Develop your proficiency in hazardous waste management and logistics for upstream oil and gas with EnergyEdge's specialized course. Enroll now to advance your career.
Course Introduction Our Venepuncture and Phlebotomy training equips delegates with the skills and knowledge needed to take blood safely. Please note: this course is for health care professionals and nurses only. About this event Applicable to Nurses, Health Care Assistants and Phlebotomists in primary care, the community, hospitals or nursing homes, this course is interactive and involves a demonstration session on performing blood tests. Our venepuncture training will give delegates the theoretical and practical awareness to undertake a competence assessment framework in the workplace that will deem them competent to take blood safely and appropriately. Each delegate will receive a competence-based framework to allow them to do this. Course Aims Identify and describe equipment used for routine venepuncture Be able to assess and select suitable sites used for venepuncture as well as locations to avoid Describe and utilize the required steps to perform routine venepuncture Describe actions that ensure safety during performance of a venepuncture Identify suitable vein selection and identify factors influencing this Understand relevant professional and legal issues Be able to identify potential complications Understand anatomy and physiology and correct vein selection Be familiar with equipment and exercise choice in using most appropriate equipment Practice safely in terms of infection control and waste management Become skilled and competent at phlebotomy To recognise any complications arising and be able to take the appropriate action Course Content Background and importance of training and competence Supervision and practice Scope and responsibilities Accountability Professional and legal issues Consent and capacity What is phlebotomy? Tools of the trade-equipment Needles and patient safety Blood collection systems and devices Syringes and when to use them Blood collection tubes Labelling Anatomy and physiology Vein Selection: - Identification of Veins - Arm Veins - Hand Veins Vein assessment Unacceptable sites for venous collection Venepuncture procedure Attempts Order of Fill Specimen collection procedures Specimen handling post-phlebotomy Personal protective equipment Needle stick injuries Legislation-EU Directives Disposal Needle phobias Dealing with anxiety/fainting etc. Practical session Potential Complications (including infection control) Practical Application - techniques and troubleshooting Case scenarios Troubleshooting Audit Who should attend / would be applicable? Nurses HCAs Those interested in careers as Phlebotomists AB Health Group awards CPD points / certificate of attendance for each course. If you would prefer an accredited certificate by our accrediting body Aim Qualifications we can organise this. The charge for the certificate including postage is £30.00. Annie Barr AB Health Group Organiser Description Annie Barr is a leading provider of high quality, accredited healthcare training. With a selection of engaging healthcare training that has been developed by experts to equip you and your workforce with the skills, knowledge and competence needed to provide compassionate and high quality care.
The NEBOSH General Certificate qualification has been recognised for many years as an excellent introduction to the fundamentals of occupational health and safety. The NEBOSH Environmental Management Certificate is designed to provide a similarly sound foundation in environmental management.
Duration 1 Days 6 CPD hours This course is intended for To ensure success, students should have completed Excel Essentials and Excel Functions Including Pivot Tables and Lookups or have the equivalent knowledge and experience. Overview Upon successful completion of this course, students will be able to enhance productivity and efficiency by streamlining workflow, collaborate with others, and audit and analyse data. This course is designed for students desiring to gain skills necessary to create macros, collaborate with others, audit and analyse data, incorporate multiple data sources, and import data. Working with Multiple Worksheets and Workbooks Working with Named Ranges Link Cells Across Worksheets and Workbooks Use 3D References to Calculate Across Worksheets Consolidate Data Use Formula Auditing and Error Checking Reveal Formulas Trace Cell Precedents and Dependents Locate Errors in Formulas Watch and Evaluate Formulas Reviewing and Protecting Workbooks Control Data Entry via Data Validation Protect Workbook Access Protect Worksheets and Cell Content Add and Edit Comments Prepare a Workbook for Distribution Modify Excel's Default Settings Using Macros to Automate Workbook Functionality Create Macros via Recording Run Macros via Buttons and Shortcuts Assign Macros to the Quick Access Toolbar and Ribbon Assign Macros to Objects View Macro Code Forecasting and Analysis Data Use Conditional Formatting to Highlight, Sort and Filter Key Data Advanced Conditional Formatting using Formulas Create Sparklines to Visualise Data Add Trendlines to Charts to Visualise and Forecast Trends Use Data Tables and Scenarios to Project Potential Outcomes Use Goal Seek to Calculate Outcomes Forecast Data Trends Using Solver
Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Course Information This course offers foundational guidance and practical support tailored for individuals operating within Good Manufacturing Practice (GMP) frameworks. Explore the fundamental prerequisites of a pharmaceutical quality system (PQS) and delve into the application of quality risk management (QRM) principles, aligning with current regulations and guidance. Gain insights into pivotal aspects such as requirements, roles, and responsibilities, encompassing change control, document management, and key documentation essential for effective implementation of GMP with a focus on regulatory inspections and common findings. Is this course for you? Ideal for professionals engaged in GMP across various sectors, including: Research and Development (R&D) Contract Manufacturing Organisations Manufacturing Units Quality Control (QC) Laboratories Auditing Roles. What will you learn? Event objectives - by the end of the course, delegates shall: Have an awareness of the basic requirements of GMP Be aware of UK and EU GMP Rules and Guidance and relevant publications Understand the roles and responsibilities associated with GMP Be able to contribute to and maintain quality documentation Have a basic understanding of product lifecycle and manufacturing Understand the requirements of GMP in the QC laboratory context Have a basic understanding of risk management and mitigation principles Understand the need for quality systems and quality assurance activities Be aware of common regulatory findings. Learning outcomes: delegates will be able to: Implement their role within GMP with confidence and knowledge of the principle requirements Contribute effectively to the GMP quality system and their organisation’s compliance Comprehend where their organisation’s activities sit within the larger GMP arena Know where to seek further information within the published rules and guidance, UK Legislation, European Commission Directives, ICH Guidance and other relevant publications, as well as via the internet. Tutors Tutors will be comprised of (click the photos for biographies): Louise Handy Director, Handy Consulting Ltd Programme Please note timings may be subject to alteration. Day 1 09:30 Introductions and Scope of the Course Understand the group requirements and the tutor's background and experience. 09:45 Background and Regulatory Environment Setting the scene, understanding the context, key legislation. 10:30 Principles of GMP Key points and requirements. 11:15 Break 11:30 Personnel and Responsibilities Management and staff, duties and accountabilities. 12:00 Overview of GMP Manufacturing Basics of the product life cycle. 12:30 Lunch 13:15 Risk Management Workshop Practical exploration of risk and mitigation activities. 14:30 QC Laboratories Activities and practicalities. 15:15 Break 15:30 Compliance Quality Assurance and Self Inspection. 16:15 Question Time A chance for questions on the practicalities of GMP. 16:30 Close of Course Extra Information Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam. CPD Points 7 Points Development Level Learn
Level 5 QLS Endorsed Course | CPD & CiQ Accredited | Audio Visual Training | Free PDF Certificate | Lifetime Access
Give a compliment to your career and take it to the next level. This Internal Audit Training bundle will provide you with the essential knowledge to shine in your professional career. Whether you want to develop skills for your next job or elevate your skills for your next promotion, this Internal Audit Training bundle will help you stay ahead of the pack. Throughout the Internal Audit Training programme, it stresses how to improve your competency as a person in your chosen field while also outlining essential career insights in the relevant job sector. Along with this Internal Audit Training course, you will get 10 premium courses, an originalhardcopy, 11 PDF certificates (Main Course + Additional Courses) Student ID card as gifts. This Internal Audit Training Bundle Consists of the following Premium courses: Level 2 Microsoft Office Essentials Microsoft Teams Leadership & Management Diploma Working from Home Essentials Mental Health and Working from Home Online Meeting Management Effective Communication Skills Time Management Report Writing Emotional Intelligence and Human Behaviour Take this course anywhere and at any time. Don't let your