• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

10231 Office courses in Cardiff delivered Online

AS27 IBM Advanced System Operator Workshop for IBM i

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This advanced course is designed for those individuals who are responsible for operating and managing the operation of an IBM i system. Overview Explain the concept of how LPAR works Explain the functions served by the HMC Explain how user versus resource security are implemented Explain the difference between group profiles and authorization lists Describe how adopted authority works Describe how work is managed on the system and the concepts of the performance tuning process on the system Explain how Management Central can be used to manage a single system or a network of System i servers Perform the steps to create a basic CL program using both the traditional (PDM and SEU) and the newer GUI (RSE and LPEX) application development tools Perform the steps to create a menu using SDA Provide some tips on how you can improve your operations This course is designed to enhance the skills of an IBM i System Operator. This course explains the concept of how LPAR works and discusses the functions provided by the HMC LPAR concepts and overview . Console options and HMC overview . IASP concepts and overview . Security concepts and overview . System values . User security (user and group profiles) . Resource security . Authorization lists and adopted authority . Management Central overview . Commands and tasks using Management Central . Inventory using Management Central . System values using Management Central . Other Management Central functions . Work management: Concepts and overview . Work management: Subsystem concepts and overview . Work management: Job processing concepts and interactive jobs . Work management: Job processing concepts of other job types . Work management: Submitting and tracking of batch jobs . Programming concepts . CL programming concepts . Using PDM and SEU to create a CL program . Starting and setting up RSE . Creating a CL program using RSE and LPEX Editor . Creating a menu using SDA . Tips for improved operation .

AS27 IBM Advanced System Operator Workshop for IBM i
Delivered OnlineFlexible Dates
Price on Enquiry

Cybersecurity Maturity Model Certification (CMMC): Certified Professional

By Nexus Human

Duration 4.375 Days 26.25 CPD hours This course is intended for This course provides a jump start on learning material that relates to the CMMC program, and to the planned Certified Professional (CP) certification in particular. It discusses the CMMC program, the current CMMC Model, and other CMMC materials as they exist today. The course may be of interest to individuals who wish to pursue the CMMC-CP certification when it is released. It may also be useful to stakeholders in organizations who will be involved in CMMC assessments, and who wish to gain a general understanding of the program and its requirements for their business planning purposes Overview In this course, you will examine the current CMMC model (Version 1.02), framework, context, and application within the DoD, as well as the expectations and requirements that will be imposed upon organizations that do business with the DoD. It will also help you to identify threats to cybersecurity and privacy within an IoT ecosystem and implement appropriate countermeasures. You will gain the skills to: · Identify risks within the defense supply chain and the established standards for managing them. · Describe how the CMMC model ensures compliance with federal acquisition regulations. · Identify responsibilities of the CMMC Certified Professional, including appropriate ethics and behavior. · Identify regulated information and establish the Certification and Assessment scope boundaries for evaluating the systems that protect that regulated information. · Evaluate OSC readiness and determine the objective evidence you intend to present to the assessor. · Use the NIST 800-171A and CMMC Assessment Guide to assess objective evidence for processes and practices. · Implement and evaluate practices required to meet CMMC maturity level 1. · Implement and evaluate processes and practices required to meet CMMC maturity level 2. · Implement and evaluate processes and practices required to meet CMMC maturity level 3. · Identify processes and practices required to meet CMMC maturity levels 4 and 5. · Work through the logistics of a CMMC assessment, including planning for and conducting the assessment, as well as any follow-up processes, such as remediation and adjudication. The Cybersecurity Maturity Model Certification (CMMC), managed by the CMMC Accreditation Body (CMMC-AB), is a program through which an organization's cybersecurity program is measured by their initial and ongoing compliance with applicable cybersecurity practices as well as their integration of corresponding policies and plans into their overall business operations. By Fiscal Year 2026, all organizations providing products or services to the United States Department of Defense (DoD) must obtain at least a Maturity Level 1 certification under this program. Managing Risk within the Defense Supply Chain Topic A: Identify Threats to the Defense Supply Chain Topic B: Identify Regulatory Responses Against Threats Ensuring Compliance through CMMC Topic A: Identify Limitations of Self-Certification Topic B: Identify Benefits of CMMC Topic C: Describe the CMMC Model Architecture Performing the General Responsibilities of a CMMC CP Topic A: Identify Responsibilities of the CMMC CP Topic B: Demonstrate Appropriate Ethics and Behavior Identifying and Scoping Regulated Information Topic A: Identify Regulated Information Topic B: Establish the Certification and Assessment Scope Boundaries Initiating the Assessment Process Topic A: Evaluate Readiness Topic B: Determine Objective Evidence Assessing Objective Evidence Topic A: Assess the Practices Using the CMMC Assessment Guides Topic B: Assess the Processes Using the CMMC Assessment Guide Level 3 Implementing and Evaluating CMMC Level 1 TTopic A: Maturity Level 1 Domains and Practices Topic B: Determine Scope Boundaries at Maturity Level 1 Topic C: Perform a Maturity Level 1 Gap Analysis Topic D: Perform a Maturity Level 1 Evidence Validation Implementing and Evaluating CMMC Levels 2 and 3 Topic A: Process Maturity Requirements for CMMC Levels 2 and 3 Topic B: Maturity Level 2 Practices Topic C: Maturity Level 3 Practices Identifying CMMC Levels 4 and 5 Topic A: Maturity Level 4 Processes and Practices Topic B: Maturity Level 5 Processes and Practices Working Through a CMMC Assessment Topic A: Define the Assessment Logistics Topic B: Resolve Assessment Related Issues Appendix A: Additional Documentation the CP Should Study

