• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

662 Organisation courses in Downpatrick delivered Live Online

DESIGNATED SAFEGUARDING LEAD ZOOM COURSE

By Child Protection Training Uk

This Course is the DSL Course delivered via Zoom (it is the same as the face to face course but delivered via video conferencing and will be no more than 15 people at one time. There will be a training consultant taking delegates through the course and available to answer any questions throughout the course. This course will help you and you become familiar with the role and responsibilities of the designated safeguarding lead in your organisation. It will develop both your competence and confidence in carrying out the role of Designated Safeguarding Lead (DSL). Formally known as Level 3.

DESIGNATED SAFEGUARDING LEAD ZOOM COURSE
Delivered OnlineFlexible Dates
£234

Professional Scrum Master Training II

By Fractal Training

Join the Scrum.org accredited Live Virtual Class - Professional Scrum Master 2 (PSM II). This is an advanced scrum master training course - designed for experienced Scrum Masters seeking professional growth. Course Description This advanced Professional Scrum Master (PSM II) qualification is designed to elevate you to a level of total Scrum mastery. Deepen your understanding of the Scrum framework and Agile practices while transforming your team into an Agile powerhouse. Gain the skills to teach Agile and support your organisation, regardless of your role. Whether you aim to lead Agile transformation within your organisation or progress your Agile career, this advanced Scrum mastery course is your ideal opportunity. Our Scrum.org certified advanced professional scrum master training course is delivered by industry experts with unrivalled interactivity. We combine real world experience with industry leading practicals that embed key principles. The PSM 2 course if focussed on developing practical skillsets and best practice implementation to achieve tangible results. Through these tried and tested learning techniques, Fractal Systems delivers a 98% first-time pass rate. Learn how to become an advanced Scrum Master: Understand how Scrum principles and values guide decision-making. Enhance servant-leadership abilities. Support Development Teams and Product Owners to improve effectiveness. Foster a conducive environment for successful Scrum Teams with greater agility. Gain tips and techniques for collaboration with the organisation. Improve overall organisational impact as a successful Scrum Master. Address team conflict and remove impediments. Communicate the significance of a "Done" Increment. Grasp how to support the Scrum Team and navigate middle management challenges. Why Train With Us? This immersive two day PSM II course prioritises your growth and success in the industry. We believe in hands-on learning experiences that deliver practical applications that are specific to your individual workplace challenges. This not only helps to frame key principles of an advanced Scrum Master but also enables you to have a more immediate impact in your role. The PSM II training course is led by our Scrum Trainers, all of which have real world industry experience. Gain a deep understanding of advanced Scrum theory, empower your Scrum teams with best practices and be supported by industry professionals throughout - from passing test to implementing learnings into your role. Who Should Attend This Course? The Professional Scrum Master II course is an advanced program tailored for experienced Scrum Masters with a deep understanding of the Scrum framework. We recommend this to individuals with at least one year of Scrum Master experience. Your Professional Scrum Trainer Meet Jay, the founder of Fractal Systems and an experienced Professional Scrum Trainer. With over 20 years in leadership and team roles, Jay excels in delivering practical value. He adopts an interactive teaching style, avoiding PowerPoint in favour of engaging, experience-based learning, using techniques from Liberating Structures and Neuro-Linguistic Programming. Jay specialises in business transformations, providing training, mentoring, coaching, and consulting to drive success through teamwork. For those pursuing the Professional Scrum Master II (PSM II) certification, Jay and the Fractal team are committed to supporting your learning journey with a range of valuable resources: Complimentary Scrum Resource Bundle Access to a PSM Exam Simulator Free PSM II Exam Coaching Sessions Personalised 1:1 Coaching At Fractal Systems, our goal is to ensure you have the support and resources needed for a successful PSM II learning experience. Our Clients Our Testimonials

