• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5 Educators providing Policy courses in Bradford

Budokai Karate

budokai karate

London

By Sensei Kevin Allmond 3rd Dan Hakuda Ryu Karate Senior Instructor & Technical Director - Budokai Karate Member of the BMABA (Pictured right) Every instructor at Budokai Karate realises that the martial arts is not simply about kicking and punching, but more about encouraging physical fitness, self confidence, self discipline and ultimately achieving a set of goals that we look to achieve together. We genuinley believe that in developing an individual both physically and mentally, they will reap the rewards in every aspect of their lives and it's because of this we are dedicated to not only producing excellent martial artists but outstanding members of the community. Budokai simply means "many styles" and as can be seen from the instructor profiles below, the main instructors all come from different backgrounds. Martial Arts are all essentially the same as there are only so many ways to perform a kick or a punch, however, there are subtle differences between styles which help people of varying abilities to perform each technique. With the wealth of experience that we are now gaining as an organisation there are very few techniques, if any, that can't be taught to people of any level. Whether they saw it on the Teenage Mutant Hero Turtles, on the Power Rangers, or on Yu Gi Oh, children today have been exposed to martial arts from an early age. From karate to kung fu, martial arts provide a powerful workout, but some parents worry that these sports are too violent for children. While it is true that martial arts originated as fighting systems in Asia, today's martial arts provide children with physical exercise, a chance to gain self confidence, an opportunity to interact with others, and worthwhile lessons in self defence. For children of all ages, martial arts are an exciting alternative to more traditional sports. We teach karate, or empty hand, which is perhaps the most well known martial art. Karate is a Japanese discipline used for self defence. In addition to throws and blocks, karate also incorporates punches and kicks as well as weapons. Karate competitions take place at all levels across the UK, and more information can be found from the British Karate Association. No matter in which martial arts your children become interested, all martial arts build confidence, encourage self control, motivate self esteem, and teach self defence. Martial arts are also incredibly safe when taught in an appropriate school, and all qualified instructors will be more than happy to share their qualifications and training philosophies. Finding the right school for your child could well be the first step to a long love affair with the martial arts.

IVE Studio

ive studio

Leeds

We are IVE (formerly CapeUK) was established as an incorporated company in April 1997 and registered as a charity in April 1999. Inspired by radical new models of creative education, the company was originally set up as a research and development organisation. CapeUK looked to drill down into the creative process and explore how it might be used to drive improvements in teaching and learning. We became influential in relation to policy development and established a national and international reach in relation to championing creativity and professional learning. We also acted as advisors to Government on the importance of creativity and how it might be developed as a transferable skill. By 2014 we realised there was an opportunity to diversify our work and utilise the learning that 17 years of research and development had provided us. It was clear there was significant appetite beyond the education and cultural sectors for programmes that were aimed at developing the creative capacity and competencies of the workforce, and particularly in leadership. We have therefore spent the last 5 years designing and delivering training that aims to teach creativity as a transferable skill and how to create the right environment for creativity to flourish within the workplace, driving innovation, in a consistent and structured way. We also draw out the leadership and team behaviours that are needed to support this. IVE today Rosi Lister, CEO, explains: Rosi Lister CEO We are IVE “In 2016 we began delivering creative leadership training in sectors that are highly regulated and where staff are not traditionally encouraged or empowered to think outside the box, but where there is a growing need for this skill set. “Then, in 2017, our umbrella identity became We Are IVE Ltd, establishing InnovatIVE as our trading company which gifts all profits to our charitable programme. This programme seeks to inspire young, diverse & talented people from some of our most disadvantaged communities through a range of opportunities designed to develop their own creative potential as future leaders.” We believe that the workplace of the future depends on having individuals that are creative, that are able to adapt, that are resilient and have the range of skills and aptitudes employers are looking for. That’s why, when we deliver our training on an earned income basis, the profit goes back into supporting our charitable programmes for disadvantaged young people. It is therefore a ‘pay it forward’ scheme where all our customers and beneficiaries win.

