• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

6240 Courses

Managing Benefits in Your Projects: Powerful Principles to Bolster Project Success

By IIL Europe Ltd

Managing Benefits in Your Projects: Powerful Principles to Bolster Project Success Projects are approved based on the benefits project completion promises. Once authorized, most attention shifts to project delivery being on time and on budget, with little attention paid to benefit appraisal, tracking, or review. APMG's Managing Benefits guide introduces tools that can be used to effectively monitor benefits realization and optimize the return from project investment. This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies. Fractions of PDUs may also be reported. The smallest increment of a PDU that can be reported is 0.25. This means that if you spent 15 minutes participating in a qualifying PDU activity, you may report 0.25 PDU. If you spend 30 minutes in a qualifying PDU activity, you may report 0.50 PDU.

Managing Benefits in Your Projects: Powerful Principles to Bolster Project Success
Delivered Online On Demand1 hour
£10

Information Field Hypothesis: Shifting From a Red to a Green Worldview

By IIL Europe Ltd

Information Field Hypothesis: Shifting From a Red to a Green Worldview Shifting from a Red to a Green Worldview How we lead our life, run our business and shape the world around us, depends on our self-conception. This self-conception is based on our worldview - our perception of how reality works. Updating our worldview can therefore result in a Better Life, a Better Business, and a Better World. This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies. Fractions of PDUs may also be reported. The smallest increment of a PDU that can be reported is 0.25. This means that if you spent 15 minutes participating in a qualifying PDU activity, you may report 0.25 PDU. If you spend 30 minutes in a qualifying PDU activity, you may report 0.50 PDU.

Information Field Hypothesis: Shifting From a Red to a Green Worldview
Delivered Online On Demand15 hours
£10

The Social Media Imperative: Engage, Connect, and Communicate to Succeed

By IIL Europe Ltd

The Social Media Imperative: Engage, Connect, and Communicate to Succeed 57% of people talk more online than they do in real life. Your customers are on social media, talking about you; how are you reacting? Are you engaging your audience without tarnishing your reputation? Uncover how you can tell the very best story in the most inviting way, on the platforms that work for your business. This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies. Fractions of PDUs may also be reported. The smallest increment of a PDU that can be reported is 0.25. This means that if you spent 15 minutes participating in a qualifying PDU activity, you may report 0.25 PDU. If you spend 30 minutes in a qualifying PDU activity, you may report 0.50 PDU.

The Social Media Imperative: Engage, Connect, and Communicate to Succeed
Delivered Online On Demand15 minutes
£10

Designated Safeguarding Lead Online Course

By Child Protection Training Uk

This course will help you and your staff become familiar with the role and responsibilities of the designated safeguarding lead in your organisation. It will develop both your competence and confidence in carrying out the role of Designated Safeguarding Lead (DSL). Formally known as Level 3

Designated Safeguarding Lead Online Course
Delivered In-Person in London or UK WideFlexible Dates
£234

