• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

27651 Courses

Appraisal skills (In-House)

By The In House Training Company

Many managers question the value of appraisal programmes and many line managers believe appraisals are unduly time-consuming and bureaucratic. Yet the appraisal is a vital starting point when it comes to managing performance effectively and it is vital that managers appreciate this. Handled well, the benefits of formal appraisals are enormous. This thoroughly practical workshop has been designed to give line managers the knowledge, skills and confidence to deliver a well-structured appraisal - even in the most challenging circumstances. This course will help participants: Appreciate the benefits of the appraisal process Assess standards of performance objectively Plan and prepare for appraisals effectively Conduct a well-structured appraisal meeting Acquire the essential skills required for effective appraisals Improve their ability to discuss difficult issues more confidently Identify training and development requirements Agree clear and measurable development objectives Complete essential paperwork Understand the need to facilitate continual informal dialogue between appraisals 1 Introduction and course objectives 2 The appraisal process The aim of the appraisal process Understanding the bigger picture - the appraisal process as part of the employee development process The benefits of the appraisal process Common pitfalls Five steps to an effective performance appraisal 3 Step 1 - Assessment Using job standards as the basis for objective assessment Assessment of previous objectives 4 Step 2 - Preparation Documentation required Data on each appraisee Planning the meeting 5 Step 3 - The meeting The skills of appraisal interviewing The structure of the appraisal interview Dealing with poor performance and difficult situations Taking notes and completing documentation 6 Step 4 - Planning ahead and objective setting Identifying action to improve performance and enhance skills Establishing relevant training needs Agreeing SMART performance objectives Formulating a personal development plan 7 Step 5 - Action after the interview Essential paperwork Follow-up and action required between appraisal interviews Continuing informal dialogue 8 Video case study Bullets 9 Conclusion Course review / discussion Preparation of action plans for building on the skills learnt Close

Appraisal skills (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Credit Derivatives - Correlation & Counterparty Risk

5.0(5)

By Finex Learning

Overview This is a 2 day course on understanding credit markets converting credit derivatives, from plain vanilla credit default swaps through to structured credit derivatives involving correlation products such as nth to default baskets, index tranches, synthetic collateralized debt obligations and more. Gain insights into the corporate credit market dynamics, including the role of ratings agencies and the ratings process. Delve into the credit triangle, relating credit spreads to default probability (PD), exposure (EAD), and expected recovery (LGD). Learn about CDS indices (iTRAXX and CDX), their mechanics, sub-indices, tranching, correlation, and the motivation for tranched products. The course also includes counterparty risk in derivatives market where you learn how to managed and price Counterparty Credit Risk using real-world, practical examples Understand key definitions of exposure, including Mark-to-Market (MTM), Expected Exposure (EE), Expected Positive Exposure (EPE), Potential Future Exposure (PFE), Exposure at Default (EAD), and Expected Loss (EL) Explore the role of collateral and netting in managing counterparty risk, including the key features and mechanics of the Credit Support Annex (CSA) Briefly touch upon other XVA adjustments, including Margin Valuation Adjustment (MVA), Capital Valuation Adjustment (KVA), and Collateral Valuation Adjustment (CollVA). Who the course is for Credit traders and salespeople Structurers Asset managers ALM and treasury (Banks and Insurance Companies) Loan portfolio managers Product control, finance and internal audit Risk managers Risk controllers xVA desk IT Regulatory capital and reporting Course Content To learn more about the day by day course content please request a brochure To learn more about schedule, pricing & delivery options, book a meeting with a course specialist now

Credit Derivatives - Correlation & Counterparty Risk
Delivered in Internationally or OnlineFlexible Dates
Price on Enquiry

Fixed Income Attribution

5.0(5)

By Finex Learning

Overview This 2-day programme covers the latest techniques used for fixed income attribution. This hands-on course enables participants to get a practical working experience of fixed income attribution, from planning to implementation and analysis. After completing the course you will have developed the skills to: Understand how attribution works and the value it adds to the investment process Interpret attribution reports from commercial systems Assess the strengths and weaknesses of commercially available attribution software Make informed decisions about the build vs. buy decision Present results in terms accessible to all parts of the business Who the course is for Performance analysts Fund and portfolio managers Investment officers Fixed Income professionals (marketing/sales) Auditors and compliance Quants and IT developers Course Content To learn more about the day by day course content please request a brochure To learn more about schedule, pricing & delivery options, book a meeting with a course specialist now

Fixed Income Attribution
Delivered in Internationally or OnlineFlexible Dates
Price on Enquiry