Professional Scrum Master Training II
Delivered OnlineFlexible Dates
£1,000

BABY PROJECT – WORKING WITH BABIES TO INCREASE EMPATHY

By Inclusive Solutions

This radical way of building empathy is inspired by the work of the ‘Roots of Empathy’ organisation in Canada. Roots of Empathy (ROE) is dedicated to building caring and peaceful societies through the development of empathy in children. It is a parenting education programme for elementary school students (between the ages of 3 to 14 years) based on monthly visits to the classroom by a parent and infant from the school neighbourhood. Course Category Behaviour and Relationships Autism and Communication Meeting emotional needs Description This radical way of building empathy is inspired by the work of the ‘Roots of Empathy’ organisation in Canada. As Mary Gordon founder of this way of working describes: ‘By regular visits to the classroom of local mums and their children build an empathic relationship with the baby.MARY GORDON Roots of Empathy (ROE) is dedicated to building caring and peaceful societies through the development of empathy in children. It is a parenting education program for elementary school students (between the ages of 3 to 14 years) based on monthly visits to the classroom by a parent and infant from the school neighbourhood. We teach teachers and educators to help children to observe, over the school year, how their baby forms an attachment to his or her parent. Children are encouraged to record how the infants develop. The children learn to spot their babies cues and unique temperament, while celebrating developmental milestones. Children are prepared for responsible and responsive parenting as they increase their knowledge about human development, learning, and infant safety. The baby project program brings about the development of empathy and emotional literacy: As children learn to take the perspective of others they are less likely to hurt through bullying, exclusion, aggression, and violence. Children learn how to challenge cruelty and injustice in their own classroom. Messages of social inclusion and activities that are consensus-building contribute to a culture of caring that changes the tone of the classroom. Involving fathers and men provides rich models of male nurturance Testimonials ‘13% increase in empathy scores for our year 1s’ ‘Years 2s empathy had increased by 35%’ ‘Now that I am older I can be happy for other people’ (6 year old) ‘Everyone is special – thats the truth – but when I was small I thought its not fair when someone got a present and I didn’t’ (7 year old) Dramatic improvements in children taking responsibility for actions and being less defiant over the year of the project. Learning Objectives Understanding of method and approach to building empathy with babies Full understanding of background to this approach Practical advice received as to how to set up baby project in classrooms across school Who Is It For ? Teachers School leaders Project Coordinators Social Care Course Content We will provide theoretical and evidence back ground to impact of this work. We will describe existing UK school based work. We will inspire staff in attendance to want to actively engage in this work There may even be a baby to hold!!

BABY PROJECT – WORKING WITH BABIES TO INCREASE EMPATHY
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

Demystifying strategic planning

By Strategy Insights

This Strategy Insights Masterclass explores what strategic planning is really about and how to approach it effectively (including how to consider the uncertainty of the future).

Demystifying strategic planning
Delivered OnlineFlexible Dates
£120

2nd Women in Local Government Leadership Workshop

5.0(1)

By Own Your Success

Women in Local Government Leadership Workshop is for Local Government professionals looking to learn new skills with like-minded peers and further or advance their within Local government.

2nd Women in Local Government Leadership Workshop
Delivered OnlineJoin Waitlist
£475 to £625

Security+

5.0(3)

By Systems & Network Training

Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in Internationally or OnlineFlexible Dates
£2,797

Data Protection (GDPR) Practitioner Certificate

By CloudLearn

We are data protection specialists and this is our flagship training programme for Data Protection Officers, Data Protection Managers, Compliance Managers or anyone with a responsibility for Data Protection. The Data Protection (GDPR) Practitioner Certificate is an internationally recognised qualification, endorsed by TQUK, which is regulated by Ofqual, a UK Government department. It equips current and aspiring data protection officers and data protection managers with knowledge and skills to undertake data protection compliance activities throughout an organisation. It is a valuable course for anybody with data protection compliance responsibilities. The course takes account of the latest developments in this fast moving subject, together with the latest guidance from the ICO and includes real life, practical examples throughout. There are two versions of the course (with the same content and same trainer). The courses priced at £1200 are run by Computer Law Training and lead to the TQUK endorsed certificate. The courses priced at £1440+VAT are run in collaboration with, and are booked through, the Law Society of Scotland and, on successful completion, lead to the TQUK endorsed certificate and a 'Certified Specialist' certification from the Law Society of Scotland. Suitability - Who should attend? The training programme for Data Protection Officers, Data Protection Managers, Compliance Managers, Corporate Governance Managers or anyone with a responsibility for Data Protection. The Data Protection (GDPR) Practitioner Certificate is ideal for you if you: Are already undertaking the role of Data Protection Officer Expect to be filling the post of Data Protection Officer in their current employment Are looking for employment as a Data Protection Officer Have, or expect to have, data protection responsibilities in their organisation Need to advise others on data protection compliance Wish to be able to demonstrate verifiable practical skills and learning in this area. It is suitable for those working in: the public sector, the private sector and the third sector. In either case, it will teach participants essential data protection skills and in depth knowledge. Outcome / Qualification etc. Understand the importance of data protection legislation and compliance in the UK and beyond. Interpret key terminology of the UK GDPR and Data Protection Act 2018 (DPA) in a practical context Understand the key obligations of the UK GDPR and DPA Create appropriate policies and procedures necessary for data protection compliance Carry out a data protection audit and gap analysis Develop an action plan to address a data protection gap analysis Respond appropriately to data protection issues arising in an organisation Carry out the duties of a data protection officer Undertake accountability and risk analysis activities Training Course Content Day 1 Data Protection – history and background GDPR Overview What, really, is personal data Purposes & Legal Bases Day 2 Consent Special Categories of Personal Data Data Subject Rights Transparency Requirements Data Processors and Controllers Information Security Obligations Breach Reporting and Recording Day 3 Restricted (International) Transfers Cloud Services Accountability The Personal Data Audit & Record of Processing The “Accountability Portfolio” Data Protection by Design & Default Data Protection Impact Assessments Privacy Enhancing Technologies Data Protection Officers Direct Marketing & Cookies Day 4 Data Protection Act 2018 HR Issues Risk Frameworks Data Protection Governance Day 5 Data Protection Audit Gap Analysis Action Plan Implementation The ICO and Enforcement Brexit and the future (crystal ball!) The European Data Protection Board (EDPB) Questions Course delivery details The course is delivered on Zoom. It lasts 5 days over 3 weeks, 9.30-16.30. The advertised start date is usually a Tuesday which is the first day of the course. The course normally continues on the Thursday of that week, Tuesday and Thursday the following week and one day in the third week: 24, 26, 31 January & 2, 7 February 2023 The one-hour test to obtain the certificate is online by arrangement in the week or two following the course. The trainer for the course is Tim Musson, who has a Master of Laws degree in IT and Telecoms Law, is a Certified Information Privacy Professional (CIPP/E) and a Certified Information Privacy Technologist (CIPT).

