If you want your employees to improve their customer service skills and deliver an amazing experience to your customers, feel free to check out my Training course focusing on telephone etiquettes, communication and behaviours.
This one-day Suicide First Aid training course gives learners the knowledge and tools to understand that suicide is one of the most preventable deaths and some basic skills can help someone with thoughts of suicide stay safe from their thoughts and stay alive.
Our experienced trainer will provide competence assessment for the whole day. You need to book clients in for ear irrigation and you need a minimum number of clients which we will discuss with you upon booking. If travel is required within a 25 miles radius we will charge travel expenses on top of the fee we charge.
Gain the knowledge and skills to assess, manage, and support individuals with dysphagia through our comprehensive "Understanding Dysphagia and Safe Swallowing" course. Learn about its causes, assessment methods, and strategies for safe swallowing.
This course provides detailed safeguarding adults & children awareness, including essential knowledge in the recognition and reporting of abuse and neglect, procedures and responsibilities. This is for all workforce involved in Social Care from the health, public, independent, or voluntary sectors. This subject forms standard 10 & 11 in The Care Certificate.
Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.
With the recent pandemic, infection prevention and control has never been so important. This regulated and nationally recognised qualification provides learners with the opportunity to develop their knowledge of the principles of infection prevention and control, and how best to protect those around them. The QA Level 2 Award in Infection Prevention and Control (RQF) has been specifically designed for those who have a responsibility in infection prevention and control within their job roles, such as: care assistants, health care workers or other healthcare environments.
This course provides detailed safeguarding adults & children awareness, including essential knowledge in the recognition and reporting of abuse and neglect, procedures and responsibilities. This is for all workforce involved in Social Care from the health, public, independent, or voluntary sectors. This subject forms standard 10 & 11 in The Care Certificate.
This course will start by giving you an overview of some of the common types and causes of learning disabilities, characteristics and behaviours and how they affect people. We will consider which learning & behavioural strategies are appropriate and how using a person centred approach to care will get the best results and ensure that needs of the individual are effectively met. We also discuss overcoming the stigma attached to learning disabilities
This training is aimed at developing Person Centred Planning – for Local Authority, School or Multi Academy Trust professional teams. Parents and carers can also participate in this training. One day introduction to underlying values and practicalities of approach in schools – 100 people 2 Day skill training for 30 participants to learn PATH planning skills 1 day follow up after 3 months to problem solve issues and celebrate what achieved. Person Centred Planning (PCP) is a way of expressing a set of inclusive values through a unique range of tools and techniques. The most commonly used person centred tool with children is a PATH – and it shows these values in action. Why now? The Children and Families Act 2014 sets out clear principles for supporting and involving children and young people in all aspects of the support and planning of their special educational need. The Special Educational Needs and Disability Code of Practice: 0 – 25 years provides the statutory guidance relating to part 3 of the Children and Families Act 2014. Embedded in its principles is the need for a stronger focus on the participation of children, young people and their parents/carers in decision making at both individual and strategic levels. The use of Person Centred Approaches provides the opportunity to fulfil those principles. Working in this way ensures the CYP and their parents/carers are at the centre of all decision making and future planning. It provides an opportunity to engage directly with children and young people to discuss their needs, and plan how they can achieve the best possible outcomes. This should be integral to all planning for children and young people with Special Educational Need and Disability (SEND) throughout their lives. Education Health Care Planning processes are required to be truly person centred at every stage, including annual reviews, so understanding this way of working has never been more essential. Is this different to what we do already? This person-centred way of working offers a radical new approach to visualising planning, empowering and directly involving children and those that care about them throughout planning meetings and allowing for inclusive, creative methodology which builds on and challenges existing practice in schools. Core principles The focus of inclusive, person-centred working is first and foremost on ordinary needs and not solely on special needs. – Being somebody – Contributing by sharing gifts and capacities – Knowing people and having relationships – Having choice and control – Sharing ordinary places – being present in local spaces and having a valued role there The training is delivered by Inclusive Solutions who are Educational Psychologists with a national reputation for training and person centred planning with schools over the last 16 years. In this training, you will learn how to facilitate with a child, family, team or an organisation to think together around their preferred future or about a challenge or issue. Here is an opportunity to experience first-hand the person centred, futures planning tool – PATH (Pearpoint, Forest et. al. 1989). This course will provide participants with a practical introduction to person centred planning and approaches, including examples of best practice in using person centred approaches in schools. The course will explore the underlying values of person centred approaches, provide an introduction to the person centred planning tools and link this to national policy and guidance. Participants will gain: 1 Knowledge of person centred planning and approaches 2 An understanding of how person centred approaches can be used in schools 3 A basic knowledge of the person centred review process and where to find out more information 4 The skills to gather information about what is important to and for the children and young people they support 5 An understanding of PATH and situations in which this process could be used in school The course answers these questions: • What are person centred approaches? • How can we use person centred approaches in our school? • What is person centred thinking and how can it be used in schools? • How can we learn about what is important to and for the child or young person and share this information? • How can we make sure that the child is at the centre of their annual/transition review?