CertNexus Certified CyberSec First Responder (CFR-410)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners preparing for or who currently perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for those roles within federal contracting companies and private sector firms whose mission or strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD Information Network (DoDIN) operation and incident handling. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. Overview In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will: Assess cybersecurity risks to the organization. Analyze the threat landscape. Analyze various reconnaissance threats to computing and network environments. Analyze various attacks on computing and network environments. Analyze various post-attack techniques. Assess the organization's security posture through auditing, vulnerability management, and penetration testing. Collect cybersecurity intelligence from various network-based and host-based sources. Analyze log data to reveal evidence of threats and incidents. Perform active asset and network analysis to detect incidents. Respond to cybersecurity incidents using containment, mitigation, and recovery tactics. Investigate cybersecurity incidents using forensic analysis techniques. This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation. In addition, this course and subsequent certification (CFR-410) meet all requirements for personnel requiring DoD directive 8570.01-M position certification baselines: CSSP Analyst CSSP Infrastructure Support CSSP Incident Responder CSSP Auditor The course and certification also meet all criteria for the following Cybersecurity Maturity Model Certification (CMMC) domains: Incident Response (IR) Audit and Accountability (AU) Risk Management (RM) Lesson 1: Assessing Cybersecurity Risk Topic A: Identify the Importance of Risk Management Topic B: Assess Risk Topic C: Mitigate Risk Topic D: Integrate Documentation into Risk Management Lesson 2: Analyzing the Threat Landscape Topic A: Classify Threats Topic B: Analyze Trends Affecting Security Posture Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments Topic A: Implement Threat Modeling Topic B: Assess the Impact of Reconnaissance Topic C: Assess the Impact of Social Engineering Lesson 4: Analyzing Attacks on Computing and Network Environments Topic A: Assess the Impact of System Hacking Attacks Topic B: Assess the Impact of Web-Based Attacks Topic C: Assess the Impact of Malware Topic D: Assess the Impact of Hijacking and Impersonation Attacks Topic E: Assess the Impact of DoS Incidents Topic F: Assess the Impact of Threats to Mobile Security Topic G: Assess the Impact of Threats to Cloud Security Lesson 5: Analyzing Post-Attack Techniques Topic A: Assess Command and Control Techniques Topic B: Assess Persistence Techniques Topic C: Assess Lateral Movement and Pivoting Techniques Topic D: Assess Data Exfiltration Techniques Topic E: Assess Anti-Forensics Techniques Lesson 6: Assessing the Organization's Security Posture Topic A: Implement Cybersecurity Auditing Topic B: Implement a Vulnerability Management Plan Topic C: Assess Vulnerabilities Topic D: Conduct Penetration Testing Lesson 7: Collecting Cybersecurity Intelligence Topic A: Deploy a Security Intelligence Collection and Analysis Platform Topic B: Collect Data from Network-Based Intelligence Sources Topic C: Collect Data from Host-Based Intelligence Sources Lesson 8: Analyzing Log Data Topic A: Use Common Tools to Analyze Logs Topic B: Use SIEM Tools for Analysis Lesson 9: Performing Active Asset and Network Analysis Topic A: Analyze Incidents with Windows-Based Tools Topic B: Analyze Incidents with Linux-Based Tools Topic C: Analyze Indicators of Compromise Lesson 10: Responding to Cybersecurity Incidents Topic A: Deploy an Incident Handling and Response Architecture Topic B: Mitigate Incidents Topic C: Hand Over Incident Information to a Forensic Investigation Lesson 11: Investigating Cybersecurity Incidents Topic A: Apply a Forensic Investigation Plan Topic B: Securely Collect and Analyze Electronic Evidence Topic C: Follow Up on the Results of an Investigation Additional course details: Nexus Humans CertNexus Certified CyberSec First Responder (CFR-410) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified CyberSec First Responder (CFR-410) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Certified CyberSec First Responder (CFR-410)
Delivered OnlineFlexible Dates
£3,495

Microsoft Power BI Online

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The student should be familiar with Excel and the concepts of datasets and basic reporting. Overview Understand and utilize Power BI Online. Understand and examine the differences between Power BI Desktop and Power BI Online. Understand and explore the Power BI Online interface. Understand and perform importing Excel worksheets, CSV, TXT, PBIX. Understand connecting to databases. Understand other forms of data. Understand data refresh. Understand and perform creating a new Power BI report. Understand and perform adding filters to a report. Understand and perform adding KPI's to a report. Understand and perform creating a Power BI dashboard. Understand and perform pinning tiles. Understand sharing reports and dashboards. Understand Power BI Mobile. This Logical Operations courseware is no longer available on the LO Store, but can be purchased by phone orderThis one-day course familiarizes the student with Power BI Online, which allows the student to intuitively discover and automate the import, transformation, and combination of data across a variety of data sources. COURSE OVERVIEW Introduction Course Materials Facilities Prerequisites What We'll Be Discussing INTRODUCTION TO POWER BI ONLINE What is Power BI Online Examining the Differences Between Power BI Desktop and Power BI Online Exploring the Power BI Online Interface IMPORTING DATA Utilizing Excel (.xlsx or .xlsm), Comma Separated Value (.csv), and Power BI Desktop (.pbix) Files Connecting to Databases Examining Other Forms of Data Understanding Data Refresh CREATING REPORTS Creating a New Power BI Report Adding Filters to a Power BI Report Adding KPI?s to a Report CONFIGURING DASHBOARDS Creating a Power BI Dashboard Pinning Tiles SHARING REPORTS AND DASHBOARDS Sharing Reports and Dashboards Exploring Power BI Mobile

