• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

36 Educators providing ALERT courses

Social Life

social life

London

What makes a boundary? How we circumnavigate London is often imagined through its hard materiality of bricks and roads, staggered by open, green spaces and meandering waterways. Yet the sensory experience of moving through the city plays a significant role in how we percieve place, define neighbourhoods, and establish routes and routines. In mid June, Social Life hosted a workshop as part of the London Festival of Architecture, which aimed to explore how sight, smell and sound impact our perceptions of boundaries. Our approach drew closely from a toolkit developed by Saffron Woodcraft and Connie Smith at UCL's Insitute for Global Prosperity - the 'Sensory Notation Toolkit' - which was created with the intention for 'researchers to become alert to their different sense and how these are stimulated by particular environments.' Workshop participants walked with us on a short route around Elephand & Castle. At each stop we asked participants to record their sensory stimulation on a scale of 1-5 for each of the six sense: visual, aural, kinetic, thermal and chemical. We used a visual sensory chart to capture the data to understand what the concurrent themes were for each space and overall which space had the highest and lowest level of sensory stimulation. Building on Social Life's earlier work on sensory stimulation and psychgeography in our local area, our 2017 'Feeling of the Place' project, the workshop aimed to look more closely at the relationship between our sense and how this guides our perception of boundaries. The sensory walk was an exercise on connecting sights, smells and sounds as elements of boundary making and unmaking. Two boundaries were chosen for the exercise, Strata Tower by Elephant and Castle roundabout and a pedestrial barrier in the Newington Estate close to Peacock Yard where Social Life is based. Participants were asked to stop on either side of the 'boundary' and record their sensory stimulation. The stops differed dramatically. Whilst one was located in the middle of a blooming community garden others were located right at the foot of Strata Tower, surrounded by the hustle and bustle of urban life. They were however only a short walk apart. The responses were fairly predictable. Participants noted feeling unwelcome and feelings of unpleasantness in areas that were less human scale and contained less greenery. Aural stimualtion - negative or positive - scored highly for many participants with many connecting unpleasant feelings with wind, loud noises and also temperature.

Menopause Support Coach Certification

menopause support coach certification

The Menopause Support Coach Certification is a dual certified and doubly accredited CPD and ActiveiQ online course.  A 3 month program that trains students to be compassionate, alert to & effective in menopause support and to become a worldclass MSCC level coach.  This is fully delivered online via a learning portal with private log in and is for anyone ... * Working with and supporting women in their life business, career and happiness journey e.g. health & fitness coaches, PTs, Life Coaches, Business Coaches, Mindset Coaches, Women’s Health Coaches * You want to deepen your knowledge of the menopause and women’s health space to offer a new level of support in your coaching * You want to become part of a community of like-minded people and open up new exciting opportunities for yourself * You want to make a long lasting impact on the world in a big and positive way You’ll learn: * –  Menopause well-being nutrition to understanding your clients better, * –  How to coach menopausal clients towards their goals, * –  How to hold space for where they are right now, * –  The basics of HRT (Hormone Replacement Therapy) to be able to guide your clients through their journey safely and successfully. Not only that but It’s going to open up new and exciting opportunities in a growing industry of women’s health, as well as equip you as a coach in this space to enable your business to expand or niche. Sign Up to the waitlist for further details on the next cohort intake 

West Midlands Open College

west midlands open college

Walsall

Professional GCSEs are here. Click for more information on WMOC Professional GCSEs Targeting adults and young adults not in main stream education, looking for alternative secondary education with a money making focus. COLLEGE-OPEN LEARNING INFORMATION COVID-19 ANNOUCEMENT: ALL CENTRE BASED AND VISITS ARE NO LONGER TAKING PLACE. ALL OUR LESSONS HAVE NOW BEEN MOVED TO ONLINE LIVE WEBINARS. STAY ALERT, SAVE LIVES, SAVE THE NHS(AND YOUR HEALTH SYSTEM IN YOUR COUNTRY WHERE YOU ARE). In the UK we are now allowing face to face meetinmgs as the government has relaxed the rules. If your tutor asks you to attend, you are free to do so. Also we will have both systems running side by side: physical meetings and online live webnair(Updated 23rd May 2022) The college takes on distance learning students nationally in the United Kingdom and internationally therefore, you can study in the comfort of your home and also have an option of attending some of our face to face sessions(when the LOCKDWON is over) either via tutor led sessions in comfortable location near your home. As of now all our lessons are mandatory via live webinars. The Open College is designed for people to have maximum and unlimited access to to Further Education and Higher Education of quality both accredited with exam boards and bespoke professional development programmes. The College targets all wishing to further their education and those wishing to continually develop themselves through CPD workshops in any discipline that is listed on our course page, we also design bespoke courses to meet the learning needs of corporations and groups of individual. The ethos is that not at any time should any one be left out to have a chance for further education(FE) and higher education(HE) including professional development. Entrepreneurs and leaders of any sector and background are supported through long and shorter term courses. With the state of art online learning system and via live link, we are able to do seminars and run run courses effectively. Candidate do not have to ravel to our centres in the UK. We have broken the barrier of distance and one can speak live to our tutors and lecturers. Through the John Lukomona Scholarship scheme, you can benefit by studying Entrepreneurship; and many a people that qualify and have started their first step, in the journey, towards launching a business, To apply click here first COMMONWEALTH SCHOLARSHIP COMMISSION(CSC) CANDIDATES The West Midlands Open College delivers professional courses to the commonwealth commission sponsored fellows. The past fellows were hosted by the Lifegate Centre Communities in Walsall. 2015 was the second year in delivering the core components of development courses that added value to the scholars' career and development to their country of origin, when they returned at the end of the programme. Click here and follow the story of this year's May to July 2015 journey of the scholars. Are you thinking of a choice for special destination to acquire effective development with your commonwealth scholarship application? West Midlands Open College has that experience to give you that professional boost in any area of your discipline interest.

