• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

428 Trust courses in Bradford delivered Live Online

M.D.D COUPLES TRUST BUILDING AND COMMUNICATION THERAPY PACKAGE (COUPLES)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

Trust building Pain point assessment Relationship history analysation Communication strengthening Ascertain main problem areas Closure on reoccurring arguments Intervention and mediation Emotional intelligence training Love language assessment Resolving fights Private assessments with each individual 3 couples therapy sessions https://relationshipsmdd.com/product/couples-trust-building-and-communication-therapy-package/

M.D.D COUPLES TRUST BUILDING AND COMMUNICATION THERAPY PACKAGE (COUPLES)
Delivered in London or UK Wide or OnlineFlexible Dates
£425

Behavioural Science: Designing for Persuasion, Emotion and Trust

By Bunnyfoot

This one-day course introduces the field of user experience and provides an excellent entry point to our other specialised training courses. UX processes and practices have become a central component of product design, service design and web design.

Behavioural Science: Designing for Persuasion, Emotion and Trust
Delivered OnlineFlexible Dates
£595

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered OnlineFlexible Dates
£2,380

Windows certificates for engineers

5.0(3)

By Systems & Network Training

Windows certificates training course description A hands-on training course concentrating solely on PKI using Windows certificates. What will you learn Explain how PKI works. Install windows certificates. Configure windows certificates. Troubleshoot windows certificates. Windows certificates training course details Who will benefit: Technical security staff. Prerequisites: Windows server. Duration 3 days Windows certificates training course contents PKI Symmetric encryption, asymmetric encryption, authentication, digital signing, hashing, certificates, Certification Authorities, Root CA, Intermediate CA, policy CA, Issuing CA, Certificate Revocation Lists. Hands on Inspecting a certificate. Policies and PKI Security policy, certification policy. CA hierarchy Impact of CAs on Active Directory, CA architecture, number of tiers, issuing CA organisation, CA configuration files. CA security. Hands on CA installation PKI health tool, monitoring. Certificate revocation When to revoke, OCSP. Hands on Revoking certificates. Certificate validation Discovery, validation, checks, revocation checking, certificate chains, certification publication. Hands on Event viewer. Certificate templates Version 1, version 1, default, modifying templates. Hands on Template management. Roles Criteria roles, CA administrator, Certificate manager, Backup operator, Auditor. Other PKI management roles. Disaster recovery Backups, recovery. Hands on certutil. Issuing certificates The certificate enrolment process, enrolment methods, manual enrolment, automatic enrolment. Trust between organisations Creating Trust, CTLs, common root CA, cross certification, bridge CA. Web servers and certificates SSL encryption, certificate authentication. Hands on Web servers. VPN Hands on Certificate deployment for VPN. WiFi Hands on 802.1X

Windows certificates for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,497

Free Webinar | Elevating Client Relationships: How to build trust and rapport

4.3(5)

By Bayfield Training

Learn how to maintain strong relationships with clients, tenants, investors and other stakeholders. On this webinar, we will share actionable strategies to elevate your client experience, build lasting connections, and stand out in today’s competitive landscape. Additionally, we will also discuss effective techniques for establishing trust and building rapport with clients, including active listening, empathy, and effective communication strategies. Finally, we will also be discussing how to overcome common challenges encountered in client relationships and learn strategies for resolving conflicts maintaining positive interactions. Whether you’re a business owner, sales professional, consultant, or anyone responsible for managing client relationships, this webinar will equip you with the knowledge and skills needed to excel in today’s competitive marketplace.

Free Webinar | Elevating Client Relationships: How to build trust and rapport
Delivered OnlineFlexible Dates
FREE

Project Stakeholder Relationship Skills: In-House Training

By IIL Europe Ltd

Project Stakeholder Relationship Skills: In-House Training This course is designed to provide project managers with the ability to: Analyze the complexities of major stakeholder relationship categories Apply the most appropriate interpersonal relationship skills to the different categories of relationships Align the dynamic needs of the stakeholders with a project's objective throughout the project life cycle What you Will Learn Examine traditional and non-traditional ways to identify and assess stakeholders Explain how competence, character, and trust lead to project success and strong relationships with stakeholders Utilize 'Embodied Leadership' skills to build stakeholder relationships Apply stakeholder engagement best practices to case study and real-life scenarios Getting Started Stakeholders and project success Stakeholder management research Managing stakeholder relationships Identifying Stakeholders Stakeholder categories Stakeholder relationships across the project life cycle Tools and techniques for identifying stakeholders Assessing Stakeholders Assessing stakeholder relationships Recognizing stakeholder attitudes toward the project Analyzing stakeholders Using other types of stakeholder assessments Building Stakeholder Relationships The importance of psychological safety Building trust and getting results The anatomy of trust Navigating Challenging Situations Dynamics of conflict Responding to conflict Managing difficult conversations

Project Stakeholder Relationship Skills: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£850

Project Stakeholder Relationship Skills: Virtual In-House Training

By IIL Europe Ltd

Project Stakeholder Relationship Skills: Virtual In-House Training This course is designed to provide project managers with the ability to: Analyze the complexities of major stakeholder relationship categories Apply the most appropriate interpersonal relationship skills to the different categories of relationships Align the dynamic needs of the stakeholders with a project's objective throughout the project life cycle What you Will Learn Examine traditional and non-traditional ways to identify and assess stakeholders Explain how competence, character, and trust lead to project success and strong relationships with stakeholders Utilize 'Embodied Leadership' skills to build stakeholder relationships Apply stakeholder engagement best practices to case study and real-life scenarios Getting Started Stakeholders and project success Stakeholder management research Managing stakeholder relationships Identifying Stakeholders Stakeholder categories Stakeholder relationships across the project life cycle Tools and techniques for identifying stakeholders Assessing Stakeholders Assessing stakeholder relationships Recognizing stakeholder attitudes toward the project Analyzing stakeholders Using other types of stakeholder assessments Building Stakeholder Relationships The importance of psychological safety Building trust and getting results The anatomy of trust Navigating Challenging Situations Dynamics of conflict Responding to conflict Managing difficult conversations