Introduction to C Plus Plus Programming Essentials (TTCP2100)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an introductory-level C++ programming course designed for developers with experience programming in C or other languages. Practical hands-on prior programming experience and knowledge is required. Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in basic coding with C++, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment, guided by our expert team, attendees will learn: Writing procedural programs using C++ Using private, public and protected keywords to control access to class members Defining a class in C++ Writing constructors and destructors Writing classes with const and static class members Overloading operators Implementing polymorphic methods in programs Writing programs using file I/O and string streams Using manipulators and stream flags to format output Using the keyword template to write generic functions and classes Writing programs that use generic classes and functions Writing programs that use algorithms and containers of the Standard Library Apply object-oriented design techniques to real-world programming problems Using algorithms and containers of the Standard Library to manipulate string data Understand how C++ protects the programmer from implementation changes in other modules of an application Using try() blocks to trap exceptions Using catch() blocks to handle exceptions Defining exceptions and using throw to trigger them Introduction to C++ Programming / C++ Essentials is a skills-focused, hands-on C++ training course geared for experienced programmers who need to learn C++ coupled with sounds coding skills and best practices for OO development. Students will leave this course armed with the required skills to put foundation-level C++ programming skills right to work in a practical environment. The central concepts of C++ syntax and style are taught in the context of using object-oriented methods to achieve reusability, adaptability and reliability. Emphasis is placed on the features of C++ that support abstract data types, inheritance, and polymorphism. Students will learn to apply the process of data abstraction and class design. Practical aspects of C++ programming including efficiency, performance, testing, and reliability considerations are stressed throughout. Comprehensive hands on exercises are integrated throughout to reinforce learning and develop real competency Moving from C to C++ (Optional) New Compiler Directives Stream Console I/O Explicit Operators Standard Libraries Data Control Capabilities Handling Data New Declaration Features Initialization and Assignment Enumerated Types The bool Type Constant Storage Pointers to Constant Storage Constant Pointers References Constant Reference Arguments Volatile Data Global Data Functions Function Prototypes and Type Checking Default Function Data Types Function Overloading Problems with Function Overloading Name Resolution Promotions and Conversions Call by Value Reference Declarations Call-by-Reference and Reference Types References in Function Return Constant Argument Types Conversion of Parameters Using Default Initializers Providing Default Arguments Inline Functions Operator Overloading Advantages and Pitfalls of Overloading Member Operator Syntax and Examples Class Assignment Operators Class Equality Operators Non-Member Operator Overloading Member and Non-Member Operator Functions Operator Precedence This Pointer Overloading the Assignment Operator Overloading Caveats Creating and Using Objects Creating Automatic Objects Creating Dynamic Objects Calling Object Methods Constructors Initializing Member consts Initializer List Syntax Allocating Resources in Constructor Destructors Block and Function Scope File and Global Scope Class Scope Scope Resolution Operator :: Using Objects as Arguments Objects as Function Return Values Constant Methods Containment Relationships Dynamic Memory Management Advantages of Dynamic Memory Allocation Static, Automatic, and Heap Memory Free Store Allocation with new and delete Handling Memory Allocation Errors Controlling Object Creation Object Copying and Copy Constructor Automatic Copy Constructor Conversion Constructor Streaming I/O Streams and the iostream Library Built-in Stream Objects Stream Manipulators Stream Methods Input/Output Operators Character Input String Streams Formatted I/O File Stream I/O Overloading Stream Operators Persistent Objects Introduction to Object Concepts The Object Programming Paradigm Object-Orientated Programming Definitions Information Hiding and Encapsulation Separating Interface and Implementation Classes and Instances of Objects Overloaded Objects and Polymorphism Declaring and Defining Classes Components of a Class Class Structure Class Declaration Syntax Member Data Built-in Operations Constructors and Initialization Initialization vs. Assignment Class Type Members Member Functions and Member Accessibility Inline Member Functions Friend Functions Static Members Modifying Access with a Friend Class Templates Purpose of Template Classes Constants in Templates Templates and Inheritance Container Classes Use of Libraries Strings in C++ Character Strings The String Class Operators on Strings Member Functions of the String Class Inheritance Inheritance and Reuse Composition vs. Inheritance Inheritance: Centralized Code Inheritance: Maintenance and Revision Public, Private and Protected Members Redefining Behavior in Derived Classes Designing Extensible Software Systems Syntax for Public Inheritance Use of Common Pointers Constructors and Initialization Inherited Copy Constructors Destructors and Inheritance Public, Protected, Private Inheritance Exceptions Types of Exceptions Trapping and Handling Exceptions Triggering Exceptions Handling Memory Allocation Errors C++ Program Structure Organizing C++ Source Files Integrating C and C++ Projects Using C in C++ Reliability Considerations in C++ Projects Function Prototypes Strong Type Checking Constant Types C++ Access Control Techniques Polymorphism in C++ Definition of Polymorphism Calling Overridden Methods Upcasting Accessing Overridden Methods Virtual Methods and Dynamic Binding Virtual Destructors Abstract Base Classes and Pure Virtual Methods Multiple Inheritance Derivation from Multiple Base Classes Base Class Ambiguities Virtual Inheritance Virtual Base Classes Virtual Base Class Information The Standard Template Library STL Containers Parameters Used in Container Classes The Vector Class STL Algorithms Use of Libraries