Cybersecurity Maturity Model Certification (CMMC): Certified Professional
Delivered OnlineFlexible Dates
Price on Enquiry

CMMC: Organizational Foundations v2.2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course provides an immersive learning experience for business and technical professionals who need a thorough understanding of the CMMC program. It does this by taking the point of view of a CMMC Certified Professional. Students might consider taking this course to learn more about the overall CMMC program, how DoD contractors are assessed, and how to help their organizations prepare for a CMMC Assessment. Overview In this course, you will learn about the CMMC Model, framework, context, and application within the DoD, as well as the expectations and requirements imposed upon organizations that do business with the DoD. You will: Identify the threats to the Defense Supply Chain and the established regulations and standards for managing the risk. Identify the sensitive information that needs to be protected within the Defense Supply Chain and how to manage it. Describe how the CMMC Model ensures compliance with federal acquisitions regulations. Identify responsibilities of the Certified CMMC Professional, including appropriate ethical behavior. Establish the Certification and Assessment scope boundaries for evaluating the systems that protect regulated information. Prepare the OSC for an Assessment by evaluating readiness. Use the CMMC Assessment Guides to determine and assess the Evidence for practices. Implement and evaluate practices required to meet CMMC Level 1. Identify the practices required to meet CMMC Level 2. Work through the CMMC Assessment process. The Cybersecurity Maturity Model Certification (CMMC), managed by The Cyber AB (formerly known as the CMMC Accreditation Body or the CMMC-AB), is a program through which an organization's cybersecurity program maturity is measured by their initial and ongoing compliance with applicable cybersecurity practices, as well as their integration of corresponding policies and plans into their overall business operations. Once rule-making has concluded and CMMC 2.0 has been implemented, all organizations providing products or services to the United States Department of Defense (DoD) must comply with the requirements of their applicable CMMC Level. This course provides a complete review of the key elements of this important program. Lesson 1: Managing Risk within the Defense Supply Chain Topic A: Identify Threats to the Defense Supply Chain Topic B: Identify Regulatory Responses against Threats Lesson 2: Handling Sensitive Information Topic A: Identify Sensitive Information Topic B: Manage the Sensitive Information Lesson 3: Ensuring Compliance through CMMC Topic A: Describe the CMMC Model Architecture Topic B: Define the CMMC Program and Its Ecosystem Topic C: Define Self-Assessments Lesson 4: Performing CCP Responsibilities Topic A: Identify Responsibilities of the CCP Topic B: Demonstrate Appropriate Ethics and Behavior Lesson 5: Scoping Certification and Assessment Boundaries Topic A: Use the CMMC Assessment Scope Documentation Topic B: Get Oriented to the OSC Environment Topic C: Determine How Sensitive Information Moves Topic D: Identify Systems in Scope Topic E: Limit Scope Lesson 6: Preparing the OSC Topic A: Foster a Mature Cybersecurity Culture Topic B: Evaluate Readiness Lesson 7: Determining and Assessing Evidence Topic A: Determine Evidence Topic B: Assess the Practices Using the CMMC Assessment Guides Lesson 8: Implementing and Evaluating Level 1 Topic A: Identify CMMC Level 1 Domains and Practices Topic B: Perform a CMMC Level 1 Gap Analysis Topic C: Assess CMMC Level 1 Practices Lesson 9: Identifying Level 2 Practices Topic A: Identify CMMC Level 2 Practices Lesson 10: Working through an Assessment Topic A: Identify Assessment Roles and Responsibilities Topic B: Plan and Prepare the Assessment Topic C: Conduct the Assessment Topic D: Report the Assessment Results Topic E: Conduct the CMMC POA&M Close-Out Assessment

