ICT, ECDL, and Computer Training in Cardiff

Computer training in Cardiff

We provide Computer training in Cardiff, near the city centre at 5-7 Museum Place, Cardiff, CF10 3BD. We can offer accredited and non-accredited training courses.

For training dates, have a look at our calendar – CLICK HERE

All of our accredited courses are recognised by a leading Awarding Body in their field. CCW – Training Academy is a recognised provider and test center for the British Computer Society (BCS) Qualifications including the European Computer Driving Licence (ECDL). The ECDL qualification is one of the global standard in IT user skills. This qualification will increase the efficiency and productivity of the workforce. We offer monthly ECDL Revision and Testing services for all on the last Friday of each month.

For more information, contact us on: 02921 156603 or info@CareerChangeWales.co.uk

We offer accredited and unaccredited courses that cover practical skills that are required by everyone working in an organisation in today’s changing computer landscape.

MS Office Course in Cardiffoutlookexcelvisio

We offer Computer training in Cardiff in all of Microsoft’s product including; Word, Excel, Powerpoint, Access, Project, Outlook, Visio and Publisher. These courses cover introductory to advanced levels and can be accredited by awarding bodies if required.

ECDL Qualifications in Cardiffecdl_logo-150_small

The European Computer Driving Licence (ECDL) is an internationally recognised qualification in computer use. They come in 3 levels, Essential, Extra, and Advance. They are beneficial for individuals of all levels, from absolute beginner to advanced user. The ECDL Essential covers everything that a new user requires to get by in a busy computer based office environment and teaches learners how to manage emails, safely surf the web and develop a general understanding of IT Security. The ECDL Extra covers the big 3 of office computing, Word processing, Spreadsheet and Presentation. In addition to this, the ECDL Extra also develops productivity with an assessed module on Improving Productivity. The ECDL Advanced covers Word Processing, Spreadsheets, Presentation, Databases and Improving Productivity. The Level 3 qualifications is designed for highly skilled IT users who wish to develop exceptional IT skills. Employers are nowadays looking for ECDL qualification/s because the skills obtained will increase the efficiency and productivity of the workforce. The Flexible Model provide learners the opportunity to ‘mix & match’ all the training modules in the level 2 & 3 QCF qualification.

Online ECDL Qualifications

We all live in a busy world and sometimes we don’t have the time to take off for training. You shouldn’t allow this to get in the way of your personal and professional development as it’s one of the best ways to grow and improve yourself. With this in mind we have no started to offer the ECDL qualifications online! Why not look into this computer training in Cardiff. The qualification is the same as our classroom taught courses, but the difference is that you will do all of the training online. You will only need to come to our office to complete the examinations, everything else is done in your own time.


This is our brand new Xero Beginner Training course. We have created this Xero Beginner training for those who are looking at using Xero on a day to day basis. Xero is an excellent accounting software for any business, organisation or individual. Xero has a lot of useful functionality for those who are looking at using it for their accounting. This training will show you how simple Xero can be and use for your accounting needs.

AutoCAD 2016

The AutoCAD computer training in Cardiff courses that CCW offer focus on practical skills that all industry professional need in order to develop as planners and designers. Both of these courses are focused around practical skills and industry short cuts. Tutors of this course are industry professionals with many years of experience in their respective fields. Depending on your requirements for the course, we can bespoke the course to your needs. Our focus is on practical skills that leads to functional AutoCAD 2016 design in 2D and 3D, and for making amendments to drawing.

Practical Use of AutoCAD 2016

AutoCAD 2016 is a computer aided design tool used to create 2 and 3 dimensional drawing for technical, design and planning purposes. This course focuses on building practical expertise and industry short cuts to improve productivity.

Beginner / Foundation AutoCAD Training 2016

This course is great for those just starting out with AutoCAD. It takes you from the very beginning of creating a drawing to altering objects. This course has been designed for those with no experience using AutoCAD or for anyone looking for a refresher course.

Intermediate AutoCAD Training 2016

Our intermediate course follows on from the teachings in the beginner course and takes you to an advanced level. You will learn different utility commands and advanced layouts. This course is for anyone who is experienced in using AutoCAD 2016.

Full AutoCAD Training (5 Day) 2016

This is the amalgamation of the beginner and the intermediate AutoCAD courses but with a day of 3D AutoCAD thrown in as well. This is a fantastic course for anyone who want to learn how to used AutoCAD or to refresh their skills. Our foundation course will takes you from the very beginning of creating a simple drawing to being able to use AutoCAD 2D and 3D.

