• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4084 Technology courses delivered Online

Commercial awareness for technical people (In-House)

By The In House Training Company

The aim of this course is to expose the commercial context within which technical work is carried out. It is to allow technical staff to understand how they fit into a larger picture, why they may be asked to undertake tasks that may not appear to be technical and the impact their interactions have within the commercial context. The scope of the programme includes: The course emphasises the collaborative nature of delivery and the need to offer value to customers. The principal training objectives for this programme are to help participants: Understand why technical roles are broader than we might assume Appreciate the importance of, and the need to support, sales Value the idea of 'Good Enough' Recognise what can affect profitability Realise the future needs protecting 1 Introduction (Course sponsor) Why this programme has been developed Review of participants' needs and objectives 2 That's not my job! How we see our own role in work How other people see our role Stakeholders: who are they and why do they matter? The organisational backdrop What is my role really? 3 Sales and marketing Where does the money come from? Where do we find customers? The sales process One-off sales versus repeat business Customer/supplier relationships What something costs versus what the customer will pay The value chain 4 Estimating Purpose of estimates The problem with precision Five estimating techniques 5 Change control Can you just do this for me? When being helpful leads to bankruptcy How to deal with change requests 6 Risk management Risk in projects Risk in operations Categories of risk 7 The value of intellectual property Issues with sharing information Commercial in confidence Non-disclosure agreements 8 Course review and action planning (Course sponsor present) Identify actions to be implemented individually What actions should be implemented to improve working with non-technical people? Conclusion

Commercial awareness for technical people (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Certified IT Asset Disposal (CITAD)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for those responsible for ITAD programs and other IT professionals involved in Asset Management, resource budgeting, finance, software licensing, contract management and strategic planning. Overview Students will learn the best practices in an IT Asset Management Program and align those processes with their organizations' business practices. They will be able to manage overall ITAM programs and demonstrate in-depth knowledge, operational knowledge and competence in asset disposal and process development. The IAITAM Certified IT Asset Disposition (CITAD) course prepares individuals to manage the IT asset disposal process within an organization. Best practices in IT Asset Disposition (ITAD) are broken down from policy management, data security to chain of custody transitioning. Attendees whose job responsibilities include ITAD will take away the knowledge of how to avoid risk of data loss and public exposure that surround a breakdown in ITAD process management. ITAD best practices, financial return, data security global implications and the importance of vendor management are just a few of the topics incorporated in the CITAD course. This course exposes the attendee to numerous concepts for ITAM that are relevant for both direct application and as a means of discussion for those persons who will implement, manage and direct ITAM initiatives for their organizations. This course includes the exam for CITAD certification. Course Outline Disposition Overview Disposition and ITAM Organizational Goals for Disposition ITAM Goals for Disposition Governance of Electronic Disposal Composition of E-Scrap Waste Management Laws Foundation for Disposal Management Policy Topics Relevant to Disposition Asset Standards Benefit Disposal The Role of Automation Data Security Governance Working with Vendors Selecting Vendors Due Diligence The Removal Process Software During Disposition Decision Factors for Retirement The Disposition Processes Financial Management & Measurement Additional course details: Nexus Humans Certified IT Asset Disposal (CITAD) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified IT Asset Disposal (CITAD) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified IT Asset Disposal (CITAD)
Delivered OnlineFlexible Dates
Price on Enquiry

