• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5594 Awareness courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

IPAF - Harness Awareness

By Kingfisher Access

The theory assessment provides delegates with the essential knowledge to select, monitor, manage and plan the correct use of Harnesses and lanyards for use in a MEWP. Delegates successfully completing the e-learning will: Have an awareness of how to correctly identify and select the appropriate form of personal protection against falls from MEWPs. Have a theoretical awareness only of how to check, use, maintain and store a harness and lanyard with manufacturer’s instructions. Have a theoretical awareness of how harnesses and lanyards should be fitted and adjusted.

IPAF - Harness Awareness
Delivered Online1 hour, May 19th, 08:00 + 228 more
£75

ECS Labourers Card

By MJ Electrical Training

MJ Electrical Training offers a one-day online course for a Health & Safety Exemption, which can be used when applying for an ECS Labourers card. ECS (Electrotechnical Certification Scheme) is a card scheme for electrotechnical operatives in the UK. The ECS Labourer card is designed for those working in a supporting role within the electrotechnical industry.

ECS Labourers Card
Delivered Online & In-PersonFull day, May 20th, 06:30 + 9 more
£174

Mandatory Refresher Training

4.8(40)

By EF Training & Consultancy Ltd

Health & Safety, PPE Covid COSHH & RIDDOR Equality & Diversity, Human Rights Infection Control Food Safety Information Governance Data Protection (GDPR) Records Management Fraud & Bribery Conflict Resolution Lone Worker Moving & Handling level 2(practical covered) Fire Safety Freedom of Information Safeguarding Adult & Children level 3 Radicalisation Slips Trips & Falls Your Healthcare Career Person Centred Care Duty of Care Consent Communication Privacy & Dignity Complaints Handling BLS –CPR & Choking for Adults and Children (practical covered) Mental Capacity Act—DoLS Mental Health Act

Mandatory Refresher Training
Delivered In-Person in LondonFull day, May 20th, 08:00 + 8 more
£72

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites * CompTIA Network+ Certification 1 - SECURITY AND RISK MANAGEMENT * Security Governance Principles * Compliance * Professional Ethics * Security Documentation * Risk Management * Threat Modeling * Business Continuity Plan Fundamentals * Acquisition Strategy and Practice * Personnel Security Policies * Security Awareness and Training 2 - ASSET SECURITY * Asset Classification * Privacy Protection * Asset Retention * Data Security Controls * Secure Data Handling 3 - SECURITY ENGINEERING * Security in the Engineering Lifecycle * System Component Security * Security Models * Controls and Countermeasures in Enterprise Security * Information System Security Capabilities * Design and Architecture Vulnerability Mitigation * Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems * Cryptography Concepts * Cryptography Techniques * Site and Facility Design for Physical Security * Physical Security Implementation in Sites and Facilities 4 - INFORMATION SECURITY MANAGEMENT GOALS * Organizational Security * The Application of Security Concepts 5 - INFORMATION SECURITY CLASSIFICATION AND PROGRAM DEVELOPMENT * Information Classification * Security Program Development 6 - RISK MANAGEMENT AND ETHICS * Risk Management * Ethics 7 - SOFTWARE DEVELOPMENT SECURITY * Software Configuration Management * Software Controls * Database System Security 8 - CRYPTOGRAPHY * Ciphers and Cryptography * Symmetric-Key Cryptography * Asymmetric-Key Cryptography * Hashing and Message Digests * Email, Internet, and Wireless Security * Cryptographic Weaknesses 9 - PHYSICAL SECURITY * Physical Access Control * Physical Access Monitoring * Physical Security Methods * Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered Online6 days, May 20th, 13:00 + 9 more
£3395

L 3: Conflict Management Course

5.0(6)

