• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

22061 Courses

Professional Certificate Course in Supply Chain Planning Models and Approaches in London 2024

4.9(261)

By Metropolitan School of Business & Management UK

Delve into the intricate world of Supply Chain Planning Models and Approaches, gaining insights into forecasting demand, systematic forecasting processes, and the blend of quantitative and qualitative strategies.    This course dissects Supply Chain Planning (SCP) through modules on forecasting demand, criteria for effective forecasting, and systematic forecasting processes. Participants will explore both quantitative and qualitative approaches, unraveling the intricacies of key planning areas essential for successful supply chain management. After the successful completion of the course, you will be able to learn about the following, Understand Supply Chain Planning (SCP) and its pivotal role in organizational success. Explore the tangible benefits derived from effective Supply Chain Planning. Identify key planning areas crucial for streamlined operations in the supply chain. Comprehend the significance of forecasting demand within the supply chain. Examine the criteria utilized in forecasting processes for enhanced accuracy. Acquire knowledge of a systematic approach to forecasting within supply chain management. Explore quantitative approaches employed in supply chain planning for data-driven decision-making. Delve into qualitative approaches utilized in planning to consider non-numeric factors impacting the supply chain. This course provides an in-depth exploration of Supply Chain Planning Models and Approaches, focusing on demand forecasting, systematic processes, and the interplay between quantitative and qualitative strategies. Participants will gain the skills to strategically navigate key planning areas and unlock the benefits of robust Supply Chain Planning for organizational success. Course Structure and Assessment Guidelines Watch this video to gain further insight. Navigating the MSBM Study Portal Watch this video to gain further insight. Interacting with Lectures/Learning Components Watch this video to gain further insight. Supply Chain Planning Models and Approaches Self-paced pre-recorded learning content on this topic. Supply Chain Planning Models and Approaches Put your knowledge to the test with this quiz. Read each question carefully and choose the response that you feel is correct. All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course. The certificate is designed to enhance the learner's knowledge in the field. This certificate is for everyone eager to know more and get updated on current ideas in their respective field. We recommend this certificate for the following audience, Supply Chain Planner Demand Planning Analyst Inventory Planning Manager Forecasting Specialist Operations Planning Coordinator Supply Chain Analyst Demand Forecasting Manager Logistics Planning Strategist Inventory Control Supervisor Strategic Sourcing Planner Average Completion Time 2 Weeks Accreditation 3 CPD Hours Level Advanced Start Time Anytime 100% Online Study online with ease. Unlimited Access 24/7 unlimited access with pre-recorded lectures. Low Fees Our fees are low and easy to pay online.

Professional Certificate Course in Supply Chain Planning Models and Approaches in London 2024
Delivered Online On Demand14 days
£41