Data Protection (GDPR) Practitioner Certificate
Delivered OnlineFlexible Dates
£1,200

Debian system administration

5.0(3)

By Systems & Network Training

Debian training course description This three day hands on course provides a comprehensive coverage of core Linux administration tasks on Debian Linux. What will you learn Administer & configure Linux systems. Maintain Linux by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure Linux system. Describe the organisation and implementation of the filesystem. Debian training course details Who will benefit: System administrators. Network administrators. Prerequisites: Linux fundamentals Duration 3 days Debian training course contents Managing software Package Concepts, RPM, rpm Commands, Yum, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management, Managing Processes, the Kernel: The First Process, Process Lists, Foreground & Background Processes, Process Priorities, Killing Processes. Configuring hardware Configuring Firmware and Hardware, IRQs, I/O Addresses, DMA Addresses, Boot Disks, Coldplug and Hotplug Devices, Configuring Expansion Cards and PCI Cards, Kernel Modules, USB Devices, Linux USB Drivers, Configuring Hard Disks, Partitioning Systems, LVM, Common Layouts, Creating Partitions and Filesystems, Maintaining Filesystem Health, Tuning, Journals, Checking Filesystems, Monitoring Disk Use, Mounting and Unmounting Filesystems. Managing files File Management Commands, File Naming and Wildcards, File Archiving, Links, Directory Commands, File Ownership and Group, File access control, Permissions, chmod, Defaults, File Attributes, Disk Quotas, Enabling and setting Quotas, Locating Files, The FHS. Booting Linux and editing files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Administering the system Managing Users and Groups, Tuning User and System Environments, Using System Log Files, Understanding syslogd , Setting Logging Options, Manually Logging Data, Rotating Log Files, Reviewing Log File Contents, Maintaining the System Time, Linux Time Concepts, Manually Setting the Time, Using NTP, Running Jobs in the Future, Understanding the Role of cron, Creating System cron Jobs, Creating User cron Jobs, Using anacron, Using at. Configuring basic networking TCP/IP, Network Hardware, Network Addresses, Hostnames, Network Ports, Configuring Linux for a Local Network, Configuring with DHCP, Static IP Address, Configuring Routing, Using GUI Configuration Tools, ifup and ifdown, Diagnosing Network Connections, Testing Connectivity, Tracing a Route, Checking Network Status , Examining Network Traffic, Additional Tools. Securing your systems Administering Network Security, Super Server Restrictions, Disabling Unused Servers, Administering Local Security, Securing Passwords, Limiting root Access, Setting Login, Process, SUID/SGID Files, Configuring SSH, Using GPG, Generating, Importing and Revoking Keys, Encrypting and Decrypting Data, Signing Messages and Verifying Signatures.

Debian system administration
Delivered in Internationally or OnlineFlexible Dates
£3,497

Ubuntu system administration

5.0(3)

