• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

758 Educators providing Courses

Courses matching "Strategies "

Show all 10773

Marketing and Business Growth for FitPros Workshop

5.0(13)

By Platinum Training Institute

This intensive 1-day workshop equips both newly qualified and experienced fit-pros with the business knowledge and marketing tools to effectively market their services, attract more clients and build a successful & sustainable business.

Marketing and Business Growth for FitPros Workshop
Delivered In-Person in Belfast
£95

Methane Emissions Mitigation and Management for Oil and Gas Industry

By EnergyEdge - Training for a Sustainable Energy Future

Enhance your knowledge on methane emissions mitigation and management in the oil and gas industry with EnergyEdge's course. Sign up now!

Methane Emissions Mitigation and Management for Oil and Gas Industry
Delivered In-Person
£2,399 to £2,499

Cost Estimation and Analysis of Well Abandonment Activities

By EnergyEdge - Training for a Sustainable Energy Future

Enhance your skills in cost estimation and analysis of well abandonment activities with EnergyEdge's comprehensive course. Join now!

Cost Estimation and Analysis of Well Abandonment Activities
Delivered In-Person
£2,799 to £2,899

Economic and Financial Analysis of Renewable Energy, Storage and Hydrogen

By EnergyEdge - Training for a Sustainable Energy Future

Enhance your knowledge of economic and financial analysis in renewable energy storage and hydrogen with EnergyEdge's course. Enroll now!

Economic and Financial Analysis of Renewable Energy, Storage and Hydrogen
Delivered In-Person
£1,499 to £1,599

CertNexus Certified Cyber Secure Coder (CSC-210)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for software developers, testers, and architects who design and develop software in various programming languages and platforms, including desktop, web, cloud, and mobile, and who want to improve their ability to deliver software that is of high quality, particularly regarding security and privacy. This course is also designed for students who are seeking the CertNexus Cyber Secure Coder (CSC) Exam CSC-210 certification Overview In this course, you will employ best practices in software development to develop secure software.You will: Identify the need for security in your software projects. Eliminate vulnerabilities within software. Use a Security by Design approach to design a secure architecture for your software. Implement common protections to protect users and data. Apply various testing methods to find and correct security defects in your software. Maintain deployed software to ensure ongoing security... The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle. This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development. Identifying the Need for Security in Your Software Projects Identify Security Requirements and Expectations Identify Factors That Undermine Software Security Find Vulnerabilities in Your Software Gather Intelligence on Vulnerabilities and Exploits Handling Vulnerabilities Handle Vulnerabilities Due to Software Defects and Misconfiguration Handle Vulnerabilities Due to Human Factors Handle Vulnerabilities Due to Process Shortcomings Designing for Security Apply General Principles for Secure Design Design Software to Counter Specific Threats Developing Secure Code Follow Best Practices for Secure Coding Prevent Platform Vulnerabilities Prevent Privacy Vulnerabilities Implementing Common Protections Limit Access Using Login and User Roles Protect Data in Transit and At Rest Implement Error Handling and Logging Protect Sensitive Data and Functions Protect Database Access Testing Software Security Perform Security Testing Analyze Code to find Security Problems Use Automated Testing Tools to Find Security Problems Maintaining Security in Deployed Software Monitor and Log Applications to Support Security Maintain Security after Deployment

CertNexus Certified Cyber Secure Coder (CSC-210)
Delivered Online
£2,085

Access to Funding for Established Businesses

By The Consortium

This workshop seeks to demystify the intricate world of business funding, equipping you with the knowledge and strategies needed to secure the resources your established and growing business needs and deserves.

Access to Funding for Established Businesses
Delivered In-Person in Basildon
FREE

The SHARE Project - Self-Help & Relaxation Exercises for SEN/EBSA Parent Carers (click for dates)

By AUsomeMums

Self-help and relaxation skills and exercises for stressed, burned out SEN parents and carers

The SHARE Project - Self-Help & Relaxation Exercises for SEN/EBSA Parent Carers (click for dates)
Delivered Online + more
£27

Rally Navigation - Regularity for Improvers

By Rally Navigation Training Services

Historic Road Rallying training webinar on Regularity focusing on Average Speed Table style regularities.

Rally Navigation - Regularity for Improvers
Delivered Online
£30

Conflict Management

5.0(1)

By Noble Foods

We all have different experiences, backgrounds and perspectives which mean that we can all react differently to situations at work, which can also affect the relationships we have. This diversity of experience and thought is a good thing, but on occasion it can also lead to misunderstanding and conflict between individuals which need effective resolution strategies. Conflict can have a significant impact on colleagues and the business financially and emotionally. It is important that as a manager you have the tools to resolve conflict before it becomes an issue. What does the course cover? What is Workplace conflict? What causes conflict in the workplace? The effects of conflict on colleagues and the business Types of Conflict Conflict Management Styles Early Conflict resolution Mediation

Conflict Management
Delivered in person or Online + more
FREE

Venepuncture & Cannulation

4.8(50)

By EF Training & Consultancy Ltd

Venepuncture and cannulation course Venepuncture training for healthcare professionals Cannulation skills development Intravenous access techniques Blood sample collection training Infection control in venepuncture Hands-on venepuncture practice Cannula insertion training Nursing revalidation hours CPD accredited course Healthcare professional skills development Venepuncture and cannulation procedures Venepuncture certification program Intravenous catheter insertion Best practices in venepuncture Patient assessment for venepuncture Troubleshooting venepuncture complications Venepuncture and cannulation simulation Real-life venepuncture scenarios Healthcare career advancement with venepuncture skills

Venepuncture & Cannulation
Delivered In-Person in London
£150