• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

42998 RES courses delivered Online

Wellness Lab: Resting Authentically

5.0(2)

By The Self Leadership Initiative

Build the right kinds of rest into your week.

Wellness Lab: Resting Authentically
Delivered OnlineThu, Nov 2113:00
£10

22nd November Eli Keren #Agent121. Looking for: NON-FICTION

5.0(1)

By I Am In Print

LOOKING FOR: NON-FICTION Eli Keren started his publishing career at Curtis Brown before joining United Agents as an assistant in 2016. In 2021 he became an associate literary agent, representing a growing list of clients across fiction and non-fiction, actively seeking books that are going to make a positive impact in the world in some way, big or small. His role as an agent at Curious Minds Literary Agency began in 2024. Before working in books, Eli was a research scientist designing and synthesising novel drugs (white coat and everything), and science books remain a particular passion of his. In 2022 he wrote and taught a HOW TO WRITE A PROPOSAL course, and in 2023 was elected treasurer of the Association of Authors’ Agents, and in 2024 he judged the inaugural Bloomsbury Academic Writing Fellowship. Eli specialises in helping academics, scientists and researchers to bring their area of expertise to the mass-market in authoritative, ideas-led books in the fields of smart science and current affairs. He is particularly interested in popular science and cultural history, as well as issues-led books and social justice. Eli only occasionally works with memoir.  He is very keen to see non-fiction LGBTQ+ themed books. He enjoys books written by writers who are obsessed with a niche subject and skilled enough communicators to make others fall in love with their subject too. Ultimately he wants to find books that are going to change the world for the better.  Eli would like you to submit a covering letter, 1 -2 page synopsis and the first 5,000 words of your completed manuscript in a single word document. (In addition to the paid sessions, Eli is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Thursday 14 November 2024

22nd November Eli Keren #Agent121. Looking for: NON-FICTION
Delivered OnlineFri, Nov 2210:00 + more
£72

Managing Complex Safeguarding Issues, including Fabricated Induced Illness, Disguised Compliance, Child Parent Abuse & Parental Mental Health Concerns

By Brightcore Consultancy

This masterclass will help develop your confidence and knowledge in identifying and managing complex safeguarding issues.

Managing Complex Safeguarding Issues, including Fabricated Induced Illness, Disguised Compliance, Child Parent Abuse & Parental Mental Health Concerns
Delivered OnlineFri, Nov 2209:30 + more
£80

22nd November Clare Coombes #Agent121. Looking for: ADULT FICTION

5.0(1)

By I Am In Print

LOOKING FOR: ADULT FICTION Clare set up the Liverpool Literary Agency in 2020 to help address inequality and underrepresentation in the publishing industry. With more than 15 years’ experience of writing and editing professionally, including the publication of two novels, Definitions (2015) and We Are of Dust (2018 - which has received development funding from the Liverpool Film Office for a TV adaptation), she has developed an in-depth knowledge of what commissioning editors and publishers expect to see from a submitted manuscript. With a background in PR and marketing, alongside teaching on creative writing programmes, Clare also has extensive experience in pitching and promoting writers and has been nominated for the Romantic Novelist Association Agent of the Year Award! Clare would love to see historical fiction, crime fiction, psychological thrillers and women’s fiction, but she is open to all great writing with a strong hook in any area (excluding non-fiction, children’s and YA). She actively encourages submissions from writers who have been traditionally under-represented. Clare would like you to submit a covering letter, 1 page synopsis and the first 5,000 words of your manuscript in a single word document. (In addition to the paid sessions, Clare is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Thursday 14 November 2024

22nd November Clare Coombes #Agent121. Looking for: ADULT FICTION
Delivered OnlineFri, Nov 2212:00 + more
£72

Real Estate Modelling Masterclass (Advanced Cash Flow Modelling)

4.3(5)

By Bayfield Training

This course is intended to the most ambitious modellers in the property industry who would like to be fully proficient in building complex real estate models.

Real Estate Modelling Masterclass (Advanced Cash Flow Modelling)
Delivered in person or OnlineFri, Dec 1310:00 + more
£1500