LEED Green Associate Training Course

By One Education

The LEED Green Associate Training Course offers a clear path into sustainable building practices through the globally recognised LEED framework. Designed for those interested in environmentally responsible design and construction, this course delivers all the theoretical essentials required to build a solid understanding of green building strategies—without overwhelming technical jargon. Whether you're aiming to boost your CV or broaden your knowledge in sustainable development, this learning experience provides a solid base to grasp the core concepts behind energy-efficient and environmentally sound practices. Every module has been carefully structured to prepare learners for the official LEED Green Associate examination. The content is streamlined to support flexible, on-demand study—ideal for anyone keen to explore the principles of green architecture at their own pace. With up-to-date knowledge, thorough topic coverage, and focused exam preparation, this course provides exactly what’s needed to confidently approach your LEED certification goals. Meet the Endorsement The Quality Licence Scheme has been designed specifically to recognise high-quality courses. This LEED Green Associate Training course materials are recognised by Quality Licence Scheme (QLS). This ensures the deep research and quality resource allocation behind the development phase of the course. In addition, the QLS certificate enriches your CV and recognises your quality study on the relevant subject. Expert Support Dedicated tutor support and 24/7 customer support are available to all students with this premium quality course. Key Benefits Learning materials of the Design course contain engaging voiceover and visual elements for your comfort. Get 24/7 access to all content for a full year. Each of our students gets full tutor support on weekdays (Monday to Friday) Course Curriculum: Module 01: Introduction LEED Green Associate (LEED GA BD+C Introduction) Module 02: Integrative Process Integrative Process Integrative Project Planning and Design Module 03: Location & Transportation Location and Transportation Overview Neighbourhood Development Sensitive Land High Priority Site Surrounding Density & Diverse Uses Access to Quality Transit Bicycle Facilities Reduced Parking Footprint Green Vehicles Module 04: Sustainable Sites Sustainable Site Overview Construction Activity Pollution Prevention Environmental Site Assessment Restore or Protect Habitat Open Space Rainwater Management Heat Island Reduction Light Pollution Reduction Site Master Plan Tenant Design and Construction Guidelines Places of Respite Direct Exterior Access Joint Use Facilities Module 05: Water Efficiency Water Efficiency Overview Prereq Outdoor Water Use Prereq Indoor Water Use Building Water Metering Credit Outdoor Water Use Indoor Water Use Cooling Tower Water use Building Water Metering Credit Module 06: Energy & Atmosphere Energy & Atmosphere Overview Fundamental Commissioning & Verification Minimum Energy Performance Prereq Building Level Energy Metering Fundamental Refrigerant Management Enhanced Commissioning Minimum Energy Performance Advanced Energy Metering Demand Response Renewable Energy Production Enhanced Refrigerant Management Green Power and Carbon Offsets Module 07: Materials & Resources Materials & Resources Overview Storage and Collection of Recyclables Construction and Demolition Waste Management Planning Preq PBT Source Reduction - Mercury Building Life-Cycle Impact Reduction BPDO Environmental Product Declaration BPDO Sourcing of Raw Materials BPDO Material Ingredients PBT Source Reduction - Mercury Credit PBT Source Reduction - Lead Cadmium Copper Furniture and Medical Furnishings Design for Flexibility Construction and Demolition Waste Management Module 08: Indoor Environment Quality Indoor Environment Quality Overview Min Indoor Air Quality Performance Environmental Tobacco Smoke Control Minimum Accoustic Performance Enhanced Indoor Air Quality Strategies Low Emitting Materials Construction Indoor Air Quality Management Plan Indoor Air Quality Assessment Thermal Comfort Interior Lighting Daylight Quality Views Accoustic Performance Module 09: Innovation Innovation Credit Innovation LEED AP Module 10: Regional Priority Regional Priority Regional Priority Credit Module 11: Completion Completion Course Assessment To simplify the procedure of evaluation and accreditation for learners, we provide an automated assessment system. Upon completion of an online module, you will immediately be given access to a specifically crafted MCQ test. The results will be evaluated instantly, and the score will be displayed for your perusal. For each test, the pass mark will be set to 60%. When all tests have been successfully passed, you will be able to order a certificate endorsed by the Quality Licence Scheme. CPD 120 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This LEED Green Associate Training course is designed to enhance your expertise and boost your CV. Learn key skills and gain a certificate of achievement to prove your newly-acquired knowledge. Requirements This LEED Green Associate Training course is open to all, with no formal entry requirements. Career path Upon successful completion of the LEED Green Associate Training Course, learners will be equipped with many indispensable skills and have the opportunity to grab. Certificates Certificate of completion Digital certificate - £9 Certificate of completion Hard copy certificate - £89 QLS Endorsed Certificate Hardcopy of this certificate of achievement endorsed by the Quality Licence Scheme can be ordered and received straight to your home by post, by paying - Within the UK: £89 International: £89 + £10 (postal charge) = £99 CPD Accredited Certification Hardcopy Certificate (within the UK): £15 Hardcopy Certificate (international): £15 + £10 (postal charge) = £25

LEED Green Associate Training Course
Delivered Online On Demand3 weeks
£12

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou

Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry

ArcGIS Desktop for Spatial Analysis: Go from Basic to Pro

By Packt

Gain proficiency in the mastery of Geographic Information Systems (GIS) via ArcGIS Desktop

ArcGIS Desktop for Spatial Analysis: Go from Basic to Pro
Delivered Online On Demand4 hours 45 minutes
£37.99

Excel Pivot Tables in 1 Hour, The Magic Data Cube

4.6(12)

By PCWorkshops

Pivot tables are really very easy to create, but very powerful. By using Excel pivot tables, one can get very interesting and valuable business intelligence from your data in very little time. This short session aims to give you the techniques to use this valuable Excel tool creatively. It is enough time to learn a lot about Excel Pivot Tables, but there is very little time for other questions.

Excel Pivot Tables in 1 Hour, The Magic Data Cube
Delivered Online & In-PersonFlexible Dates
£25

Firebase and Cloud Firestore for Android

By Packt

Learn all about the brand new Firestore, a NoSQL document based technology

Firebase and Cloud Firestore for Android
Delivered Online On Demand5 hours 30 minutes
£37.99

Business Intelligence with Microsoft Power BI - with Material

By Packt

This course will take you through the key tools of Power BI. You will learn how to use them to clean and visualize data and create impressive reports and dashboards with ease.

Business Intelligence with Microsoft Power BI - with Material
Delivered Online On Demand8 hours 47 minutes
£37.99

Deploy MEAN Stack App on Azure Cloud with CICD Pipeline

By Packt

If you want to gain a step-by-step understanding of how to deploy any MEAN stack application on Azure Cloud with CICD Pipeline using Azure DevOps and other cloud services, then this course is for you. This is one of the most practical hands-on-based full-stack application deployment courses where you will learn everything about public cloud services from scratch.

Deploy MEAN Stack App on Azure Cloud with CICD Pipeline
Delivered Online On Demand2 hours 43 minutes
£37.99

Jenkins for Professionals

By Packt

Real World Training Program for Jenkins

Jenkins for Professionals
Delivered Online On Demand5 hours
£37.99

Linux Fundamentals

By Packt

This course will take you through the basic and advanced concepts of Linux. You will become familiar with shell scripting, file and user management, data streams, and Linux networking with the help of many interesting activities.

Linux Fundamentals
Delivered Online On Demand5 hours 45 minutes
£37.99