Advanced TP-CT - Implementing and Configuring Cisco TelePresence Video Suite

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Network Video Engineer Voice/UC/Collaboration/Communications Engineer Collaboration Tools Engineer Collaboration Sales/Systems Engineer Overview Implement and Configure Cisco Endpoints Implement and Configure Cisco Unified Communications Manager for Video Endpoints Implement and Configure Cisco IMP for Jabber Implement and Configure Cisco Expressway Implement and Configure Cisco Video Communications Server (VCS) Control Implement and Configure Cisco Video Communications Server (VCS) Expressway Implement and Configure connectivity between a Cisco VCS and Cisco UCM Implement and Configure a Cisco Conductor Implement, Configure, and Operate Cisco TelePresence Management Suite (TMS) and provision devices using Cisco TMS Provisioning Extension (TMSPE) Implement and Configure Cisco Meeting Server This one of kind Cisco Collaboration in-depth course takes student from initial endpoint configuration to a full solution deployment using all of the Cisco Collaboration Components. Students will have extensive labs in which they will configure and troubleshoot a full Cisco Telepresence Deployment. Participants will gain in-depth practical knowledge with exercises on installing, configuring, maintaining and troubleshooting of all Cisco Telepresence Components.The software applications that are covered in this course include:Cisco Unified Communications Manager (CUCM)Cisco Unified Communications Manager IM and PresenceCisco ExpresswayCisco Video Communication Server (VCS)Cisco ConductorCisco Telepresence Server (TS)Cisco Meeting Server (CMS)Cisco Telepresence Management Suite (TMS)Cisco TMS Extensions Understanding Cisco TelePresence Endpoints Cisco TelePresence Endpoint Solutions Overview Cisco DX Series Endpoint Characteristics Cisco TelePresence TC Software-Based Endpoint Characteristics Cisco TelePresence EX60 and EX90 Cisco TelePresence MX Series Cisco TelePresence SX Series Endpoints Cisco TelePresence Room Kits Cisco Intelligent Proximity Cisco TelePresence TC Software-Based Endpoint Peripherals Cisco TelePresence TC Software-Based Endpoint Deployments Cisco TelePresence Integrator C Series-Based Endpoints Cisco Jabber Video for TelePresence Characteristics Cisco Jabber Understanding the Cisco Video Network Network Overview H323 Overview SIP Overview VCS vs Unified Communications Manager Internetworking QOS Overview Implementing and Configuring Unified Communication Manager Unified Communications Manager Initial Settings Service Activation Enterprise and Service Parameters SIP Domains Configure IMP for Jabber Configure Jabber Settings Registering Endpoints Verifying Network Registration Cisco VCS / Expressway Overview and Configuration Configuring Initial VCS Setting Configuring Authentication Registration Conflict Policy Registration Restriction Policy Local Zone Components Membership Rules Transforms Purpose of Zones Search Priority Neighbor Zones Creating Neighbor Zones Need for Traversal Zones H.460 and Assent Protocols Traversal Zone Configuration Domain Name System Dialing E.164 Number Mapping Bandwidth Management Pipes Subzones and Zones Subzone Call Failure Call Processing Order Certificates Certificate Installation Clustering and the Cisco VCS Clustering Configuration Collecting Information Log Files Search History Connecting VCS-C to CUCM Connect VCS-C to VCS-E Connecting CUCM to VCS-C Understanding the Cisco TelePresence Conductor What is Conductor? Conductor ? How it works Installing Cisco Conductor Configuring Conductor Network Settings Configuring Conductor for a CUCM Configuration MCU Configuration Telepresence Server Telepresence Conductor Server Configuration Configuring TelePresence Conductor for ad hoc conferences Configuring TelePresence Conductor for rendezvous conferences Configuring Unified CM Configuring general settings on Unified CM Locations in Unified CM Unified CM trusts TelePresence Conductor's server certificate SIP trunk security profile Configuring Unified CM for rendezvous conferences Sip Trunk Configuration Conference Bridge Configuration MRG and MRGL Configuration Unified CM normalization scripts Configuring Unified CM for ad hoc conferences Sip Trunk Configuration Route pattern to match the SIP Trunk Configuration Unified CM normalization scripts Configuring the Cisco VCS with TelePresence Conductor Designing a Dial Plan MCU Configuration Telepresence Server Configuring the Cisco VCS Telepresence Conductor Server Configuration Backing Up Conductor Troubleshooting Conductor Overview of Cisco Telepresence Management Server (TMS) Windows Server Installation SQL Server Installation Server Pre-requisites and configuration Installing TMS Installing TMS Provisioning Extensions Initial Configuration Endpoint Configuration Adding Systems to TMS Configuration Templates Setting Configuration VCS Configuration for TMS Direct Endpoint Management VCS/TMS CUCM Configuration for TMS Direct Endpoint Management?CUCM Phonebooks & Phonebook Sources Conference Creation Advanced Conference Settings Booking & Scheduling Participant Types Methods Conference Monitoring Dial Plans, Configuration Templates Scheduler/Smart Scheduler Managing and Troubleshooting Cisco TMS Using the Logs Cisco TMS Ticketing System Troubleshooting VCS Registrations Troubleshooting CUCM Registrations System Maintenance Configuring Cisco Meeting Server (formerly Acano) Setting up CMS Installing Certificates Configuring CUCM with CMS Provision the RTC Client Configuring Meeting Spaces Additional course details: Nexus Humans Advanced TP-CT - Implementing and Configuring Cisco TelePresence Video Suite training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced TP-CT - Implementing and Configuring Cisco TelePresence Video Suite course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Advanced TP-CT - Implementing and Configuring Cisco TelePresence Video Suite
Delivered OnlineFlexible Dates
Price on Enquiry

