training course, participants will learn a variety of modern structural concepts and techniques and their role in the interpretation of seismic data. Using an applied 'hands-on' approach, participants will be exposed to a diversity of worldwide case examples with complementary exercises - both of an individual and group nature. The course is designed from an applied standpoint, with numerous examples and hands-on exercises from the petroleum industry. This course can also be offered through Virtual Instructor Led Training (VILT) format. Training Objectives By the end of this course, the participants will be able to: Go beyond tracing horizons and marking faults and truly understand the structural and stratigraphic system. Understand the role of tectonics and deformation in the formation of various types and orientations of geologic structures. Understand the interaction of the structural system with the stratigraphic and sedimentologic environment for better prediction of reservoir formation. Integrate data from the large seismic scale to subseismic scale, including seismic anisotropy, to understand better the overall petroleum system. Learn about the common pitfalls of interpretation. Target Audience This course is intended for geologists, geophysicists, reservoir engineers, and exploration/production managers. Course Level Intermediate Trainer Your expert course leader received his B.S. and M.S. degrees in Geology from the now University of Louisiana-Lafayette in 1989 and 1990 respectively, and his Ph.D. as a National Science Foundation fellow at Baylor University, Waco, Texas, in 1993. From 1994 - 1996, he studied planetary tectonics as a NASA-funded postdoctoral fellow at Southern Methodist University. In 1996, he returned to UL-Lafayette, where he was awarded in 1997 the Hensarling-Chapman Endowed Professorship in Geology. He began independent consulting activities in 1991, and in 2001, he left academia for full-time consulting for clients ranging from one-man shops to supermajors. He rejoined UL-Lafayette as an adjunct professor from 2011 - 2018. He is an active researcher, receiving several million dollars in grants from federal, state, and industry sources, presenting numerous talks, including a 2019 AAPG Levorsen award, and publishing on a diversity of geoscience topics, including a Grover E. Murray Best Published Paper award in 2017. He is co-author of the inaugural GCAGS/GCSSEPM Transactions Best Student Paper award in 2018. He served as the GCAGS Publisher since 2006 and in various GCAGS/GCSSEPM Transactions editing capacities since 2006, including the 2014 and 2017 - 2022 Editor (named Permanent Transactions Editor in 2017), and Managing Editor since 2011, receiving a GCAGS Distinguished Service Award in 2018. He served as the General Chair for GeoGulf 2020 (70th GCAGS/GCSSEPM Convention), the 1st hybrid geoscience conference in the world. He is a Past President of the Lafayette Geological Society and served as its Editor and Publisher from 2002 - 2018. In 2018, he founded the Willis School of Applied Geoscience, reformulating decades of industry-training experience to provide alternative opportunities for graduate-level education. In 2020, he received an Honorary Membership from GCSSEPM. He also joined the LSU faculty as an adjunct professor in 2020. In 2021, he co-founded the Society of Applied Geoscientists and Engineers, serving as its President, General Chair for the SAGE 2022 Convention & Exposition, and Vice-Chair for the Benghazi International Geoscience & Engineering Conference 2022 (BIGEC 2022). POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Application of Structural Geology in Seismic Interpretation
Delivered in Internationally or OnlineFlexible Dates
£3,611 to £4,199

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites CompTIA Network+ Certification 1 - Security and Risk Management Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training 2 - Asset Security Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling 3 - Security Engineering Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities 4 - Information Security Management Goals Organizational Security The Application of Security Concepts 5 - Information Security Classification and Program Development Information Classification Security Program Development 6 - Risk Management and Ethics Risk Management Ethics 7 - Software Development Security Software Configuration Management Software Controls Database System Security 8 - Cryptography Ciphers and Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Hashing and Message Digests Email, Internet, and Wireless Security Cryptographic Weaknesses 9 - Physical Security Physical Access Control Physical Access Monitoring Physical Security Methods Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered OnlineFlexible Dates
£3,395

Positive Psychology Masterclass

4.9(27)

