• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

431 Trust courses in Cardiff delivered Live Online

How to build a successful private practice

By Human Givens College

Whether you’re starting out in private practice, or have been in business for a while, this inspiring course will SAVE you time and money and help you build the practice and lifestyle you want … Accredited CPD Certificate: 6 hours Length: 1 day (9.30am - 4.00pm GMT) Extremely helpful course. The real life, practical examples and advice were invaluable...EMMA WARDROPPER Live Online Training – Join Jennifer Broadley for this inspiring, practical training – you will have plenty of opportunity to ask questions. Simply book your place and we will email you details of how to join the Zoom training the day before the event. BONUS RECORDING – the training is recorded in case anyone experiences technical difficulties on the day, so you also get a recording for a limited time afterwards to maximise your learning. Why take this course Although word of mouth is one of the best ways to get business, being a good counsellor or therapist isn’t always enough to fill your practice with clients – and that’s where the easy-to-learn, simple but effective business and marketing skills you will learn on this online course come in. Jennifer Broadley has been a qualified and practising psychotherapist for 10 years and has been in business for herself for well over 20 years. She brings her extensive knowledge of the personal and professional ups and downs to life in this practical and motivating day. You will also gain a wealth of time-saving devices and tips that others who have successfully built their thriving practices have used, all of which will allow you to focus more time on your clients. Jennifer built her business, Healthy Chat, from no clients to full practice within 2 years. She has tried-and-tested marketing strategies and will share with you the ones that have worked for her and the ones that haven’t. She is fully transparent with her client numbers, systems and finances so that you will leave the course clear about whether a full-time or part-time therapy practice is for you – and how to go about getting the work/life balance you want. I’ve learned so much! A must for everyone setting up a therapy businessHEALTH VISITOR What will you learn The essential actions to take when starting your practice from scratch – what’s worth spending money on and what’s not Confidence to take on your first client(s) or increase your client intake until you have a full practice Clear systems for starting or growing your counselling / therapy practice Tools to ensure clients easily find you, trust that you can help, and then book sessions with you Clarity about how long to work with a client – average timings and outliers (for stress, trauma, panic attacks, relationships, etc); when to keep a client and when to let a client go Key information that will help you decide how much to charge and when/whether to be flexible Important things to remember if you work with clients online Time-saving methods for client management: intake, treatment, ending well and future follow up How to manage yourself as a business owner – when to work hard, when to take time out How to make your therapy practice fit in with the lifestyle you want to live – and what to do to avoid becoming overwhelmed When (or whether) to let go of your full or part-time work and shift to letting your counselling practice support you financially How to get your 9 emotional needs met while working for yourself How to define your ideal client(s) and where to find them Practicalities: taking payments, tracking your numbers, meeting your targets, turnover v’s net income, paying VAT (or not), paying tax, chasing non-payments Creating a healthy, open attitude and language around money and finances How to set up your therapy practice to be financially successful and more… Brilliant, this online course has shown me what I need to focus on to build a successful private practice – and where to put my energy, money and time!COUNSELLOR Course Programme The ‘Obsessive Compulsive Disorder – understanding OCD and how best to treat it’ online course starts at 9.15am and runs until 4.00pm. (GMT). 9.15am Join the Zoom meeting 9.30am A context for the demand for HG therapy and counselling 11.00am Comfort break and discussion 11.30am Private Practice Design 1.00pm Lunch break 1.45pm Marketing your practice 2.45pm Comfort break and discussion 3.00pm Effective Therapy Sessions & Client Follow up 4.00pm Day ends Who is this course suitable for? Anyone who wants to set up a private therapy or counselling practice If you’re already in private practice and want to increase your client numbers, work less and earn more, you’ll also benefit from attending Anyone who is presently in full or part time salaried work and is considering moving to self employment or entrepreneurialism This course has been independently accredited by the internationally recognised CPD Standards Office for 6 hours of CPD training. On completion of this training you’ll receive CPD certificates from the College and the CPD Standards Office.