RW Consulting Solutions Ltd/ Controlled Events

rw consulting solutions ltd/ controlled events

Buckinghamshire

Please read the terms and conditions of this agreement (the “Agreement” or “Terms” or “Terms of Service”) before logging into ECR Manager, Accreditation software or other systems provided by RW Consulting Solutions Limited (trading as Controlled Events). By completing the registration process, accessing the Service, using the Site or adding a log entry, you agree that you have read and understood these terms and conditions of this Agreement and you agree to be bound by them. We may periodically update these terms and conditions. Your continued use of this site will constitute your acceptance of any new or amended terms and conditions. 1. DEFINITIONS “Account” means access to the Service. “Agreement” means these customer Terms of Service and all materials referenced or linked. “Data” means all information that Customer adds or views on the log. “Documentation” means online user guides, documentation and help and training materials published by Controlled Events or accessible through the Service, as may be updated by Controlled Events from time to time. “Service” means our cloud-based application you have subscribed to and developed, operated and maintained by us. “Site” means www.controlledevents.com/log – known as ECR Manager “Third-Party Sites” means third-party websites linked from within the Service. “Users” means your employees, representatives, consultants, contractors or agents who are authorized to use the Service for your benefit and have unique user identifications and passwords for the Service. “You”, “your” or “Customer” means the person or entity using the Service and identified in the applicable registration process, billing statement, online subscription process or Order Form as the customer. 2. WHO WE ARE 2.1. www.controlledevents.com/log and the Controlled Events Service are provided by RW Consulting Solutions Limited (RWCS), a registered private limited company in England and Wales, which has its registered office at New Burlington House, 1075 Finchley Road, London NW11 0PU with Company Registration Number: 7493058 (collectively, “we”, “us”, “Controlled Events”). 3. DESCRIPTION OF THE SERVICE 3.1. The Service gathers and transfers log data to a cloud based system which is provided by a User of the Service. Customer who successfully subscribes will be given an Account to have its Data relating to an event, exercise or incident visualized, analyzed and stored. 3.2. Details of the Client’s service level (one off, retained, 24/7) and associated charges are provided at the point of purchase; any additional terms or conditions contained on those pages are incorporated into this Agreement by reference. 3.3. Additional functionality and services may be offered or provided by us from time to time and these will be described on the Site. 4. STORAGE SPACE AND USAGE LIMITS 4.1. Customer can upload a certain volume of log and document data, dependent on the Service level selected, which is referred to as the “Usage Limit.” Project admins can manage their Account by archiving logs no longer needed. 4.2. An email alert or alternative notification by Controlled Events will be provided when Customer is near or over its Usage Limit. 5. OUR CLOUD-BASED SOLUTION 5.1. Controlled Events will maintain commercially appropriate administrative, physical, and technical safeguards to protect Data. Controlled Events hosts and stores data on Amazon Web Services’ cloud platform and on other cloud platforms as necessary. The level of security provided in Amazon’s cloud platform is described in more detail on http://aws.amazon.com/security/. Our Data Protection and Cyber Security Manual is available upon request. 5.2. Controlled Events provides you with the option to encrypt the transmission of your Data. You acknowledge that it is your responsibility to encrypt the transmission of your Data should you wish to protect it. In the event you decide to transmit your Data unencrypted to the Service, You assume all related risks for doing so. Controlled Events will not be liable for any liabilities arising from your transmission of Data over the Internet or other network. 6. REGISTRATION 6.1. Upon registering for the Service, Users will have a username, password and email address associated with their account for password resets, which is Customer’s and its Users’ responsibility to keep secure and may not be shared with any other party. Customer agrees to immediately notify Controlled Events of any unauthorized use or any other breach of security or breach of this Agreement of which the Customer becomes aware. Controlled Events will not be liable for any loss or damage resulting from Customer’s failure to maintain proper security of its account or for unauthorized access to the Service. 7. CHARGES AND PAYMENT 7.1. Fees. The Service is made available to Customer at the price indicated in the accepted quotation. Fees are non-cancellable and non-refundable during the Term. Controlled Events reserves the right to change its price list and to institute new charges at any time, upon notice to You, which may be sent by email or posted on the Site. Your use of the Services following such notification constitutes your acceptance of any new or increased charges. Additional Charges may apply for additional services requested by Customer such as supporting data analysis of logs and usage or the transfer of data after closing the Account. Customer will be notified of services requiring additional Charges which have not been previously agreed upon before any such additional Charge will be applied. 7.2. Payment for Subscriptions is required to be paid in full at the beginning of each billing period by BACS transfer. If Controlled Events extends credit to Customer, all Charges must be paid within 30 days of issue of invoice. Payment of Charges for metered billing is required at the end of each month by credit or debit card and is based on the volume of Data uploaded and stored during the month. 7.3. In addition to the Charges, Customer must pay to Controlled Events, or to the relevant taxing authority, as appropriate, all applicable sales, use, goods and services, value added or other taxes payable under this Agreement (other than taxes levied or imposed on our income). In all cases, the amounts due under this Agreement will be paid by Customer to us in full without any right of set-off or deduction. 8. TRIAL ACCOUNTS 8.1. Customers who are provided with a free or trial Controlled Events Account or who are otherwise provided with any other promotional Controlled Events Service(s) for which they have not paid a Charge acknowledge and agree that such services are provided “as is” and so, to the fullest extent permitted by law, those services are provided without any warranties or representations whatsoever and the Customer agrees to avail of such services entirely at its own risk. 9. TERM AND TERMINATION 9.1. The subscription term shall begin on the effective date of your subscription and expire at the end of the period selected during the subscription process (“Subscription Term”). 9.2 The Subscription and Agreement will automatically renew at the published rates on a monthly, annual or otherwise mutually agreed upon period of time, unless one party notifies the other party in writing of its intent not to renew at least thirty (30) days in advance of the expiration of the Subscription Term. 9.3 Customer may terminate the Service at any time, however, fees are non-refundable except in the event of Controlled Events’ incured material breach as set forth below. 9.4. Either party may terminate this Agreement at any time, effective immediately, upon written notice to the other party, if such other party: (i) breaches any of its material obligations hereunder and fails to cure such breach within thirty (30) days of written notice thereof; (ii) becomes insolvent or has a receiver, administrator, liquidator or examiner appointed over all or part of its assets or (iii) becomes the subject of a resolution, petition or order for winding up or bankruptcy. We may terminate this Agreement if, at any time, we cease providing the Service. 9.5. On termination or expiry of this Agreement for any reason, Customer will remain liable to Controlled Events for any outstanding Charges owed, Customer’s rights under this Agreement will immediately terminate, You will lose all access to the Service, including access to Your account and to Your content, and We will delete Your content and the data stored in or as part of Your account. 