CCTE Check Point Troubleshooting Expert

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for security experts and Check Point resellers who desire to obtain the necessary knowledge required to perform more advanced troubleshooting skills while managing their security environments. Overview Understand how to use Check Point diagnostic tools to determine the status of a network. Understand how to use network packet analyzers and packet capturing tools to evaluate network traffic.Become familiar with more advanced Linux system commands. Obtain a deeper knowledge of the Security Management architecture. Understand how the Management database is structured and how objects are represented in the database. Understand key Security Management Server processes and their debugs. Understand how GuiDBedit operates. Understand how the kernel handles traffic and how to troubleshoot issues with chain modules. Understand how to use the two main procedures for debugging the Firewall kernel and how they differ. Recognize User mode processes and how to interpret their debugs. Discuss how to enable and use core dumps. Understand the processes and components used for policy installs and processing packets in Access Control policies. Understand how to troubleshoot and debug issues that may occur with App Control and URLF. Understand how to debug HTTPS Inspection-related issues. Understand how to troubleshoot and debug Content Awareness issues. Understand how IPS works and how to manage performance issues. Understand how to troubleshoot Anti-Bot and Antivirus. Recognize how to troubleshoot and debug Site-to-Site VPN related issues. Understand how to troubleshoot and debug Remote Access VPNs. Understand how troubleshoot Mobile Access VPN issues. Recognize how to use SecureXL features and commands to enable and disable accelerated traffic. Understand how the server hardware and operating system affects the performance of Security Gateways. Understand how to evaluate hardware configurations for optimal performance. Provide advanced troubleshooting skills to investigate and resolve more complex issues that may occur while managing your Check Point Security environment. Course Outline Advanced Troubleshooting Management Database and Processes Advanced Kernel Debugging User Mode Troubleshooting Advanced Access Control Understanding Threat Prevention Advanced VPN Troubleshooting Acceleration and Performance Tuning Additional course details: Nexus Humans CCTE Check Point Troubleshooting Expert training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCTE Check Point Troubleshooting Expert course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CCTE Check Point Troubleshooting Expert
Delivered OnlineFlexible Dates
Price on Enquiry

Online Options

Show all 4084

28/29 November '24 - Renewables Technical Surveying Course (Two Days - £395+Vat)

By Building Metrix

This Renewables Technical Surveying training short two day course is specifically designed for individuals and companies that want to train themselves and their staff on exactly how to carry out Renewables Technical Site Surveying prior to any renewables installation measures, this includes for heating systems, solar systems and EV Charge point installations. The course is primarily aimed at Energy Suppliers, Equipment Manufacturers, Renewable Installers, Domestic Energy Assessors, Retrofit Assessors, Retrofit Co-ordinators, Renewables sales staff and suitable individuals with a basic level of knowledge in varying building structures, heating systems and varying renewable technologies.

28/29 November '24 - Renewables Technical Surveying Course (Two Days - £395+Vat)
Delivered Online
£474

How can I ensure my business is digital-ready in 2024 and beyond?

5.0(1)

By Let’s Do Business Group

Continuously evolving business and technology landscapes create new and transforming opportunities for entrepreneurs and companies that are prepared.

How can I ensure my business is digital-ready in 2024 and beyond?
Delivered Online
FREE

Advanced Phlebotomy - Skills & Techniques (GPT005)

4.6(39)

By Geopace Training

The UK's first and only Level 4 qualification in Phlebotomy (equivalent to Ireland Level 6) FDSc (Foundation Degree Level) qualification Nationally Recognised certificate Dually accredited: Open College Network and CPD Covers both aspirated and evacuated systems Covers specialised blood collection systems & methods Classroom or Virtual Classroom learning options Comprehensive Training Kit is provided when booking our Virtual Classroom option (yours to keep) Complete your training from beginner to advanced level This course either follows on from our Introduction to Phlebotomy Course or can be combined with our introductory course as part of a course package (see below) Available to candidates who have completed (or are currently enrolled to complete) our Introduction to Phlebotomy Course or have previous phlebotomy practical experience.

Advanced Phlebotomy - Skills & Techniques (GPT005)
Delivered in Liverpool + 20 more or Online + more
£195

VIRTUAL DENTAL NURSING DIPLOMA

4.4(67)