Microsoft Power BI Online
Delivered OnlineFlexible Dates
Price on Enquiry

Vectorworks and Sketchup Help in Interior Design projects

By Real Animation Works

Vectorworks Course face to face One to one

Vectorworks and Sketchup Help in Interior Design projects
Delivered in London or OnlineFlexible Dates
£360

Opaque Transparency: The Silent Project Killer

By IIL Europe Ltd

Opaque Transparency: The Silent Project Killer A 2014 report from the Standish Group showed that a staggering 31.1% of software projects get cancelled before completion. Further, over 50% of projects will cost nearly 200% of their original estimates, and only 16% of software projects are completed on time and on budget. The report cited user collaboration, executive level support and clearly stated requirements as key contributors to success, but what's the common denominator? Having led many public and private classes, and consulted with many corporations, I hear the same pain points over and over. Sharing these pains (which everyone of course believes are unique to them!) will hopefully lead to more project managers pushing for support, executives introspecting a little deeper and more realistically, and team members asking for more project transparency! I've summed up the major project pains from folks mentioned above in to one collective term: transparency. Transparency means clarity, and there are many opportunities from day one of a project to introduce clarity, yet so often these opportunities are missed one after the other. This makes the lack of transparency a silent project killer, slowly choking any chance of success and lending itself to the sad statistics shown above. Thankfully, there is hope! A clear and realistic project charter gets things off to a good start, but it needs to be followed up with other key processes. This presentation talks about those key processes, and more importantly, the fact that brilliant processes are useless without the right people employing them.

Opaque Transparency: The Silent Project Killer
Delivered Online On Demand1 hour
£15

High-Performance Teams: Core Protocols for Psychological Safety and EI

By IIL Europe Ltd

High-Performance Teams: Core Protocols for Psychological Safety and EI Want awesome teams that build great products? Great teams don't happen by accident. And they don't have to take a long time to build.In this session, Richard lays out the case for Continuous / Extreme Teaming. Join in a flight of fun learning activity-sets that will give you a taste of team awesomeness and how to start when you go back to work.Richard builds on the work of Jim and Michele McCarthy, Google, Bruce Tuckman, Gamasutra, Standish Group, Peter Drucker, and Melvin Conway. His learning activity-sets activities are short games, using elements from improvisational theater, The Core Protocols, Extreme Programming, and more.Who should attend? Anyone who wants to create a great team and build great products. You'll leave having embodied the essential elements of accelerated continuous team-building and maintenance. This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies. Fractions of PDUs may also be reported. The smallest increment of a PDU that can be reported is 0.25. This means that if you spent 15 minutes participating in a qualifying PDU activity, you may report 0.25 PDU. If you spend 30 minutes in a qualifying PDU activity, you may report 0.50 PDU.

High-Performance Teams: Core Protocols for Psychological Safety and EI
Delivered Online On Demand30 minutes
£15

The Mission-Critical Project Manager - Why Our PMs Need (more) Critical Thinking and Problem-Solving Skills

By IIL Europe Ltd

The Mission-Critical Project Manager - Why Our PMs Need (more) Critical Thinking and Problem-Solving Skills Many project managers have achieved mastery of the "tools of the project management trade": they are great planners, effective managers of their project teams, heroic firefighters - in short, they are competent in delivering projects. However, the number of people who can identify a problem, articulate a strategy to address it, *and* translate that strategy into reality is very limited in most organizations. Today, the ability to deal with ambiguity and complexity, acknowledge and solve new problems, and deal with a high degree of uncertainty is in high demand. For such challenges there is little to be found in the conventional 'PM Toolbox.' Adding creative and critical thinking skills is a rewarding opportunity and can make the difference between being just another PM or a truly strategic asset. This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies. Fractions of PDUs may also be reported. The smallest increment of a PDU that can be reported is 0.25. This means that if you spent 15 minutes participating in a qualifying PDU activity, you may report 0.25 PDU. If you spend 30 minutes in a qualifying PDU activity, you may report 0.50 PDU.

The Mission-Critical Project Manager - Why Our PMs Need (more) Critical Thinking and Problem-Solving Skills
Delivered Online On Demand15 minutes
£15