9.6. Without limitation of the foregoing, we may suspend or terminate the Service without notice if Customer shall fail to pay any amounts when due, if the Services are used for other purposes including but not limited to tampering, hacking, modifying or otherwise corrupting the security or functionality of Controlled Events Services, if the Services are used in a manner contrary to the law or the terms of this Agreement or if Controlled Events experiences unexpected technical or security issues. 9.7. Customer shall provide notice of termination of the Service to Controlled Events at support@controlledevent.com 10. ACCEPTABLE USAGE POLICY 10.1. The Controlled Events Acceptable Usage Policy prohibits the processing of data which are deemed by us in our sole discretion as being inappropriate or unlawful. We aim to ensure that we are not associated with any website content (including linked content) which is illegal, fraudulent, offensive, embarrassing, sexually explicit, obscene, threatening, defamatory or otherwise inappropriate. We prohibit the processing of data using the Service where the processing would breach the laws or rights of third parties and the Customer represents, warrants and undertakes to us that no such transactions will be processed via the Services. 10.2. Customer agrees not to use the Site or the Service or cause or permit the Site or the Service to be used: 10.2.1. so as to jeopardize or prejudice the operation, quality or integrity of the Site, the Service or the operation, quality or integrity of any telecommunications network; 10.2.2. for any commercial purpose including screen shots and copying feature information from the log, nor to go against the spirit of the log platform by sharing data outside of the agreed user base for the project; 10.2.3. to harvest or otherwise collect information about others, including e-mail addresses, without their consent; 10.2.4. to distribute, download, upload or transmit any material that contains viruses, trojan horses, worms, time bombs, cancelbots, or any other harmful or deleterious programs; 10.2.5. contrary to the terms and conditions of any Internet Service Provider whose services you may use. 11. SERVICE AVAILABILITY AND CUSTOMER SUPPORT 11.1. The Service is available 24 hours a day, 7 days a week, except for: (a) planned downtime (of which Controlled Events shall endeavor to give at least 8 hours’ notice and which Controlled Events shall schedule to the extent practicable outside of any event or user peak times), or (b) any unavailability caused by circumstances beyond Controlled Events’ reasonable control, including without limitation, Internet and telecommunications service provider failures or delays, failures of independent service providers, or denial of service attacks. Customer support is provided through the online and email channels: support@controlledevents.com and 020 3286 6392 12. DISCLAIMERS; LIMITATION OF LIABILITY 12.1. The service including any software included in or provided as part of the software is provided on an “as is” and “as available” basis, and Controlled Events expressly disclaims any warranties and conditions of any kind, whether express or implied, including but not limited to the warranties of merchantability, fitness for a particular purpose, title, accuracy, or non-infringement. without limiting the foregoing, Controlled Events does not warrant that the service will meet your specific requirements, that the service will be uninterrupted, timely, secure, or error-free, that the results that may be obtained from the use of the service will be complete, accurate, or reliable, that the quality of any products, services, information, or other material purchased or obtained by you through the service will meet your expectations, or that any errors in the service will be corrected. 12.2. Although this site is accessible worldwide, not all products or services discussed or referenced herein are available to all persons or in all geographic locations. we reserve the right to limit, in our sole discretion, the provision and quantity of any product or service to any person or geographic area it so desires. any offer for any product or service made in or through this site is void where prohibited. 12.3 Because it is not possible to guarantee data security, you acknowledge unauthorized access to your data may occur and you agree in such event that any loss you may suffer is subject to the limitation of liability provisions of this agreement. under no circumstances will Controlled Events be liable in any way for any data, including, but not limited to, any errors or omissions in any data, or any loss or damage of any kind incurred in connection with use of or exposure to any data posted, emailed, accessed, transmitted, or otherwise made available via the service. 12.4. Notwithstanding anything to the contrary contained herein, Controlled Events’ liability to customer for any direct damages, losses, expenses and causes of action (whether in contract or tort) arising from or relating to the service (for any cause whatsoever and regardless of the form of the action) will at all times be limited to the amount you paid Controlled Events in the three (3) months immediately preceding the incident giving rise to the claim. 12.5. You expressly understand and agree that Controlled Events (including its affiliates, subsidiaries, officers, directors, employees, agents, partners, and licensors) shall not be liable for any indirect, incidental, special, consequential or exemplary damages, including but not limited to damages for loss of profits, goodwill, use, data or other intangible losses (even if Controlled Events has been advised of the possibility of such damages. 13. DATA SECURITY 13.1. If Customer processes personal data using the Service, Customer shall comply with its obligations as a data controller and data processor under all applicable laws. 13.2. Customer is solely responsible for the lawful collection, delivery, obtaining of consents and use of all Data. All personal data and log data that we collect from you will be processed in accordance with Controlled Events’ Privacy Policy. You should review our Privacy Policy, which is incorporated into this Agreement by this reference and made a part hereof. Click here to read our Privacy Policy. 13.3. We do not have any obligation to review or scan any Customer data for any purpose, including without limitation for measuring quality, filtering content, or detecting the presence of malware. 14. INTELLECTUAL PROPERTY 14.1. Customers own their own log data. 14.2. Subject to this Agreement, Controlled Events grants Customer a non-exclusive, revocable, non-transferable, limited right to access and use the Service and the material displayed thereon. However, no right, title, or interest in any such materials will be granted or transferred to you as a result of any permitted use of such materials. 14.3. Customer hereby grants Controlled Events a worldwide, irrevocable, perpetual, non-exclusive, transferable, royalty-free license: (a) to process and use their data for the purposes of delivering the Service to Customer; (b) to access the client’s project internally within Controlled Events for the purposes of improving, developing and marketing the Service; and (c) to disclose anonymized and/or aggregated versions of log data to third parties in connection with the development, improvement and marketing of the Service, provided that such anonymized or aggregated log data shall not identify Customer. This license continues after the termination of this Agreement. Controlled Events’ rights under the license in this Section may be exercised by Controlled Events’ officers and employees and by contractors engaged to provide services to Controlled Events. 14.4. All materials incorporated in or accessible through the Site or the Service, including, without limitation, text, photographs, images, graphics, illustrations, trademarks, service marks, logos, button icons, audio clips, video clips, software, and other content, and the compilation, collection, arrangement, and assembly thereof (including the look and feel of the Site and the Service), are protected by applicable national and international trademark and copyright laws, and are owned, controlled or licensed by Controlled Events, or by the original creators of such materials or their permitted licensors. Such materials may be used only for viewing the Site in the ordinary course or as a resource for purchasing the products offered through the Site. Any other use of such materials, including any copying, reproduction, modification, sale, distribution, extraction, re-utilization, transmission, republication, downloading, display, posting, performance, or other exploitation thereof by any means or medium without the prior written permission of the copyright owner is strictly prohibited. 