By London Waterloo Academy

Our Virtual (via Zoom) course provide the same high-quality tuition as our classroom-based sessions. Quarterly meetings will take place at the Academy Dental Nursing Diploma with National Examining Board for Dental Nurses (NEBDN) is an internationally recognised qualification that will allow you to work as a Dental Nurse in hospitals, NHS and private dental practices. Successful completion of Dental Nursing Diploma course will enable you to register as a Dental Care Professional with the General Dental Council (GDC) and practice as a qualified Dental Nurse. Discover the exciting world of dental nursing and be a part of a growing field that offers endless opportunities for growth and development. How will you learn? In addition to our traditional class-based tuition, we also offer Virtual (via Zoom) Learning courses to cater to different learning preferences. Our Virtual Learning courses provide the same high-quality tuition as our classroom-based sessions. To participate, you will need a laptop, PC, smart phone or tablet with a built-in or external camera and microphone. From the comfort of your own home, you will have the opportunity to communicate with your tutor and classmates through video chat, using your phone or computer camera. This allows for seamless interaction, discussions, and collaborative learning. Quarterly meetings at the Academy To ensure a well-rounded learning experience, you will be required to attend face-to-face lessons at the Academy on a quarterly basis, which means every three months. These sessions serve several important purposes: Practical Units: Some aspects of the course require hands-on practical training. The face-to-face lessons will cover these practical units, allowing you to gain valuable experience and apply the knowledge you have acquired during the virtual learning sessions. Tests and Mock Exams: These assessments are important for evaluating your progress, identifying areas for improvement, and preparing you for the final exams. The Academy will provide a controlled and supervised environment to ensure the integrity and fairness of these assessments. Attending quarterly face-to-face lessons provides a balanced approach to your learning journey. It combines the convenience and flexibility of virtual learning with the benefits of in-person interactions, practical training, and assessments. By participating in these sessions, you will have the opportunity to reinforce your knowledge, receive personalized feedback, and build a stronger connection with your tutor and classmates. The Academy is dedicated to supporting your growth and success in dental nursing field, and the face-to-face lessons are an integral part of that commitment. Being a Dental Nurse can be an exciting and fulfilling career that allows you to make a positive impact on people’s lives while enjoying a variety of work and opportunities to learn and grow. You’ll get to work with an amazing dental team and get to know patients, helping them to feel at ease and comfortable during their visit. You’ll be the one behind the scene making sure everything runs smoothly, and you’ll be the one that patients will turn to for assistance. You’ll also get to be a part of the latest advancements in dental technology and treatment. And on top of all that, you get to have a flexible schedule and a good earning potential, with the potential to advance in your career. All in all, being a dental nurse is one of the most exciting and fulfilling career that you can have, and you’ll get to leave work every day knowing you’ve made a real difference in the lives of others. The course is delivered by Team of Dental Professionals who are examiners, dentists and experienced Dental tutors with years of experience in teaching Dentistry. Dental Nurses are involved in a wide range of procedures, from routine check-ups to complex surgeries, which can make the job interesting and varied. Patient-centered care: Dental Nurses have a direct impact on the patient’s experience and can make a positive difference in people’s lives by providing them with quality care. Professional development: Dental Nurses have the opportunity to continue their education and expand their skills, leading to advancement and new opportunities in the field. No previous experience required – we will teach you from A to Z. Do you need a job? Yes, you will have 3 months’ time from the start of your course to find a placement. The Academy provides a list of Private and NHS Dental Surgeries, who are regularly contacting us when looking for more Trainee Dental Nurses, so you can contact them directly as a registered student at the Academy. This is a paid job, unless you would like to work voluntary for personal reasons. We also provide a reference letter to the employee in case you need it. The course is ideal for you if: You are looking for a qualification that leads to employment You intend to participate within dentistry and make a positive contribution to the dental health You wish to learn how to maintain high standards of hygiene, cleanliness, health & safety You enjoy interacting with multidisciplinary team and different people The curriculum is based on the GDC (General Dental Council) registration requirements for dental nurses. It sets out the knowledge, skills and behavioural requirements that should be developed and demonstrated. These are set out in terms of professional competencies, with the assessment method clearly outlined (e.g. how the skills and knowledge will be assessed in the final examinations – via written questions such as multiple choice (MCQ) or extended matching questions (EMQ) or via Objective Structured Clinical Examinations – OSCEs). We are proud to announce that our Dental Nursing students has the highest examination pass rate in OSCE examinations! Free services– workshops, mock exams, eRoE marking and internal moderation. Earn while you learn could be another benefit for doing this course. We provide a list of Private Surgeries who have been working with us for the last 14 years and looking to recruit more Trainee Dental Nurses. Working together – At our Dental Department, we prioritise working together with our learners every step of the way. We firmly believe in providing unwavering support, equipping you with the necessary tools, skills, and assistance to ensure your success. We take immense pride in the achievements of our students, with a long list of graduates boasting remarkable success stories. Our commitment to your success serves as the foundation for our own accomplishments What Can You Expect to Earn as a Dental Nurse? Compared to other caring professions, Dental Nursing is well paid and offers plenty of opportunity for continued training and development. This is great for those looking on a the long-term plan for their career and those who wish to work their way up the ladder through continued learning, experience & hard work. Trainee Dental Nurse salary for standard working week will be around £23,000 per annum. Average wage for a qualified Dental Nurses between £40,417 to £42,350 p.a. When are the exams? There are two exams: 1. Multiple choice theory exam. November and March. 2. Practical exam. January and June. Record of Experience (eROE) To be eligible to sit your first exam, you have to complete your electronic Record of Experience (eROE). The eROE has to be submitted to your tutor by 31st Jan for March exam, and 31st August for November exam. London Waterloo Academy supports Mouth Cancer Research Foundation and encouraging learners to raise the awareness and participate in annual 10k walk. Study mode – virtual (via Zoom) live stream lessons combined with a quarterly meetings Saturday/Sunday at the Academy Duration – 1 year (part time) Virtual (via Zoom) classes – once a week Quarterly meetings at the Academy – date are discussed with the group in advance Next Intake/start dates (please choose one for your course to start): 21 September 2024, Saturday classes from 9am to 11am Registration fee – £300 (includes: administration, workshops, mock exams, RoE marking, internal moderation of RoE) Tuition Fees – £1,400 (we offer payment plan, and accept instalments) Exam fee – £510 will be charged at the point of candidate registration with NEBDN One day introduction course – for those who are considering/not sure whether to step up into the Dental Industry £50.00 Call us +44 (0) 7484 014980 or email to info@waterlooacademy.co.uk or Facebook – London Waterloo Academy Office location: The Foundry, 156 Blackfriars Rd, London SE1 8EN (Southwark Station (2-3 min walk) and Waterloo/Blackfriars Station (10 min walk))

VIRTUAL DENTAL NURSING DIPLOMA
Delivered Online + more
£50 to £1,400

Aquarian Light Attunement - Follow your Passion

5.0(13)

By Namura

Light Language attunement for stepping into the Age of Aquarius and unfolding your passion and magic.