How to build a successful private practice
Delivered OnlineFlexible Dates
£145

IoT and Blockchain Training

By Nexus Human

Duration 1 Days 6 CPD hours Overview Please refer to Overview This course provides an overview of IoT and Blockchain, and how Blockchain holds the potential to securely unlock business and operational value of IoT to support common tasks, such as sensing, processing, storing information, and communicating. What is IoT? Internet of Things Overview IoT History How does IoT work? Components of an IoT device Current IoT Landscape Growth areas Privacy concerns IoT Design Standards Zigbee networking protocol Thread Group AllSeen Alliance/AllJoyn Open Interconnect Consortium/IoTivity Industrial Internet Consortium ITU-T SG20 IEEE P2413 Apple HomeKit IoT Design Questions Questions to help you design an IoT solution IoT Architecture Stage 1 - Data Generation (Sensors / Actuators) Stage 2 - Data Acquisition Systems Stage 3 - Edge Processing Stage 4 - Long-Term Data Storage / Blockchain What is Blockchain? History of Blockchain How does Blockchain work? Benefits of Blockchain Blockchain vs. conventional technology IoT / Blockchain Benefits of adding Blockchain to IoT Trust Building Cost Reduction Accelerate Data Exchanges Scaled Security for IoT Additional course details: Nexus Humans IoT and Blockchain Training training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the IoT and Blockchain Training course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

IoT and Blockchain Training
Delivered OnlineFlexible Dates
Price on Enquiry

Getting paid - telephone tactics for debt collection (In-House)

By The In House Training Company

How to protect your cash flow In the current economic climate more and more companies are finding that their customers are taking longer to pay - or are not even paying at all. As cash flow is key to the survival of any business, effective debt collection tactics are vital for all businesses. This workshop concentrates on the telephone skills and techniques you can use to achieve the most positive outcome in any debt collection situation - payment of money owed, as soon as possible, whilst keeping the collection cost as low as possible. The course will help you: Understand your debtors and communicate with them accordingly Develop a strategy for more effective debt collection Make every call count Handle difficult calls Reduce the amount of time you need to spend on chasing payment Increase your collection rates 1 The debt collection process Understanding the reasons behind payment default Looking at the debt situation from the customer's point of view Developing a strategy for effective debt collection 2 Advanced telephone communication skills Techniques for speaking to the person responsible for paying the debt How to gain the customer's trust when discussing debt Telephone collection skills best practice Key phrases that keep the conversation positive and open 3 Questioning and listening skills for gathering information Different types of question Using high-gain questions to uncover key information Active listening that will help you understand what customers are really saying Leading with examples and high-impact questions Summarising and restating 4 Overcoming objections and excuses Identifying objections Preparing suitable responses Probing objections and ways to overcome them 5 Gaining commitment and ending the call Learn how to negotiate an agreement to suit both parties Summarising actions for you and the customer Ending the call professionally 6 Dealing with difficult and challenging situations Understand different personality types The correct way to respond to an upset customer Ways to calm angry customers (and handle verbal attacks) 7 Action plans Course summary and presentation of action plans

Getting paid - telephone tactics for debt collection (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Generative AI for Project Management

By IIL Europe Ltd

Artificial Intelligence (AI) is the most disruptive technology since the internet came onto the scene. AI is transforming every aspect of how we manage projects from developing a business case, to planning the work, managing risk, and tracking performance. Because the technology and market are moving so fast, it can be difficult to know how to start using AI on projects. Generative AI for Project Management will engage you with diverse Generative AI tools to start, plan, and manage either your own project or a generic case study. We will embrace a tool agnostic approach to adopting, integrating, and scaling Generative AI without compromising data or trust. You will have hands-on practice utilizing AI tools to optimize your time and your outcomes. You will be accessing a variety of AI tools requiring you to register for a free account. A computer is required for all traditional classroom deliveries. None At the end of this program, you will be able to: Define essential terms and concepts related to artificial intelligence (AI) Illustrate how prompts facilitate interaction with Generative AI Recognize the capabilities of Large Language Models Craft prompts to develop project origination documents Create prompts to assist in planning a project Develop user stories with Generative AI Analyze project performance using Generative AI Identify the limitations of Generative AI Identify the risks associated with using Generative AI Articulate the need for governance and ethics when establishing an AI program in an organization Course Overview Getting Started Foundation Concepts Understanding essential terms and concepts related to AI Exploring various Generative AI Models Understanding Prompts Creating Prompts for Project Startup Prompts for starting a project Prompts for planning a project Best Practices for prompt engineering Creating Prompts for Managing Projects Creating agile user stories Measuring project performance Analyzing a schedule Using Generative AI Responsibly Limitations of AI Models Establishing an AI governance framework Future trends and next steps Summary and Next Steps