14.5. Where any software is supplied by us for use by Customer on its computer(s), Controlled Events grants Customer a limited, personal, non-exclusive, non-transferable license to install and use the software for use solely for the purpose of enabling you to use the Service in the manner permitted by this Agreement and for no other purpose whatsoever. Customer may not copy, modify, distribute, sell, or lease any part of the Services or any software supplied in connection with the Services, nor may Customer reverse engineer or attempt to extract the source code of that software, unless laws prohibit those restrictions or you have our written permission. To the extent that the Customer is provided with access to open source software in the course of receiving or using the Service, Customer shall be responsible for complying with the open source license associated with that open source software. 14.6. Except as expressly set forth herein, Controlled Events alone (and its licensors, where applicable) will retain all intellectual property rights relating to the Service or the Software or any suggestions, ideas, enhancement requests, feedback, recommendations or other information provided by you or any other party relating to the Service and/or the Software, which are hereby assigned by You. Customer will not copy, distribute, reproduce or use any of the foregoing except as expressly permitted under this Agreement. 15. CONFIDENTIALITY 15.1. Each party (the “Receiving Party”) understands that the other party (the “Disclosing Party”) has disclosed or may disclose information relating to the Disclosing Party’s technology or business (hereinafter referred to as “Proprietary Information” of the Disclosing Party). The Receiving Party agrees: (i) not to divulge to any third person (except as set forth below) any such Proprietary Information, (ii) to give access to such Proprietary Information solely to those employees and third parties with a need to have access thereto for purposes of this Agreement, and (iii) to take the same security precautions to protect against disclosure or unauthorized use of such Proprietary Information that the party takes with its own proprietary information, but in no event will a party apply less than reasonable precautions to protect such Proprietary Information. 15.2. The Disclosing Party agrees that the foregoing will not apply with respect to any information that the Receiving Party can document (a) is or becomes generally available to the public without any action by, or involvement of, the Receiving Party, or (b) was in its possession or known by it prior to receipt from the Disclosing Party, or (c) was rightfully disclosed to it without restriction by a third party, or (d) was independently developed without use of any Proprietary Information of the Disclosing Party. Nothing in this Agreement will prevent the Receiving Party from disclosing the Proprietary Information pursuant to any judicial or governmental order, provided that the Receiving Party gives the Disclosing Party reasonable prior notice of such disclosure to contest such order. Customer acknowledges that Controlled Events does not wish to receive any Proprietary Information from Customer that is not necessary for Controlled Events to perform its obligations under this Agreement, and, unless the parties specifically agree otherwise, Controlled Events may reasonably presume that any unrelated information received from Customer is not confidential or Proprietary Information. Both Parties will have the right to disclose the existence but not the terms and conditions of this Agreement, unless such disclosure is approved in writing by both Parties prior to such disclosure, or is included in a filing required to be made by a Party with a governmental authority (provided such party will use reasonable efforts to obtain confidential treatment or a protective order) or is made on a confidential basis as reasonably necessary to potential investors or acquirers. 16. INDEMNIFICATION 16.1. Customer shall defend, indemnify, and hold harmless Controlled Events and each of its, and its affiliates, employees, contractors, directors, suppliers and representatives, from and against any liabilities, losses, claims, and expenses, including reasonable attorneys’ fees, arising from or related to your Data, or Customer’s actions in connection with any unauthorised use of the Service, including any claim that such actions violate any applicable law or third party right. 16.2. Controlled Events will notify Customer in writing thirty (30) days of becoming aware of any such claim; give you sole control of the defence or settlement of such a claim; and provide you, at your expense, with any and all information and assistance reasonably requested by you to handle the defence or settlement of the claim. Customer shall not accept any settlement that (i) imposes an obligation on us; (ii) requires us to make an admission; or (iii) imposes liability not covered by these indemnifications or places restrictions on us without prior written consent. 17. CONTENT RESPONSIBILITY 17.1 You are solely responsible for a) Your content and Data (meaning Content You post or otherwise submit to the Site or Service), b) the accuracy, quality, and legality of Your content and of Your submissions, c) the means by which You acquired Your content, including ensuring that Your content and Your submissions do not infringe upon or violate the rights of any person, d) claims relating to Your content and Your submissions, and e) responding to any person claiming Your content and/or Your submissions violate such persons rights, including notices pursuant to the Data Protection Act and General Data Protection Regulations. 18. GENERAL 18.1. The headings to the clauses in this Agreement are for reference only and shall not affect the interpretation of this Agreement. 18.2. The waiver or failure of either party to exercise any right provided for herein shall not be deemed a waiver of any further right hereunder. 18.3. This Agreement shall not constitute any party, the legal representative, partner or agent of the other parties or any of them nor shall any party or any successor of any party have the right or authority to assume, create or incur any liability or obligation of any kind express or implied against or in the name of or on behalf of any other party. The parties hereto enter this Agreement as principals for and on their own behalf. 18.4. This Agreement or the benefit hereof may not be assigned by Customer in whole or in part without the prior written consent of Controlled Events. Customer may not re-sell or make available the Services to any third parties. Controlled Events may assign this Agreement to any purchaser of, or successor in interest to, the Controlled Events business. 18.5 Except for failure to make payments when due, neither party shall be liable to the other by reason of any failure in performance of this Agreement by either party if the failure arises out of any cause beyond the reasonable control of that party, including, but not limited to, the unavailability or faulty performance of communication networks or energy sources, any act of God, any act or omission of governmental or other competent authority, fires, strikes, industrial dispute, riots, war, inability to obtain materials, embargo, refusal of license, theft, destruction, denial of service (DoS) attacks, unauthorized access to computer systems or records, programs, equipment, data, or services. 18.6. You grant us the right to add your name and company logo to our customer list and website. 18.7. This Agreement represents the entirety of the understanding of the parties concerning the subject matter hereof and overrides and supersedes all prior promises, representations, undertakings, understandings, arrangements, agreements, side letters or heads of agreement concerning the same which are hereby revoked by mutual consent of the parties. The Customer is not relying on any warranties or representations which are not expressly set out in this Agreement. 18.8. Questions about the Terms of Service should be sent to support@controlledevent.com. 18.9. Survival. The following sections shall survive the expiration or termination of this Agreement: Definitions, Fees and Payments, Intellectual Property, Confidentiality, Indemnification, Disclaimers, Limitations of Liability, Termination and General.