ILM Level 3 Award in Leadership and Management

By Dickson Training Ltd

An accredited qualification for current and prospective managers. This programme gives Team Leaders & Managers the skills, disciplines and confidence to manage their team effectively and add a great deal more value to the organisation - where they have to apply their learning in order to achieve the highly coveted ILM qualification. One of the main responsibilities of a manager is to make sure that employees are satisfied with their job and reaching their full potential. A manager who can energise his or her employees will have a team which has a much greater potential and capability of achieving company goals and objectives. It is therefore vital that a manager has the essential skills to fully support and lead their team to success. This 3-day programme brings together the key leadership skills that you will need to be an effective manager so that you can return to the workplace and deliver tangible results. All of our ILM Programmes are provided in partnership with The BCF Group, which is the ILM Approved Centre we deliver under. Course Syllabus The syllabus of the ILM Level 3 Award in Leadership and Management course is split into three main modules, covering the following: Module OneSolving Problems and Making Decisions What is a problem? How to identify a problem, its nature, scope and impact Identifying the root cause Understanding how to interpret information to solve a problem What is involved in making an informed decision? Generate ideas/solutions- creative thinking techniques How to evaluate your options Finding the critical path Having confidence to commit to a decision Planning approach Communicating the decision Implementing the plan Module TwoUnderstanding Leadership What is leadership? Recognise the differences and similarities between leadership and management Qualities and skills of a leader Action Centered Leadership - Team, Task, Individual - John Adair Varying leadership styles Evaluating a range of leadership models and their significance for: Task, Performance, Culture, Relationships Reflect on your own leadership styles and behaviours Create an action plan to enhance your performance Module ThreeUnderstanding the Communication Process in the Workplace Identify what is effective communication Understand the importance of effective communication at work Recognise the different ways we communicate Recognise possible barriers to communication and how to overcome them Johari's window - communication flows How others will perceive and interpret the information you have provided Active listening Developing questioning skills Understanding the significance of non-verbal communication and body language Developing sensory acuity and how to use it effectively in the workplace In-House & Classroom Courses Available Online We have developed an alternative to traditional face-to-face training that continues to provide a full learning experience, and allows delegates to learn effectively whilst self-isolating from home. This is how it looks: Delegates booked on Classroom and In-House courses will continue to have access to their trainer online throughout the days that the course is booked to run. Prior to a delegate's course start date, they will be enrolled on our e-learning platform (in partnership with BCF Group) for the course they are booked on to. They will also be given contact information for their trainer, and details of how to access the online workshops. Delegates will not require any special IT equipment. A desktop computer, laptop, tablet, or a mobile phone with internet and audio capability is all that is required. Delegates taking ILM Qualifications will then proceed to the book review, video review and work based assignments with 12 months tutor support as appropriate, and in line with our previous arrangements. We hope you agree that this blended learning experience represents the safest way to continue supporting our clients and delegates during the Coronavirus disruption. In-House Courses As well as being one of the most popular open courses, we can also arrange this course as an in-house programme for companies and organisations who wish to develop a number of their managers at the same time, and would find an in-house course at their own premises much more suitable. Scheduled Courses Classroom Course - Nottingham (NG12 4DG) Classroom training courses enable you to benefit from having the tutor and other delegates right there in the room with you. Face-to-face training sessions are one of the best ways to learn, as it is easy to ask questions and have group discussions. In addition to the 2 days in the classroom, delegates will need to undertake self-directed learning and 2 work-based assignments. Cost: £995 + vat 07-08 September 2023 14-15 December 2023 12-13 February 2024 Classroom Course - Reading (RG41 5QS) Classroom training courses enable you to benefit from having the tutor and other delegates right there in the room with you. Face-to-face training sessions are one of the best ways to learn, as it is easy to ask questions and have group discussions. In addition to the 2 days in the classroom, delegates will need to undertake self-directed learning and 2 work-based assignments. Cost: £995 + vat 05-06 October 2023 15-16 January 2024 11-12 April 2024 Zoom™ Course Attending a course via Zoom videoconferencing gives you all of the benefits of classroom training without the need to leave your home or office. You still benefit from a real tutor facilitating the programme, and the content is exactly the same. The only difference is that we split the course into four half-day sessions to make it easier on your eyes! Cost: £895 + vat November 2023 - 7th Nov (morning), 7th Nov (afternoon), 8th Nov (morning), 8th Nov (afternoon) March 2024 - 19th Mar (morning), 19th Mar (afternoon), 20th Mar (morning), 20th Mar (afternoon) June 2024 - 11th Jun (morning), 11th Jun (afternoon), 12th Jun (morning), 12th Jun (afternoon) Dickson Training Ltd Founded in 1985 in Yorkshire, we have built an impressive and loyal client base. Our partnerships are built by consistently delivering outstanding development solutions and working in close collaboration with our clients, resulting in us becoming a leading UK and international training provider.

ILM Level 3 Award in Leadership and Management
Delivered in Nottingham or OnlineThu, Nov 2809:00 + more
£895 to £995

IMPORTANCE OF INTERNATIONAL DOCUMENTATION

By Export Unlocked Limited

This module aims to develop knowledge and understanding of the importance of customs documentation in the world of international trade to ensure both parties clearly understand the documentation that will be required in the import or export of goods or services.

IMPORTANCE OF INTERNATIONAL DOCUMENTATION
Delivered in Oldham or OnlineMon, Jul 2808:30 + more
£395

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineMon, Dec 213:00
£3495

Operator Licence Awareness - LGV

5.0(27)

By PETM

This driver CPC course Vehicle Roadworthiness & Load Safety is suitable for LGV drivers only and will cover: Requirements, Walk Around Checks, Legal Requirements, Additional Checks, Safety Equipment, Defect Reporting, Maintenance, Prohibitions, Considerations Before Loading, Overloading, Load Distribution, Load Security, Vehicle Dimensions, Loading Equipment.

Operator Licence Awareness - LGV
Delivered OnlineSat, Nov 2308:00
£55

Remote Policy Evaluation Methods December 2024

By Institute for Fiscal Studies

The course covers research design principles and all main quantitative evaluation methods: randomised experiments, instrumental variables, sharp and fuzzy regression discontinuity designs, regression methods, matching methods and longitudinal methods (before-after, difference-in-differences and synthetic controls).

Remote Policy Evaluation Methods December 2024
Delivered OnlineMon, Dec 210:00
£450 to £1662