Introduction to C Plus Plus Programming Essentials (TTCP2100)
Delivered OnlineFlexible Dates
Price on Enquiry

Excel Training: Advanced Tricks & Techniques

5.0(1)

By LearnDrive UK

A special focus will be put on advanced MS Excel tips and tricks for career advancement in this course.

Excel Training: Advanced Tricks & Techniques
Delivered Online On Demand1 hour
£5

Microsoft Excel

5.0(1)

By LearnDrive UK

This course will fully prepare you for virtually any Excel-related career path

Microsoft Excel
Delivered Online On Demand1 hour
£5

Bond Markets - Analytics, Risk & Pricing

5.0(5)

By Finex Learning

Overview Learn in detail about Exotic Options – Taxonomy, Barriers, and Baskets Who the course is for Fixed Income sales, traders, portfolio managers Bank Treasury Insurance Pension Fund ALM employees Central Bank and Government Funding managers Risk managers Auditors Accountants Course Content To learn more about the day by day course content please request a brochure To learn more about schedule, pricing & delivery options, book a meeting with a course specialist now

Bond Markets - Analytics, Risk & Pricing
Delivered in Internationally or OnlineFlexible Dates
Price on Enquiry

F5 Networks Configuring BIG-IP APM : Access Policy Manager

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager. This three-day course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Access Policy Manager as it is commonly deployed in both application delivery network and remote access settings. The course introduces students to BIG-IP Access Policy Manager, its configuration objects, how it commonly deployed, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Module 2: Configuring Web Application Access Review of BIG-IP LTM Introduction to the Access Policy Web Access Application Configuration Overview Web Application Access Configuration in Detail Module 3: Exploring the Access Policy Navigating the Access Policy Module 4: Managing BIG-IP APM BIG-IP APM Sessions and Access Licenses Session Variables and sessiondump Session Cookies Access Policy General Purpose Agents List Module 5: Using Authentication Introduction to Access Policy Authentication Active Directory AAA Server RADIUS One-Time Password Local User Database Module 6: Understanding Assignment Agents List of Assignment Agents Module 7: Configuring Portal Access Introduction to Portal Access Portal Access Configuration Overview Portal Access Configuration Portal Access in Action Module 8: Configuring Network Access Concurrent User Licensing VPN Concepts Network Access Configuration Overview Network Access Configuration Network Access in Action Module 9: Deploying Macros Access Policy Macros Configuring Macros An Access Policy is a Flowchart Access Policy Logon Agents Configuring Logon Agents Module 10: Exploring Client-Side Checks Client-Side Endpoint Security Module 11: Exploring Server-Side Checks Server-Side Endpoint Security Agents List Server-Side and Client-Side Checks Differences Module 12: Using Authorization Active Directory Query Active Directory Nested Groups Configuration in Detail Module 13: Configuring App Tunnels Application Access Remote Desktop Network Access Optimized Tunnels Landing Page Bookmarks Module 14: Deploying Access Control Lists Introduction to Access Control Lists Configuration Overview Dynamic ACLs Portal Access ACLs Module 15: Signing On with SSO Remote Desktop Single Sign-On Portal Access Single Sign-On Module 16: Using iRules iRules Introduction Basic TCL Syntax iRules and Advanced Access Policy Rules Module 17: Customizing BIG-IP APM Customization Overview BIG-IP Edge Client Advanced Edit Mode Customization Landing Page Sections Module 18: Deploying SAML SAML Conceptual Overview SAML Configuration Overview Module 19: Exploring Webtops and Wizards Webtops Wizards Module 20: Using BIG-IP Edge Client BIG-IP Edge Client for Windows Installation BIG-IP Edge Client in Action Module 21: Configuration Project Configuration Project Additional course details: Nexus Humans F5 Networks Configuring BIG-IP APM : Access Policy Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the F5 Networks Configuring BIG-IP APM : Access Policy Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

