• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

447 Network courses in London

Building successful working relationships (In-House)

By The In House Training Company

This 2-day workshop is offered with an internal and external focus. Day 1 will focus on building your internal network and relationships by focusing on your personal network, your brand, influencing skills and perceptions. Day 2 focuses on your external relationships with suppliers, patient groups etc. This will focus on assertiveness, outcome rather than relationship focus, and influencing and negotiating skills. DAY ONE 1 Can you succeed by yourself? 2 Relationship awareness theory 3 The Strengths Deployment Inventory / Your FACET5 profile 4 Building rapport 5 Influencing power bases 6 Active listening 7 Building your personal internal network 8 Perceptions 9 Your brand DAY TWO 3 Preparing for conflict 2 The negotiation conversation 1 Your stakeholders and what they want from you 4 Influencing others 5 Your communication approaches for success 6 Emotional Intelligence 7 The trust model 8 Knowing your outcomes

Building successful working relationships (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Principles and Practices of Cyber Security

5.0(10)

By GBA Corporate

Overview Cyber Security plays an important role in every business as it encompasses everything that relates to protecting sensitive data, personal information, intellectual property, data, and governmental and industry information systems from theft and damage attempted by criminals and adversaries. This course is designed to understand and gain practical skills to plan, deliver and monitor IT/cyber security to internal and external clients understanding a complete, knowledge in the areas of IT policies, Security-Operational-Run-Book, security/penetration testing, ethical hacking and black hat hacking including understanding the basics of Kali Operating System and its tools and techniques. It will also cover WiFi security, Website security, human factors, cyber forensics, and cyber security team management, including all other areas in relation to Cyber Security.

Principles and Practices of Cyber Security
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Cyber Security demystified

5.0(3)

By Systems & Network Training

Cyber Security training course description The reliance of the world on the Internet and computer systems means the protection of information systems is vitally important. This is even more important smart devices and the Internet of Things increase the number of devices. This Cyber Security provides a concise overview on the threats and attacks that can happen along with the counter measures that can be taken. What will you learn Recognise the different types of attack. Describe the attacks that can be made against information systems. Describe the counter measures available. Cyber Security training course details Who will benefit: Non-technical staff working with computers. Prerequisites: None. Duration 1 day Cyber Security training course contents What is Cyber Security? Computer security, Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Attacks Physical access, Social engineering, Privilege escalation, Malware, Trojans, worms, viruses, rootkits, Backdoors, Denial of Service (DOS), Distributed DOS, Eavesdropping, Spoofing, Man the middle tampering. Countermeasures Prevention, detection, response. Physical, user accounts, Firewalls, IDS, AAA, authentication, cryptography, encryption, data integrity. Cyber security standards ETSI, ISO 27001, 27002, NIST, ISA/IEC 62443.

Cyber Security demystified
Delivered in Internationally or OnlineFlexible Dates
£967

Arnold for 3dsMax Basic to Advanced Training

By London Design Training Courses

Training duration: 10 hrs. Click here for more info Method: 1-2-1, Personalized attention, Tailored content, Flexible pace, Individual support. Schedule: Personalized training experience with our flexible 1-2-1 sessions. Tailor your own schedule by pre-booking a convenient hour of your choice, available from Monday to Saturday between 9 am and 7 pm. Learn Arnold for 3ds Max and make breath-taking renders with our comprehensive training course. Led by certified tutors and industry experts, you'll master the basics to advanced techniques of creating stunning visual effects and lifelike renderings. Course Duration: 10 hours Course Outline: Session 1: Introduction to Arnold Renderer (1 hour) Unveiling Arnold Renderer's features and capabilities Understanding the benefits of Arnold in 3ds Max Setting up Arnold renderer and exploring its interface Mastering the workflow for exceptional results Session 2: Basic Arnold Shading (1 hour) Navigating the Arnold shading network Creating essential materials with Arnold shaders Working with diverse shader types (standard, Lambert, etc.) Elevating visuals with maps and textures in Arnold's materials Session 3: Arnold Lighting Techniques (1.5 hours) Embracing the art of lighting with Arnold Lights Implementing various light types (area lights, spotlights, etc.) Creating ambiance with Arnold skydome and environment lighting Illuminating scenes using physical sky and image-based lighting Session 4: Arnold Cameras and Rendering Settings (1.5 hours) Mastering Arnold cameras and their settings Achieving depth of field and motion blur effects in Arnold Configuring optimal rendering settings for superior results Fine-tuning rendering with the Arnold Render Setup dialog Session 5: Advanced Arnold Shading (1.5 hours) Creating intricate materials with advanced Arnold shaders Realistic surfaces with Arnold's procedural textures Harnessing the power of advanced shading nodes (bump, displacement, etc.) Unleashing specialized effects with Arnold shaders (subsurface scattering, hair, etc.) Session 6: Arnold Rendering Optimization (1 hour) Streamlining rendering settings for enhanced efficiency Leveraging Arnold features like adaptive sampling and denoising Noise reduction techniques for smoother Arnold renders Troubleshooting common rendering issues and their solutions Session 7: Advanced Lighting Techniques (1 hour) Crafting lifelike lighting setups with Arnold's prowess Exploring advanced lighting properties (exposure, color temperature, etc.) Enhancing lighting with Arnold light filters and modifiers Implementing captivating effects like volumetric lighting and caustics Session 8: Arnold AOVs and Compositing (1 hour) Understanding Arnold AOVs (Arbitrary Output Variables) Configuring and rendering AOVs for post-production control Compositing AOVs for artistic adjustments in post-production Leveraging AOVs for fine-tuning the final image Session 9: Arnold for Animation and Motion Graphics (1 hour) Integrating Arnold seamlessly into animation and motion graphics projects Rendering animation sequences with finesse Managing motion blur and time-based effects with Arnold Unveiling Arnold's potential for particle rendering and dynamic effects Session 10: Arnold Tips, Tricks, and Best Practices (1 hour) Exploring advanced techniques and workflows for exceptional results Optimizing scene setup for enhanced rendering performance Troubleshooting tips for common issues and errors in Arnold Q&A session and final review to consolidate knowledge