Aquarian Light Attunement - Follow your Passion
Delivered Online
£22 to £28

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online
£3,495

Certified Data Centre Professional (CDCP)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is any IT, facilities or data centre professional who works in and around the data centre and who has the responsibility to achieve and improve the availability and manageability of the data centre. Overview After completion of the course the participant will be able to:? Choose an optimum site for mission-critical data centre based on current and future needs? Describe all components that are important for high availability in a data centre and how to effectively setup the data centre? Name and apply the various industry standards? Describe the various technologies for UPS, fire suppression, cooling, monitoring systems, cabling standards, etc, and to select and apply them effectively to cost-efficiently enhance the high-availability of the data centre.? Review the electrical distribution system to avoid costly downtime? Enhance cooling capabilities and efficiency in the data centre by using existing and new techniques and technologies for the increased cooling requirements of the future? Design a highly reliable and scalable network architecture and learn how to ensure installers apply proper testing techniques? Create effective maintenance contracts with equipment suppliers ensuring the best return on investment? Setup effective data centre monitoring ensuring the right people get the right message? Ensure proper security measures, both procedural and technical, are established to safeguard your company's valuable information in the data centre The course will address how to setup and improve key aspects such as power, cooling, security, cabling, safety, etc., to ensure a high available data centre. It will also address key operations and maintenance aspects. The Data Centre, it?s Importance and Causes for DowntimeData Centre Standards and Best PracticesData Centre Location, Building and Construction Selecting appropriate sites and buildings and how to avoid pitfalls Various components of an effective data centre and supporting facilities setup Raised Floor/Suspended Ceiling Uniform, concentrated and rolling load definitions Applicable standards Raised Floor guidelines Signal Reference Grid, grounding of racks Disability act and regulations Suspended ceiling usage and requirements Light Standards Light fixture types and placement Emergency lighting, Emergency Power Supply (EPS) Power Infrastructure Power infrastructure layout from generation to rack level ATS and STS systems Redundancy levels and techniques Three-phase and single-phase usage Power distribution options within the computer room Power cabling versus bus bar trunking Bonding versus grounding Common Mode Noise and isolation transformers Distribution boards, form factors and IP-protection grades Power quality guidelines Real power versus apparent power How to size and calculate load in the data centre Generators Static and dynamic UPS systems, selection criteria, how they operate and energy efficiency option Battery types, correct selection and testing Thermo-graphics Electro Magnetic Fields Electrical fields and magnetic fields definitions and units of measurements Sources of EMF Effects of EMF on human health and equipment (H)EMP Standards EMF shielding solutions Equipment Racks Rack standards, properties and selection criteria Security considerations Power rail/strip options Cooling Infrastructure Temperature and humidity recommendations Cooling measurement units and conversion rates Sensible and latent heat definitions Differences between comfort and precision cooling Overview of different air conditioner technologies Raised floor versus non-raised floor cooling Placement of air conditioner units and limitations to be observed Supplemental cooling options Cold aisle/hot aisle containment Water Supply Importance of water supply and application areas Backup water supply techniques Designing a Scalable Network Infrastructure The importance of a Structured Cabling System Planning considerations Copper and Fiber cable technology and standards ANSI/TIA-942 Cabling hierarchy and recommendations Testing and verification SAN storage cabling Network redundancy Building-to-building connectivity Network monitoring system requirements Fire Suppression Standards for fire suppression Detection systems Various total flooding fire suppression techniques and systems, their benefits and disadvantages Handheld extinguishers Signage and safety Regulatory requirements and best practices Data Centre Monitoring Data centre monitoring requirements EMS versus BMS Water leak detection systems Notification options and considerations Operational Security and Safety Practices Data centre security layers Physical, infrastructure and organisational security Safety measures and essential signage Labelling Choosing a labelling scheme Recommended labelling practices Network labelling Documentation How to setup proper documentation Document management policies and procedures Cleaning Cleaning practices for the data centre MTBF/MTTR Standards and definitions Calculation models The ?real? value Maintenance Contracts/SLA/OLAEXAM: Certified Data Centre Professional Additional course details: Nexus Humans Certified Data Centre Professional (CDCP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Data Centre Professional (CDCP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Data Centre Professional (CDCP)
Delivered Online
£1,500