Courses matching "Policy"

Show all 95

Public Policy Analysis

5.0(10)

By GBA Corporate

Overview The significance and goals of public policy Using game theory to analyze public policy. Understand the importance of public policy in society. Understand the significance of theoretical and empirical models in understanding public policy. Goals of public policy Recognizing market failures. Distinguishing between public and private goods.

Public Policy Analysis
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

All organizations have policies and procedures that guide how decisions are made and how the work is done in that organization. Professionally written policies and procedures increase organizational accountability and transparency and are fundamental to quality/standards assurance and quality improvement.

Policy & Procedure Writing
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£668

Advanced Junos Service Provider Routing

5.0(3)

By Systems & Network Training

Advanced Junos SP Routing course description This is designed to provide students with detailed coverage of OSPF, IS-IS, BGP, and routing policy. Students will gain experience in configuring, monitoring, and troubleshooting the Junos operating system and in monitoring device and protocol operations. This course uses Juniper Networks vMX Series Routers for the hands-on component, but the lab environment does not preclude the course from being applicable to other Juniper hardware platforms running the Junos OS. What will you learn Describe and configure OSPF area types and operations. Configure and monitor IS-IS. Describe basic BGP operation. Explain the causes for route instability. Describe how to troubleshoot routing policy. Explain the default behaviour of damping on links. Advanced Junos SP Routing course details Who will benefit: Network staff working with Junos at layer 3. Prerequisites: Junos Intermediate Routing Duration 5 days Advanced Junos SP Routing course contents OSPF OSPFv2 Review Link-State Advertisements Protocol Operations OSPF Authentication Lab: OSPF Multi-Area Networks Chapter 3: OSPF Areas Review of OSPF Areas Stub Area Operation and Configuration NSSA Operation and Configuration Route Summarization Lab: OSPF Route Summarization OSPF Case Studies and Solutions Virtual Links OSPF Multiarea Adjacencies External Reachability Lab: Advanced OSPF Options and Routing Policy Troubleshooting OSPF Troubleshooting OSPF Lab: OSPF Troubleshooting IS-IS Overview of IS-IS IS-IS PDUs Neighbors and Adjacencies Configuring and Monitoring IS-IS Lab: IS-IS Configuration and Monitoring Advanced IS-IS Operations and Configuration Options IS-IS Operations IS-IS Configuration Options IS-IS Routing Policy Lab: Advanced IS-IS Configuration Options and Routing Policy Multilevel IS-IS Networks Level 1 and Level 2 Operations Multilevel Configuration Lab: Configuring a Multilevel IS-IS Network Troubleshooting IS-IS Troubleshooting IS-IS Lab: IS-IS Troubleshooting BGP Review of BGP BGP Operations BGP Path Selection Options Configuration Options Lab: BGP and BGP Attributes BGP Attributes and Policy - Part1 BGP Policy Next Hop Origin and MED AS Path Lab: BGP Attributes - Next Hop, Origin, MED, and AS Path Attributes and Policy - Part2 Local Preference Communities Lab: BGP Attributes - Local Preference and Communities Route Reflection and Confederations Route Reflection Operation Configuration and Routing Knowledge BGP Confederations Lab: Scaling BGP BGP Route Damping Route Flap and Damping Overview Route Damping Parameters Configuring and Monitoring Route Damping Lab: BGP Route Damping Troubleshooting BGP Troubleshooting BGP Lab: BGP Troubleshooting Troubleshooting Policy Troubleshooting Policy Lab: Policy Troubleshooting

Advanced Junos Service Provider Routing
Delivered in Internationally or OnlineFlexible Dates
£4,997

Advanced Junos Security

5.0(3)

By Systems & Network Training

Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in Internationally or OnlineFlexible Dates
£4,997

Introduction to the Junos Operating System

5.0(3)