CMMC: Organizational Foundations v2.2
Delivered OnlineFlexible Dates
Price on Enquiry

Supporting Organizational Goals by Managing Project Portfolios

By IIL Europe Ltd

Project managers should be mindful of an organization's strategic direction and supporting portfolio(s) when making project decisions. But, is this truly understood by project managers? This enterprise-wide thinking turns an average project manager into a value-added resource within any organization. Management considers these insightful project managers as promotion-worthy and deserving of 'plum' organizational opportunities. While it is certain that project resource assignment, risk and issue management, budgeting, and scheduling all have an effect on the project, can they also affect the portfolio? How do you know that? By attending this course, you will understand why project managers must 'think forward' the ramifications of their decisions, or lack thereof, on the project as well as the portfolio.

Supporting Organizational Goals by Managing Project Portfolios
Delivered Online On Demand45 minutes
£40

Practical Advice on Working from Home

By IIL Europe Ltd

Practical Advice on Working from HomePractical Advice on Working from Home The goal of this course is to help those working from home to be more productive and effective. Working from home may be the new normal for many employees, but it will require employees to make adjustments and modifications to their approach to work. Many companies embrace working remotely while other companies and bosses are a bit more hesitant. If employees take an organized and disciplined approach to working from home, they can be extremely productive. So, what does it take to be successful, and happy, when working from home? This course will suggest ideas for managing distractions and staying focused while working from home and will explain the importance of having a healthy lifestyle and positive approach to working remotely. It will also provide some advice on: organize the workplace and daily schedule for maximum effectiveness, manage distractions and stay focused while working from home, recognize the necessity of taking a proactive approach to team building, communication, and keeping the boss informed and to understand the importance of a healthy lifestyle and positive approach to working from home. What You Will Learn At the end of this program, you will be able to: Suggest ideas for managing distractions and staying focused while working from home Explain the importance of a healthy lifestyle and positive approach to working from home Getting set up for success Organizing a daily routine Excelling while working at home Not losing sight of the bigger picture

