EmployersPrivacy firstVerifiable evidence

Evidence you can verify, without the drama

Ransford's Notes is built around practical learning and clear evidence. Learners can share account pass records and screenshots. Legacy certificates can still be verified where they already exist. No guesswork and no vague badges.

What verification tells you

  • Legacy certificate IDs are real when they were previously issued by this platform.
  • The course and assessment details match what the learner completed.
  • Current cohorts can provide pass-record screenshots from account history as evidence.
  • You can ask for supporting work such as notes or outputs if you want deeper assurance.

What it does not claim

  • It is not a regulated qualification.
  • It is not an endorsement by any employer, university, or professional body.
  • It does not replace your interview, technical test, or probation.

Privacy and data handling

In my opinion, good verification should minimise data collection. You should only receive what you need to make a decision.

Read the privacy policy
  • Legacy certificates are verified by ID and do not require you to access a learner's account.
  • Aggregate reporting is only meaningful when it is genuinely aggregated and not a back door into personal data.
  • If you sponsor learning, you can structure it so that you only receive outcomes you can justify collecting.

How Nancy is engineered for practical delivery

Nancy is built as a local first engineering assistant, not an unrestricted autonomous agent. I use Ollama for local inference, retrieval grounding for site context, schema checked tool contracts, and policy gates before high impact operations. The user experience feels like a natural language IDE layer for drafting, analysis, and guided execution, while deterministic controls enforce safety boundaries.

  • Local model by default for privacy, continuity, and predictable operating cost.
  • Prompt and retrieval optimisation first, targeted fine tuning only when repeated gaps survive evaluator tests.
  • Human approval required for high impact actions, with audit trails and rollback discipline.
  • Outputs treated as proposals until validated by tests, checks, and review criteria.

Skill mapping in plain English

These are examples of the practical capabilities the courses are designed to evidence. They are written so that a hiring manager can understand them, but they still map to real frameworks.

Cybersecurity Practitioner

Track: cyber

Learners completing this level demonstrate practical understanding of mapping threats to controls, documenting playbooks, and prioritising mitigations.

Skills

Threat modelling, Control selection, Incident playbooks

Frameworks

NIST CSF, ISO 27001

Practice & Strategy

Track: ai

Learners completing this level demonstrate practical understanding of model evaluation, bias detection, and deployment guardrails using hands-on labs.

Skills

Model evaluation, Fairness checks, Deployment risk review

Frameworks

NIST AI RMF, Model cards

Software Architecture Patterns

Track: software

Learners completing this level demonstrate practical understanding of designing services, producing stable APIs, and applying resilience patterns.

Skills

Service decomposition, API design, Resilience patterns

Frameworks

C4 modelling, Twelve-Factor

Data Intermediate

Track: data

Learners completing this level demonstrate practical understanding of data quality controls, lineage documentation, and access governance with working examples.

Skills

Data quality controls, Lineage basics, Access governance

Frameworks

DAMABOK (light), Data contracts

Want to sponsor a cohort

If you want structured learning with evidence you can audit, I can help you set up a sponsored programme. We can keep it simple, lightweight, and proportionate.