Bespoke AutoCAD Training

In addition to our off-the-shelf course, we also deliver a bespoke training course is AutoCAD 2016. The content for this course will vary greatly depending on your needs but can be altered to cover  AutoCAD 2D, AutoCAD 3D, Architectural design, and Product design. This course is suitable for all sectors.

Cyber Security for IT staff

The 21st century cybersecurity industry is expanding rapidly and is a solid area to pursue a long-standing and rewarding career in Information Security. Hence, this cyber security skills training has been designed by our experts in the Cyber Security industry and is based broadly on the 8 domains of CISSP. This course will be useful as a primer to those wishing to follow a self-study route to obtain the certification or as a refresher. However, the course will be also be useful to all those candidates with existing IT skills who are entering into a new role in information or cyber security.

This 3-day cyber security skills course features a significant amount of live demonstration and attendee participation (either alone and in groups) to provide a comprehensive overview of the main topics of cyber security.


No formal cyber security experience is required however, candidates will need to have an intermediate-level in technical skills and experience in the areas of data networking (TCP/IP), and operating systems (Windows and/or Linux).

Day 1

  • Security and Risk Management
  • Asset Security
  • Security Architecture and Engineering

Day 2

  • Communications and Network Security
  • Identity and Access Management
  • Security Assessment and Testing

Day 3

  • Security Operations
  • Software Development Security

Course Content

Part 1: Security and Risk Management

  1. Information Security & Cyber Security Management Governance
  2. The CIA Triad: Confidentiality, Integrity & Availability
  3. Constructing Security Policies
  4. Managing Technical Information and Cyber Security Risks
  5. Managing Personnel and Administrative Security Risks
  6. Computer Crime and UK Law
  7. Major UK statutory and regulatory
  8. Intellectual Property (IP) law
  9. UK Data Protection Act & EU Council General Directive on Data Protection
  10. Business Continuity and Disaster Recovery Planning

(Exercises: Examine scenarios of risk management selected from a number of sectors and fictional organisations as worked examples)

Part 2: Asset Security

  1. Information Classification
  2. Determine and maintain ownership
  3. Maintaining Privacy
  4. Information Asset Handling and Retention

(Exercises/Demos: Work through a series of scenarios to select information classification and privacy policies).

Part 3: Security Engineering

  1. Defining Security Engineering practices and principles
  2. Architecture Frameworks
  3. Security Modelling
  4. Evaluation Criteria
  5. Enterprise and System Security Architecture
  6. Distributed Systems
  7. Security Threats, Safeguards & Countermeasures
  8. Cryptographic techniques
  9. Physical security controls

(Exercises/Demos: Following the supplied sample documentation, identify threats and threat actors, and choose suitable controls).

Part 4: Communications and Network Security

  1. Network and communications architecture design principles
  2. Securing networks and communication paths
  3. Network Attacks & Defences

(Exercises/Demos: Review sample simulated network devices and configurations).

Part 5: Identity and Access Management

  1. Physical and Logical access controls for information assets
  2. Identification and Authentication methods
  3. Identity and Access services and lifecycle
  4. Authorisation methods
  5. Access Control Attacks & Defences

(Exercises/Demos: Review sample authentication controls applied to Windows & Linux devices).

Part 6: Security Assessment and Testing

  1. Design verification and validation and testing strategies
  2. Conducting security control testing
  3. Collecting security performance indicators and metrics
  4. Test analysis and reporting
  5. Internal and External Auditing

(Exercises/Demos: Worked example of test strategy & plans with reporting and analysis).

Part 7: Security Operations

  1. Planning investigations
  2. Security Investigation types
  3. Logging and monitoring
  4. Provisioning resources
  5. Concepts of Security Operations
  6. Resource protection techniques
  7. Incident Management
  8. Preventative & Detective operations
  9. Implement and support patch and vulnerability management
  10. Participate in and understand change management processes
  11. Implement recovery strategies and disaster recovery processes

(Exercises/Demos: Simulated setup of SIEM and Incident scenarios, with change management and disaster).

Part 8: Software Development Security

  1. Secure Software Development Lifecycle
  2. Security Controls and best practices for Development Environments
  3. Audit and Risk Management in software development
  4. Testing Software

(Exercises/Demos: Planning a development environment and test plan). Review of Course and Next Steps

1 comment on “ICT, ECDL, and Computer Training in Cardiff”

  1. Pingback: Computing Classes in the City of Cardiff | The Superprof Blog - UK

Comments are closed.
Scroll Up