Courses matching "ALERT"

Show all 352

Driver CPC - 1 Day Periodic 7 Hour Course/ Tiredness, Diet & Lifestyle / Economical Driving

By Total Compliance

This comprehensive 7-hour online course is designed for professional drivers who need to complete Driver CPC Periodic Training to maintain their Driver CPC Licence. Participants will explore crucial topics such as managing fatigue, understanding the impact of diet and lifestyle on driving performance, and adopting economical driving practices. Who Should Attend: This course is ideal for all professional drivers required to undertake Driver CPC Periodic Training to ensure compliance with current legislation and to enhance their driving skills. Topics Covered: • Tiredness and Fatigue Management: Techniques for managing driver fatigue, understanding rest requirements, and learning strategies to stay alert on long drives. • Diet and Lifestyle: Insights into nutrition and lifestyle habits that promote sustained energy, mental focus, and overall health. • Economical Driving: Practical tips and techniques for fuel-efficient driving that benefit both the driver and the environment, reducing overall operational costs. Course Format: Online Join us for this training session to enhance your skills, maintain compliance, and stay up-to-date with industry standards.

Driver CPC - 1 Day Periodic 7 Hour Course/ Tiredness, Diet & Lifestyle / Economical Driving
Delivered Online + more
£69.95

MS-102T00 Microsoft 365 Administrator Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. A proficient understanding of DNS and basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices. A working knowledge of PowerShell. 1 - Configure your Microsoft 365 experience Explore your Microsoft 365 cloud environment Configure your Microsoft 365 organizational profile Manage your tenant subscriptions in Microsoft 365 Integrate Microsoft 365 with customer engagement apps Complete your tenant configuration in Microsoft 365 2 - Manage users, licenses, and mail contacts in Microsoft 365 Determine the user identity model for your organization Create user accounts in Microsoft 365 Manage user account settings in Microsoft 365 Manage user licenses in Microsoft 365 Recover deleted user accounts in Microsoft 365 Perform bulk user maintenance in Microsoft Entra ID Create and manage guest users Create and manage mail contacts 3 - Manage groups in Microsoft 365 Examine groups in Microsoft 365 Create and manage groups in Microsoft 365 Create dynamic groups using Azure rule builder Create a Microsoft 365 group naming policy Create groups in Exchange Online and SharePoint Online 4 - Add a custom domain in Microsoft 365 Plan a custom domain for your Microsoft 365 deployment Plan the DNS zones for a custom domain Plan the DNS record requirements for a custom domain Create a custom domain in Microsoft 365 5 - Configure client connectivity to Microsoft 365 Examine how automatic client configuration works Explore the DNS records required for client configuration Configure Outlook clients Troubleshoot client connectivity 6 - Configure administrative roles in Microsoft 365 Explore the Microsoft 365 permission model Explore the Microsoft 365 admin roles Assign admin roles to users in Microsoft 365 Delegate admin roles to partners Manage permissions using administrative units in Microsoft Entra ID Elevate privileges using Microsoft Entra Privileged Identity Management Examine best practices when configuring administrative roles 7 - Manage tenant health and services in Microsoft 365 Monitor the health of your Microsoft 365 services Monitor tenant health using Microsoft 365 Adoption Score Monitor tenant health using Microsoft 365 usage analytics Develop an incident response plan Request assistance from Microsoft 8 - Deploy Microsoft 365 Apps for enterprise Explore Microsoft 365 Apps for enterprise functionality Explore your app compatibility by using the Readiness Toolkit Complete a self-service installation of Microsoft 365 Apps for enterprise Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager Deploy Microsoft 365 Apps for enterprise from the cloud Deploy Microsoft 365 Apps for enterprise from a local source Manage updates to Microsoft 365 Apps for enterprise Explore the update channels for Microsoft 365 Apps for enterprise Manage your cloud apps using the Microsoft 365 Apps admin center 9 - Analyze your Microsoft 365 workplace data using Microsoft Viva Insights Examine the analytical features of Microsoft Viva Insights Explore Personal insights Explore Team insights Explore Organization insights Explore Advanced insights 10 - Explore identity synchronization Examine identity models for Microsoft 365 Examine authentication options for the hybrid identity model Explore directory synchronization 11 - Prepare for identity synchronization to Microsoft 365 Plan your Microsoft Entra deployment Prepare for directory synchronization Choose your directory synchronization tool Plan for directory synchronization using Microsoft Entra Connect Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - Implement directory synchronization tools Configure Microsoft Entra Connect prerequisites Configure Microsoft Entra Connect Monitor synchronization services using Microsoft Entra Connect Health Configure Microsoft Entra Connect cloud sync prerequisites Configure Microsoft Entra Connect cloud sync 13 - Manage synchronized identities Manage users with directory synchronization Manage groups with directory synchronization Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization Configure object filters for directory synchronization Explore Microsoft Identity Manager Troubleshoot directory synchronization 14 - Manage secure user access in Microsoft 365 Manage user passwords Enable pass-through authentication Enable multifactor authentication Enable passwordless sign-in with Microsoft Authenticator Explore self-service password management Explore Windows Hello for Business Implement Microsoft Entra Smart Lockout Implement conditional access policies Explore Security Defaults in Microsoft Entra ID Investigate authentication issues using sign-in logs 15 - Examine threat vectors and data breaches Explore today's work and threat landscape Examine how phishing retrieves sensitive information Examine how spoofing deceives users and compromises data security Compare spam and malware Examine account breaches Examine elevation of privilege attacks Examine how data exfiltration moves data out of your tenant Examine how attackers delete data from your tenant Examine how data spillage exposes data outside your tenant Examine other types of attacks 16 - Explore the Zero Trust security model Examine the principles and components of the Zero Trust model Plan for a Zero Trust security model in your organization Examine Microsoft's strategy for Zero Trust networking Adopt a Zero Trust approach 17 - Explore security solutions in Microsoft 365 Defender Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 