• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

10003 Courses

MHFA Champion

5.0(2)

By Changing Minds Training

This one day course trains you as an MHFA Champion, giving you: an understanding of common mental health issues, knowledge & confidence to advocate for mental health awareness, ability to spot signs of mental ill health, and skills to support positive wellbeing. Available online or face-to-face.

MHFA Champion
Delivered In-PersonFlexible Dates
£2,400

Online Postgraduate Certificate Business of Motorsport

5.0(1)

By National Motorsport Academy

The Postgraduate Certificate (PG Cert.) consists of the first four modules from the MA Business of Motorsport Master’s Degree. You can then achieve a Postgraduate Diploma (PG Dip.) Business of Motorsport by studying the PG Dip. Top-Up, a further three modules from the MA.

Online Postgraduate Certificate Business of Motorsport
Delivered OnlineFlexible Dates
£3,950 to £5,925

Online Postgraduate Diploma Business of Motorsport

5.0(1)

By National Motorsport Academy

For the Postgraduate Diploma (PG Dip.) you will study the four modules (60 credits) from the Postgraduate Certificate (PG Cert.) plus an additional three modules (60 credits) from the MA Business of Motorsport Master’s Degree. N.B. The Postgraduate Diploma (PG Dip.) does not include the Executive Project (Dissertation) the final module of the MA.

Online Postgraduate Diploma Business of Motorsport
Delivered OnlineFlexible Dates
£3,950 to £5,925

Office Admin and Customer Service Diploma

4.3(43)