By Learn More Academy Ltd

About This Course:  Our Level 3 Deliverer of Conflict Management Course is tailored for individuals aspiring to become trainers in the security industry. It's designed for those proficient in basic lesson planning, presentation, and classroom delivery, with a keen understanding of security sectors like SIA Security, Door Supervision, or CCTV Public Surveillance. Entry Requirements: Candidates must be 18 and possess teaching qualifications such as Level 3 AET or Level 3 PTLLS. Course Assessment: Assessment involves demonstrating and submitting a portfolio assignment upon course completion. Course Cost: The Level 3 Deliverer of Conflict Management Course costs £300.00, with no hidden fees. Book Now: Secure your spot by booking over the phone at 02071937669 or 01615194328 or online via full payment or deposit. Visit our offices or send a cheque or bank transfer to Learn More Academy Ltd. Corporate Booking: Discounts are available for group bookings. Contact us for more information. Have Questions? Contact us at 02071937669 or 01615194328, or email us at training@learnmoreacademy.co.uk. Our dedicated staff are here to assist you.

L 3: Conflict Management Course
Delivered In-PersonFull day, May 20th, 09:00 + 4 more
£300

CompTIA Security+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. LESSON 1: SUMMARIZE FUNDAMENTAL SECURITY CONCEPTS * Security Concepts * Security Controls LESSON 2: COMPARE THREAT TYPES * Threat Actors * Attack Surfaces * Social Engineering LESSON 3: EXPLAIN CRYPTOGRAPHIC SOLUTIONS * Cryptographic Algorithms * Public Key Infrastructure * Cryptographic Solutions LESSON 4: IMPLEMENT IDENTITY AND ACCESS MANAGEMENT * Authentication * Authorization * Identity Management LESSON 5: SECURE ENTERPRISE NETWORK ARCHITECTURE * Enterprise Network Architecture * Network Security Appliances * Secure Communications LESSON 6: SECURE CLOUD NETWORK ARCHITECTURE * Cloud Infrastructure * Embedded Systems and Zero Trust Architecture LESSON 7: EXPLAIN RESILIENCY AND SITE SECURITY CONCEPTS * Asset Management * Redundancy Strategies * Physical Security LESSON 8: EXPLAIN VULNERABILITY MANAGEMENT * Device and OS Vulnerabilities * Application and Cloud Vulnerabilities * Vulnerability Identification Methods * Vulnerability Analysis and Remediation LESSON 9: EVALUATE NETWORK SECURITY CAPABILITIES * Network Security Baselines * Network Security Capability Enhancement LESSON 10: ASSESS ENDPOINT SECURITY CAPABILITIES * Implement Endpoint Security * Mobile Device Hardening LESSON 11: ENHANCE APPLICATION SECURITY CAPABILITIES * Application Protocol Security Baselines * Cloud and Web Application Security Concepts LESSON 12: EXPLAIN INCIDENT RESPONSE AND MONITORING CONCEPTS * Incident Response * Digital Forensics * Data Sources * Alerting and Monitoring Tools LESSON 13: ANALYZE INDICATORS OF MALICIOUS ACTIVITY * Malware Attack Indicators * Physical and Network Attack Indicators * Application Attack Indicators LESSON 14: SUMMARIZE SECURITY GOVERNANCE CONCEPTS * Policies, Standards, and Procedures * Change Management * Automation and Orchestration LESSON 15: EXPLAIN RISK MANAGEMENT PROCESSES * Risk Management Processes and Concepts * Vendor Management Concepts * Audits and Assessments LESSON 16: SUMMARIZE DATA PROTECTION AND COMPLIANCE CONCEPTS * Data Classification and Compliance * Personnel Policies ADDITIONAL COURSE DETAILS: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered Online5 days, May 20th, 15:00 + 26 more
£2475

HOSTILE ENVIRONMENT AWARENESS TRAINING - HEAT

5.0(3)