By Apex Learning

Overview This comprehensive course on Positive Psychology Masterclass will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Positive Psychology Masterclass comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Positive Psychology Masterclass. It is available to all students, of all academic backgrounds. Requirements Our Positive Psychology Masterclass is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 13 sections • 164 lectures • 08:40:00 total length •Create Capacity for True Success: 00:06:00 •Disconnect From the Grind: 00:04:00 •Create the Routine to Disconnect: 00:02:00 •Commit To the Disconnect Process: 00:02:00 •Activity: Define Your Disconnect Time: 00:02:00 •Stop Negative Self-Talk In Its Tracks: 00:05:00 •Identify Your Source of Pain: 00:01:00 •Acknowledge the Negative Thought: 00:02:00 •Define Yourself Relative to the Thought: 00:04:00 •Describe a New Reality: 00:04:00 •Verbalize the Positive Thought: 00:03:00 •Activity: Release a Negative Thought: 00:02:00 •Keep Your Joy Intact and Healthy With Positive Thoughts: 00:03:00 •Play the Vulnerability Game: 00:02:00 •Create Healthy Boundaries to Stay Positive: 00:03:00 •Make Your Process Attainable: 00:02:00 •Activity: Make Your Positivity a Reality: 00:01:00 •Become a Grounded Person Others Are Attracted To: 00:08:00 •Identify What Gives You Anxiety and Frustrations: 00:02:00 •Assume You're Not Grounded: 00:06:00 •Track What You Feel Obligated to Do: 00:04:00 •Identify When You Can't Turn Your Mind Off: 00:02:00 •Activity: Identify What Gives You Anxiety and Frustrations: 00:02:00 •Ground Yourself in A Positive Way: 00:03:00 •Assume You Are Not Fully Grounded: 00:02:00 •Assume You Have Nothing to Prove to Anybody: 00:01:00 •Set Aside Enough Time To Become Grounded: 00:02:00 •Discover the Grounding Breathing Exercise: 00:04:00 •Discover the Grounding Finger Exercise: 00:03:00 •Apply These Physical Grounding Exercises Daily In Your Life: 00:03:00 •Activity: Ground Yourself in A Positive Way: 00:02:00 •Solve Your Anxiety with Gratitude: 00:07:00 •Create a Gratitude Journal: 00:01:00 •Activity: Solve Your Anxiety with Gratitude: 00:01:00 •Solve Your Frustrations by Turning Them Around: 00:13:00 •Activity: Solve Your Frustrations by Turning Them Around: 00:01:00 •Be Significant Consistently: 00:10:00 •Become More Curious (Vs. Impressive) with People: 00:05:00 •Employ Curiosity Daily to Boost Your Positivity: 00:10:00 •Activity: Boost Your Baseline Positivity with Curiosity: 00:02:00 •Become a Good Judge of Character: 00:05:00 •Employ Character Assessing Questions: 00:04:00 •Assess Character during Conversation: 00:03:00 •Activity: Define and Identify High-Character for Yourself: 00:01:00 •Give and Expect Nothing In Return: 00:05:00 •Avoid Survival Mode: 00:02:00 •Activity: Be Comfortable Being Overt About Giving: 00:01:00 •Make People Feel Safe around You: 00:03:00 •Create Gratitude, Curiosity, and Optimism: 00:02:00 •Express Gratitude: 00:02:00 •Develop Curiosity: 00:02:00 •Practice Optimism: 00:02:00 •Activity: Enhance Your Three P's Of Mental Aptitude: 00:01:00 •Stay Even-Tempered and Patient: 00:04:00 •Recognize When You Are Being a Hare and Discourage the Rat: 00:03:00 •Activity: Map Your Positive Vision for Your Life: 00:02:00 •Maintain Responsibility and Realism: 00:02:00 •Set Positive, Realistic Goals Responsibly: 00:06:00 •Activity: Be Responsible For a Realistic Vision: 00:01:00 •Keep Your Hard Work from Going out The Window: 00:05:00 •Master Your Character and Concentration: 00:04:00 •Turn Around Character-Lacking Behaviors: 00:05:00 •Master Your Focus: 00:05:00 •Activity: Concentrate On Your Character to Master Positivity: 00:01:00 •Master Your Confidence and Courage: 00:02:00 •Grow the Seeds of Confidence: 00:03:00 •Have Courage to Put Your Confidence to Work: 00:03:00 •Use Courage to Grow Confidence: 00:02:00 •Activity: Grow Your Confidence and Courage: 00:02:00 •Identify and Mastery Your Capacity: 00:06:00 •Stabilize the Rollercoaster with Consistency: 00:05:00 •Activity: Manage Your Capacity and Consistency: 00:02:00 •How to Overcome Constant