• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1711 Step courses in London delivered Live Online

Immigration Pathway: Become An Immigration Expert

By Immigration Advice Service

Become an Expert Immigration Advisor For Only £599.00 View our Immigration Pathway, training course dates below, available remotely via Microsoft Teams. Immigration Pathway Our Immigration Pathway let’s learners take control of their studies and excel their immigration training. Pathways offers a comprehensive program with flexible learning approach tailored to your professional goals. With IAS Legal Training you can study to become an Immigration Expert for only £599.00   Step 1: Pick What OISC Course You Want To Study! OISC Level 1 OISC Level 2 OISC Level 3 (2 Day Course) OISC Level 3 (1 Day Fast Track)   Step 2: Pick 4 CPD Courses To Study! Appendix FM Naturalisation Introduction to Immigration Law Fresh Claims & Further Submissions Deportation Student Visa & Other routes Masterclass: Visit & ancestry Visa Domestic Violence (Achieving Indefinite Leave To Remain) First Time Supervisor / Caseworker (management training) Supporting Vulnerable Clients General Grounds of Refusal British Citizenship For Minors EU Settlement Scheme Private Life Route & Applications Unaccompanied Minors Exam Technique Level 1 (OISC Mock Exam Practice) Exam Technique Level 2 (OISC Mock Exam Practice) Setting Up An OISC Firm (Additional £35.00)   Benefits of Pathways: Gain specialised knowledge and skills in immigration training. Enhance your career prospects and marketability in the field. Earn CPD credits and advance your professional development. Access resources and support to excel in your chosen path. Course joining links, materials and instructions are sent out 24hours before the course starts.  Immigration Advice Service has been providing professional immigration services for over 10 years in the public, private and corporate sectors. Our fully qualified and OISC regulated trainer will guide you through each course and ensure you are competent and confident in your studies! Who Should Attend: Designed for individuals looking to start a career in the Immigration Industry You will be provided with training materials to keep after completing each course. *Please note that IAS only deliver training and do not administer OISC Exams to become regulated.   Join over 92% of satisfied customers who found their training with IAS useful and beneficial.

Immigration Pathway: Become An Immigration Expert
Delivered OnlineFlexible Dates
£599

RESILIA Foundation: In-House Training

By IIL Europe Ltd

RESILIA™ Foundation: In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls

RESILIA Foundation: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

Better Business Cases Foundation: In-House Training

By IIL Europe Ltd

Better Business Cases™ Foundation: In-House Training: In-House Training Better Business Cases™ is based on the Five Case Model - which is the UK government's best practice approach to structuring spending proposals and making effective business decisions. Using this best practice approach will allow organizations to reduce unnecessary spending and improve the decision-making process which gives you a greater chance of securing necessary funding and support for initiatives. The goal of the foundation course is to enable participants to work effectively with a team to develop a strong business case in their work environment. What You Will Learn At the end of this program, you will be able to: Describe the philosophy and the underlying rationale of the Five Case Model Identify different types of business case, their purpose, who is responsible for them Recognize when the different types are required in the development of a spending proposal Develop the business case in relation to other recognized and recommended best practices for programme and project management Overview of the Five Case Model Five key components of a business case and the order in which they are presented Three key stages in the development of a spending proposal Definition of a programme / project and the key differences between programmes and projects Purpose of a Business Justification Case (BJC) and in what circumstances it should be considered Purpose of a Strategic Outline Case (SOC) Purpose of an Outline Business Case (OBC) Purpose of a Full Business Case (FBC) Relationship between policies, strategies, programmes, and projects and their deliverables Developing the Strategic Case Purpose and core content of a Strategic Case Purpose of SMART robust spending objectives and the key objectives for spend: economy, efficiency, effectiveness, re-procurement, and statutory or regulatory compliance Four main categories of benefits criteria and the parties involved in their development Three key categories of risk Purpose of identifying constraints and dependencies Difference between direct and indirect benefits Developing the Economic Case Purpose and core content of an Economic Case Purpose of critical success factors and the key critical success factors based upon the Five Case Model Purpose of the long list options and how to generate options and undertake SWOT analysis Minimum of four short-list options, how they are derived, and what they should include (Reference Project / Public Sector Comparator [PSC]) Difference between the preferred way forward and the preferred option Purpose, objectives, key participants, and outputs of Workshop Stage 2 - identifying and assessing the options Rules that should be followed for the treatment of costs and benefits Key differences between economic appraisals and financial appraisals Factors considered when selecting the preferred option Developing the Commercial Case Purpose and core content of a Commercial Case Guiding principles when apportioning risk between the contractual parties Purpose of payment mechanisms Purpose of Step 9 in the development framework: Contracting for the deal Developing the Financial Case Purpose and core content of a Financial Case The financial statements required for all projects The possible impacts to consider Developing the Management Case Purpose and core content of a Management Case Purpose of a programme / project management strategy, framework, and plan Purpose of a change management strategy, framework, and plan Purpose of a benefits realization strategy, framework, and register / plan Purpose of a risk management strategy, framework and register / plan Purpose of a post programme / project evaluation strategy, framework, and plan