By Systems & Network Training

Junos Operating System training course description This course provides students with the foundational knowledge required to work with the Junos OS and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. Delegates will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 15.1X49. What will you learn Describe the design architecture of the Junos OS. Navigate within the Junos CLI and perform tasks within the CLI operational and configuration modes. Configure and monitor network interfaces. Navigate within the Junos J-Web interface. Identify where you might use firewall filters. Explain basic routing operations and concepts. Identify key factors in Juniper Networks' security. Junos Operating System training course details Who will benefit: This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Prerequisites: TCP/IP foundation for engineers Duration 3 days Junos Operating System training course contents Junos Operating System Fundamentals The Junos OS Traffic Processing Overview of Junos Devices User Interface Options-The Junos CLI User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode User Interface Options-The J-Web Interface The J-Web GUI Configuration Lab 1: User Interface Options Initial Configuration Factory-Default Configuration Initial Configuration Interface Configuration Lab 2: Initial System Configuration Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP Lab 3: Secondary System Configuration Operational Monitoring and Maintenance Monitoring Platform and Interface Operation Network Utilities Maintaining the Junos OS Password Recovery System Clean-Up Lab 4: Operational Monitoring and Maintenance Interface Configuration Examples Review of the Interface Configuration Hierarchy Interface Configuration Examples Using Configuration Groups Routing Fundamentals Routing Concepts: Overview of Routing Routing Concepts: The Routing Table Routing Concepts: Routing Instances Static Routing Dynamic Routing Lab 5: Routing Fundamentals Routing Policy Routing Policy Overview Case Study: Routing Policy Lab 6: Routing Policy Firewall Filters Firewall Filters Overview Case Study: Firewall Filters Unicast Reverse-Path-Forwarding Checks Lab 7: Firewall Filters Class of Service CoS Overview Traffic Classification Traffic Queueing Traffic Scheduling Case Study: CoS Lab 8: Class of Service JTAC Procedures Opening a Support Case Customer Support Tools Transferring Files to JTAC Juniper Security Concepts Security Challenges Juniper's Security Focus Appendix A: IPv6 Fundamentals IPv6 Addressing Protocols and Services Configuration

Introduction to the Junos Operating System
Delivered in Internationally or OnlineFlexible Dates
£2,367

Windows certificates for engineers

5.0(3)

By Systems & Network Training

Windows certificates training course description A hands-on training course concentrating solely on PKI using Windows certificates. What will you learn Explain how PKI works. Install windows certificates. Configure windows certificates. Troubleshoot windows certificates. Windows certificates training course details Who will benefit: Technical security staff. Prerequisites: Windows server. Duration 3 days Windows certificates training course contents PKI Symmetric encryption, asymmetric encryption, authentication, digital signing, hashing, certificates, Certification Authorities, Root CA, Intermediate CA, policy CA, Issuing CA, Certificate Revocation Lists. Hands on Inspecting a certificate. Policies and PKI Security policy, certification policy. CA hierarchy Impact of CAs on Active Directory, CA architecture, number of tiers, issuing CA organisation, CA configuration files. CA security. Hands on CA installation PKI health tool, monitoring. Certificate revocation When to revoke, OCSP. Hands on Revoking certificates. Certificate validation Discovery, validation, checks, revocation checking, certificate chains, certification publication. Hands on Event viewer. Certificate templates Version 1, version 1, default, modifying templates. Hands on Template management. Roles Criteria roles, CA administrator, Certificate manager, Backup operator, Auditor. Other PKI management roles. Disaster recovery Backups, recovery. Hands on certutil. Issuing certificates The certificate enrolment process, enrolment methods, manual enrolment, automatic enrolment. Trust between organisations Creating Trust, CTLs, common root CA, cross certification, bridge CA. Web servers and certificates SSL encryption, certificate authentication. Hands on Web servers. VPN Hands on Certificate deployment for VPN. WiFi Hands on 802.1X

Windows certificates for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,497

Supporting Windows 10

5.0(3)