By Hostile Environment Training Ltd

COURSES EVERY WEEK THROUGHOUT EVERY YEAR -------------------------------------------------------------------------------- COURSE OVERVIEW. DURATION: 3 DAY (09:00 - 18:00) COST: £1250 PER PERSON LOCATION: HAMPSHIRE OUR EVER POPULAR, CERTIFICATED AND ACCREDITED 3 DAY COURSE WAS DESIGNED FOR TRAVELLERS FROM ALL SECTORS, FROM MEDIA PROFESSIONALS, CHARITIES AND INTERNATIONAL NON GOVERNMENT ORGANISATIONS, FINANCIAL INSTITUTIONS TO OIL, GAS AND UTILITIES WORKERS, WHO FIND THEMSELVES WORKING IN UNFAMILIAR AND OFTEN HOSTILE LOCATIONS. No previous training or experience is required to attend this course, which has been structured to enable individuals and groups to transit to and work in a country or region whilst being aware of the inherent risks and dangers present and more importantly the steps that can be taken to avoid and deal with the situations they may be presented with. The focus at HET is to ensure that our delegates are able to get the job done, whilst having an appreciation for the risks and threats associated with travel to elevated risk environments, this ranges from bombings and vehicle related incidents to high risk kidnap situations. The remote medical training provided on the course is of high priority and provides the traveller with the knowledge and practical skills to save lives in remote locations.  Our highly experienced instructors are drawn from a range of backgrounds and ensure that the training delivered is extremely practical, current and most importantly relevant to ensure that the work gets done and everyone gets home safe. Unsure if this is the right course for you? Get in touch with our team to help you choose the best course for your needs. -------------------------------------------------------------------------------- COURSE ELEMENTS. * THREAT RISK ASSESSMENT AND MITIGATION * FIRST AID TRAINING * KIDNAP AND HOSTAGE * VEHICLE SAFETY AND SECURITY * LANDMINE AND IED’S * WEAPON FAMILIARISATION * NAVIGATION TECHNIQUES * RADIO AND VOICE COMMUNICATIONS * CONFLICT MANAGEMENT

HOSTILE ENVIRONMENT AWARENESS TRAINING - HEAT
Delivered In-Person in Andover3 days, May 21st, 08:00 + 14 more
£1250

Certified Information Security Manager (CISM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification. Overview Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Identify and manage information security risks to achieve business objectives. Create a program to implement the information security strategy. Implement an information security program. Oversee and direct information security activities to execute the information security program. Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents. In this course, students will establish processes to ensure that information security measures align with established business needs. Prerequisites Information security governance Information risk management Information security program development Information security program management Incident management and response 1 - INFORMATION SECURITY GOVERNANCE * Develop an Information Security Strategy * Align Information Security Strategy with Corporate Governance * Identify Legal and Regulatory Requirements * Justify Investment in Information Security * Identify Drivers Affecting the Organization * Obtain Senior Management Commitment to Information Security * Define Roles and Responsibilities for Information Security * Establish Reporting and Communication Channels 2 - INFORMATION RISK MANAGEMENT * Implement an Information Risk Assessment Process * Determine Information Asset Classification and Ownership * Conduct Ongoing Threat and Vulnerability Evaluations * Conduct Periodic BIAs * Identify and Evaluate Risk Mitigation Strategies * Integrate Risk Management into Business Life Cycle Processes * Report Changes in Information Risk 3 - INFORMATION SECURITY PROGRAM DEVELOPMENT * Develop Plans to Implement an Information Security Strategy * Security Technologies and Controls * Specify Information Security Program Activities * Coordinate Information Security Programs with Business Assurance Functions * Identify Resources Needed for Information Security Program Implementation * Develop Information Security Architectures * Develop Information Security Policies * Develop Information Security Awareness, Training, and Education Programs * Develop Supporting Documentation for Information Security Policies 4 - INFORMATION SECURITY PROGRAM IMPLEMENTATION * Integrate Information Security Requirements into Organizational Processes * Integrate Information Security Controls into Contracts * Create Information Security Program Evaluation Metrics 5 - INFORMATION SECURITY PROGRAM MANAGEMENT * Manage Information Security Program Resources * Enforce Policy and Standards Compliance * Enforce Contractual Information Security Controls * Enforce Information Security During Systems Development * Maintain Information Security Within an Organization * Provide Information Security Advice and Guidance * Provide Information Security Awareness and Training * Analyze the Effectiveness of Information Security Controls * Resolve Noncompliance Issues 6 - INCIDENT MANAGEMENT AND RESPONSE * Develop an Information Security Incident Response Plan * Establish an Escalation Process * Develop a Communication Process * Integrate an IRP * Develop IRTs * Test an IRP * Manage Responses to Information Security Incidents * Perform an Information Security Incident Investigation * Conduct Post-Incident Reviews

Certified Information Security Manager (CISM)
Delivered Online4 days, May 21st, 13:00 + 6 more
£1995

Conflict Resolution - The Classroom Edition

4.8(8)

By Mindful Sparks

Join our dynamic and insightful Conflict Resolution workshop, designed to equip everyone with effective strategies for handling and navigating conflicts in the educational environment with more self-awareness, objectivity and compassion.