By Systems & Network Training

Ubuntu training course description This three day hands on course provides a comprehensive coverage of core Linux administration tasks on Ubuntu Linux. What will you learn Administer & configure Linux systems. Maintain Linux by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure Linux system. Describe the organisation and implementation of the filesystem. Ubuntu training course details Who will benefit: System administrators. Network administrators. Prerequisites: Linux fundamentals Duration 3 days Ubuntu training course contents Managing software Package Concepts, RPM, rpm Commands, Yum, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management, Managing Processes, the Kernel: The First Process, Process Lists, Foreground & Background Processes, Process Priorities, Killing Processes. Configuring hardware Configuring Firmware and Hardware, IRQs, I/O Addresses, DMA Addresses, Boot Disks, Coldplug and Hotplug Devices, Configuring Expansion Cards and PCI Cards, Kernel Modules, USB Devices, Linux USB Drivers, Configuring Hard Disks, Partitioning Systems, LVM, Common Layouts, Creating Partitions and Filesystems, Maintaining Filesystem Health, Tuning, Journals, Checking Filesystems, Monitoring Disk Use, Mounting and Unmounting Filesystems. Managing files File Management Commands, File Naming and Wildcards, File Archiving, Links, Directory Commands, File Ownership and Group, File access control, Permissions, chmod, Defaults, File Attributes, Disk Quotas, Enabling and setting Quotas, Locating Files, The FHS. Booting Linux and editing files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Administering the system Managing Users and Groups, Tuning User and System Environments, Using System Log Files, Understanding syslogd , Setting Logging Options, Manually Logging Data, Rotating Log Files, Reviewing Log File Contents, Maintaining the System Time, Linux Time Concepts, Manually Setting the Time, Using NTP, Running Jobs in the Future, Understanding the Role of cron, Creating System cron Jobs, Creating User cron Jobs, Using anacron, Using at. Configuring basic networking TCP/IP, Network Hardware, Network Addresses, Hostnames, Network Ports, Configuring Linux for a Local Network, Configuring with DHCP, Static IP Address, Configuring Routing, Using GUI Configuration Tools, ifup and ifdown, Diagnosing Network Connections, Testing Connectivity, Tracing a Route, Checking Network Status , Examining Network Traffic, Additional Tools. Securing your systems Administering Network Security, Super Server Restrictions, Disabling Unused Servers, Administering Local Security, Securing Passwords, Limiting root Access, Setting Login, Process, SUID/SGID Files, Configuring SSH, Using GPG, Generating, Importing and Revoking Keys, Encrypting and Decrypting Data, Signing Messages and Verifying Signatures.

Ubuntu system administration
Delivered in Internationally or OnlineFlexible Dates
£3,497

Suse system administration

5.0(3)

By Systems & Network Training

Suse training course description This three day hands on course provides a comprehensive coverage of core Linux administration tasks on Suse Linux. What will you learn Administer & configure Linux systems. Maintain Linux by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure Linux system. Describe the organisation and implementation of the filesystem. Suse training course details Who will benefit: System administrators. Network administrators. Prerequisites: Linux fundamentals Duration 3 days Suse training course contents Managing software Package Concepts, RPM, rpm Commands, Yum, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management, Managing Processes, the Kernel: The First Process, Process Lists, Foreground & Background Processes, Process Priorities, Killing Processes. Configuring hardware Configuring Firmware and Hardware, IRQs, I/O Addresses, DMA Addresses, Boot Disks, Coldplug and Hotplug Devices, Configuring Expansion Cards and PCI Cards, Kernel Modules, USB Devices, Linux USB Drivers, Configuring Hard Disks, Partitioning Systems, LVM, Common Layouts, Creating Partitions and Filesystems, Maintaining Filesystem Health, Tuning, Journals, Checking Filesystems, Monitoring Disk Use, Mounting and Unmounting Filesystems. Managing files File Management Commands, File Naming and Wildcards, File Archiving, Links, Directory Commands, File Ownership and Group, File access control, Permissions, chmod, Defaults, File Attributes, Disk Quotas, Enabling and setting Quotas, Locating Files, The FHS. Booting Linux and editing files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Administering the system Managing Users and Groups, Tuning User and System Environments, Using System Log Files, Understanding syslogd , Setting Logging Options, Manually Logging Data, Rotating Log Files, Reviewing Log File Contents, Maintaining the System Time, Linux Time Concepts, Manually Setting the Time, Using NTP, Running Jobs in the Future, Understanding the Role of cron, Creating System cron Jobs, Creating User cron Jobs, Using anacron, Using at. Configuring basic networking TCP/IP, Network Hardware, Network Addresses, Hostnames, Network Ports, Configuring Linux for a Local Network, Configuring with DHCP, Static IP Address, Configuring Routing, Using GUI Configuration Tools, ifup and ifdown, Diagnosing Network Connections, Testing Connectivity, Tracing a Route, Checking Network Status , Examining Network Traffic, Additional Tools. Securing your systems Administering Network Security, Super Server Restrictions, Disabling Unused Servers, Administering Local Security, Securing Passwords, Limiting root Access, Setting Login, Process, SUID/SGID Files, Configuring SSH, Using GPG, Generating, Importing and Revoking Keys, Encrypting and Decrypting Data, Signing Messages and Verifying Signatures.

Suse system administration
Delivered in Internationally or OnlineFlexible Dates
£3,497