By Systems & Network Training

Supporting Windows 10 course description This course is designed to provide students with the knowledge and skills required to support and troubleshoot Windows 10 PCs and devices in a Windows Server domain environment. These skills include understanding of Windows 10 features, how they can be used in an Active Directory environment and how to troubleshoot them. What will you learn Troubleshoot startup issues and operating system services on a Windows 10 PC. Troubleshoot issues related to network connectivity. Troubleshoot client configuration failures and GPO application issues. Troubleshoot issues related to application installation and operation. Recover a PC running Windows 10. Supporting Windows 10 course details Who will benefit: Anyone supporting users running Windows 10 personal computers within a medium to large enterprise. Prerequisites: None. Duration 5 days Supporting Windows 10 course contents Implementing a Troubleshooting Methodology Overview of Windows 10, Introduction to the EDST Job Role, Overview of the Troubleshooting Steps & Tools. Hands on Implementing a Troubleshooting Methodology. Hands on Using Troubleshooting Tools for Windows 10. Troubleshooting Startup Issues Overview of the Windows 10 Startup Recovery Environment, Troubleshooting Startup Settings & Operating System Services Issues, Recovering BitLocker-Protected Drives. Hands on Troubleshooting Startup Issues. Hands on Recovering BitLocker-Encrypted Drives, Creating a New BitLocker Password. Troubleshooting Hardware and Device Drivers Troubleshooting Device Driver Failures & Physical Failures, Overview of Hardware Troubleshooting, Monitoring Reliability, Configuring the Registry. Hands on Troubleshooting Device Driver Issues, Resolving Hardware Issues, Adding a Missing Device Driver to a Driver Store, Reverting a Problematic Device Driver. Hands on Troubleshooting Hardware Issues, Diagnosing Memory, Troubleshooting and Repairing Failed Disk Redundancy Synchronizing Settings, Accessing Data on a Foreign Volume. Troubleshooting Remote Computers Using Remote Desktop and Remote Assistance, Remoting with Windows PowerShell Hands on Troubleshooting Remote Computer by using Remote Desktop and Remote Assistance. Hands on Troubleshooting Remote Computer by using Windows PowerShell. Resolving Network Connectivity Issues Determining Network Settings, Troubleshooting Network Connectivity Issues, Troubleshooting Name Resolution. Hands on Resolving Network Connectivity Issues. Hands onResolving Name Resolution Issues. Troubleshooting Group Policy Overview of Group Policy Application, Resolving Client Configuration Failures and GPO Application Issues. Hands on Troubleshooting Group Policy Application Issues. Hands on Resolving Group Policy Issues. Hands on Installing and Sharing a Printer. Troubleshooting User Settings Troubleshooting Sign In Issues, Troubleshooting the Application of User Settings. Hands on Troubleshooting Sign in Problems. Hands on Troubleshooting the Application of User Settings, Resolving Folder Redirection Problem, Resolving Roaming User Profile Problem. Troubleshooting Remote Connectivity Troubleshooting VPN Connectivity Issues & DirectAccess. Hands on Troubleshooting VPN Connectivity Lab : Configuring and Troubleshooting DirectAccess Configuring and Verifying, DirectAccess Client-Side Settings, Troubleshooting DirectAccess. Troubleshooting Resource Access Within a Domain & File Permissions Issues, Recovering Files Encrypted by EFS, Troubleshooting Printer Access Issues. Lab : Troubleshooting File Access Issues Lab : Troubleshooting Access to Encrypted Files. Hands on Troubleshooting Printer Access Issues Troubleshooting Resource Access for Non Domain Member Clients Configuring and Troubleshooting Device Registration, Configuring and Troubleshooting Work Folders, Configuring and Troubleshooting OneDrive Access. Hands on Troubleshooting Resource Access for Clients that are not Domain Members. Troubleshooting Device Registration, Work Folders and OneDrive for Business. Troubleshooting Applications Troubleshooting Desktop App Installation Issues, Desktop Apps, Managing Windows Store Apps, Troubleshooting Access to Company Web Applications. Hands on Troubleshooting Desktop Apps, AppLocker Policy Application & Application Compatibility issue. Hands on Troubleshooting Access to Company Web Applications, Internet Explorer Issue & Microsoft Edge. Maintaining Windows 10 Managing & Troubleshooting Windows Activation, Troubleshooting Performance, Applying Applications. Hands on Monitoring and Troubleshooting Performance. Recovering Data and Operating System File Recovery in Windows 10, Recovering an OS. Hands on Recovering Data, Recovering Data from Azure Backup, Recovering Deleted File by Using File History. Hands on Provisioning Computer to Comply with Company Standards, Provision Computer to Comply with Company Standards.