CRISC Certified in Risk and Information Systems Control

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is ideal for Professionals preparing to become CRISC certified. Risk practitioners Students or recent graduates Overview At course completions, students will understand the essential concepts in the 4 ISACA CRISC domains: Governance IT Risk Assessment Risk Response and Reporting Information Technology and Security This 3 Day CRISC course is geared towards preparing students to pass the ISACA Certified in Risk and Information Systems Control examination. The course covers all four of the CRISC domains, and each section corresponds directly to the CRISC job practice. CRISC validates your experience in building a well-defined, agile risk-management program, based on best practices to identify, analyze, evaluate, assess, prioritize and respond to risks. This enhances benefits realization and delivers optimal value to stakeholders. GOVERNANCE - a. Organizational Governance Organizational Strategy, Goals, and Objectives Organizational Structure, Roles, and Responsibilities Organizational Culture Policies and Standards Business Processes Organizational Assets GOVERNANCE - b. Risk Governance Enterprise Risk Management and Risk Management Framework Three Lines of Defense Risk Profile Risk Appetite and Risk Tolerance Legal, Regulatory, and Contractual Requirements Professional Ethics of Risk Management IT RISK ASSESSMENT - a. IT Risk Identification Risk Events (e.g., contributing conditions, loss result) Threat Modelling and Threat Landscape Vulnerability and Control Deficiency Analysis (e.g., root cause analysis) Risk Scenario Development IT RISK ASSESSMENT - b. IT Risk Analysis and Evaluation Risk Assessment Concepts, Standards, and Frameworks Risk Register Risk Analysis Methodologies Business Impact Analysis Inherent and Residual Risk RISK RESPONSE AND REPORTING - a. Risk Response Risk Treatment / Risk Response Options Risk and Control Ownership Third-Party Risk Management Issue, Finding, and Exception Management Management of Emerging Risk RISK RESPONSE AND REPORTING - b. Control Design and Implementation Control Types, Standards, and Frameworks Control Design, Selection, and Analysis Control Implementation Control Testing and Effectiveness Evaluation RISK RESPONSE AND REPORTING - c. Risk Monitoring and Reporting Risk Treatment Plans Data Collection, Aggregation, Analysis, and Validation Risk and Control Monitoring Techniques Risk and Control Reporting Techniques (heatmap, scorecards, dashboards) Key Performance Indicators Key Risk Indicators (KRIs) Key Control Indicators (KCIs) INFORMATION TECHNOLOGY AND SECURITY - a. Information Technology Principles Enterprise Architecture IT Operations Management (e.g., change management, IT assets, problems, incidents) Project Management Disaster Recovery Management (DRM) Data Lifecycle Management System Development Life Cycle (SDLC) Emerging Technologies INFORMATION TECHNOLOGY AND SECURITY - b. Information Security Principles Information Security Concepts, Frameworks, and Standards Information Security Awareness Training Business Continuity Management Data Privacy and Data Protection Principles

CRISC Certified in Risk and Information Systems Control
Delivered Online
£2,037

ITIL© 4 Foundation

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for anyone who needs an understanding of IT Service Management to help deliver better value to customers. It is appropriate for all IT staff and management, as well as customers who work closely with IT to support business requirements. This course is also designed for students who are seeking the ITIL© 4 Foundation certification and who want to prepare for ITIL© 4 Foundation exam. Overview By the completion of this course, you will have a deep understanding of the 7 Guiding Principles, 4 Dimensions of Service Management, 34 ITIL© Practices, and the new Service Value Chain that incorporate the core of ITIL© version 4. ITIL© is the world?s leading best practice framework for implementing IT Service Management. ITIL version 4 introduces IT Service Management through the lens of a Service Value System (SVS), which provides a holistic end-to-end view of how to successfully contribute to business value, and also how to leverage concepts from models such as Lean IT, Agile, DevOps and Organizational Change Management. This foundational course immerses you in the guiding principles, dimensions, and practices of ITIL© 4. This course will earn you 21 PDUs. This class includes an exam voucher. 1 - ITIL 4 OVERVIEW Introduction to ITIL Key Concepts of ITIL 2 - The ITIL Framework The Four Dimensions of Service Management The ITIL Service Value System 3 - The ITIL Guiding Principles Focus on Value Start Where You Are Progress Iteratively with Feedback Collaborate and Promote Visibility Think and Work Holistically Keep It Simple and Practical Optimize and Automate 4 - THE ITIL SERVICE VALUE SYSTEM (SVS) Governance The Service Value Chain Continual Improvement 5 - Key ITIL Practices Continual Improvement Service Level Management Change Control Incident Management Service Request Management Service Desk Problem Management 6 - Other ITIL Practices General Management Practices Service Management Practices Technical Management Practices

