• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

36236 Courses

Remote Policy Evaluation Methods May 2025

By Institute for Fiscal Studies

The course covers research design principles and all main quantitative evaluation methods: randomised experiments, instrumental variables, sharp and fuzzy regression discontinuity designs, regression methods, matching methods and longitudinal methods (before-after, difference-in-differences and synthetic controls).

Remote Policy Evaluation Methods May 2025
Delivered Online
£450 to £1,662

IRATA LEVEL 1 Rope Training Course

4.6(26)

By MCL Height Safety

The IRATA Level 1 is the entry level into the rope access industry. An IRATA Level 1 technician will be able to perform a range of rope access manoeuvres and have an understanding of the current legislation. An IRATA Level 1 is required to be supervised by an IRATA Level 3 technician.

IRATA LEVEL 1 Rope Training Course
Delivered In-PersonFlexible Dates
£896

Securing Linux systems

5.0(3)

By Systems & Network Training

Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing Linux systems
Delivered in Internationally or OnlineFlexible Dates
£3,697

GPON and FTTx networks

5.0(3)

By Systems & Network Training

GPON and FTTx networks training course description Designed to benefit those requiring an in depth knowledge of the principles and applications of Ten Gigabit and Gigabit Passive Optical Networking and Fibre to the X in NG Networks applications and their associated equipment, its flexibility and function within a modern transmission network. Using an effective mix of 'hands on' equipment instruction and correlation to theory based learning the delegate will gain a complete understanding of the equipment and the tasks to be undertaken in a real life situation. What will you learn Compare PON/FTTx systems. Explain network elements and designs. Support applications and network interfaces. List circuit provisioning and bandwidth requirements. Understand upstream & downstream issues. Describe headend & network elements/OLT-ONT. Perform network testing with OTDR test sets. GPON and FTTx networks training course details Who will benefit: Anyone working with GPON and FTTx. Prerequisites: Introduction to data communications and networking. Duration 5 days GPON and FTTx training course contents FTTN, FTTC, FTTH SMF, MMF, Fibre safety and properties (dispersion/attenuation), Fibre reel cables and types, Fibre installation and air blown fibre, Transmitters and receivers - power budget/laser classes. Fibre to the home (FTTH), FTTC (Fibre to the Cabinet), FTTN (Fibre to the node) , FTTD (Fibre to the desk), FFTH topologies and wavelengths, Active or passive optical network. WDM equipment and GPON OSP design Wavelength considerations, WDM/DWDM/CWDM, EDFA optical amplification, AWG (Arrayed Waveguide Grating) splitters , Couplers (splitters) and losses, Optical splitters 1x2, 1x4, 1x8, 1x16, 1x32, 1x64, 2x64. PON variants Gigabit passive optical network (GPON), Gigabit Ethernet passive optical network (GEPON), Time division PON (TDM-PON), Wave Division Multiplexing PON (WDM-PON), 1Gbps, 10Gbps, 40Ggps, 100Gbps FSAN (Full Service Access Network) NGA (Next Generation Access), Strategies for TDM-PON to WDM-PON migration, Architecture of NG-PON (hybrid WDM/TDM PON), Additional services than triple play. GEPON design GPON OSP centralized and distributed design, GPON PON splitters x4 x8 x32, Fibre splice trays /cassette trays & enclosures, GPON field testing and installation verification, GPON physical layer testing, Optical time domain reflectometer (OTDR), Optical power source & meter, Optical return loss (ORL), APON/BPON/GPON/EPON comparisons. GPON ITU-T G.984.1 Reference model, terminology & architecture, Access network system management functions. ONT & OLT functional block examples. FTTx scenarios, 4 switching arrangements for external access network backup. GPON ITU-T G.984.2 Physical layer, Enhancement band, Bit rate and wavelengths, FEC and RAMAN. GPON ITU-T G.984.3 Frame structure, GPON encapsulation method (GEM), GTC adaptation and framing sublayer protocol stack, Status reporting & traffic monitoring DBA (SR-DBA & TM-DBA), Transmission container (T-CONT) types, Downstream & upstream multiplexing, GEM port identifier, Media access control and ONU registration, Extended bandwidth assignment model scheduling architecture, PLOAM & alarm messages, Downstream & Upstream FEC, Process order in a GTC transmit flow. GPON ITU-T G.984.4 and G.988 ONT management and control interface (OMCI) Management interface, Reference model, Typical ONT with SCTE 55-1 or SCTE 55-2 compliancy. GPON ITU-T G.984.5 enhancement band Band options, GPON NGA, Wavelength allocation. GPON ITU-T G.984.6 optical reach extension (G.984.re) Reach extension (RE), OA-based and OEO-based reach extenders, Protection, Reach extender with OTDR blocking filters (BF) and bypass (BYP) filters. GPON ITU-T G.984.7 long reach Quiet Window. 10-GPON ITU-T G.987.1 (XG-PON) Scenarios, reference access network architecture, XG-PON with G-PON through WDM1r, G-PON and XG-PON wavelength allocation, G-PON and XG-PON co-existence with video overlay option, RE migration scenarios. G.989 40Gbps XG-PON2 Functional reference architecture, NG-PON2 system coexistence with legacy systems, Definitions of legacy compatibility terminology. GPON issues and standards GPON components GPON OLT / GPON ONT, GPON management, Operational support systems (OSS), Network management systems (NMS), OMCI (ONT Management control interface), RG (Residential gateway), Data and prioritised voice channel product, GPON broadband-forum standards, Broadband-forum , TR-069 and TR-156, HPNA (home phone network alliance), Powerline carrier (PLC), GPON DLNI G.hn or G.9960, MOCA, FTTH council certification standard for network certification. Fibre-connected home badge, Ethernet in the first mile (EFM), GPON frame synchronization to network timing, Direct clock synchronization interface (BITS), Multiservice access platform (MSAP), Software planning tool, Superconnected cities / voucher scheme. Hands on practical assignments Single and multimode fibre recognition, Fibre Cleaning methods, Checking cleaning with an optical microscope, Optical light source and optical power meter referencing, PON splitter and fibre drum testing with an optical power meter, 6km classroom passive optical network testing with an OTDR at 1310/1550nm, Using decibels (dB's) and decibel milliwats (dBm's), Designing networks up to 20km long using vendor specifications (power budget), Fault finding with a visible fault locator.

