This one-day Suicide First Aid training course gives learners the knowledge and tools to understand that suicide is one of the most preventable deaths and some basic skills can help someone with thoughts of suicide stay safe from their thoughts and stay alive.
If you want your employees to improve their customer service skills and deliver an amazing experience to your customers, feel free to check out my Training course focusing on telephone etiquettes, communication and behaviours.
Our experienced trainer will provide competence assessment for the whole day. You need to book clients in for ear irrigation and you need a minimum number of clients which we will discuss with you upon booking. If travel is required within a 25 miles radius we will charge travel expenses on top of the fee we charge.
Gain the knowledge and skills to assess, manage, and support individuals with dysphagia through our comprehensive "Understanding Dysphagia and Safe Swallowing" course. Learn about its causes, assessment methods, and strategies for safe swallowing.
This course provides detailed safeguarding adults & children awareness, including essential knowledge in the recognition and reporting of abuse and neglect, procedures and responsibilities. This is for all workforce involved in Social Care from the health, public, independent, or voluntary sectors. This subject forms standard 10 & 11 in The Care Certificate.
Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.
With the recent pandemic, infection prevention and control has never been so important. This regulated and nationally recognised qualification provides learners with the opportunity to develop their knowledge of the principles of infection prevention and control, and how best to protect those around them. The QA Level 2 Award in Infection Prevention and Control (RQF) has been specifically designed for those who have a responsibility in infection prevention and control within their job roles, such as: care assistants, health care workers or other healthcare environments.
This course provides detailed safeguarding adults & children awareness, including essential knowledge in the recognition and reporting of abuse and neglect, procedures and responsibilities. This is for all workforce involved in Social Care from the health, public, independent, or voluntary sectors. This subject forms standard 10 & 11 in The Care Certificate.
This course will start by giving you an overview of some of the common types and causes of learning disabilities, characteristics and behaviours and how they affect people. We will consider which learning & behavioural strategies are appropriate and how using a person centred approach to care will get the best results and ensure that needs of the individual are effectively met. We also discuss overcoming the stigma attached to learning disabilities
Catheters are used to help when someone has difficulty urinating, this course aims to provide the learner with the knowledge on what may cause these difficulties, what their role will entail, infection control, equiptment, risks and complications associated with a catheter.