Protect your organization's identities using Microsoft Defender for Identity Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint Protect against cyber attacks using Microsoft 365 Threat Intelligence Provide insight into suspicious activity using Microsoft Cloud App Security Review the security reports in Microsoft 365 Defender 18 - Examine Microsoft Secure Score Explore Microsoft Secure Score Assess your security posture with Microsoft Secure Score Improve your secure score Track your Microsoft Secure Score history and meet your goals 19 - Examine Privileged Identity Management Explore Privileged Identity Management in Microsoft Entra ID Configure Privileged Identity Management Audit Privileged Identity Management Control privileged admin tasks using Privileged Access Management 20 - Examine Azure Identity Protection Explore Azure Identity Protection Enable the default protection policies in Azure Identity Protection Explore the vulnerabilities and risk events detected by Azure Identity Protection Plan your identity investigation 21 - Examine Exchange Online Protection Examine the anti-malware pipeline Detect messages with spam or malware using Zero-hour auto purge Explore anti-spoofing protection provided by Exchange Online Protection Explore other anti-spoofing protection Examine outbound spam filtering 22 - Examine Microsoft Defender for Office 365 Climb the security ladder from EOP to Microsoft Defender for Office 365 Expand EOP protections by using Safe Attachments and Safe Links Manage spoofed intelligence Configure outbound spam filtering policies Unblock users from sending email 23 - Manage Safe Attachments Protect users from malicious attachments by using Safe Attachments Create Safe Attachment policies using Microsoft Defender for Office 365 Create Safe Attachments policies using PowerShell Modify an existing Safe Attachments policy Create a transport rule to bypass a Safe Attachments policy Examine the end-user experience with Safe Attachments 24 - Manage Safe Links Protect users from malicious URLs by using Safe Links Create Safe Links policies using Microsoft 365 Defender Create Safe Links policies using PowerShell Modify an existing Safe Links policy Create a transport rule to bypass a Safe Links policy Examine the end-user experience with Safe Links 25 - Explore threat intelligence in Microsoft 365 Defender Explore Microsoft Intelligent Security Graph Explore alert policies in Microsoft 365 Run automated investigations and responses Explore threat hunting with Microsoft Threat Protection Explore advanced threat hunting in Microsoft 365 Defender Explore threat analytics in Microsoft 365 Identify threat issues using Microsoft Defender reports 26 - Implement app protection by using Microsoft Defender for Cloud Apps Explore Microsoft Defender Cloud Apps Deploy Microsoft Defender for Cloud Apps Configure file policies in Microsoft Defender for Cloud Apps Manage and respond to alerts in Microsoft Defender for Cloud Apps Configure Cloud Discovery in Microsoft Defender for Cloud Apps Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - Implement endpoint protection by using Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint in Microsoft Intune Onboard devices in Microsoft Defender for Endpoint Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management Manage device discovery and vulnerability assessment Reduce your threat and vulnerability exposure 28 - Implement threat protection by using Microsoft Defender for Office 365 Explore the Microsoft Defender for Office 365 protection stack Investigate security attacks by using Threat Explorer Identify cybersecurity issues by using Threat Trackers Prepare for attacks with Attack simulation training 29 - Examine data governance solutions in Microsoft Purview Explore data governance and compliance in Microsoft Purview Protect sensitive data with Microsoft Purview Information Protection Govern organizational data using Microsoft Purview Data Lifecycle Management Minimize internal risks with Microsoft Purview Insider Risk Management Explore Microsoft Purview eDiscovery solutions 30 - Explore archiving and records management in Microsoft 365 Explore archive mailboxes in Microsoft 365 Enable archive mailboxes in Microsoft 365 Explore Microsoft Purview Records Management Implement Microsoft Purview Records Management Restore deleted data in Exchange Online Restore deleted data in SharePoint Online 31 - Explore retention in Microsoft 365 Explore retention by using retention policies and retention labels Compare capabilities in retention policies and retention labels Define the scope of a retention policy Examine the principles of retention Implement retention using retention policies, retention labels, and eDiscovery holds Restrict retention changes by using Preservation Lock 32 - Explore Microsoft Purview Message Encryption Examine Microsoft Purview Message Encryption Configure Microsoft Purview Message Encryption Define mail flow rules to encrypt email messages Add organizational branding to encrypted email messages Explore Microsoft Purview Advanced Message Encryption 33 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 34 - Implement Microsoft Purview Insider Risk Management Explore insider risk management Plan for insider risk management Explore insider risk management policies Create insider risk management policies Investigate insider risk management activities and alerts Explore insider risk management cases 35 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 36 - Explore Microsoft Purview Data Loss Prevention Examine Data Loss Prevention Explore Endpoint data loss prevention Examine DLP policies View DLP policy results Explore DLP reports 37 - Implement Microsoft Purview Data Loss Prevention Plan to implement Microsoft Purview Data Loss Protection Implement Microsoft Purview's default DLP policies Design a custom DLP policy Create a custom DLP policy from a template Configure email notifications for DLP policies Configure policy tips for DLP policies 38 - Implement data classification of sensitive information Explore data classification Implement data classification in Microsoft 365 Explore trainable classifiers Create and retrain a trainable classifier View sensitive data using Content explorer and Activity explorer Detect sensitive information documents using Document Fingerprinting 39 - Explore sensitivity labels Manage data protection using sensitivity labels Explore what sensitivity labels can do Determine a sensitivity label's scope Apply sensitivity labels automatically Explore sensitivity label policies 40 - Implement sensitivity labels Plan your deployment strategy for sensitivity labels Examine the requirements to create a sensitivity label Create sensitivity labels Publish sensitivity labels Remove and delete sensitivity labels Additional course details: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-102T00 Microsoft 365 Administrator Essentials
Delivered Online
£2,975