Better Business Cases Foundation: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

M.D.D GOTTMAN METHOD COUPLES THERAPY PACKAGE (COUPLES)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

Including the following services: Strengthening the bond with Gottman Method Effective communication techniques in couples therapy Managing conflict through Gottman Method interventions Building trust and intimacy in relationships Enhancing emotional connection with Gottman Method Relationship assessment and interventions Cultivating a resilient partnership with Gottman Method Transformative couples therapy program Invest in the future of your relationship today and experience the power of Gottman Method Couples Therapy. Our compassionate therapists are dedicated to guiding you and your partner towards lasting love and deep connection. Take the first step towards transformative change by scheduling a session with us now. 3 x 1 hour https://relationshipsmdd.com/product/gottman-method-couples-therapy-package/

M.D.D GOTTMAN METHOD COUPLES THERAPY PACKAGE (COUPLES)
Delivered in London or UK Wide or OnlineFlexible Dates
£700

Beginner UX Design Course

5.0(5)

By UX Academy

Learn user experience fundamentals and master the design process with a user-centered approach. This UX Design Course has been designed to fully equip you with all the tools and methodologies you need to succeed as a UX designer.

Beginner UX Design Course
Delivered OnlineFlexible Dates
£199 to £1,250

Remote Policy Evaluation Methods February 2025

By Institute for Fiscal Studies

The course covers research design principles and all main quantitative evaluation methods: randomised experiments, instrumental variables, sharp and fuzzy regression discontinuity designs, regression methods, matching methods and longitudinal methods (before-after, difference-in-differences and synthetic controls).

Remote Policy Evaluation Methods February 2025
Delivered OnlineJoin Waitlist
£450 to £1,662

Remote Policy Evaluation Methods December 2024

By Institute for Fiscal Studies

The course covers research design principles and all main quantitative evaluation methods: randomised experiments, instrumental variables, sharp and fuzzy regression discontinuity designs, regression methods, matching methods and longitudinal methods (before-after, difference-in-differences and synthetic controls).

Remote Policy Evaluation Methods December 2024
Delivered OnlineJoin Waitlist
£450 to £1,662

RESILIA Foundation: Virtual In-House Training

By IIL Europe Ltd

RESILIA™ Foundation: Virtual In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls

RESILIA Foundation: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,850

Better Business Cases Foundation: Virtual In-House Training

By IIL Europe Ltd

Better Business Cases™ Foundation: Virtual In-House Training Better Business Cases™ is based on the Five Case Model - which is the UK government's best practice approach to structuring spending proposals and making effective business decisions. Using this best practice approach will allow organizations to reduce unnecessary spending and improve the decision-making process which gives you a greater chance of securing necessary funding and support for initiatives. The goal of the foundation course is to enable participants to work effectively with a team to develop a strong business case in their work environment. What You Will Learn At the end of this program, you will be able to: Describe the philosophy and the underlying rationale of the Five Case Model Identify different types of business case, their purpose, who is responsible for them Recognize when the different types are required in the development of a spending proposal Develop the business case in relation to other recognized and recommended best practices for programme and project management Overview of the Five Case Model Five key components of a business case and the order in which they are presented Three key stages in the development of a spending proposal Definition of a programme / project and the key differences between programmes and projects Purpose of a Business Justification Case (BJC) and in what circumstances it should be considered Purpose of a Strategic Outline Case (SOC) Purpose of an Outline Business Case (OBC) Purpose of a Full Business Case (FBC) Relationship between policies, strategies, programmes, and projects and their deliverables Developing the Strategic Case Purpose and core content of a Strategic Case Purpose of SMART robust spending objectives and the key objectives for spend: economy, efficiency, effectiveness, re-procurement, and statutory or regulatory compliance Four main categories of benefits criteria and the parties involved in their development Three key categories of risk Purpose of identifying constraints and dependencies Difference between direct and indirect benefits Developing the Economic Case Purpose and core content of an Economic Case Purpose of critical success factors and the key critical success factors based upon the Five Case Model Purpose of the long list options and how to generate options and undertake SWOT analysis Minimum of four short-list options, how they are derived, and what they should include (Reference Project / Public Sector Comparator [PSC]) Difference between the preferred way forward and the preferred option Purpose, objectives, key participants, and outputs of Workshop Stage 2 - identifying and assessing the options Rules that should be followed for the treatment of costs and benefits Key differences between economic appraisals and financial appraisals Factors considered when selecting the preferred option Developing the Commercial Case Purpose and core content of a Commercial Case Guiding principles when apportioning risk between the contractual parties Purpose of payment mechanisms Purpose of Step 9 in the development framework: Contracting for the deal Developing the Financial Case Purpose and core content of a Financial Case The financial statements required for all projects The possible impacts to consider Developing the Management Case Purpose and core content of a Management Case Purpose of a programme / project management strategy, framework, and plan Purpose of a change management strategy, framework, and plan Purpose of a benefits realization strategy, framework, and register / plan Purpose of a risk management strategy, framework and register / plan Purpose of a post programme / project evaluation strategy, framework, and plan

Better Business Cases Foundation: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,850

Business Intelligence: In-House Training

By IIL Europe Ltd

Business Intelligence: In-House Training Business Intelligence (BI) refers to a set of technology-based techniques, applications, and practices used to aggregate, analyze, and present business data. BI practices provide historical and current views of vast amounts of data and generate predictions for business operations. The purpose of Business Intelligence is the support of better business decision making. This course provides an overview of the technology and application of BI and how it can be used to improve corporate performance. What you will Learn You will learn how to: Specify a data warehouse schema Identify the data and visualization to be used for data mining and Business Intelligence Design a Business Intelligence user interface Getting Started Introductions Agenda Expectations Foundation Concepts The challenge of decision making What is Business Intelligence? The Business Intelligence value proposition Business Intelligence taxonomy Business Intelligence management issues Sources of Business Intelligence Data warehousing Data and information Information architecture Defining the data warehouse and its relationships Facts and dimensions Modeling, meta-modeling, and schemas Alternate architectures Building the data warehouse Extracting Transforming Loading Setting up the data and relationships Dimensions and the Fact Table Implementing many-to-many relationships in data warehouse Data marts Online Analytical Processing (OLAP) What is OLAP? OLAP and OLTP OLAP functionality Multi-dimensions Thinking in more than two dimensions What are the possibilities? OLAP architecture Cubism Tools OLAP variations - MOLAP, ROLAP, HOLAP BI using SOA Applications of Business Intelligence Applying BI through OLAP Enterprise Resource Planning and CRM Business Intelligence and financial information Business Intelligence User Interfaces and Presentations Data access Push-pull data access Types of decision support systems Designing the front end Presentation formats Dashboards Types of dashboards Common dashboard features Briefing books and scorecards Querying and Reporting Reporting emphasis Retrofitting Talking back Key Performance Indicators Report Definition and Visualization Typical reporting environment Forms of visualization Unconstrained views Data mining What is in the mine? Applications for data mining Data mining architecture Cross Industry Standard Process for Data Mining (CISP-DM) Data mining techniques Validation The Business Intelligence User Experience The business analyst role Business analysis and data analysis Five-step approach Cultural impact Identifying questions Gathering information Understand the goals The strategic Business Intelligence cycle Focus of Business Intelligence Design for the user Iterate the access Iterative solution development process Review and validation questions Basic approaches Building ad-hoc queries Building on-demand self-service reports Closed loop Business Intelligence Coming attractions - future of Business Intelligence Best practices in Business Intelligence

Business Intelligence: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,495