Arnold for 3dsMax Basic to Advanced Training
Delivered in London or OnlineFlexible Dates
£400

ISO 14298:2021 Security Printing Management System Lead Auditor Course

5.0(1)

By Cognicert Limited

The "ISO 14298:2021 Lead Auditor Course" integrates the principles of ISO 14298:2021, the International Standard for Security Printing Management, with the methodologies outlined in ISO 19011:2018, the Guidelines for Auditing Management Systems. The course equips participants with the skills and knowledge required to lead security printing audits effectively, ensuring compliance with ISO 14298:2021, and applies the principles of ISO 17011:2017 for conformity assessment bodies. It covers audit planning, execution, and reporting while emphasizing risk management and continual improvement.

ISO 14298:2021 Security Printing Management System Lead Auditor Course
Delivered In-Person in London
£640 to £800

Clean Hydrogen Derivatives - Ammonia, Methanol and Synthetic Hydrocarbon - Virtual Instructor Led Training (VILT)

By EnergyEdge - Training for a Sustainable Energy Future

Elevate your expertise in clean hydrogen derivatives - ammonia, methanol, and synthetic hydrocarbon with EnergyEdge's course. Enroll now for virtual instructor-led training!

Clean Hydrogen Derivatives - Ammonia, Methanol and Synthetic Hydrocarbon - Virtual Instructor Led Training (VILT)
Delivered in Internationally or OnlineFlexible Dates
£1,099 to £1,199

Live from London | EA/PA Excellence Workshop

5.0(1)

By Own Your Success

EA/PA Excellence Workshop Live from London on the 25th of April 2024. Featuring Keynote speaker Reggie Love, former Special Assistant to 44th President of the USA, Barrack Obama. Panel featuring Sophie Chapman, assistant to Steven Bartlett entrepreneur, author, host of the diary of a CEO and youngest ever dragon on BBC's Dragon's Den, Victoria Wratten, CEO of the Executive & Personal Assistants Association. The workshop contains, panel talk, keynote talk and facilitation over key topics from Kate Wood over the course of the day.

Live from London | EA/PA Excellence Workshop
Delivered In-PersonFlexible Dates
£530 to £580

Backstage/The Mandy Network - Introductory Event

4.4(69)

By Central Film School

DATE: Thursday 17th October TIME: 3:45pm LOCATION: Online Join us for an introductory session with The Mandy Network, as they provide useful skills and insight into how to build your career, be cast in upcoming films and find the best collaborators for your projects. Areas covered will include: Interactive session - Example of a real job posting on our site and going through the real candidates, their CVs, cover notes. This exercise should give them a view of how the employer thinks when they hire talent. How to find cast and crew for your projects How to approach job hunting How to make the most of online job platform and make your profile standout Common mistakes and pitfalls Advice on CV and Cover Notes An exclusive offer from Mandy for your students

Backstage/The Mandy Network - Introductory Event
Delivered OnlineJoin Waitlist
FREE

RESILIA Foundation: In-House Training

By IIL Europe Ltd

RESILIA™ Foundation: In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls

RESILIA Foundation: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

RESILIA Foundation

By IIL Europe Ltd

RESILIA™ Foundation AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls

RESILIA Foundation
Delivered In-Person in LondonFlexible Dates
£1,995