• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

60228 Courses

23rd July Laetitia Rutherford #Agent121. Looking for: ADULT FICTION / NON-FICTION

5.0(1)

By I Am In Print

LOOKING FOR: ADULT FICTION, ADULT NON-FICTION Laetitia Rutherford is a literary agent at Watson, Little, where she recently passed her ten year anniversary. She began as an agent at Toby Eady Associates, following three years as a Marketing Executive for HarperCollins Fiction. Watson, Little is a longstanding agency representing writers across all tastes and genres and with a strong reputation for extending book rights into Translation and into Film and TV. Laetitia is looking for upmarket and literary Fiction, and for creative Non-Fiction. She welcomes writers from all walks of life and is keen to hear from a variety of voices and life experiences. Laetitia is looking for novels with a strong concept, question or emotional scenario, fresh perspectives, well worked out narratives, and arresting style. She is more often looking for contemporary settings, and loves to be immersed in a distinctive place, but also likes historical novels, as long as they speak lucidly for today. Contemporary issues like housing, money, and the experience of different workplaces appeal, as does unconventional family life and relationships. Laetitia is also open to novels with surreal or fantastical aspects, that throw universal storylines into the challenges of today (and tomorrow)’s complex world. It is always exciting to see a story so relatable, or as yet unheard, or resonant that it speaks to different countries in different languages. Laetitia is experienced in unique literary work, seen in her author Hannah Silva’s My Child, the Algorithm, a Granta Best Books of 2023; gripping and intelligent upmarket fiction (see Anika Scott); as well as highly popular Crime fiction like Ajay Chowdhury’s Detective Kamil Rahman series and Jenny Blackhurst’s locked room refresh Three Card Murder, both in TV development. She loves plot and the puzzle of a really plotty edit, as much as dazzling writing, whether spare or lush. Her current focus is on taking forward Watson, Little’s Literary talent, and less on mainstream Crime. But Laetitia would be excited to see a novel that plays with crime elements – and is looking forward to reading, for example, Jennifer Croft’s The Extinction of Irena Rey.   Among the most compelling novels recently read are Fates and Furies by Lauren Groff, No One Is Talking About This by Patricia Lockwood, Girl, Woman, Other by Bernardine Evaristo, The Vanishing Half by Brit Bennett, An American Marriage by Tayeri Jones, Lullaby by Leila Slimani, Lanny by Max Porter, and the William novels by Elizabeth Strout. In Non-Fiction, recent favourites include In the Dream House by Carmen Maria Machado, Maggie Nelson’s The Argonauts, Amy Liptrot’s The Outrun, Jennifer Croft’s Homesick, and Noreen Masud’s A Flat Place. Laetitia would like you to submit a covering letter, 1 page synopsis and the first three chapters or 5,000 words of your manuscript in a single word document. (In addition to the paid sessions, Laetitia is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk [agent121@iaminprint.co.uk] to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Monday 15 July 2024

23rd July Laetitia Rutherford #Agent121. Looking for: ADULT FICTION / NON-FICTION
Delivered Online15 minutes, Jul 23rd, 12:00 + 5 more
£72

Excel - Automating Excel with Macros and Analysis Tools

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for To ensure success, students should have completed Excel Essentials and Excel Functions Including Pivot Tables and Lookups or have the equivalent knowledge and experience. Overview Upon successful completion of this course, students will be able to enhance productivity and efficiency by streamlining workflow, collaborate with others, and audit and analyse data. This course is designed for students desiring to gain skills necessary to create macros, collaborate with others, audit and analyse data, incorporate multiple data sources, and import data. WORKING WITH MULTIPLE WORKSHEETS AND WORKBOOKS * Working with Named Ranges * Link Cells Across Worksheets and Workbooks * Use 3D References to Calculate Across Worksheets * Consolidate Data USE FORMULA AUDITING AND ERROR CHECKING * Reveal Formulas * Trace Cell Precedents and Dependents * Locate Errors in Formulas * Watch and Evaluate Formulas REVIEWING AND PROTECTING WORKBOOKS * Control Data Entry via Data Validation * Protect Workbook Access * Protect Worksheets and Cell Content * Add and Edit Comments * Prepare a Workbook for Distribution * Modify Excel's Default Settings USING MACROS TO AUTOMATE WORKBOOK FUNCTIONALITY * Create Macros via Recording * Run Macros via Buttons and Shortcuts * Assign Macros to the Quick Access Toolbar and Ribbon * Assign Macros to Objects * View Macro Code FORECASTING AND ANALYSIS DATA * Use Conditional Formatting to Highlight, Sort and Filter Key Data * Advanced Conditional Formatting using Formulas * Create Sparklines to Visualise Data * Add Trendlines to Charts to Visualise and Forecast Trends * Use Data Tables and Scenarios to Project Potential Outcomes * Use Goal Seek to Calculate Outcomes * Forecast Data Trends Using Solver