Practical Advice on Working from Home
Delivered Online On Demand15 minutes
£40

Safeguarding Diploma

By Study Plex

Highlights of the Course Course Type: Online Learning Duration: 35 Minutes Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about safeguarding Understand the core competencies and principles of safeguarding Explore the various areas of safeguarding Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert safeguarding officer Safeguarding Diploma Course Master the skills you need to propel your career forward in safeguarding. This course will equip you with the essential knowledge and skillset that will make you a confident safeguarding officer and take your career to the next level. This comprehensive safeguarding course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this safeguarding course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This comprehensive course will teach you the theory of effective safeguarding practice and equip you with the essential skills, confidence and competence to assist you in the safeguarding industry. You'll gain a solid understanding of the core competencies required to drive a successful career in safeguarding. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for safeguarding officer or for people who are aspiring to specialize in safeguarding. Enroll in this safeguarding course today and take the next step towards your personal and professional goals. Earn industry-recognized credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive safeguarding course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this safeguarding can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This safeguarding course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This safeguarding course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This safeguarding course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. Course Curriculum Safeguarding A Guide to Safeguarding 00:27:00 Introduction to Safeguarding vulnerable groups 00:05:00 What does this mean for Service Providers 00:03:00 Documents relating to Safeguarding 00:02:00 Registration of New Service Users 00:03:00 Identification of Concerns 00:01:00 Proactive Analysis of Issues 00:01:00 Collaborative Review 00:02:00 Audit of Effectiveness 00:01:00 Embedding Safeguarding Procedures 00:04:00 Key Learning Points 00:02:00 Assessment Assessment - Safeguarding 00:10:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Safeguarding Diploma
Delivered Online On Demand
£19.99

The Role of an Agile PM within a Digital Transformation Program

By IIL Europe Ltd

The Role of an Agile PM within a Digital Transformation Program Historically, we have associated project managers with traditional delivery efforts, so is the term 'Agile Project Manager' an oxymoron? Do we need Agile PMs within our organization? If yes, what does an Agile Project Manager do within a digital transformation initiative? Agile is no longer a development framework or methodology used solely by software teams; ever since the pandemic, more organizations are using Agile principles in their digital transformation efforts. How an Agile PM becomes critical to align team members to deliver on digital transformation goals Ways an Agile PM demonstrates servant leadership to build a self-organized and self-sufficient delivery team Mental model differences to embrace agility in the project manager role Success traits needed to serve as an effective Agile project manager

The Role of an Agile PM within a Digital Transformation Program
Delivered Online On Demand1 hour
£40

Time Management Approved Online Training

By Twig Services Ltd

Time Management Approved Online Training

Time Management Approved Online Training
Delivered Online On Demand1 hour 45 minutes
£29

GDPR - How to Apply the General Data Protection Regulation Trainning Online

By Study Plex

Highlights of the Course Course Type: Online Learning Duration: 1 Hour Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about General Data Protection Regulation or GDPR Understand the core competencies and principles of General Data Protection Regulation or GDPR Explore the various areas of General Data Protection Regulation or GDPR Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert data controller or data protection officer GDPR - How to apply the General Data Protection Regulation Course Master the skills you need to propel your career forward in General Data Protection Regulation or GDPR. This course will equip you with the essential knowledge and skillset that will make you a confident data controller or data protection officer and take your career to the next level. This comprehensive GDPR course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this GDPR course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This comprehensive course will teach you the theory of effective General Data Protection Regulation or GDPR practice and equip you with the essential skills, confidence and competence to assist you in the General Data Protection Regulation or GDPR industry. You'll gain a solid understanding of the core competencies required to drive a successful career in General Data Protection Regulation or GDPR. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for data controller or data protection officer or for people who are aspiring to specialise in General Data Protection Regulation or GDPR. Enrol in this GDPR course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive GDPR course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this General Data Protection Regulation or GDPR can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This GDPR course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This GDPR course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This GDPR course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. Course Curriculum Introduction Trainer Introduction and Course Outline 00:02:00 Why Data Protection? What Exactly is Why Deal with Data Protection Anyway. 00:02:00 How is the Protection of Data Guaranteed. 00:04:00 The Five Basic Principles of Data Protection Introduction 00:01:00 Principle 1: Prohibition of Data Processing and Exceptions to Consent 00:01:00 Principle 2: Purpose of Data Collection 00:03:00 Principle 3: Data Collection Limits 00:02:00 Principle 4: Data Security 00:01:00 Principle 5: Transparency 00:02:00 Summary 00:02:00 The Foundations of Data Processing introduction 00:01:00 Data Processing with Consent 00:03:00 Data Processing without Consent 00:03:00 Rights of Data Subjects Rights of Data Subjects 00:05:00 Responsibility of Data Controller or Processor Introduction 00:01:00 Maintaining a Record of Processing Activities 00:03:00 Technical and Organizational Measures (TOM) 00:01:00 Data Processing 00:02:00 Data Breaches 00:02:00 Summary 00:01:00 The Data Protection Officer The Data Protection Officer 00:02:00 Summary Summary 00:02:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