Conflict Resolution - The Classroom Edition
Delivered Online1 hour 30 minutes, May 21st, 10:00
£50

HOSTILE ENVIRONMENT FIRST AID TRAINING - HEFAT

5.0(3)

By Hostile Environment Training Ltd

COURSES EVERY WEEK THROUGHOUT EVERY YEAR -------------------------------------------------------------------------------- COURSE OVERVIEW. DURATION: 4 DAY (09:00 - 18:00) COST: £1500 PER PERSON LOCATION: HAMPSHIRE THIS 4 DAY HEFAT COURSE IS WITHOUT DOUBT THE HIGHEST LEVEL OF HOSTILE ENVIRONMENT TRAINING AVAILABLE Hostile Environment First Aid Training (HEFAT) has been designed for those operating or working in hostile or elevated risk environments who require an advanced level of medical training. The skills taught on the HEAT course are taken to the next level by training delegates how to deal with more complex levels of medical conditions and trauma first aid training coupled with practical training in the use of advanced medical equipment and techniques. In line with all of our benchmark courses HEFAT ensures that travellers from all backgrounds are prepared for the widest possible threat levels across the widest field of environments and situations. Delegates leave aware of potential risks and confident that they have the skills and knowledge to deal with immediate and developing situations. No previous training or qualifications are required to attend this course. Unsure if this is the right course for you? Get in touch with our team to help you choose the best course for your needs. -------------------------------------------------------------------------------- COURSE ELEMENTS. * THREAT RISK ASSESSMENT AND MITIGATION * ADVANCED TRAUMA AND FIRST AID TRAINING * KIDNAP AND HOSTAGE * VEHICLE SAFETY AND SECURITY * POST TRAUMATIC AND ENVIRONMENTAL STRESS * LANDMINE AND IED’S * NAVIGATION TECHNIQUES * WEAPON FAMILIARISATION * CONFLICT MANAGEMENT * RADIO AND VOICE COMMUNICATION

HOSTILE ENVIRONMENT FIRST AID TRAINING - HEFAT
Delivered In-Person in Andover4 days, May 21st, 08:00 + 15 more
£1500

Educators matching "Awareness"

Show all 2915
Awareness Matters Ltd

awareness matters ltd

Sudbury

Cathy is based in Suffolk, but travels widely across the UK and internationally with Awareness Matters running commissioned workshops and training for multi-agency professionals, counsellors/psychotherapists, from both statutory and voluntary organisations on issues related to domestic violence & abuse. Cathy has 24 years experience as a therapist and is a registered MBACP Senior Accredited Counsellor and Supervisor with the British Association of Counselling and Psychotherapy adhering to the BACP Code of Ethics. Cathy values working therapeutically with both clients and supervisees and enjoys the unique learning process that therapy provides. Cathy has a particular interest in the traumatic impact of domestic and sexual abuse. Cathy is Chair of Trustees for the charity Compassion – addressing domestic abuse and providing long term support to victims and families. To learn more about the work of Compassion please view the short film below or visit www.compass-ion.org Cathy is an experienced facilitator for therapeutic group work for survivors of domestic and sexual abuse and has provided group supervision for teams of facilitators and therapists for many years. Cathy has managed various specialist therapeutic service provisions including Southend Women’s Aid, SOS Domestic Abuse Projects and Lighthouse Women’s Aid, Ipswich. For many years Cathy sat on the DV Hate Crime Scrutiny Panel addressing domestic abuse prosecutions for the Suffolk Crown Prosecution Service and continues to provide consultancy for organisations. Cathy is enthusiastic and passionate about her work in the arena of domestic abuse, but when not working Cathy enjoys time with her family, walking, gardening, travel and catching up with friends.