lifestyle limit your learning or your potential. Experienced tutors and mentors will be there for you whenever you need them, and solve all your queries through email and chat boxes. Learning Outcomes: Fully understand the purpose and requirements of an internal audit Learn all processes needed to perform an internal audit Develop methods to apply useful technology and measures to an audit Work out the best way to identify and control risk in operations Acquire the ability to perform employee interviews intuitively Obtain the capability to produce an incisive and accurate final report Adhere to accepted and recognised UK Internal Audit Standards Become a trusted and reliable auditor in your chosen sector and much more... Benefits you'll get choosing Apex Learning: One payment, but lifetime access to 11 CPD courses Certificates, student ID for the title course included in a one-time fee Full tutor support available from Monday to Friday Free up your time - don't waste time and money travelling for classes Accessible, informative modules taught by expert instructors Learn at your ease - anytime, from anywhere Study the course from your computer, tablet or mobile device CPD accredited course - improve the chance of gaining professional skills Gain valuable knowledge without leaving your home Curriculum: ***Internal Audit Training Diploma*** Module 01: Auditing as a Form of Assurance Module 02: Internal Audit Procedures Module 03: Technology-based Internal Audit Module 04: Internal Control and Control Risk Module 05: Audit Interviews Module 06: Reporting Audit Outcome Module 07: UK Internal Audit Standards Module 08: Career as an Auditor How will I get my Certificate? After successfully completing the course you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificate: Free (Previously it was £6*11 = £66) Hard Copy Certificate: Free (For The Title Course: Previously it was £10) CPD 45 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this Internal Audit Training bundle. Requirements This Internal Audit Training course has been designed to be fully compatible with tablets and smartphones. Career path Internal Auditor - £30-50k/year. External Auditor - £35-50k/year. Audit Manager - £40-70k/year. Risk Manager - £40-70k/year. Compliance Officer - £30-50k/year. Fraud Investigator - £25-45k/year. Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course (Leadership and InfluencingSkills) absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The de.livery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost
Learn how to find broken links, bad tags and many more uses of SEO audit tool through our SEO Audit with Screaming Frog course. The lucid contents of the course teach you how an audit tool exponents your whole site and create a spreadsheet of all your pages. Teaching you the basic function of SEO tools, it enables you how to recognize duplicate content, issue a report, create XML sitemaps, scrutinize broken backlinks, and fix site errors. It also guides you to learn a webpage crawling, and Frog SEO Spider using system to create a list of your internal pages. Frog SEO tracks the crawl level, keyword elements, export your data to spreadsheet, measure file size, justify page depth, find replica pages with duplicate content and organize outlinks and inlinks to any given URL. What you'll learn You'll learn the basics to SEO (Search Engine Optimization) You'll learn how to how to use Screaming Frog SEO Spider You'll learn how to perform an SEO Audit You'll learn how to analyze broken backlinks You'll learn how to identify duplicate content You'll learn how to fix site errors You'll learn how to issue a report You'll learn how to crawl a website You'll learn how to examine the .htaccess for issues & compatability You'll learn how to analyse page data like titles, meta & descriptions You'll learn how to generate XML sitemaps You'll learn how to meta robots text You'll learn how to audit hreflang attributes Requirements You should know how to use a PC at a beginner level Screaming Frog SEO Spider (FREE Version at least) Who is the target audience? Online Marketers Everyone with a Website SEO Marketers & Engineers Brick & Mortar Businesses Everyone with a Product Video Producers who want to rank their videos higher in Google Link Builders Bloggers Content Creators who want to get more traffic from their work Module: 01 Starting Your SEO Audit 00:47:00 SEO Audit Software Walkthrough 01:02:00 Keyword Planner 00:08:00 Free Keyword Research Tool 00:06:00 Paid Keyword Research Tool 00:07:00 Module: 02 WordPress Fastest Cache Settings 00:05:00 Yoast Real-Time Analysis for Any Site 00:02:00 WordPress Cache Speed Test 00:01:00 Real-Time Ranking Case Study 00:08:00 All In One SEO Plugin 00:03:00 Course Certification
Level 5 QLS Endorsed Course with FREE QLS Certificate | CPD Accredited | 150 CPD Points | Lifetime Access