By John Academy

Description: Office administration and customer service skills are very important for any kind of business. In this course, you will learn the necessary skills, knowledge, and information about office administration and customer service. You will learn how to identify what administrative procedures to be included in your business. This is a series of discussions about administrative and customer service support. You will then learn how large-scale organisations are managed. You will also be able to learn the structures and objectives involved in conducting of admin assistant and customer service. Who is the course for? Professionals, employees or businessmen who want to improve the administration and customer service department of their company. People who want to know how administrative management and customer service work. Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Assessment: At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After you have successfully passed the test, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. PDF certificate's turnaround time is 24 hours and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognised accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path: The Office Admin and Customer Service Course is a useful qualification to possess, and would be beneficial for the following careers: Accounting Technician Admin Assistant Bid Writer Bookkeeper Civil Service Administrative Officer Customer Service Provider Data Entry Clerk Finance Officer Hotel Receptionist Legal Secretary Payroll Administrator Liaison Officers Supervisor Typist. Admin Support Module One - Getting Started 00:30:00 Module Two - Getting Organized (I) 01:00:00 Module Three - Getting Organized (II) 01:00:00 Module Four - Managing Time 01:00:00 Module Five - Getting It All Done On Time 01:00:00 Module Six - Special Tasks 01:00:00 Module Seven - Verbal Communication Skills 01:00:00 Module Eight - Non-Verbal Communication Skills 01:00:00 Module Nine - Empowering Yourself 01:00:00 Module Ten - The Team of Two 01:00:00 Module Eleven - Taking Care of Yourself 01:00:00 Module Twelve - Wrapping Up 00:30:00 Administrative Management Module One - Getting Started 00:30:00 Module Two - Why Your Office Needs Administrative Procedures 01:00:00 Module Three - Gathering the Right Tools 01:00:00 Module Four - Identifying Procedures to Include 01:00:00 Module Five - Top Five Procedures to Record 01:00:00 Module Six - What to Include in Your Binder (I) 01:00:00 Module Seven - What to Include in Your Binder (II) 01:00:00 Module Eight - Organizing Your Binder 01:00:00 Module Nine - What Not to Include in the Procedure Guide 01:00:00 Module Ten - Share Office Procedure Guide 01:00:00 Module Eleven - Successfully Executing the Guide 01:00:00 Module Twelve - Wrapping Up 00:30:00 Organisational Skills Module One - Getting Started 00:30:00 Module Two - Remove the Clutter 01:00:00 Module Three - Prioritize 01:00:00 Module Four - Scheduling Your Time 01:00:00 Module Five - To Do Lists 01:00:00 Module Six - Paper and Paperless Storage 01:00:00 Module Seven - Organization in Your Work Area 01:00:00 Module Eight - Tools to Fight Procrastination 01:00:00 Module Nine - Organizing Your Inbox 01:00:00 Module Ten - Avoid the Causes of Disorganization 01:00:00 Module Eleven - Discipline is the Key to Stay Organized 01:00:00 Module Twelve - Wrapping Up 00:30:00 Customer Relations and Dealings Module One - Getting Started 00:30:00 Module Two - The Right Attitude Starts with You 01:00:00 Module Three - Stress Management (Internal Stressors) 01:00:00 Module Four - Stress Management (External Stressors) 00:30:00 Module Five - Transactional Analysis 01:00:00 Module Six - Why are Some Customers Difficult 01:00:00 Module Seven - Dealing with the Customer Over the Phone 01:00:00 Module Eight - Dealing with the Customer In Person 01:00:00 Module Nine - Sensitivity in Dealing with Customers 01:00:00 Module Ten - Scenarios of Dealing with a Difficult Customer 01:00:00 Module Eleven - Following up With a Customer Once You Have Addressed Their Issue 01:00:00 Module Twelve - Wrapping Up 00:30:00 Customer Service: Telephone Etiquette Module One - Getting Started 00:30:00 Module Two - Aspects of Phone Etiquette 01:00:00 Module Three - Using Proper Phone Language 01:00:00 Module Four - Eliminate Phone Distractions 01:00:00 Module Five - Inbound Calls 01:00:00 Module Six - Outbound Calls 01:00:00 Module Seven - Handling Rude or Angry Callers 01:00:00 Module Eight - Handling Interoffice Calls 01:00:00 Module Nine - Handling Voicemail Messages 01:00:00 Module Ten - Methods of Training Employees 01:00:00 Module Eleven - Correcting Poor Telephone Etiquette 01:00:00 Module Twelve - Wrapping Up 00:30:00 Customer Relationship Management Customer Relationship Management 00:10:00 What CRM Is and Who It Serves 00:15:00 Checklist for Success 00:15:00 Requirement Driven Product Selection 00:15:00 Considerations in Tool Selection 00:15:00 Strategies for Customer Retention 00:15:00 Building the Future 00:15:00 Homegrown vs. Application Service Provider 00:15:00 Evaluating and Reviewing Your Program 00:15:00 The Development Team 00:15:00 Microsoft Office Word Module One - Getting Started 00:30:00 Module Two - Opening 01:00:00 Module Three - Working with the Interface 01:00:00 Module Four - Your First Document 01:00:00 Module Five - Basic Editing Tasks 01:00:00 Module Six - Basic Formatting Tasks 01:00:00 Module Seven - Formatting Paragraphs 01:00:00 Module Eight - Advanced Formatting Tasks 01:00:00 Module Nine - Working with Styles 01:00:00 Module Ten - Formatting the Page 01:00:00 Module Eleven - Sharing Your Document 01:00:00 Module Twelve - Wrapping Up 00:30:00 Microsoft Office Powerpoint Module One - Getting Started 00:30:00 Module Two - Opening PowerPoint 01:00:00 Module Three - Working with the Interface 01:00:00 Module Four - Your First Presentation 01:00:00 Module Five - Working with Text 01:00:00 Module Six - Formatting Text and Paragraphs 01:00:00 Module Seven - Adding Pictures 01:00:00 Module Eight - Advanced Formatting Tasks 01:00:00 Module Nine - Working with Transitions and Animations 01:00:00 Module Ten - Setting Up Your Slide Show 01:00:00 Module Eleven - Showtime! 01:00:00 Module Twelve - Wrapping Up 00:30:00 Microsoft Office Excel Module One - Getting Started 00:30:00 Module Two - Opening Excel 01:00:00 Module Three - Working with the Interface 01:00:00 Module Four - Your First Worksheet 01:00:00 Module Five - Viewing Excel Data 01:00:00 Module Six - Building Formulas 01:00:00 Module Seven - Using Excel Functions 01:00:00 Module Eight - Using Quick Analysis 01:00:00 Module Nine - Formatting Your Data 01:00:00 Module Ten - Using Styles, Themes, and Effects 01:00:00 Module Eleven - Printing and Sharing Your Workbook 01:00:00 Module Twelve - Wrapping Up 01:00:00 Refer A Friend Refer A Friend 00:00:00 Mock Exam Mock Exam- Office Admin and Customer Service Course 00:30:00 Final Exam Final Exam- Office Admin and Customer Service Course 00:30:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Office Admin and Customer Service Diploma
Delivered Online On Demand3 days
£25