Excel - Automating Excel with Macros and Analysis Tools
Delivered OnlineTwo days, Jul 25th, 08:30 + 4 more
£197

Aesthetic Therapy Training - Beginner to Advanced PACKAGE

4.6(39)

By Geopace Training

THIS COURSE PACKAGE INCLUDES: 1: PERIPHERAL I.V. CANNULATION - IV THERAPIES COURSE (GPT008) 2: VACCINATION / INJECTION COURSE (GPT601) Learn how to administer injectables and intravenous therapies ... FAST-TRACK YOUR AESTHETICS TRAINING WITH OUR COMPLETE TRAINING PACKAGE 20% Multi-Course Discount Cover all stages from Level 1 through to Level 4 (FDSc) Cover your theory training online Complete your advanced practical training in 1 day Practical training in Classroom or Virtual Classroom Comprehensive Practise@Home training kits for VC Awards 2 accredited qualifications Dual Accreditations for all courses Covers all steps required to safely perform injectables Covers all steps required to safely perform IV therapies Practise IV on artificial arm with fake blood Practise injection techniques on realistic injection pads Learn beginner to advanced skills and techniques Basic understanding of English language required OPEN TO ALL APPLICANTS

Aesthetic Therapy Training - Beginner to Advanced PACKAGE
Delivered Online or in Liverpool + 5 more locationsFull day, Jul 26th, 08:30 + 11 more
£292

Security Engineering on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for security engineers, security architects, and information security professionals. Overview Identify security benefits and responsibilities of using the AWS Cloud Build secure application infrastructures Protect applications and data from common security threats Perform and automate security checks Configure authentication and permissions for applications and resources Monitor AWS resources and respond to incidents Capture and process logs Create and configure automated and repeatable deployments with tools such as AMIs and AWS CloudFormation This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents. Prerequisites We recommend that attendees of this course have: * Working knowledge of IT security practices and infrastructure concepts * Familiarity with cloud computing concepts * Completed AWS Security Essentials and Architecting on AWS courses 1 - SECURITY ON AWS * Security in the AWS cloud * AWS Shared Responsibility Model * Incident response overview * DevOps with Security Engineering 2 - IDENTIFYING ENTRY POINTS ON AWS * Identify the different ways to access the AWS platform * Understanding IAM policies * IAM Permissions Boundary * IAM Access Analyzer * Multi-factor authentication * AWS CloudTrail 3 - SECURITY CONSIDERATIONS: WEB APPLICATION ENVIRONMENTS * Threats in a three-tier architecture * Common threats: user access * Common threats: data access * AWS Trusted Advisor 4 - APPLICATION SECURITY * Amazon Machine Images * Amazon Inspector * AWS Systems Manager 5 - DATA SECURITY * Data protection strategies * Encryption on AWS * Protecting data at rest with Amazon S3, Amazon RDS, Amazon DynamoDB * Protecting archived data with Amazon S3 Glacier * Amazon S3 Access Analyzer * Amazon S3 Access Points 6 - SECURING NETWORK COMMUNICATIONS * Amazon VPC security considerations * Amazon VPC Traffic Mirroring * Responding to compromised instances * Elastic Load Balancing * AWS Certificate Manager 7 - MONITORING AND COLLECTING LOGS ON AWS * Amazon CloudWatch and CloudWatch Logs * AWS Config * Amazon Macie * Amazon VPC Flow Logs * Amazon S3 Server Access Logs * ELB Access Logs 8 - PROCESSING LOGS ON AWS * Amazon Kinesis * Amazon Athena 9 - SECURITY CONSIDERATIONS: HYBRID ENVIRONMENTS * AWS Site-to-Site and Client VPN connections * AWS Direct Connect * AWS Transit Gateway 10 - OUT-OF-REGION PROTECTION * Amazon Route 53 * AWS WAF * Amazon CloudFront * AWS Shield * AWS Firewall Manager * DDoS mitigation on AWS 11 - SECURITY CONSIDERATIONS: SERVERLESS ENVIRONMENTS * Amazon Cognito * Amazon API Gateway * AWS Lambda 12 - THREAT DETECTION AND INVESTIGATION * Amazon GuardDuty * AWS Security Hub * Amazon Detective 13 - SECRETS MANAGEMENT ON AWS * AWS KMS * AWS CloudHSM * AWS Secrets Manager 14 - AUTOMATION AND SECURITY BY DESIGN * AWS CloudFormation * AWS Service Catalog 15 - ACCOUNT MANAGEMENT AND PROVISIONING ON AWS * AWS Organizations * AWS Control Tower * AWS SSO * AWS Directory Service