Negativity: 00:05:00 •Let Go of Holding Grudges: 00:03:00 •Redefine Your Success in Challenging Situations: 00:02:00 •Examine Non-Successful Situations: 00:01:00 •Determine Your Control over Upsetting Events: 00:02:00 •Activity: Release a Grudge: 00:02:00 •Be Difficult To Offend: 00:03:00 •Become Others-Focused: 00:05:00 •Activity: Write an Others-Focused Mission Statement: 00:01:00 •Neutralize Toxic People: 00:07:00 •Neutralize Toxic People Already In Your Life: 00:05:00 •Activity: Neutralize Toxic People: 00:02:00 •Don't Just Talk About 'It,' Be 'It': 00:04:00 •Identify How Gritty You Are: 00:01:00 •Describe Your Own Grit: 00:01:00 •Activity: Take the Grit Scale Assessment: 00:02:00 •Set Up Your Environment for Self-Control: 00:02:00 •Get Some Sleep: 00:01:00 •Purge Yourself of Negativity: 00:02:00 •Follow a Healthy, Daily Routine: 00:01:00 •Live With Zest and Excitement: 00:01:00 •Rise Up and Be Real: 00:02:00 •Activity: Incorporate the Five Healthy/Daily Habits in Your Life: 00:02:00 •Make Your Grit Sustainable: 00:02:00 •Direct Yourself to Sustained Grit: 00:02:00 •Focus On Solutions, Not Problems: 00:02:00 •Activity: Self-Coach To Sustain Your Grit: 00:01:00 •Become More Comfortable In Your Own Skin: 00:06:00 •Become More Relaxed: 00:02:00 •Work On Yourself to Help Others: 00:05:00 •Try a Form of Meditation: 00:02:00 •Activity: Create a Gratitude List: 00:01:00 •Get Physically Fit: 00:10:00 •Exercise to Feel Alive: 00:04:00 •Get to Sleep: 00:03:00 •Activity: Identify New Positive Healthy Habits: 00:01:00 •Develop Strong Body Language: 00:04:00 •Make a Strong First Impression: 00:04:00 •Make Eye Contact: 00:03:00 •Present Good Posture: 00:03:00 •Activity: Develop Strong Body Language: 00:02:00 •Practice the Respect That People Gravitate Toward: 00:04:00 •Identify Positive Boundaries: 00:04:00 •Demonstrate Positive Boundary Practices: 00:04:00 •Protect Your Mental and Emotional Health: 00:03:00 •Activity: Identify Your Positive Boundaries: 00:01:00 •Recognize Boundaries Where You Fall Short: 00:02:00 •Create Your Own Boundaries: 00:03:00 •Make Creating and Evaluating Them Routine: 00:02:00 •Activity: Reign in Your Boundary Short-Comings: 00:02:00 •Use Grit to Enforce: 00:02:00 •Use Conative Strengths to Enforce: 00:03:00 •Determine Your Boundary Enforcement Helpers: 00:02:00 •Activity: Enforce Your Boundaries: 00:01:00 •Become the Person You Are Meant To Be: 00:07:00 •Know Yourself through Strengths and Weaknesses: 00:07:00 •Solicit Input from Leaders: 00:03:00 •Enhance Your Strengths: 00:03:00 •Activity: Self-Identify Your Strengths: 00:01:00 •Embrace Change in Your Life: 00:04:00 •Become Proactive To Welcome Change In Your Life: 00:08:00 •Activity: Embrace Change to Achieve a Goal: 00:01:00 •Learn To Say 'No': 00:09:00 •Learn To Say No To Other Non-Key Commitments: 00:05:00 •Use Your Positive Success to Bring Positive Success to Others: 00:05:00 •Identify Your Greatest Gift for Others: 00:02:00 •Seek Outside Counsel: 00:02:00 •Assess To Gain Understanding: 00:02:00 •Activity: Consolidate Insights on Your Gift: 00:02:00 •Live Out the People You Serve: 00:04:00 •Honor Your Commitments to Your Team: 00:03:00 •Honor Your Commitments to Yourself: 00:03:00 •Activity: Reflect On Your Business Practices: 00:02:00 •Live Out How Well You Serve Others: 00:02:00 •Harness Your Vision: 00:02:00 •Be a Go-Giver: 00:02:00 •Activity: Apply the Five Laws: 00:01:00 •Be Free From a World of Struggle and Hurt: 00:09:00 •Identify Whose Business It Is: 00:02:00 •Identify When It's Your Business: 00:02:00 •Identify When It's Other People's Business: 00:05:00 •Activity: Identify Whose Business It Is: 00:01:00 •Find Safety to Detach: 00:01:00 •Separate Your Life from Who You Are As a Person: 00:05:00 •Separate a Value from a Thought: 00:06:00 •Show Empathy without Picking up The Rope: 00:11:00 •Activity: Find Safety to Detach: 00:02:00 •Look Forward to the Next No: 00:01:00 •Take Turtle Steps to Detach: 00:03:00 •Take Bigger Steps to the Next No: 00:06:00 •Activity: Look Forward to the Next No: 00:01:00 •Assignment - Positive Psychology Masterclass: 00:00:00

