• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2156 Trust courses in Cardiff delivered Online

Virtual Team Building & Management

4.8(9)

By Skill Up

Master the art of Virtual Team Building & Management, fostering collaboration and efficiency in remote work environments. Equip yourself with essential skills for leading virtual teams.

Virtual Team Building & Management
Delivered Online On Demand
£16.99

Team Management Certificate Course in Workplace

4.3(43)

By John Academy

Description: Whenever you walk into an interview, one of the most basic questions you will face is about teamwork. It is a very important part of corporate world as almost all innovations come from a group of people. With the help of this Team Management Certificate Course in Workplace you can develop your team working skills. This course is geared towards helping you build better teams and it is done by outlining the importance of teamwork, observing team development process and trust building exercises. The course covers more like communication and being a team player, which are must-have attributes you will get here. Learning Outcomes: The price of working as a team How to develop team standard, ground rules, and team contracts Their team player methods as well as how it can be applied effectively Mediums to create team belief The phases of team development and how to assist a team go through them The sensitive role communication skills will contribute to building and managing a team atmosphere Paths in which team members can get engaged in and boost in a team setting Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Team Management Certificate Course in Workplace is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Team Management Certificate Course in Workplace is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Modules Course Overview (Team management certificate course in Workplace) 00:15:00 Defining Teams 00:15:00 Establishing Team Norms 00:15:00 Working as a Team 00:15:00 Your Team Player Type 01:00:00 Building Team Trust 00:15:00 The Stages of Team Development 00:30:00 Communication 00:30:00 Becoming a Good Team Player 00:15:00 Mock Exam Mock Exam- Team Management Certificate Course in Workplace 00:20:00 Final Exam Final Exam- Team Management Certificate Course in Workplace 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Team Management Certificate Course in Workplace
Delivered Online On Demand4 hours 10 minutes
£18

ISO 27701 Internal Auditor

By Training Centre

  Being ISO 27701 Certified proves your Information Privacy Systems Audit experience, skills and knowledge, and demonstrates you are capable in the assessment of vulnerabilities, Compliance with GDPR and institutional controls within the enterprise.   Gain an in-depth understanding of GDPR solutions and how they map to compliance requirements Learn how to perform and lead Privacy Information Management System (PIMS) certification audits to ISO 19011 standards Enhance your existing or learn with new skills in the field of Data Protection Candidates deliver Assurance services to organisations by advising on conformance with PIMS requirements Become a Technical expert on the preparation required for ISO 27701 Certification Understand a Privacy Information Management System (PIMS) and its processes based on ISO/IEC 27701 Identify the relationship between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks Acquire the competences of the auditor's role in planning, leading, and following up on a management system audit in accordance with ISO 19011. Learn how to interpret the requirements of ISO/IEC 27701 in the context of a PIMS audit About This Course   ISO 27701 Internal Auditor Certification;    Confirms your knowledge and experience Quantifies and markets your expertise Demonstrates that you have gained and maintained the level of knowledge required to meet the dynamic challenges of a modern enterprise Is globally recognized as the mark of excellence for the Information Privacy Audit professional Increases your value to your organization Gives you a competitive advantage over peers when seeking a new role Is administered by the International Examination & Certification Board (IECB), based in Estonia, and fully aligned to the ISO/IEC 17024:2012 standard (Conformity assessment - General requirements for bodies operating certification of persons)   Certified Individuals:    Are highly qualified, experienced professionals in the field of Data Protection Systems Audit Provide the enterprise with a Certification route for Information Privacy Assurance that is recognized by multinational clients, lending credibility to the enterprise Are excellent indicators of proficiency in control requirements creation and monitoring Demonstrate competence in five domains, including standards and practices; organization and management; processes; integrity, confidentiality and availability; and software development, acquisition and maintenance Demonstrate a commitment to providing the enterprise with trust in and value from your Privacy Compliance Framework Maintain ongoing professional development for successful on -the -job performance   The below job practice is organized by domains. Each domain is covered in the course.   Domain 1-The Process of Auditing Information Privacy Systems and Solutions   Provide audit services in accordance with ISO 19011 audit standards to assist the organization in protecting and controlling information privacy systems.    Domain 2 - Governance and Management of Information Privacy Technology   Provide assurance that the necessary leadership and organizational structures and processes are in place to achieve objectives and to support the organization's strategy.    Domain 3-Information Systems Acquisition, Development and Implementation   Provide assurance that the practices for the acquisition, development, testing and implementation of information systems meet the organization's strategies and objectives.    Domain 4-Information Systems Operations, Maintenance and Service Management Provide assurance that the processes for information systems operations, maintenance and service management meet the organization's strategies and objectives.   Domain 5-Protection of Personally Identifiable Information (PII) Assets   Provide assurance that the organization's policies, standards, procedures and controls ensure the confidentiality, integrity and availability of PII.   Prerequisites   A thorough understanding of current Data Protection legislation, Information Security & Risk Management knowledge as well as ISO 19011 Auditing Standards is required to successfully pass the examination. What's Included?   Teas, Coffees, refreshments and a full Lunch* Course Slides Study Guide Exam Fees * For Classroom based Courses only Accreditation   Who Should Attend?   Auditors seeking to perform and lead Privacy Information Management System (PIMS) certification audits Managers or consultants seeking to master a PIMS audit process Individuals responsible for maintaining conformance with PIMS requirements Technical experts seeking to prepare for a PIMS audit Expert advisors in the protection of Personally Identifiable Information (PII)   Assessment     Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 12 question, essay type exam on Day 3 of the course. The overall passing score is 70%, to be achieved within the 150 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success. Our Guarantee   We are an approved IECB Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras. The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE.   *FREE training offered for retakes - come back within a year and train for free. Provided by   This course is Accredited by NACS and Administered by the IECB

ISO 27701 Internal Auditor
Delivered OnlineFlexible Dates
£1,250

Networking skills for sales professionals (In-House)

By The In House Training Company

Many people have a misconception about networking events, and lose out on new business opportunities as a result. They either don't appreciate the real benefits and techniques of networking and don't attend events, or they attempt to 'sell on the first date', causing resentment. You can either attempt to make a sale for a quick buck (which is particularly likely to backfire at a networking event), or you can try to open a long-term relationship, creating new opportunities and a high lifetime value customer (which is how it's meant to be done). Networking, when done properly, is an excellent tool for referrals. But you have to appreciate that it's done on the basis of giving rather than receiving and this doesn't always come naturally to sales professionals. The old saying that it's about getting to 'know, like and trust' is still true. This workshop is about having your prospects and customers getting to know, like and trust you, and building that lifetime value as a result. By the end of this programme, participants will be able to: Understand what networking is - networking etiquette Know how and where to network Clarify their objectives - why network Use the 4 basic questions to start a conversation Build rapport quickly and easily Answer the question 'What do you do?' effectively in a few seconds Deliver a 60-second pitch Break into a group Prepare for a network meeting Identify opportunities Use tools to assist in networking 1 Introduction Aims and objectives 2 What is networking? Why network - objectives and goal setting Networking etiquette Preparation - online and offline tools to use Identify networking opportunities - where to network Know what you have to offer 'Know, like and trust' - the process 3 What do you do? Answer in 5-10 seconds Create and deliver a 60-second pitch Who is your target market? 4 Starting a conversation Breaking into a group Building rapport The 4 questions to start a conversation Moving on 5 Communicate and engage LISTEN - 4 types of listening skill Ask powerful questions Influence - don't sell What can you do to help others - give to get 6 Power of referrals Who can give you referrals? When to give or ask for referrals Have a referral system Showing appreciation 7 Social media and other online tools Using LinkedIn and other social media Online directories 8 Next steps Following up Arranging one-to-one meetings Developing relationships

Networking skills for sales professionals (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

VMware NSX for Intrinsic Security [V4.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators Overview By the end of the course, you should be able to meet the following objectives: Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of intrusion detection and intrusion prevention systems Differentiate between Malware Prevention approaches Describe the VMware intrinsic security portfolio Use NSX segmentation to implement Zero-Trust Security Configure user and role management Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies Configure and troubleshoot Gateway Security Use VMware Aria Operations™ for Logs and VMware Aria Operations™ for Networks to operate NSX firewalls Explain the security best practices related to grouping, tagging, and rule configuration Describe north-south and east-west service insertion Describe endpoint protection Configure and troubleshoot IDS/IPS Deploy NSX Application Platform Configure and troubleshoot NSX Malware Prevention Describe the capabilities of NSX Intelligence and NSX NDR This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX© for intrinsic security. This course introduces all the security features in NSX, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX© Intelligence?, and VMware NSX© NDR?. In addition, this course presents common configuration issues and gives a methodology to resolve them. Course Introduction Introduction and course logistics Course objectives Security Basics Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of IDS/IPS Differentiate between Malware Prevention approaches VMware Intrinsic Security Define the VMware intrinsic security strategy Describe the VMware intrinsic security portfolio Explain how NSX aligns with the intrinsic security strategy Implementing Zero-Trust Security Define Zero-Trust Security Describe the five pillars of a Zero-Trust architecture Define NSX segmentation and its use cases Describe the steps needed to enforce Zero-Trust with NSX segmentation User and Role Management Integrate NSX and VMware Identity Manager? Integrate NSX and LDAP Describe the native users and roles in NSX Create and assign custom user roles Explain object-based RBAC in a multitenancy environment Distributed Firewall Configure Distributed Firewall rules and policies Describe the NSX Distributed Firewall architecture Troubleshoot common problems related to NSX Distributed Firewall Configure time-based policies Configure Identity Firewall rules Configure the distributed firewall to block malicious IPs Gateway Security Configure Gateway Firewall rules and policies Describe the architecture of the Gateway Firewall Identify and troubleshoot common Gateway Firewall issues Configure TLS Inspection to decrypt traffic for both internal and external services Configure URL filtering and identify common configuration issues Operating Internal Firewalls Use VMware Aria Operations for Logs and VMware Aria Operations for Networks to operate NSX firewalls Explain security best practices related to grouping, tagging, and rule configuration Network Introspection Explain network introspection Describe the architecture and workflows of north-south and east-west service insertion Troubleshoot north-south and east-west service insertion Endpoint Protection Explain endpoint protection Describe the architecture and workflows of endpoint protection Troubleshoot endpoint protection Intrusion Detection and Prevention Describe the MITRE ATT&CK framework Explain the different phases of a cyber attack Describe how NSX security solutions can be used to protect against cyber attacks Configure and troubleshoot Distributed IDS/IPS Configure and troubleshoot North-South IDS/IPS NSX Application Platform Describe NSX Application Platform and its use cases Identify the topologies supported for the deployment of NSX Application Platform Deploy NSX Application Platform Explain the NSX Application Platform architecture and services Validate the NSX Application Platform deployment and troubleshoot common issues NSX Malware Prevention Identify use cases for NSX Malware Prevention Identify the components in the NSX Malware Prevention architecture Describe the NSX Malware Prevention packet flows for known and unknown files Configure NSX Malware Prevention for east-west and north-south traffic NSX Intelligence and NSX NDR Describe NSX Intelligence and its use cases Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities Describe NSX NDR and its use cases Explain the architecture of NSX NDR in NSX Describe the visualization capabilities of NSX NDR Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX for Intrinsic Security [V4.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX for Intrinsic Security [V4.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware NSX for Intrinsic Security [V4.x]
Delivered OnlineFlexible Dates
Price on Enquiry

Data Privacy and Protection

By NextGen Learning

The digital age has brought about remarkable opportunities for growth, innovation, and communication. However, it has also introduced new challenges in the form of cyber threats, privacy breaches, and online fraud. Our Data Privacy and Protection course offers a comprehensive understanding of cyber law, cyber security, and the legal aspects of protecting online information. By learning about cyber crime, cyber ethics, and the role of legislation, you'll be better equipped to navigate this complex landscape. The Cyber Security Law course covers topics such as threat factors, cyberterrorism, the deep web, fraud, and jurisdiction. As a result, you'll gain valuable insights into the legal challenges and opportunities in the cyber security law industry. With a growing demand for experts in this field, now is the perfect time to expand your knowledge and seize the opportunity to make a real impact in the digital world. So Enrol today and begin your journey towards a fulfilling career in cyber security law. Learning Outcomes: Grasp fundamental concepts of cyber law and cyber ethics. Investigate online gambling and its legal implications. Explore cyber crime, cyber security, and trust in cyberspace. Examine various computer-based threats and threat actors. Assess cyber security risks from criminals and hacktivists. Understand jurisdiction complexities in cyber law enforcement. Course Curriculum: Module 01: Learn the basics of cyber law, its history, and the significance of legislation in the digital realm. Module 02: Discover the importance of cyber ethics and the legal aspects of online gambling. Module 03: Delve into cyber crime, cyber security, and the role of trust in the online environment. Module 04: Examine the threats targeting computers and the various factors contributing to them. Module 05: Understand the dangers posed by criminals and organised crime in the cyber security landscape. Module 06: Explore the threats from hacktivists and nation-states and the role of cyber warfare. Module 07: Study cyberterrorism, its motives, and its impact on global security. Module 08: Uncover the evolving threat of the deep web and its influence on cyber security. Module 09: Learn about different types of fraud and their legal consequences. Module 10: Understand the complexities of jurisdiction in cyber law and its implementation. Certification Upon completion of the course, learners can obtain a certificate as proof of their achievement. You can receive a £4.99 PDF Certificate sent via email, a £9.99 Printed Hardcopy Certificate for delivery in the UK, or a £19.99 Printed Hardcopy Certificate for international delivery. Each option depends on individual preferences and locations. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Cyber Security Law course is designed for individuals interested in learning about data privacy, protection, and cyber security law. It is suitable for law students, legal professionals, IT specialists, and anyone seeking to understand the legal aspects of cyber security. By taking this Cyber Security Law course, participants will gain a solid foundation in cyber law, learn about various cyber threats, and understand the role of legislation in protecting against cyber attacks. The knowledge acquired in this Cyber Security Law course can be applied in various professional settings, including legal practice, IT consulting, or working within corporate cybersecurity teams. Career path Cyber Security Analyst - £35,000 to £60,000/year Data Privacy Officer - £40,000 to £70,000/year Cyber Security Consultant - £45,000 to £80,000/year Cyber Law Attorney - £60,000 to £100,000/year Cyber Security Policy Advisor - £50,000 to £80,000/year IT Compliance Analyst - £35,000 to £55,000/year

Data Privacy and Protection
Delivered Online On Demand2 hours
£15

Fire Marshall Certification Flames may break out suddenly and it is essential to realize how to manage these circumstances, as a fire marshal, however as a person also. This course covers essential fire security and avoidance ventures, just as the moves to make in case of a fire, in order to improve generally fire mindfulness. The course expects to prepare all people, just as the fire marshal, with the information and abilities expected to appropriately manage crisis circumstances. You will figure out how to distinguish potential fire dangers, how you can limit their danger, how to appropriately utilize a fire quencher and how to be receptive in any circumstance. You Will Learn:- A portion of the essential standards behind burning and how flames spread. What the most well-known reasons for fire are. The wellbeing and deterrent measures to take to limit the danger of fire. What the principle obligations of the fire marshal incorporate. About the various classes of fire and how this prompts picking the right fire quencher. The moves to make in case of a fire breaking out. Advantages of Taking This Course:- Your insight will permit you to appropriately recognize fire risks in a zone. Your insight will permit you to be better prepared in keeping fires from breaking out. You will learn of the proactive and receptive duties of the fire marshal, permitting you to acquire trust in this job. You will figure out how to deal with a fire quencher. You will acquire a generally speaking better comprehension of fire security and mindfulness, which can all be applied to the two people and fire marshals. The information gave in this course will assist you to more readily manage a crisis.

Fire Marshall
Delivered Online On Demand
£50

Caring for Your Customers' Needs

By OnlineCoursesLearning.com

Caring for Your Customers' Needs Certificate Clients are fulfilled just when a business lives up to their desires. Clients commonly trust that an organization will tune in to their assessments and input, resolve their questions and give a scope of items that will address their issues. In any case, giving predictable client support and addressing client needs isn't generally clear. In this course, you will gain proficiency with the down to earth steps you can take that will empower you to work with your clients and fabricate a relationship that will guarantee their unwaveringness to your business. You Will Learn: Why immediate, customized client assistance will help your business stand apart from the rest Why you need to investigate your clients' requirements and assumptions The devices and methods you can use to find your clients' thought processes and assumptions Instructions to comprehend a customer's viewpoint and request their suppositions on your items and administrations The most effective method to support and reward customer steadfastness Advantages of Taking This Course: On the off chance that you own or maintain a business, this course will assist you with separating yourself from your rivals by offering an extraordinary client experience On the off chance that you work in client care, this course will assist you with understanding what your client needs and how to determine their interests In the event that you work in an advertising or deals job, this course will assist you with creating business by discovering what your clients need and clarifying how your items and administrations can help them On the off chance that you are answerable for managing center gatherings, this course will assist you with posing helpful inquiries that will ensure significant input from customers

Caring for Your Customers' Needs
Delivered Online On Demand
£50

Managing Classroom Behaviour

By OnlineCoursesLearning.com

Overseeing Classroom Behavior Figuring out how to oversee homeroom conduct is fundamental for everybody engaged with the instructive interaction, including guardians and school chairmen, and is particularly significant for educators of all age bunches in an instructive foundation. This course covers all you will at any point require to know in regards to guaranteeing a very much run and bother free homeroom, which is profoundly helpful for learning and creating incredible understudies. You'll have the option to comprehend youngsters' conduct on psychodynamic, intellectual and natural levels and build up an appropriate relationship with understudies through showing others how its done and having a profound association with them. From the standards and schedules, to guarantee an all around run and polite class to managing issues utilizing the profoundly acclaimed ABC chart and numerous other proactive and responsive methods, this course covers all you'll at any point require to know with respect to overseeing homeroom conduct! What You Will Learn: The most effective method to comprehend the root mental, natural and actual parts of kids' conduct The various standards and schedules you need to set up in the homeroom, to guarantee a trained and intelligent climate The most effective method to build up a solid relationship with every understudy, by setting a genuine model and interfacing with them on their level Managing issues utilizing the ABC graph and other exceptionally successful proactive and receptive procedures The Benefits of Taking This Course: Further your present showing profession and open up new freedoms all throughout the planet Improve your odds of finding the showing position you had always wanted, by showing a more profound information on study hall the executives in interviews Gain the trust and backing of your understudies, and appreciate each second in the homeroom Try not to make mental or passionate harm youngsters, by connecting mistakenly with them

Managing Classroom Behaviour
Delivered Online On Demand
£50

Myers-Briggs Theory and Test

By OnlineCoursesLearning.com

Myers-Briggs Theory and Test With regards to the complexities of people, one considers character being the greatest separation. It is intuition to sort our environmental factors to more readily get things. Clinician for quite a long time have been endeavoring to do exactly that with characters and their numerous characteristics. Be that as it may, how would they figure out how to precisely figure out who has what characteristics? This is the place where hypotheses and testing techniques, for example, the Myers-Briggs proves to be useful. The individuals who set aside the effort to comprehend what they Myers-Briggs test and hypothesis are acquire a more profound comprehension of individuals, themselves and how tests can be utilized as a solid mental instrument. In the event that you are keen on digging into the profundity of your own character, at that point it never damages to begin with the most effortless test - the Myers-Briggs test. In this course you will find out about every part of the Myers-Briggs test and other related tests. What You Will Learn with This Course: The Myers-Briggs hypothesis and test, just as different kinds of psychometric tests The psychometric test announcing techniques The character consequences of the Myers-Briggs test and how they can be applied The polarities utilized in the Myers-Briggs test and hypothesis and the impediments of this test/hypothesis The Benefits of Taking This Course: You will study psychometric testing and how these tests are utilized as mental evaluation instruments You will get familiar with your own character type and how to precisely do your own self-detailing You will actually want to acquire trust in yourself by understanding your qualities and shortcomings You will actually want to accomplish a more profound comprehension of individuals and their various characters

Myers-Briggs Theory and Test
Delivered Online On Demand
£50