AZ-104T00 Microsoft Azure Administrator

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Administrators. The Azure Administrator implements, manages, and monitors identity, governance, storage, compute, and virtual networks in a cloud environment. The Azure Administrator will provision, size, monitor, and adjust resources as appropriate. This course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web apps and containers, back up and share data, and monitor your solution. Prerequisites Successful Azure Administrators start this role with experience in virtualization, networking, identity, and storage. Understanding of on-premises virtualization technologies, including: VMs, virtual networking, and virtual hard disks. Understanding of network configurations, including TCP/IP, Domain Name System (DNS), virtual private networks (VPNs), firewalls, and encryption technologies. Understanding of Active Directory concepts, including users, groups, and role-based access control. Understanding of resilience and disaster recovery, including backup and restore operations. 1 - Configure Microsoft Entra ID Describe Microsoft Entra ID benefits and features Describe Microsoft Entra concepts Compare Active Directory Domain Services to Microsoft Entra ID Select Microsoft Entra editions Implement Microsoft Entra join Implement Microsoft Entra self-service password reset 2 - Configure user and group accounts Create user accounts Manage user accounts Create bulk user accounts Create group accounts Create administrative units 3 - Configure subscriptions Identify Azure regions Implement Azure subscriptions Obtain an Azure subscription Identify Azure subscription usage Implement Microsoft Cost Management Apply resource tagging Apply cost savings 4 - Configure Azure Policy Create management groups Implement Azure policies Create Azure policies Create policy definitions Create an initiative definition Scope the initiative definition Determine compliance 5 - Configure role-based access control Implement role-based access control Create a role definition Create a role assignment Compare Azure roles to Microsoft Entra roles Apply role-based access control Review fundamental Azure RBAC roles 6 - Configure Azure resources with tools Use the Azure portal Use Azure Cloud Shell Use Azure PowerShell Use Azure CLI 7 - Use Azure Resource Manager Review Azure Resource Manager benefits Review Azure resource terminology Create resource groups Create Azure Resource Manager locks Reorganize Azure resources Remove resources and resource groups Determine resource limits 8 - Configure resources with Azure Resource Manager templates Review Azure Resource Manager template advantages Explore the Azure Resource Manager template schema Explore the Azure Resource Manager template parameters Consider Bicep templates Review QuickStart templates 9 - Configure virtual networks Plan virtual networks Create subnets Create virtual networks Plan IP addressing Create public IP addressing Associate public IP addresses Allocate or assign private IP addresses 10 - Configure network security groups Implement network security groups Determine network security group rules Determine network security group effective rules Create network security group rules Implement application security groups 11 - Configure Azure DNS Identify domains and custom domains Verify custom domain names Create Azure DNS zones Delegate DNS domains Add DNS record sets Plan for Azure Private DNS zones Review Azure Private DNS zone scenarios 12 - Configure Azure Virtual Network peering Determine Azure Virtual Network peering uses Determine gateway transit and connectivity Create virtual network peering Extend peering with user-defined routes and service chaining 13 - Configure network routing and endpoints Review system routes Identify user-defined routes Determine service endpoint uses Determine service endpoint services Identify private link uses 14 - Configure Azure Load Balancer Determine Azure Load Balancer uses Implement a public load balancer Implement an internal load balancer Determine load balancer SKUs Create back-end pools Create health probes Create load balancer rules 15 - Configure Azure Application Gateway Implement Azure Application Gateway Determine Azure Application Gateway routing Configure Azure Application Gateway components 16 - Configure storage accounts Implement Azure Storage Explore Azure Storage services Determine storage account types Determine replication strategies Access storage Secure storage endpoints 17 - Configure Azure Blob Storage Implement Azure Blob Storage Create blob containers Assign blob access tiers Add blob lifecycle management rules Determine blob object replication Upload blobs Determine Blob Storage pricing 18 - Configure Azure Storage security Review Azure Storage security strategies Create shared access signatures Identify URI and SAS parameters Determine Azure Storage encryption Create customer-managed keys Apply Azure Storage security best practices 19 - Configure Azure Files and Azure File Sync Compare storage for file shares and blob data Manage Azure file shares Create file share snapshots Implement Azure File Sync Identify Azure File Sync components Deploy Azure File Sync 20 - Configure Azure Storage with tools Use Azure Storage Explorer Use the Azure Import/Export service Use the WAImportExport tool Use the AzCopy tool 21 - Configure virtual machines Review cloud services responsibilities Plan virtual machines Determine virtual machine sizing Determine virtual machine storage Create virtual machines in the Azure portal Connect to virtual machines 22 - Configure virtual machine availability Plan for maintenance and downtime Create availability sets Review update domains and fault domains Review availability zones Compare vertical and horizontal scaling Implement Azure Virtual Machine Scale Sets Create Virtual Machine Scale Sets Implement autoscale Configure autoscale 23 - Configure Azure App Service plans Implement Azure App Service plans Determine Azure App Service plan pricing Scale up and scale out Azure App Service Configure Azure App Service autoscale 24 - Configure Azure App Service Implement Azure App Service Create an app with App Service Explore continuous integration and deployment Create deployment slots Add deployment slots Secure your App Service app Create custom domain names Back up and restore your App Service app Use Azure Application Insights 25 - Configure Azure Container Instances Compare containers to virtual machines Review Azure Container Instances Implement container groups Review the Docker platform 26 - Configure file and folder backups Describe Azure Backup benefits Implement Backup Center for Azure Backup Configure Azure Recovery Services vault backup options Use the Microsoft Azure Recovery Services (MARS) agent Configure on-premises file and folder backups 27 - Configure virtual machine backups Explore options to protect virtual machine data Create virtual machine snapshots in Azure Backup Set up Azure Recovery Services vault backup options Back up your virtual machines Restore your virtual machines Implement System Center DPM and Azure Backup Server Compare the MARS agent and Azure Backup Server Implement soft delete for your virtual machines Implement Azure Site Recovery 28 - Configure Azure Monitor Describe Azure Monitor key capabilities Describe Azure Monitor components Define metrics and logs Identify monitoring data and tiers Describe activity log events Query the activity log 29 - Configure Azure alerts Describe Azure Monitor alerts Manage Azure Monitor alerts Create alert rules Create action groups 30 - Configure Log Analytics Determine Log Analytics uses Create a Log Analytics workspace Create Kusto (KQL) queries Structure Log Analytics queries 31 - Configure Network Watcher Describe Azure Network Watcher features Review IP flow verify diagnostics Review next hop diagnostics Visualize the network topology

AZ-104T00 Microsoft Azure Administrator
Delivered Online + more
£2,380

C30M01 - Evacuation Alert systems - BS 8629 (online)

5.0(1)

By Ember Compliance

Learners will be introduced to EAS as part of the fire safety solution for tall residential properties. This CPD course provides learners with an understanding of the requirements of BS 5839-1 in relation to, design, installation, commissioning, and maintenance of EAS.

C30M01 - Evacuation Alert systems - BS 8629 (online)
Delivered Online + more
£230

C30M01 - Evacuation Alert systems - BS 8629 (classroom)

5.0(1)

By Ember Compliance

Learners will be introduced to EAS as part of the fire safety solution for tall residential properties. This CPD course provides learners with an understanding of the requirements of BS 5839-1 in relation to, design, installation, commissioning, and maintenance of EAS.

C30M01 - Evacuation Alert systems - BS 8629 (classroom)
Delivered In-PersonFlexible Dates
£230

CompTIA Security+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Lesson 1: Summarize Fundamental Security Concepts Security Concepts Security Controls Lesson 2: Compare Threat Types Threat Actors Attack Surfaces Social Engineering Lesson 3: Explain Cryptographic Solutions Cryptographic Algorithms Public Key Infrastructure Cryptographic Solutions Lesson 4: Implement Identity and Access Management Authentication Authorization Identity Management Lesson 5: Secure Enterprise Network Architecture Enterprise Network Architecture Network Security Appliances Secure Communications Lesson 6: Secure Cloud Network Architecture Cloud Infrastructure Embedded Systems and Zero Trust Architecture Lesson 7: Explain Resiliency and Site Security Concepts Asset Management Redundancy Strategies Physical Security Lesson 8: Explain Vulnerability Management Device and OS Vulnerabilities Application and Cloud Vulnerabilities Vulnerability Identification Methods Vulnerability Analysis and Remediation Lesson 9: Evaluate Network Security Capabilities Network Security Baselines Network Security Capability Enhancement Lesson 10: Assess Endpoint Security Capabilities Implement Endpoint Security Mobile Device Hardening Lesson 11: Enhance Application Security Capabilities Application Protocol Security Baselines Cloud and Web Application Security Concepts Lesson 12: Explain Incident Response and Monitoring Concepts Incident Response Digital Forensics Data Sources Alerting and Monitoring Tools Lesson 13: Analyze Indicators of Malicious Activity Malware Attack Indicators Physical and Network Attack Indicators Application Attack Indicators Lesson 14: Summarize Security Governance Concepts Policies, Standards, and Procedures Change Management Automation and Orchestration Lesson 15: Explain Risk Management Processes Risk Management Processes and Concepts Vendor Management Concepts Audits and Assessments Lesson 16: Summarize Data Protection and Compliance Concepts Data Classification and Compliance Personnel Policies Additional course details: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered Online + more
£2,475

WhatsUp Gold for engineers

5.0(3)

By Systems & Network Training

WhatsUp Gold training course description A hands on course focusing on network management using WhatsUp Gold. What will you learn Discover devices using WhatsUp Gold. Use WhatsUp Gold. Poll and monitor devices using WhatsUp Gold. Create Alarms, alerts and reports. Diagnose faults using WhatsUp Gold. Administrate a WhatsUp Gold system. WhatsUp Gold training course details Who will benefit: Technical staff working with WhatsUp Gold. Prerequisites: None. Duration 2 days WhatsUp Gold for engineers Getting started with WhatsUp Gold Starting WhatsUp Gold, manual discovery, automatic discovery, controlling IP discovery, mapping network devices. Hands on Using WhatsUp Gold. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. MIBs. Hands on Device discovery. Adding devices. Customising maps. Using WhatsUp Gold Polling, obtaining MIB information, MIB walking, Active monitors, critical monitors, passive monitors. Hands on Monitoring devices. Groups. MIB walking. SNMP trap monitor. Syslog monitor. Alarms Actions, Alert centre, thresholds, actions on events. Hands on Using the alert centre. Web tools. Reports Creating reports, automatic reports, customising reports. Hands on Performance reports. Graphs. Administration Users, backups, the database. Hands on Adding a user. Backups.