Supporting Windows 10
Delivered in Internationally or OnlineFlexible Dates
£3,697

Microsoft Active Directory

5.0(3)

By Systems & Network Training

Microsoft Active Directory course description A thorough understanding of this system is essential for anyone managing enterprise MS networks. Essential theory is complimented with a high level of hands on practice allowing delegates to observe the idiosyncrasies of Active Directory and Group Policy at first hand. Delegates learn the fundamental theory of AD and progress onto building a multi-domain network in the classroom. The course includes troubleshooting methods, and essential maintenance procedures. This course is designed to teach you the skills needed for day to day management of these technologies. What will you learn Install AD on multiple PCs. Use the tools to create and manage objects. Create appropriate group policies to restrict selected user's desktops and network access. Install DNS to support Active Directory without loosing Internet Connectivity. Maintain and troubleshoot AD problems Backup Active Directory. Microsoft Active Directory course details Who will benefit: Technical staff working with AD based networks. Prerequisites: Supporting Windows server. Duration 3 days Microsoft Active Directory course contents Introduction to Active Directory Network authentication methods, Active Directory defined, AD naming conventions, network management with AD, AD structures: Domains, Organisational Units, Forests & Trees, Sites, The Global Catalogue. Windows 2003 new features, installing AD. Hands on Installing an AD network. Windows overview Management methods Server management tools, installing the additional tools, Terminal Server: Administration mode, Administrator accounts in AD, Local Security Policy. Hands on Install the management tools, Management using Terminal Services. Creating & Managing Objects (a quick look) AD management tools, AD users and computers, Creating & managing OUs, User Accounts and groups, controlling access to AD objects, moving objects, Publishing resources, locating objects in AD, delegating authority. Hands on Creating a control OU structure and delegating authority. Introduction to Group Policies What are Group Policies? Where Group Policy data is stored, security, Group Policy flow. Hands on Implementing Group Policies Working with Group Policies Local security templates, administrative templates, scripts, folder redirection, software deployment. Hands on Scripts, redirecting the start menu, creating a secure, robust desktop environment. Implementing DNS DNS basics, troubleshooting, implementing DNS zones. Hands on Building a unified DNS solution. Maintaining and managing the AD database AD support tools, database internal structure, replication, replication tools, Single Operations Masters, tools for maintenance, maintenance techniques, Backing up AD, Directory Services restore mode, NTDSUtil, Authoritative & non-authoritative restoration, rebuilding. Hands on NTDSUtil.

Microsoft Active Directory
Delivered in Internationally or OnlineFlexible Dates
£1,877

Natural Gas & LNG Sales Agreements

By EnergyEdge - Training for a Sustainable Energy Future

Enhance your knowledge of natural gas and LNG sales agreements with EnergyEdge course. Enroll now to gain valuable industry knowledge and skills.

Natural Gas & LNG Sales Agreements
Delivered in Internationally or OnlineFlexible Dates
£2,699 to £2,799

Production Sharing Contracts (PSC) & Related Agreements

By EnergyEdge - Training for a Sustainable Energy Future

Gain a deep understanding of Production Sharing Contracts (PSC) and related agreements through our expert-led course. Enroll now and excel in your field with EnergyEdge.

Production Sharing Contracts (PSC) & Related Agreements
Delivered in Internationally or OnlineFlexible Dates
£2,699 to £2,799