Security Engineering on AWS
Delivered Online4 days, Jul 31st, 13:00 + 1 more
£2025

Certified Information Security Manager (CISM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification. Overview Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Identify and manage information security risks to achieve business objectives. Create a program to implement the information security strategy. Implement an information security program. Oversee and direct information security activities to execute the information security program. Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents. In this course, students will establish processes to ensure that information security measures align with established business needs. Prerequisites Information security governance Information risk management Information security program development Information security program management Incident management and response 1 - INFORMATION SECURITY GOVERNANCE * Develop an Information Security Strategy * Align Information Security Strategy with Corporate Governance * Identify Legal and Regulatory Requirements * Justify Investment in Information Security * Identify Drivers Affecting the Organization * Obtain Senior Management Commitment to Information Security * Define Roles and Responsibilities for Information Security * Establish Reporting and Communication Channels 2 - INFORMATION RISK MANAGEMENT * Implement an Information Risk Assessment Process * Determine Information Asset Classification and Ownership * Conduct Ongoing Threat and Vulnerability Evaluations * Conduct Periodic BIAs * Identify and Evaluate Risk Mitigation Strategies * Integrate Risk Management into Business Life Cycle Processes * Report Changes in Information Risk 3 - INFORMATION SECURITY PROGRAM DEVELOPMENT * Develop Plans to Implement an Information Security Strategy * Security Technologies and Controls * Specify Information Security Program Activities * Coordinate Information Security Programs with Business Assurance Functions * Identify Resources Needed for Information Security Program Implementation * Develop Information Security Architectures * Develop Information Security Policies * Develop Information Security Awareness, Training, and Education Programs * Develop Supporting Documentation for Information Security Policies 4 - INFORMATION SECURITY PROGRAM IMPLEMENTATION * Integrate Information Security Requirements into Organizational Processes * Integrate Information Security Controls into Contracts * Create Information Security Program Evaluation Metrics 5 - INFORMATION SECURITY PROGRAM MANAGEMENT * Manage Information Security Program Resources * Enforce Policy and Standards Compliance * Enforce Contractual Information Security Controls * Enforce Information Security During Systems Development * Maintain Information Security Within an Organization * Provide Information Security Advice and Guidance * Provide Information Security Awareness and Training * Analyze the Effectiveness of Information Security Controls * Resolve Noncompliance Issues 6 - INCIDENT MANAGEMENT AND RESPONSE * Develop an Information Security Incident Response Plan * Establish an Escalation Process * Develop a Communication Process * Integrate an IRP * Develop IRTs * Test an IRP * Manage Responses to Information Security Incidents * Perform an Information Security Incident Investigation * Conduct Post-Incident Reviews

Certified Information Security Manager (CISM)
Delivered Online4 days, Jul 31st, 13:00 + 4 more
£1995

Certified Professional for Usability and User Experience – Usability Testing and Evaluation (CPUX-UT)

By Bunnyfoot

This one-day course introduces the field of user experience and provides an excellent entry point to our other specialised training courses. UX processes and practices have become a central component of product design, service design and web design.