ITIL© 4 Foundation
Delivered Online + more
£1,695

Professional Diploma in UX Design

By UX Design Institute

Become a Certified User Experience Professional Build a career in UX with the world’s only university credit-rated online UX course. Acquire the mindset, the skills and the confidence that make UX designers so valuable. A rewarding and meaningful career awaits. Why become a UX designer? Be in demand UX is a high-growth sector. The demand for UX designers far outstrips the supply of qualified professionals. Get well paid UX designers are highly paid. The average entry-level salary for a UX designer in the United Kingdom is £35,465 (PayScale, 2019) Love your job UX designers make an impact. They solve real-world problems using an exciting mix of research, design, technology and psychology. Study method Online, self-paced Duration 6 months Access to content 12 months Qualification Level 8 Diploma - User Experience Design Awarded by Glasgow Caledonian University Regulated by SQA Additional info Exam(s) / assessment(s) is included in price Tutor is available to students Description Duration: 6 months Get certified in six months following a flexible, structured learning path. Delivery: Online The course is delivered entirely online, including video modules, mentor-led webinars and support. Assessment: 2-hour exam Before getting certified, you'll be assessed during a two-hour exam taken online. Outcomes for you Think like a UX designer; adopt the mindset that sets them apart Showcase your knowledge with a portfolio of project work Speak with the confidence that comes from a true, deep understanding of UX Advance your career with job-ready skills Complete a university credit-rated course, valued by employers globally Become a Certified UX Professional Learn with us We’ve worked hard to design the best possible online learning experience for you. As well as an unmatched syllabus, our approach includes: Projects & portfolio Learn by doing with a series of real-world projects ideal for your UX portfolio. Mentors & webinars Be guided by our hand-picked, world-class mentors during monthly webinars. Structure & support Stay motivated with a structured programme supported by fellow students and our customer success team. What you’ll learn We’ve put together a university credit-rated curriculum that’s deep, rigorous and covers everything you need to know to become a certified UX professional and turbocharge your career. Module 01 - Introduction to UX design Module 02 - User research Module 03 - User goals Module 04 - Structure and navigation Module 05 - Interactions Module 06 - Design principles Module 07 - Design patterns Module 08 - Mobile Module 09 - Workflows Module 10 - Prototyping and handover Module 11 - AI and UX Module 12 - Creating your portfolio Module 13 - Career guidance Hub Tutorials for Figma Projects and portfolio - Projects that build into a portfolio Exam - 2-hour final exam Requirements Background You don’t need experience in design or technology to enrol in our courses, although having one or both is a definite bonus. Our students come from a diverse array of backgrounds, including project management, development, graphic design, product management, business analysis and so on. Commitment You do need to be motivated and committed. We set a high bar. Studying for one of our professional qualifications requires a certain amount of time, energy and focus. Our team will be there to support you along every step of the way but success will come as a result of your own diligence. Career path The average salary for entry level user experience designers is £28,000 The average salary for user experience designers with 1-5 years experience ranges from £29,000 to £50,000 The average salary for user experience managers/leads is £80,000 Information from LinkedIn Salary Reports, based on real jobs listings.

Professional Diploma in UX Design
Delivered Online + more
£2,750

Educators matching "Technology"

Show all 3233
The Technology Academy

the technology academy

1.0(1)

Winchester

Founded in 2007, we are an independent company that develops and delivers online training courses in the specialised fields of radio frequency (RF), wireless and microwave technology. Our instruction is focused is on teaching practical, relevant and up-to-date technical skills and knowledge, underpinned by essential theory that can be immediately applied in the workplace. Our Instructors As experts in their respective fields, all of our instructors are carefully selected from leading technology companies and universities for their comprehensive knowledge and experience of the subject matter they teach. Each has an ability to translate complex technical theory into practical, understandable and relevant concepts and convey this to a professional audience in an effective, lively and enthusiastic manner. Our Aim We aim to deliver technology training excellence in an engaging and enthusiastic manner, inspiring individuals to achieve their goals while adding measurable value to their companies and organisations. All of our courses are taught by leading technical experts from industry and academia with many years of experience in their specialist fields. Our Mission Our mission is to provide technology professionals with relevant and up-to-date technical skills and knowledge in order to significantly enhance their productivity and increase the competitive advantage of their employers. Our Vision Our vision is to be widely known within our technology niches as a premium provider of training courses, setting a respected benchmark for technology education excellence. Our Values The following six core values are central to how we operate: Responsive – We continually adapt and update courses to encompass feedback, technology developments and best learning practices. Stimulating – We deliver remarkable training in an engaging and enthusiastic manner, inspiring individuals to achieve their goals. Supportive – We provide help and support, so that individuals develop the skills and knowledge required for success in their chosen field. Focused – We deliver results that make a positive impact on individuals and add measurable value to their companies and organisations. Integrity – We operate with uncompromising integrity and a commitment to financial responsibility. Professional – We treat staff, instructors, delegates and their organisations with utmost respect and continually strive for excellence.

Technology Coaching

technology coaching

5.0(21)

Glasgow

At Technology Coaching, we are passionate about empowering small business owners and professionals to thrive in the digital age. Founded with a vision to make technology accessible and actionable, we specialise in designing, developing, and delivering interactive learning experiences that drive results. Our core services include hands-on workshops, tailored digital solutions, Small Business Sessions, and our flagship CPD-accredited courses that help businesses unlock their full potential. From mastering social media content creation to navigating the complexities of automation, our offerings are designed to equip you with the essential skills needed for success. Our Small Business Sessions provide a hands-on, practical approach to help entrepreneurs and small business owners address their unique challenges. Whether you need guidance on digital marketing, technology integration, or business strategy, these sessions offer personalised support to drive your business forward. It’s our mission that every person develops a complete digital mindset based on six core competencies: Innovation, Web Presence, Social Media Marketing, AI & Automation, Cyber Security, and Making Decisions With Data. These competencies are at the heart of everything we do, ensuring that our clients are not just up-to-date but ahead of the curve in the digital world. We also offer “Tackle Your Tech,” a flexible service that provides you with dedicated support to conquer your digital challenges. Whether it’s website updates, video editing, or social media strategy, we ensure your business stays ahead in the ever-evolving digital landscape. Our Digital Dominators Series is another highlight, featuring interactive online sessions with expert speakers who share insights on topics crucial to your business growth. Each session is crafted to inspire, educate, and connect you with actionable strategies that you can implement immediately. Led by our founder, Sooz Young, Technology Coaching stands out for its engaging and professional approach. We believe in taking action, being visible, and showing up where it matters most—online. Whether you’re a small business owner looking to upskill or a corporate professional seeking innovative solutions, we are here to help you achieve your goals. Join us at Technology Coaching, where we make technology work for you.