Generative AI for Project Management
Delivered OnlineFlexible Dates
Price on Enquiry

Decision Making for Vulnerable People Webinar

5.0(1)

By Born at the Right Time

leading expert Philip Warford will talk about the options available to protect a disabled person using specialist Wills and Trusts

Decision Making for Vulnerable People Webinar
Delivered Online
FREE

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

Telework and Telecommuting

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Employees not working in a centralized office. Overview The Telework and Telecommuting workshop will cover strategies to help participants learn skills required for working outside the office that include proper self-management, manage time efficiently, know different methods of organization and planning, identify various forms of communication and address and resolve challenges that teleworkers can face. The Telework and Telecommuting workshop will cover strategies to help participants learn skills required for working outside the office that include proper self-management, manage time efficiently, know different methods of organization and planning, identify various forms of communication and address and resolve challenges that teleworkers can face. Getting Started Workshop Objectives Pre-Assignment Core Skills Required Self-Management Time Management Organizing and Planning Communication Self-Management (I) Solving Problems on Your Own Being and Staying Motivated You Have More Freedom ? Don?t Abuse It You and Only You are Accountable Self-Management (II) Recognize and Remove Bad Habits Reflect on Mistakes and Learn from Them Establish Good Habits Be Assertive with Yourself Time Management (I) Build a Little Flexibility into Your Schedule Identify and Remove Time Wasters Working with Time Zones Using Free Time Wisely Time Management (II) The Urgent/Important Matrix Setting and Sticking to Deadlines The Glass Jar: Rocks, Pebbles, Sand and Water Recognize When You Are Procrastinating Organizing and Planning (I) Plan for Additional Stress When to Seek Help Being Proactive ? Not Reactive Establish Priorities and Attainable Goals Organizing and Planning (II) Setting Up Your Home Office Remove Unneeded or Distracting Items When Technology Fails Develop a Normal Working Day Communication (I) Stay in the Loop Use the Correct Medium Be Clear and to the Point Virtual Communication Can Be Impersonal Communication (II) Open and Frequent Communication Share Your Information Have a Collaborative Attitude Setting Expectations with Family and Friends Additional Challenges Building Trust and Rapport Feeling Isolated Always in the Office Lack of or Less Feedback Wrapping Up Words from the Wise

Telework and Telecommuting
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat Identity Management and Active Directory Integration with exam (RH363)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Red Hat Certified System Administrator (RHCSA) who wants to learn how to provision and configure IdM technologies across both Linux and Windows applications Identity management specialist or engineer Access management specialist or engineer Web application developer DevOps specialist Overview As a result of attending this course, you will gain an understanding of the architecture of an identity management realm and trusted relationships using both Red Hat Enterprise Linux Identity Management and Microsoft Active Directory. You will be able to create, manage, and troubleshoot user management structures, security policies, local and remote secure access methods, and implementation technologies such as Kerberos, PKI, and certificates. You should be able to demonstrate these skills: Create and manage a scalable, resilient Identity Management realm, including both Linux and Microsoft Windows clients and servers. Create and manage secure access configurations, including managing and troubleshooting Kerberos, certificate servers, and access control policies. Integrate IdM as the back end for other major enterprise tools in the Red Hat portfolio, including Satellite Server and Tower. This course will empower you with the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat© Enterprise Linux.You will master these skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance. This course covers the same material as RH362, but includes the Red Hat Certified Specialist in Identity Management exam (EX362). Install Red Hat Identity Management Describe and install Red Hat Identity Management (IdM). Centralize Identity Management Explain the IdM server services, explore IdM clients access methods, and install an IdM client. Authenticate identities with Kerberos Define the Kerberos protocol and configure services for Kerberos authentication. Integrate IdM with Active Directory Create a trust relationship with Active Directory. Control user access Configure users for authorized access to services and resources. Manage a public key infrastructure Manage certificate authorities, certificates, and storing secrets. Maintain IdM operations Troubleshoot and recover Identity Management. Integrate Red Hat products with IdM Configure major services to share the IdM authentication database. Install scalable IdM Construct a resilient and scalable Identity Management topology.