GPON and FTTx networks
Delivered in Internationally or OnlineFlexible Dates
£3,697

Oliver McGowan Mandatory Training - Bath - Train the Trainer Tier 2 Programme

4.6(22)

By The Autism Training Network Ltd

You MUST complete E-Learning on The Oliver McGowan Mandatory Training On Learning Disabilites & Autism before you attend further training. This is free and can be accessed here: https://portal.e-lfh.org.uk/Component/Details/781480 The training contains potentially challenging material that mentions death and dying, trauma, mental and physical illness, system failures and inequalities faced by autistic people and people with a learning disability. Tier 2 - Train The Facilitator Course Information  Suitable For: People who have the skills and experience needed to deliver Tier 2 Face-to-Face training to trainees who provide support and/or care of autistic people or people with a learning disability. Course Summary:  Tier 2 Train The Facilitator is a 2 day course. Trainee Facilitators need to: Complete the E-learning Attend a live Tier 2 training session Day 1 - Learning Disability Training Day Day 2 - Autism Training Day The trainee will then be assessed by our Lead Trainer where a decision will be made regarding signing the trainee off to delivery training. Information about The Oliver McGowan Mandatory Training on Learning Disabilities & Autism The training is named after Oliver McGowan. Oliver was a young man whose death at the age of 18, shone a light on the need for health and social care colleagues to have better skills, knowledge and understanding of the needs for autistic people and people with a learning disability. The Oliver McGowan Mandatory Training on Learning Disability and Autism is the government’s preferred and recommended training for health and social care staff and is enshrined in law in the Health & Care Act 2022. The Oliver McGowan Mandatory Training on Learning Disability and Autism is co-delivered with a Facilitator and co-trainers with lived experience of learning disability and autism. The Oliver McGowan Mandatory Training is a standardised package that is delivered by trained and approved trainers. The consistent content and delivery means it is transferable between employers. Content may trigger difficult and upsetting feelings. Please note that for this course to run there is a minimum of 3 trainees to attend; if this is not met by the day before the course it may not go ahead and you will need to reschedule.