Project Stakeholder Relationship Skills: Virtual In-House Training
Delivered OnlineFlexible Dates
£850

Engaging your first young Trustees: Programme information session

By Kids in Museums

Engaging your first young Trustees: Programme information session   Thursday 10 April, 2-3pm This free informal information session for museum staff and trustees aims to provide more information about the Kids in Museums programme to support you to recruit young Trustees at your museum, gallery or heritage organisation. Please note this programme is funded by Arts Council England. We have up to eight free places available for museums from England. If you are based in Wales, Northern Ireland or Scotland, we may be able to accommodate you if we do not receive sufficient applications from English museums. In this session, you can:    Find out more about the programme, Hear about the impact the programme has had on the museums that took part 2024-25, Hear more about Kids in Museums programmes, our impact and how we work with wider museum sector, Ask any questions about the young Trustees programme.   This session will be one hour long and delivered on Zoom. If you require any adjustments to attend a session on Zoom, please let us know and we will find a way to support you.     Who should attend?  This session is for Trustees and staff from museums and heritage organisations who are interested in appointing young people aged 18-30 to their boards.  

Engaging your first young Trustees: Programme information session
Delivered Online
FREE

PERSON CENTRED PLANNING – FOR LOCAL AUTHORITY, SCHOOL OR MULTI ACADEMY TRUST TEAMS

By Inclusive Solutions

This training is aimed at developing Person Centred Planning – for Local Authority, School or Multi Academy Trust professional teams. Parents and carers can also participate in this training. One day introduction to underlying values and practicalities of approach in schools – 100 people 2 Day skill training for 30 participants to learn PATH planning skills 1 day follow up after 3 months to problem solve issues and celebrate what achieved. Person Centred Planning (PCP) is a way of expressing a set of inclusive values through a unique range of tools and techniques. The most commonly used person centred tool with children is a PATH – and it shows these values in action. Why now? The Children and Families Act 2014 sets out clear principles for supporting and involving children and young people in all aspects of the support and planning of their special educational need. The Special Educational Needs and Disability Code of Practice: 0 – 25 years provides the statutory guidance relating to part 3 of the Children and Families Act 2014. Embedded in its principles is the need for a stronger focus on the participation of children, young people and their parents/carers in decision making at both individual and strategic levels. The use of Person Centred Approaches provides the opportunity to fulfil those principles. Working in this way ensures the CYP and their parents/carers are at the centre of all decision making and future planning. It provides an opportunity to engage directly with children and young people to discuss their needs, and plan how they can achieve the best possible outcomes. This should be integral to all planning for children and young people with Special Educational Need and Disability (SEND) throughout their lives. Education Health Care Planning processes are required to be truly person centred at every stage, including annual reviews, so understanding this way of working has never been more essential. Is this different to what we do already? This person-centred way of working offers a radical new approach to visualising planning, empowering and directly involving children and those that care about them throughout planning meetings and allowing for inclusive, creative methodology which builds on and challenges existing practice in schools. Core principles The focus of inclusive, person-centred working is first and foremost on ordinary needs and not solely on special needs. – Being somebody – Contributing by sharing gifts and capacities – Knowing people and having relationships – Having choice and control – Sharing ordinary places – being present in local spaces and having a valued role there The training is delivered by Inclusive Solutions who are Educational Psychologists with a national reputation for training and person centred planning with schools over the last 16 years. In this training, you will learn how to facilitate with a child, family, team or an organisation to think together around their preferred future or about a challenge or issue. Here is an opportunity to experience first-hand the person centred, futures planning tool – PATH (Pearpoint, Forest et. al. 1989). This course will provide participants with a practical introduction to person centred planning and approaches, including examples of best practice in using person centred approaches in schools. The course will explore the underlying values of person centred approaches, provide an introduction to the person centred planning tools and link this to national policy and guidance. Participants will gain: 1 Knowledge of person centred planning and approaches 2 An understanding of how person centred approaches can be used in schools 3 A basic knowledge of the person centred review process and where to find out more information 4 The skills to gather information about what is important to and for the children and young people they support 5 An understanding of PATH and situations in which this process could be used in school The course answers these questions: • What are person centred approaches? • How can we use person centred approaches in our school? • What is person centred thinking and how can it be used in schools? • How can we learn about what is important to and for the child or young person and share this information? • How can we make sure that the child is at the centre of their annual/transition review?

PERSON CENTRED PLANNING – FOR LOCAL AUTHORITY, SCHOOL OR MULTI ACADEMY TRUST TEAMS
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

M.D.D MY PARTNER IS VERY JEALOUS AND POSSESSIVE PACKAGE (COUPLES)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

Addressing jealousy and trust issues Couples coaching Resolving problems Relationship advice Ascertaining where trust issues are stemming from Change destructive behavioural patterns Rebuild trust and relationship foundation Address emotional challenges Assessment and mediation sessions separately 4 sessions x 1 hour https://relationshipsmdd.com/product/my-partner-is-very-jealous-and-possessive-package/

M.D.D MY PARTNER IS VERY JEALOUS AND POSSESSIVE PACKAGE (COUPLES)
Delivered in London or UK Wide or OnlineFlexible Dates
£500