WhatsUp Gold for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

SolarWinds NPM for engineers

5.0(3)

By Systems & Network Training

SolarWinds NPM training course description A hands on course providing a solid foundation on network management using SolarWinds. The course specifically focusses on SolarWinds Orion Network Performance Monitor. The course starts with configuring agents and device discovery, onto exploiting SNMP with SolarWinds and then Alerts, reports and customisation of menus, views and maps. What will you learn Discover devices using Solarwinds. Use Solarwinds. Poll and monitor devices using Solarwinds. Create Alarms and reports. Diagnose faults using Solarwinds. SolarWinds NPM training course details Who will benefit: Technical staff working with Solarwinds. Prerequisites: None. Duration 2 days SolarWinds NPM training course content Getting started with SolarWinds What is SolarWinds, Products, ICMP, WMI, SNMP. Installing SolarWinds. Hands on Connecting to SolarWinds, configuring users and groups, using SolarWinds. Device discovery with SolarWinds Manual discovery, automatic discovery, controlling IP discovery, polling, thresholds. Hands on Adding ICMP only, SNMP and WMI nodes. dependencies, groups. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. MIBs, SNMPv3, obtaining MIB information. Universal device poller. Hands on MIB browser, MIB walking, syslog. Message center. Using SolarWinds The home page, Views, changing views, adding views. Hands on Views and menu customisation. Server monitoring. Alerts Filters, acknowledgements, notes. Basic alert configuration, Advanced alert configuration. Hands on Configuring alerts. Reports Creating reports, on demand reports, scheduled reports, customising reports, adding reports to views. Standard reports. Hands on Performance reports. Graphs. Maps Orion Network Atlas, the background, adding objects, connect now, applying to views. Hands on Customising a map. Administration Backups, the database.

SolarWinds NPM for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Food Safety for Retail, Level 2

5.0(50)

By Pochat Training

QA Level 2 Award In Food Safety For Retail (RQF) Face to Face: Full day course Virtual Classroom: Spread over 3 sessions of 2½ hr duration Food business operators are required by law, to ensure that food handlers receive appropriate supervision and instruction/training in food hygiene in line with their work activity and should enable them to handle food safely Recommended by HSE and Environmental Health Officers (EHO's) Course Contents: The Importance of Food Safety Food Safety Laws Legal Responsibilities of Food Handlers Types of Contamination and the Associated Risks Bacteriology Food Poisoning Foodborne Illnesses An Introduction to Hazard Analysis and Critical Control Points (HACCP) Personal Hygiene Work Flow, Work Surfaces and Equipment Cleaning and Disinfection Waste Disposal Pest Control Safe Food Handling Practices including Time and Temperature Controls Preparation Cooking and Reheating Chilling Cooling Thawing Hot holding Displaying food Core temperatures Food Preservation Storage Stock Control Procedures Benefits of this course: Businesses have a duty to their customers to produce food that is safe for consumption. There are one million cases of food poisoning in the UK each year. More than 6,000 are admitted to hospital. In 2014/2015, businesses in Chesterfield were issued 344 written enforcement notices. Derby received 1,116. Doing our Ofqual regulated, nationally accredited course ensures that nothing of importance is left out. EU and UK regulations state that all food handlers must receive appropriate training in food safety practices relevant to their duties. The Food Standards Agency says that 'Food business operators are required by law, to ensure that food handlers receive appropriate supervision and instruction/training in food hygiene in line with their work activity and should enable them to handle food safely’. Our QA Level 2 Award in Food Safety in Catering (RQF) is a nationally accredited qualification especially suitable for people working in, or planning to work in, the food retail industry, and complies with the training regulations.

Food Safety for Retail, Level 2
Delivered in Chesterfield or Online + more
£105

Food Safety for Manufacturing, Level 2

5.0(50)

By Pochat Training

QA Level 2 Award In Food Safety For Manufacturing (RQF) Face to Face: Full day course Virtual Classroom: Spread over 3 sessions of 2½hr duration Food business operators are required by law, to ensure that food handlers receive appropriate supervision and instruction/training in food hygiene in line with their work activity and should enable them to handle food safely Recommended by HSE and Environmental Health Officers (EHO's) Course Contents: The Importance of Food Safety Food Safety Laws Legal Responsibilities of Food Handlers Types of Contamination and the Associated Risks Bacteriology Food Poisoning Foodborne Illnesses An Introduction to Hazard Analysis and Critical Control Points (HACCP) Personal Hygiene Work Flow, Work Surfaces and Equipment Cleaning and Disinfection Waste Disposal Pest Control Safe Food Handling Practices including Time and Temperature Controls Preparation Cooking and Reheating Chilling Cooling Thawing Hot holding Displaying food Core temperatures Food Preservation Storage Stock Control Procedures Benefits of this course: Businesses have a duty to their customers to produce food that is safe for consumption. There are one million cases of food poisoning in the UK each year. More than 6,000 are admitted to hospital. In 2014/2015, businesses in Chesterfield were issued 344 written enforcement notices. Derby received 1,116. Doing our Ofqual regulated, nationally accredited course ensures that nothing of importance is left out. EU and UK regulations state that all food handlers must receive appropriate training in food safety practices relevant to their duties. The Food Standards Agency says that 'Food business operators are required by law, to ensure that food handlers receive appropriate supervision and instruction/training in food hygiene in line with their work activity and should enable them to handle food safely’. Our QA Level 2 Award in Food Safety in Catering (RQF) is a nationally accredited qualification especially suitable for people working in, or planning to work in, the food retail industry, and complies with the training regulations. Accredited, Ofqual regulated qualification: Our Food Safety For Manufacturing training course is a nationally recognised, Ofqual regulated qualification accredited by Qualsafe Awards. This means that you can be rest assured that your Food safety For Manufacturing certificate fulfils the legal requirements and is a very good way to make sure your employees are trained in Food Safety. The Ofqual Register number for this course is 603/2592/6

Food Safety for Manufacturing, Level 2
Delivered in Chesterfield or Online + more
£105