Oliver McGowan Mandatory Training - Bath - Train the Trainer 
 Tier 2 Programme
Delivered In-Person in Bath
£750

Implementing Good Clinical Laboratory Practice

By Research Quality Association

Course Information Join our comprehensive course, meticulously designed to equip individuals implementing Good Clinical Laboratory Practice (GCLP) within laboratories handling samples from clinical trials. Delve into the current regulatory landscape governing laboratory work supporting clinical trials, referencing key guidelines such as the ICH Guideline for Good Clinical Practice, the Clinical EU Trials Directive, relevant regulations, and leveraging insights from the RQA guidance document on GCLP. Is this course for you? This course is tailored for laboratory managers, analysts, investigators, trial coordinators, monitors, and auditors operating in diverse settings such as pharmaceutical company laboratories, central laboratories, contract research organisations, hospital laboratories, clinics, and investigator sites. This course will give you: Guidance on effectively interpreting and applying GCLP within the broader framework of Good Clinical Practice (GCP) Insight into the seamless integration of GCLP within clinical programmes (GCP) Practical strategies for implementing GCLP in the nuanced environment of clinical research laboratories The chance to update your knowledge with the latest interpretations and guidance on clinical laboratories by the UK Medicines and Healthcare Products Regulatory Agency (MHRA) Access to a seasoned panel of speakers with extensive expertise A unique opportunity to deepen your understanding of GCLP's application across diverse scenarios. Engage in: Lively discussions to foster ideas Problem-solving sessions targeting specific challenges Detailed exploration of specific aspects within the realms of GCP and GCLP. Tutors Tutors will be comprised of (click the photos for biographies): Vanessa Grant -, - Louise Handy Director, Handy Consulting Ltd Tim Stiles Consultant, Qualogy Ltd Programme Please note timings may be subject to alteration. Day 1 08:50 Registration 09:00 Welcome and Introduction 09:20 Good Clinical Practice and the Requirements of Good Clinical Laboratory Practice A review of Good Clinical Practice and its requirements for the laboratory analysis of samples from a trial. The thought processes behind the development of Good Clinical Laboratory Practice, its objective, scope, interpretation and application are explained. 10:00 Safety and Ethical Consideration Informed consent, confidentiality, expedited reporting, blinding and unblinding and serious breaches of the GCP are discussed. 10:40 Break 10:55 Organisation and Personnel Responsibilities within GCP and the Laboratory The responsibilities of key functions that should exist within a clinical laboratory including personnel records of training and competence are discussed. 11:30 Staff Training and Training Records Personnel records of training and competency assessments are discussed. 11:45 Laboratory Facilities, Equipment and Materials Suitable facility design, organisation and operation will be discussed. The calibration, validation and maintenance of equipment used in the conduct of sample analysis are examined, as are the suitability of materials and the identification and labelling of reagents and solutions. 12:30 Lunch 13:15 Workshop 1 - Facilities, Equipment and Responsibilities Some practical problems with regard to the facilities, equipment and responsibilities are explored. 13:45 Workshop 1 - Feedback 14:15 Computer Systems Validation Systems, including computerised systems, used in the analysis, collection and reporting of results should be appropriately tested, operated and controlled. What this means in practice is discussed. 14:45 Trial Protocols, Analytical Plans During this session we examine the purpose, content, control and change of these important documents. 15:30 Break 15:45 Workshop 2 - SOPs, Clinical Protocols, Analytical Plans and Validation The practicalities of managing and documenting the planning phase of analytical work on a trial are explored along with computerised system validation. 16:30 Workshop 2 - Feedback 17:00 Close of Day Day 2 09:00 Conduct of the Work and Quality Control Many of the issues that surround the conduct of sample collection, shipment, storage, analysis and management of Analytical Methods are discussed. This includes the quality control of the assay that may be employed and Quality Control checks. 10:00 Deviation Management The expectations around deviations and CAPA are discussed. 10:15 Workshop 3 - Conduct of the Work and Quality Control Practical work conduct and quality control issues are explored. 10:45 Break 11:00 Workshop 3 - Feedback 11:30 Source Data, Data Integrity, Records and Reports The creation and subsequent management of source data and records, data integrity, are discussed, together with the process of reporting analytical results. 12:10 Workshop 4 - Data, Records and Reports Practical problems with data, records and reports are investigated. 12:45 Lunch 13:30 Workshop 4 - Feedback 14:00 Quality Audit The requirements for and purpose of quality audits are discussed. The difference between quality audit and quality control are explained along with the role of the quality audit staff and their interaction with the analytical project managers, laboratory management and study staff. 14:40 Risk Management How should we assess risk and how can we use the process to assist in evaluation of audit findings. 15:15 Break 15:30 Regulatory Inspection The conduct of regulatory inspections and current expectations of the inspectors. Preparation for inspections and conduct during them will be discussed. 16:00 Panel Session This panel session will address any outstanding issues raised by the delegates. 16:15 Close of Course Extra Information Face-to-face course Course Material Course material will be available in PDF format for delegates attending this course. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course. The material will be emailed in advance of the course and RQA will not be providing any printed copies of the course notes during the training itself. Delegates wishing to have a hard copy of the notes should print these in advance to bring with them. Alternatively delegates are welcome to bring along their own portable devices to view the material during the training sessions. Remote course Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam. CPD Points 14 Points Development Level Develop