Certified Professional for Usability and User Experience – Usability Testing and Evaluation (CPUX-UT)
Delivered Online3 days, Jul 30th, 08:30 + 1 more
£1495

Give your clients flawless smooth looking skin where make-up goes on flawlessly! Suitable for: Must hold A&P L2 or equivalent TIME: 10am - 2pm What's covered: * Introduction to dermplaing * Health & safety & hygiene * Skin analysis * Hair growth & anatomy * Check list * Contraindications * Pre/post treatment advice * Equipment and products * Consultation * Treatment step by step * Trouble shooting Course Extra's * Business start up support * Social media tips  * Follow up call to find out how your getting on and any questions you may have * Ongoing support  * Lifetime aftercare * Small Groups (Max 4)

Dermaplaning
Delivered In-Person in Bungay4 hours, Jul 24th, 09:00
£129

Awareness of First Aid for Mental Health

5.0(50)

By Pochat Training

FAA LEVEL 1 AWARD IN AWARENESS OF FIRST AID FOR MENTAL HEALTH (RQF) -------------------------------------------------------------------------------- * Classroom (4.5 hour course), Virtual (2 x 2 ½ hour sessions)  * Gives learners a good awareness of Mental Health First Aid * Gives learners the skills to start that difficult conversation -------------------------------------------------------------------------------- COURSE CONTENTS: * What is Mental Health? * Why people develop mental health conditions * What the role of a mental health first aider is * Knowing how to provide advice and practical support * Knowing how to recognise and manage stress * Recognising a range of mental health conditions: * Depression * Anxiety * Psychosis * Eating disorders * Suicide * Self-harm BENEFITS OF THIS COURSE: * 37% of all work-related ill-health is due to mental health problems * Problems with mental health cover 45% of all working days lost * A whopping 12.8 million working days, or 49, 042 years, were lost due to mental health problems in 2018/19 * 602,000 workers suffered from work-related stress, depression or anxiety in 2018/19 * One in four people will have a mental health problem at some point during their lives * Whether work is causing or aggravating mental health problems, employers have a legal responsibility towards their employees * Work-related mental health issues must to be assessed to measure the levels of risk to staff * Where a risk is identified, steps must be taken to remove it or reduce it as far as reasonably practicable * This half day course gives people a good awareness of mental health in the workplace * For a more complete introduction, see our full day First Aid for Mental Health or two day Supervising First Aid for Mental Health courses -------------------------------------------------------------------------------- ACCREDITED, OFQUAL REGULATED QUALIFICATION This Awareness of Mental Health First Aid Course is a nationally recognised, Ofqual regulated qualification accredited by First Aid Awards [http://www.firstaidawards.com/]. This means that you can be rest assured that your Mental Health First Aid Certificates fulfil the upcoming legal requirements and are a very good way to make sure you and your employees have a supporting workplace to deal with staff's mental health conditions. The Ofqual Register number for this course is 603/3768/0

Awareness of First Aid for Mental Health
Delivered Online or in Chesterfield6 hours, Jul 24th, 09:00 + 5 more
£90 to £100

EUSR Deep Excavation Cat 3 4 & 5 - Milton Keynes

5.0(1)

By Vortex Training Group

EUSR Categories 3, 4 & 5 Install, Inspect & Remove Timber, Steel & Proprietary Support Systems (Deep Excavation) course - now being run at our Milton Keynes training venue £695 + VAT book now

EUSR Deep Excavation Cat 3 4 & 5 - Milton Keynes
Delivered In-Person in Milton KeynesTwo days, Jul 29th, 07:00 + 2 more
£834

Universal Credit Webinar

5.0(1)

By Born at the Right Time

leading expert Philip Warford will talk about the options available to protect a disabled person using specialist Wills and Trusts

Universal Credit Webinar
Delivered Online1 hour, Jul 18th, 09:00
FREE