Red Hat Identity Management and Active Directory Integration with exam (RH363)
Delivered OnlineFlexible Dates
Price on Enquiry

PostgreSQL Server Administration (TTDB7020)

By Nexus Human

Duration 3 Days 18 CPD hours PostgreSQL is a powerful, open-source, object-relational database system known for being reliable, secure, and flexible. For administrators, learning PostgreSQL equips you with the skills needed to handle complex and high-performance databases in our data-driven world. Big-name companies like Apple, Cisco, Fujitsu, and IBM trust PostgreSQL for their critical applications, which highlights its significance and broad industry adoption. By getting the hang of PostgreSQL, administrators can boost their career opportunities and play a key role in the success of data-focused businesses. PostgreSQL Server Administration is a three-day hands-on course geared for administrators seeking to sharpen their skills and elevate their database management capabilities. Throughout the course you?ll explore a wide range of essential topics, from server architecture and user accounts to monitoring and routine maintenance. Throughout the course, you'll gain invaluable insights and practical techniques that will empower you to optimize, secure, and manage your PostgreSQL environment effectively. As you navigate through server configuration, database reporting, backup and restore procedures and more, you'll have the opportunity to apply your newfound knowledge to real-world scenarios. By the end of the course, you'll be equipped with the confidence and skillset required to tackle a wide array of administrative challenges and to effectively manage your PostgreSQL databases. Additional course details: Nexus Humans PostgreSQL Server Administration (TTDB7020) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PostgreSQL Server Administration (TTDB7020) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

PostgreSQL Server Administration (TTDB7020)
Delivered OnlineFlexible Dates
Price on Enquiry

Negotiation skills (In-House)

By The In House Training Company

Any successful business manager will tell you that you never get the deal you deserve - you always get the deal you negotiate! This two-day workshop includes recent research and practical techniques from the Harvard Business School Negotiation Project and provides a unique opportunity to learn and practice these skills in a safe environment using up to date materials and life-like practice negotiation case studies. This course will help participants to: Understand the basics of negotiation Develop negotiating skills Increase their business acumen Develop their communication skills Learn the models, techniques and tools for an effective negotiation Identify the barriers to agreements Close the deal 1 What is negotiation? Key skills for negotiation Types of negotiation Win-lose negotiations versus Win-win negotiations Wise agreements and Principled Negotiation 2 Four key negotiating concepts BATNA - Best alternative to negotiated agreement Setting your reservation price ZOPA - Zone of possible agreement Creating and trading value 3 Business acumen Understanding pricing, gross margins and profit Knowing the key points on which to negotiate 4 A Four Phase Model for negotiation Nine steps to successful planning Discussing a deal - creating and claiming value Making and framing proposals Bargaining for the winning deal 5 Effective communication Effective questioning Active listening skills Understanding and interpreting body language Barriers to effective communication 6 Understanding influence and persuasion Influencing strategies Ten proven ways to influence people Six universal methods of persuasion Understanding why people do business with other people 7 Negotiating tactics Tactics for win-lose negotiations Tactics for win-win negotiations Effective team negotiating Understanding and using powerv What do you do when the other side has more power? 8 Barriers to agreement Common barriers to agreement The Negotiators Dilemma Dealing with die-hard negotiators Dealing with lack of trust 9 Potential barriers to cross-border agreements Understanding business methods and practice in other cultures Figuring out who has the power and who makes decisions Recognising and dealing with cultural differences What's OK here might not be OK there 10 Closing the deal Four steps to closing the winning deal

Negotiation skills (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry