• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

127 Courses

Professional Call Centre Skills Training Course

By iStudy UK

Course Overview Learn the secrets to successful telephone customer service and kickstart your career as Call Centre Representative, with this video-guided training course. This Online Call Centre Training Course is designed to provide learners with the skills they'll need to speak like a star, handle difficult customers, train employees, and carry out other essential call centre duties. Through case studies and video lessons, you will learn how to improve your telephone etiquette, with tips and techniques for handling complaints, leaving voicemail messages, and managing inbound/outbound calls. You'll also learn some useful strategies for minimising phone distractions to maintain a high standard of customer service at all times. By the end of this course, you will have an excellent understanding of the principles of proper phone language, as well as the skills to maintain high customer satisfaction by developing proper phone etiquette. Take your telephone customer service skills to the next level and improve your performance to earn regular bonuses! What You Will Learn This Call Centre Training Course is designed to teach learners the essential skills required to succeed in a telephone customer service role. It covers the fundamentals of telephone etiquette, staff training methods, industry best practice, and much more. How to Speak Like a Star How to Handle Rude or Angry Callers An Introduction to Basic Telephone Etiquette Skills Required to Work in a Professional Call Centre Providing Excellent Telephone Customer Service Goal Setting and Benchmarking Closing techniques and Wrapping Up How to Handle Voicemail Messages Methods of Training Employees Ways to Eliminate phone Distractions Why You Should Choose This Course From iStudy Study at your own pace Full Tutor support on weekdays (Monday - Friday) Fully compatible with any device Free Printable PDF Certificate immediately after completion No prior qualifications are needed to take this course No hidden fees or exam charges CPD Qualification Standards and IAO accredited Efficient exam system, assessment, and instant results Our customer support team is always ready to help you Gain professional skills and better earning potential Certification After completing the course you'll receive a free printable CPD accredited PDF certificate. Hard Copy certificate is also available, and you can get one for just £9! Accreditation This course is accredited by Continuing Professional Development (CPD). It is a recognised independent accreditation service. Enrol today and learn something new with iStudy. You'll find a full breakdown of the course curriculum down below, take a look and see just how much this course offers. We're sure you'll be satisfied with this course.

Professional Call Centre Skills Training Course
Delivered Online On Demand19 hours 15 minutes
£25

Advanced Diploma In Customer Service

4.7(160)

By Janets

Transform your customer service expertise with our Advanced Diploma in Customer Service. Gain a comprehensive understanding of industry best practices, advanced communication strategies, and cutting-edge customer-centric approaches. Elevate your skills, boost customer satisfaction, and propel your career to new heights. Enroll now for a specialized program designed to empower you with the knowledge and tools needed to excel in the dynamic world of customer service.

Advanced Diploma In Customer Service
Delivered Online On Demand4 weeks
£9.99

Network Engineer Training

By Compete High

🚀 Take your IT career to the next level with our Network Engineer Training Course! Learn essential networking concepts, security protocols, and industry best practices at your own pace. Enrol now and start building your future in Network Engineering! 🔗💻

Network Engineer Training
Delivered Online On Demand7 hours
£4.99

Safe Isolation On Demand

5.0(4)

By Ember Compliance

Online Safe Isolation training for fire & security engineers. Learn local isolation, pass the assessment, get CPD certified. Start anytime, anywhere. Safe Isolation of Electrical Supplies – Online On Demand Training Designed specifically for fire & security engineers, this self-paced course teaches safe local isolation practices with clear guidance, assessment, and CPD certification. Includes optional practical assessment on-site or at our Broxburn centre.

Safe Isolation On Demand
Delivered Online On Demand1 hour 30 minutes
£20

CDM 2015 - in-depth (In-House)

By The In House Training Company

The learning objectives that we believe you require to be covered within the training include: A detailed understanding of the CDM 2015 Regulations and how they should work in practice An understanding of the key roles (Designer, Principal designer, contractor, principal contractor and client) under CDM 2015 What constitutes design and when you may be acting as a designer The requirements for notification Pre construction information, the construction phase plan and the H&S file An opportunity for delegates to ask questions and gain clarification on specific project requirements 1 Introduction Why manage health and safety? The costs of accidents Construction industry statistics Why CDM 2015? 2 Overview of health and safety law and liabilities Criminal and civil law Liability Enforcement and prosecution Compliance - how far do we go? Statutory duties 3 Health and safety law in construction - the current framework Framework of relevant legislationHealth and Safety at Work etc Act 1974Management of Health and Safety at Work Regulations 1999Construction (Design and Management) Regulations 2015Work at Height Regulations 2005 Who is responsible for the risks created by construction work? Shared workplaces/shared responsibilities Control of contractors - importance of contract law 4 CDM 2015 - the principles and current best practice Scope - what is construction? Application - when do the Regulations apply? The CDM management systemDutyholders (client, designer, principal designer, principal contractor, contractor)Documents (pre construction information, Notification, construction phase Plan, H&S File)Management process The 2015 HSE guidance / industry best practice Clarification of roles and responsibilities 5 Competence under CDM 2015 What is 'Competence'? The criteria to be used in construction Achieving continuous improvement 6 Part 4 Construction Health Safety and Welfare Overview of Part 4 Responsibilities Welfare arrangements 7 Risk assessment and the role of the designer Principles of risk assessment Loss prevention / hazard management What is a suitable risk assessment?Design v construction risk assessmentThe client is a designer?Whose risk is it? 8 Risk assessment exercise Understanding the principles of design risk assessment Identifying hazards under the control of clients and designers Quantifying the risk 9 Questions, discussion and review

CDM 2015 - in-depth (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Customer Service Specialist Level 3

By Rachel Hood

A professional for direct customer support within all sectors and organisation types.

Customer Service Specialist Level 3
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou

Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry

Educators matching "Industry Best Practices"

Show all 9
CJR Driving School

cjr driving school

In today’s modern world, learning to drive is one of the most important elements to gaining independence – imagine going where you want, whenever you want. Learning to drive is an exciting experience, and we want students to go from being nervous novices to capable and competent new drivers. CJR will pull out all the stops to get you there… CJR Driving School is a small family-run driving school based in Killamarsh (Sheffield) that specialises in providing quality one-to-one driving tuition for both students new to driving, and existing drivers looking for a refresher course. Our instructors will take you from your initial introduction to driving, through to your practical driving test, or, for those existing drivers wanting to achieve a standard of driving that will provide additional skills and confidence. Our instructors are DVSA (Driving Vehicle Standards Agency) qualified Driving Instructors and are fully paid members of both the MSA (Motor Schools Association) and SDDIA (Sheffield and District Driving School Association). Being members of these associations will ensure that our instructors are kept fully up to date with all industry best practices. As an industry standard our instructors have been CRB checked At CJR Driving School our ultimate aim is to provide a learning environment that best suits our students’ individual needs, and lessons are structured in a way that ensures learning to drive is as stress free as possible. Some people find driving straight forward, whilst others find it less so. Our instructors will tailor lessons to suite the individual needs and at a pace that ensures everyone’s safety.

Training Express

training express

5.0(14)

London

About Us Training Express is a premier course provider, established by a committed team of experts working across the UK. We deliver accredited certification and training to UK businesses aiming to enhance organisational performance. Our extensive courses span a wide range of sectors and industries, with a strong emphasis on promoting high standards of food hygiene, business wellbeing, and workplace safety. Our goal is to assist businesses in making smarter decisions regarding their management of in-house safety standards and regulations by bringing in specialists to guide you every step of the way. We pride ourselves on continuously improving our course quality and catalogue, consistently introducing new opportunities for our learners to maximise their professional development. Quality is paramount to us, which is why we only collaborate with trainers and professionals we can trust. We employ only the most qualified experts to support you in your studies, ensuring a high standard of service every time. This dedication has led us to become one of the most respected training providers, renowned for helping businesses ensure workplace proficiency, professionalism, and safety. Our Vision Training Express has one clear vision: to enhance workplace standards for organisations across the UK. Our mission and values are centred on raising awareness regarding professional compliance, competency, and preparedness in matters of health and safety. This means that we endeavour to help everyone we work with take steps towards a safer and more productive working environment. The ultimate goal: to boost business performance, ensure safer working environments, and uphold a high standard of professionalism in businesses nationwide. Our Aim As a leading health and safety training course provider, we strive to improve workplace standards, awareness, quality, and compliance. We offer on-site tuition to ensure a user-friendly service that will equip you with the information needed to effectively train staff on industry best practices. Each course is accredited and approved by a professional, guaranteeing quality training material in accordance with industry standards. We also aim to maintain complete transparency, and you can learn about your rights as a trainee and how we manage and store your data in our detailed Business and Privacy Policy. Should you wish to know more about our terms of service, please feel free to contact us at any time via email or phone. Our customer service team is always on hand to address any issues or queries you may have. Why choose us At Training Express, we are confident that our professional dedication, user-friendly platform and commitment to delivering quality training sets us apart from our competitors. Our team is experts in their field and our specially curated courses are designed to make learning online as flexible and efficient as possible. Our trusted, high quality and affordable online courses are designed to train individuals to become experts in their field. * Accredited Certification * Meets UK & EU Standards * Developed by Qualified Professionals * Engaging Audio Visual Training * Instant Course Access * Study Wherever, Whenever * Instant Digital Certificate * Premium Support: Live Chat, Email, Telephone

Random Analysis

random analysis

Berkshire

If you are contemplating transitioning your organisation to Agile ways of working, then you have probably already read numerous reports and editorials on the advantages of Agile delivery and all the improvements you can expect in terms of speed of delivery, quality of outcome and most importantly, reduced costs; but have you thought about the challenges you may face along the way? When organisations begin their Agile transformation, one of their first challenges is understanding the roles necessary to support the initiative; for example, one of the most critical but often a new concept for many organisations new to Agile delivery, is the role of the ‘Scrum Master’. The most frequently asked question is "What makes the Scrum Master role different from that of a Project Manager?" The differences are important and, in our experience, understanding them is crucial to Agile success. A strong corporate culture not accustomed to the Agile mindset can also be a difficult environment in which to implement Agile methods. In some cases, the company’s culture and practices may reward non-Agile milestones while inadvertently discouraging Agile success. In other words, If the correct framework for the new delivery concept is not in place, Agile adoption can be extremely difficult. When a company maintains a non-Agile framework and then tries to shoe-horn in Agile practices, they often end up accomplishing less at greater cost while also achieving lower quality results which, ultimately leads them to somehow conclude that, it is Agile that does not work. Agile training workshops We combine powerpoint presentations, business cases and discussions to create an effective learning experience; an optional online assessment on conclusion of the workshops assess the level of Agile knowledge transfer. Take a look at our Agile training workshop services for course features. Agile coaching Our professional and highly motivated Agile coaches will be responsible for creating and improving Agile processes within your team or organisation by spreading industry best practices between different teams, integrate Agile teams with non-Agile practices and measure the results of the transition. Business change and process automation The COVID-19 pandemic refocussed businesses on resilience, for many that resulted in an acceleration of the business process automation agenda. Automation combined with contextual intelligence can provide a route to greater agility, reduced risk, a better delivery experience and stronger growth. Working closely with your teams, we can map you existing processes using UML diagrams enabling us to identify process gaps, inefficient or repetitious tasks. Once the process optimisations have been agreed, we can proceed to automation with bespoke interfaces and system workflows enabling your teams to focus more easily on the business of generating growth. We are also fully versed with the UK central government/public sector GDS Digital by Default Service Design Standards, G-Cloud and DOS framework procurement processes.