Women's Technology Training

women's technology training

4.3(71)

Liverpool

Blackburne House, formerly the Women’s Technology and Education Centre (WTEC), was established in 1983 with the aim of progressing women from disadvantaged backgrounds into employment within technical professions – an area in which, at the time, women were significantly under-represented. The organisation grew quickly and considerably and, in 1991, moved into new premises in Liverpool’s famous Georgian Quarter. More than £4m was raised in order to breathe new life back into Blackburne House and the beautiful, Grade II-listed building became our new home. Today, Blackburne House is a vibrant and thriving organisation and one of the country’s leading education centres for women – but we wouldn’t have experienced the growth we have without the help of our partner organisations. Over the years, we have established a number of successful social enterprises that succeed in supporting our educational aims and provide tangible examples of how new markets can be used to serve local communities. Attracting thousands of visitors each year, our facilities now include a thriving bistro, health spa, conference and events facilities and a 30-place nursery. HISTORY OF THE BULDING Blackburne House is a stunning Grade II-listed building, situated on Hope Street in Liverpool’s famous Georgian Quarter. Hope Street was voted Britain’s Best Street in 2012 and it’s little wonder; it’s a strikingly beautiful area, boasting two cathedrals and some of the best restaurants in town, not to mention a lively arts scene and independent retailers. You can read more about Hope Street here. The building has a deep-rooted history in providing education to women and girls – dating as far back as the mid-1800s as the first girl's school in the country – with some well-known faces passing through its doors, including former MP Edwina Currie, actress Tina Malone and journalist Gillian Reynolds, who was awarded an MBE in 1999 for her services to broadcasting. The Liverpool Institute High School for Girls, as Blackburne House was formerly known, closed its doors in 1986 and the building remained unused until 1992. We reopened the doors to a totally transformed Blackburne House in 1994, following an extensive programme of regeneration. Today, the building retains much of its original charm, whilst a suite of new facilities ensure it is comfortable and accessible for students and visitors alike. We are currently undergoing a planned refurbishment programme of the building to ensure its continuation of purpose, reduced environmental impacts and to future-proof it for the student and visitors of the future. You can read more about the history of Blackburne House here. VISION & VALUES The vision of Blackburne House is to educate and upskill women so that they can pursue professions in every sector and at every level – including maintenance, logistics and technology, where women are still typically under-represented. We aspire to give confidence to the women we work with so that they can go on to live independent lives, believe in their dreams and achieve their ambitions. We want to inspire our women to believe that anything is possible. We want to instil a culture of empathy and understanding; of inclusion and acceptance. We want to overcome prejudice, discrimination and adversity and create a positive and holistic environment where women can share, learn and grow. At Blackburne House, we have a core set of values that is ingrained into everything that we do. Those values are integral to our organisation, helping to define our long-term aims and objectives and influence the way we work. We are committed to inspiring the women we work with at Blackburne House; raising aspirations is built into our education and development programmes and always reflected in our teaching, working and the services we provide. INSPIRATION TRANSFORMATION By thinking and working creatively, we continually seek new ways to meet and exceed our financial, social and environmental aims – renewing and transforming areas of our business to ensure that we positively influence everyone who works with us. EQUALITY Blackburne House actively promotes a holistic approach to improving the lives of women – all women. We are committed to developing the services we offer to ensure that we are delivering services that will contribute to improving the lives of women. INDEPENDENCE We seek to promote confidence amongst the women we help and aim to equip them in order that they can be both personally and financially independent. We have also established a number of social enterprise businesses and a programme of charitable activity so that Blackburne House can be commercially independent. SOCIAL VALUE As a high-performing social business, our social purpose and the social value we create is key to all of the activities undertaken at Blackburne House. We are home to a wide range of social businesses including The School for Social Entrepreneurs, Blackburne House Bistro, Blackburne House Nursery, The Health Place, and Blackburne House Conferencing and Events – all of which create social value for the wider community. All of our profits enable us to deliver outstanding educational and economic opportunities for women from across the city who view Blackburne House as a safe place to access learning and personal development. Feedback from our learners and customers has proven that, by offering a range of educational opportunities, women across the city go on to access higher education and employment, becoming role models for their family and friends. Blackburne House is key to the economic activity of many women and this can only be achieved as our social enterprises generate income and opportunities.