F5 Networks Configuring BIG-IP APM : Access Policy Manager
Delivered OnlineFlexible Dates
Price on Enquiry

Intelligence Analysis for National Security and Public Safety

4.7(26)

By Academy for Health and Fitness

48-Hour Knowledge Knockdown! Prices Reduced Like Never Before! Imagine a world where national security and public safety threats are detected, analysed, and addressed promptly. This is the realm of intelligence analysts, who play a vital role in ensuring our safety. The Intelligence Analysis for National Security and Public Safety course provides comprehensive knowledge to help you succeed in this growing industry. The demand for intelligence analysts in the UK is rising, with the government and private sector investing heavily in national security infrastructure. This Intelligence Analyst Certification Course will equip you with the skills and understanding required to excel in intelligence analysis. Learning Outcomes: Understand the definition and importance of intelligence analysis in national security and public safety. Gain knowledge of the historical development and evolution of intelligence analysis. Comprehend the intelligence cycle and its components for effective analysis. Develop critical thinking and structuring techniques for accurate intelligence analysis. Learn the analysis process, best practices, and methodologies. Examine the role of intelligence in national security and its implications. Explore legal issues and ethical considerations in intelligence analysis. Identify your role, responsibilities, and functions as an intelligence analyst. Why Prefer this Intelligence Analysis for National Security and Public Safety Course? Opportunity to earn a certificate accredited by CPD QS after completing this Intelligence Analysis for National Security and Public Safety course Get a free student ID card! (£10 postal charge will be applicable for international delivery). Innovative and engaging content. Free assessments. 24/7 tutor support Throughout this Intelligence Analysis for National Security and Public Safety course, you will learn the intelligence cycle, critical thinking, structuring techniques, and the legal and ethical considerations involved in intelligence analysis. This Intelligence Analysis for National Security and Public Safety course will pave the way for a rewarding career in intelligence, with ample opportunities for growth and development. Enrol in the Intelligence Analysis for National Security and Public Safety course today, and become part of the front line in safeguarding our nation and communities. Here is the curriculum breakdown of this Intelligence Analysis for National Security and Public Safety course: Module 01: Learn the concept of intelligence analysis Understand its significance in national security Module 02: Explore historical development Understand its evolution over time Module 03: Discover the intelligence cycle components Learn how it enhances analysis Module 04: Develop critical thinking skills Understand structuring for accurate analysis Module 05: Learn methodologies and best practices Enhance your analysis process Module 06: Examine the role of intelligence in security Understand its implications for national security Module 07: Explore legal and ethical issues Learn to navigate them as an analyst Module 08: Identify your role as an intelligence analyst Understand your responsibilities and functions Certification Upon successful completion of the Intelligence Analysis for National Security and Public Safety course, learners can obtain a certificate as proof of their achievement. The following certificate options are available: PDF Certificate: A digital version of the certificate will be emailed to the learner upon request for only £10. Printed Hardcopy Certificate - UK Delivery: For learners within the United Kingdom, a high-quality printed hardcopy of the certificate can be delivered to your postal address for only £29. Printed Hardcopy Certificate - International Delivery: For learners residing outside the UK, a high-quality printed hardcopy of the certificate can be delivered to your international postal address for only £39. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Individuals aspiring to work as intelligence analysts in national security, law enforcement, or public safety sectors Professionals in related fields want to enhance their understanding of intelligence analysis and its application. Public safety and national security agencies seeking to train their staff in intelligence analysis Students pursuing degrees in security studies, political science, or related fields who want to develop a foundation in intelligence analysis. Researchers or academics focusing on intelligence analysis and its role in national security and public safety. Requirements You will not need any prior background or expertise. All you need to take this Intelligence Analysis for National Security and Public Safety is - A smart device. A secure internet connection. Being over the age of 16. And a strong drive for learning and literacy. Career path Intelligence Analyst - £30-50k/year Counterterrorism Analyst - £35-55k/year Law Enforcement Analyst - £25-45k/year Security Consultant - £40-70k/year Crime Analyst - £25-45k/year

Intelligence Analysis for National Security and Public Safety
Delivered Online On Demand6 hours
£16

Bravery & Womanhood

By Person Irresponsible

Are women really braver than men? Even when doing exactly the same activity? Like walking across America whilst fat, forty-sob-sob-sob-something, female and alone?

Bravery & Womanhood
Delivered In-PersonFlexible Dates
£11.36