Implementing Good Clinical Laboratory Practice
Delivered In-Person in Cambridge
£858 to £1,112

Electronic Document Management System (EDMS)

5.0(10)

By GBA Corporate

Overview EDMS Electronic Document Management System is basically a kind of IT-based system which is developed to manage the creation, tracking, storage and disposal of all physical and digital documents and records. Through this, we can easily keep track of various documents modified by different users. With the access of one application, many different tasks can be completed that revolve around document management. It enhances the security system where we can easily define whom to have access to what part of the documents. EDRMS is known by many other different names like Enterprise content management systems or digital asset management, document mapping and so on. This course shows participants how to deal with documents in an electronic way to get rid of the paper's hard copy which takes a lot of space and time. It will also update you with the EDRMS system and changes that happen to take place with the passage of time. The advanced technology leads to Advance EDRMS systems with enhanced features. 

Electronic Document Management System (EDMS)
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Electronic Document and Record Management System (EDRMS)

5.0(10)

By GBA Corporate

Overview EDRMS Electronic Document and Record Management System is basically a kind of IT-based system which is developed to manage the creation, tracking, storage and disposal of all physical and digital documents and records. Through this, we can easily keep track of various documents modified by different users. With the access of one application, many different tasks can be completed that revolve around document management. It enhances the security system where we can easily define whom to have access to what part of the documents. EDRMS is known by many other different names like Enterprise content management systems or digital asset management, document mapping and so on. This course shows participants how to deal with documents in an electronic way to get rid of the paper's hard copy which takes a lot of space and time. It will also update you with the EDRMS system and changes that happen to take place with the passage of time. The advanced technology leads to Advance EDRMS systems with enhanced features. 

Electronic Document and Record Management System (EDRMS)
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

BA (HONS) FILM BUSINESS & PRODUCTION

By Screen and Film School

Are you passionate about the business side of film? Do you have an entrepreneurial mindset and ambitions to pave a career in a fast-growing creative industry? The BA (Hons) Film Business & Production degree reflects current demands for professionally ready graduates equipped with the vital creative, business and entrepreneurial skills to navigate the modern film, screen and media environment.

BA (HONS) FILM BUSINESS & PRODUCTION
Delivered In-Person in Birmingham + 2 moreFlexible Dates
£9,250 to £15,950