Python for OOP - The A to Z OOP Python Programming Course

By Packt

Learn to write scalable, reusable, and maintainable code by leveraging the OOP concepts in Python. This comprehensive OOP course covers essential concepts, such as encapsulation, inheritance, and polymorphism. The last section of this course covers a real-world library management system project.

Python for OOP - The A to Z OOP Python Programming Course
Delivered Online On Demand3 hours 59 minutes
£48.99

Introduction to Floating Production, Storage and Offloading Vessels (FPSO) – Design & Technology

By EnergyEdge - Training for a Sustainable Energy Future

Join Energy Edge's FPSO design and technology course to gain essential knowledge on floating production systems. Elevate your skills in the energy sector.

Introduction to Floating Production, Storage and Offloading Vessels (FPSO) – Design & Technology
Delivered In-Person
£1,999 to £2,199

Health And Safety In The Workplace, Level 1

5.0(50)

By Pochat Training

QA Level 1 Award In Health And Safety In The Workplace (RQF) Face to Face: Half-day course Virtual Classroom: Spread over 2 sessions of 2½ hr duration A basic course to train your workers in basic health and safety Teaches workers how to keep themselves and others safe at work Course Contents: Roles and responsibilities of employers and employees The importance of health and safety in the workplace Workplace hazards and Risks, including:Slips, Trips and FallsManual HandlingFireWorking from HeightElectricityHazardous SubstancesMachinery and Vehicles Workplace conditions that can affect health and safety Health and Safety Signage Personal Protective Equipment and its uses Importance of Personal hygiene The Purpose of First Aid Provision The need for Reporting Incidents and ill Health Benefits of this course: In 2018/19, 1.4 million people suffered from a work-related illness 581,000 sustained an injury 147 People lost their lives The estimated cost of injuries and ill health last year was £15 billion 28.2 million working days, or 108,045 working years, were lost due to work-related illnesses and injuries It is an employer's duty to protect the health, safety and welfare of their employees and other people who might be affected by their business. This includes providing sufficient information, instruction and training of employees, so they can work in a way that does not put themselves or others at risk Our QA Level 1 Award in Health and Safety in the Workplace (RQF) course helps employs gain a bit more understanding of health and safety issues and their own role within that Accredited, Ofqual regulated qualification: Our Health and Safety Training Course is a nationally recognised, Ofqual regulated qualification accredited by Qualsafe Awards.This means that you can be rest assured that your Health and Safety Certificate fulfils the legal requirements and is a very good way to make sure you and your employees are trained in Health and Safety.The Ofqual Register number for this course is 603/0774/2

Health And Safety In The Workplace, Level 1
Delivered in Chesterfield or Online + more
£85

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

Getting Started with Spring Boot 2

By Packt

Learn how to build real-world applications using Spring Framework 5 and Spring Boot 2

Getting Started with Spring Boot 2
Delivered Online On Demand12 hours 56 minutes
£22.99

Understanding Worry: FREE Workshop

By Anxiety Curse- Ivana Franekova

*Understanding Worry* is a FREE, interactive, hands-on workshop, focused on helping you understand uncontrollable, excessive worrying.

Understanding Worry: FREE Workshop
Delivered Online On Demand
FREE