GDPR - How to Apply the General Data Protection Regulation Trainning Online
Delivered Online On Demand
£19

AZ-120T00 Planning and Administering Microsoft Azure for SAP Workloads

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for Azure Administrators who migrate and manage SAP solutions on Azure. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface. Overview After completing this course, students will be able to: Migrate and SAP HANA, S/4HANA, SAP NetWeaver to Azure Leverage Azure Portal, Cloud Shell, Azure PowerShell, CLI, and Resource Manager Use intersite connectivity features including VNet Peering and VNet-to-VNet connections Work with Azure Active Directory (AAD) and Azure AD Connect As an IT Professionals experienced in SAP solutions, you will discover how to leverage Azure resources that include deployment and configuration of virtual machines, virtual networks, storage accounts, and Azure AD that includes implementing and managing hybrid identities. You will also be introduced to concepts, scenarios, procedures, and hands-on labs that will empower you to best plan and implement migration and operation of an SAP solution on Azure. You will also receive guidance on subscriptions, create and scale virtual machines, implement storage solutions, configure virtual networking, back up and share data, connect Azure and on-premises sites, manage network traffic, implement Azure Active Directory, secure identities, and monitor your solution. Introduction Contains an overview of the SAP and Microsoft partnership. Foundations of SAP on Azure Contains brief lessons on Azure compute, Azure storage, Azure networking, SAP HANA for Azure (Large Instances), identity services, governance and manageability, backup and data protection services, and migration services. SAP Certified Offerings on Azure Contains lessons on general prerequisites (SAP support in public cloud environments), deployment options of Azure for SAP workloads, SAP product-specific support for Azure, operating System support of Azure for SAP workloads, storage support of Azure for SAP workloads, networking support for SAP, database support for SAP, high availability and disaster recovery support for SAP, and monitoring requirements for SAP. Lab : Online Lab: Implementing Linux clustering on Azure VMs Lab : Online Lab: Implementing Windows clustering on Azure VMs SAP on Azure Reference Architecture Contains lessons on SAP NetWeaver with AnyDB, SAP S4 HANA, and SAP HANA on Azure (Large Instances) on Azure VMs. Planning for Implementing SAP Solutions on Azure Contains lessons on Azure VM compute, network, and storage considerations. As well as Azure VM high availability and disaster recovery, Azure VM backup considerations, Azure VM monitoring considerations, Azure VM security considerations, and Azure VM authentication and access control considerations. Planning for Migrating SAP Workloads to Azure Contains lessons on strategies for migrating SAP systems to Microsoft Azure and SAP a workload planning and deployment checklist. Implementing Azure VM-based SAP Solutions Contains lessons on Azure VM deployment methodologies, single-instance implementations (2-tier or 3-tier), implementing HA SAP NetWeaver with AnyDB on Azure VMs, implementing HA SAP HANA on Azure VMs, configure the Azure Enhanced Monitoring Extension for SAP, and implementing AD and Azure AD-based authentication. Module 8-Deploying HANA Large Instances (HLI) Contains a lesson on implementing HANA Large Instances (HLI). Migrating SAP Workloads to Azure Contains lessons on migration options, DMO methodologies, cloud migration options, and Very Large Database Migration to Azure. Lab : Online Lab-Implement SAP architecture on Azure VMs running Linux Lab : Online Lab-Implement SAP architecture on Azure VMs running Windows Maintaining SAP on Azure Contains lessons on, remote management, performing backups and restores, OS and workload updates, vertical and horizontal scaling, and Disaster Recovery (DR). Monitoring and Troubleshooting SAP on Azure Contains lessons on monitoring Azure VMs, monitoring SAP HANA on Azure (Large Instances), and integrating SAP solutions with Microsoft cloud services.

AZ-120T00 Planning and Administering Microsoft Azure for SAP Workloads
Delivered OnlineFlexible Dates
Price on Enquiry