Positive Psychology Masterclass
Delivered Online On Demand8 hours 40 minutes
£12

NCSP 800-53 Practitioner Certification Training

By IIL Europe Ltd

The NCSP® 800-53 Practitioner accredited (APMG International), certified (NCSC/GCHQ-UK), and recognized (DHS-CISA-USA) certification course teaches Digital Business, Operational Stakeholders, Auditors, and Risk Practitioners a Fast-Track approach to adopting and adapting the NIST Cybersecurity Framework and its 800-53 controls across an enterprise and its supply chain.The course also teaches candidates how to build a Digital Value Management System (DVMS) CPD overlay model capable of enabling the quick adoption and adaption of new frameworks and models (NIST-CSF, NIST Privacy Framework, CMMC, etc.) that may be required to address internal, external (regulatory), and cyber threat landscape changes. Finally, the course teaches candidates how to ensure the organization's DVMS is designed for use within the organization and auditable by government regulators looking to verify regulatory outcomes. The NCSP Practitioner 800-53 course is designed for both the Implementer and Auditor topics and participants select the exam they want to take (or an additional exam can be ordered to be certified as both an implementer and auditor).

NCSP 800-53 Practitioner Certification Training
Delivered OnlineFlexible Dates
£2,995 to £3,995

Level 7 Diploma In Risk Management Pathway To MSc In Risk Management

4.9(261)

By Metropolitan School of Business & Management UK

Level 7 Diploma In Risk Management Pathway To MSc In Risk Management Level 7 Diploma in Risk Management (QCF) – 6 - 8 Months Credits: 120 Credits The objective of the Level 7 Diploma in Risk Management is to provide learners with the skills and understanding of risk management that align with good strategic decision making to maintain organisations’ competitive advantage. The OTHM Level 7 Diploma in Risk Management programme provides an in-depth understanding of risk and its application in practice both for financial and non-financial organisations. Learners will learn both theoretical and practical understanding of risk including risk measurement and modelling. This programme is a Pathway programme to MSc in Risk Management. Course Details The Level 7 Diploma in Risk Management qualification consists of 6 mandatory units making a combined total of 120 credits, 1200 hours Total Qualification Time (TQT) and 600 Guided Learning Hours (GLH) for the completed qualification.Modules (120 Credits): Principles of Risk Management Strategic Risk Management Responsible Leadership and Governance Organisational and Environmental Risk Risk Analysis and Modelling Advanced Research Methods Accreditation All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. University Progression University Top-up On completion of this course, students have the opportunity to complete a Master degree programme from a range of UK universities. The top-up programme can be studied online or on campus. The top-up comprises the final 60 credits which consist of either a dissertation or a dissertation and one module. (The course tuition fee listed above does NOT include the top-up fees) University Progression Click here to see University routes and fee information for progression. Entry Requirements For entry onto the Level 7 Diploma in Risk Management leading to the MSc in Risk Management qualification, learners must possess: An honours degree in related subject or UK level 6 diploma or equivalent overseas qualification i.e. Bachelors Degree or Higher National Diploma OR Mature learners (over 25) with at least 5 years of management experience if they do not possess the above qualification (this is reviewed on a case by case basis) Workshops Workshops are conducted by live webinars for all students. Visa Requirements There is no Visa requirement for this programme.

Level 7 Diploma In Risk Management Pathway To MSc In Risk Management
Delivered OnlineFlexible Dates
£3,250