This course will help you and your staff become familiar with the role and responsibilities of the designated safeguarding lead in your organisation. It will develop both your competence and confidence in carrying out the role of Designated Safeguarding Lead (DSL). Formally known as Level 3
One-Day Course 10am - 4pm Updated Jan 2023 (Working Together to Safeguard Children (Jan 2021 Updated) & Keeping Children Safe in Education (2022)) This Course can also be run within your organisation for your staff group at a reduced rate, contact us for a quote or if you have any other questions about this course talk to an adviser now online: Online Live Customer Adviser What is the course about? This course will help you and your staff become familiar with the role and responsibilities of the designated safeguarding lead in your organisation. It will develop both your competence and confidence in carrying out the role of Designated Safeguarding Lead (DSL). Formally known as Level 3
Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.
Introducing Private Counselling Package: Personalized Support for Your Mental and Emotional Well-Being Are you looking for private and confidential support to address personal challenges, improve your emotional well-being, and enhance your overall quality of life? Miss Date Doctor’s Private Counselling Package offers you individualized sessions with experienced therapists who are dedicated to helping you navigate life’s difficulties and achieve personal growth. Private counselling provides you with a safe and supportive environment to explore your thoughts, feelings, and concerns without judgment. Our skilled therapists are committed to understanding your unique needs and providing you with personalized guidance to promote healing and positive change. Here’s how the Private Counselling Package can support you: Personalized Assessment: Our private counsellors will conduct a thorough assessment to gain a comprehensive understanding of your unique challenges and aspirations. Individualized Approach: Your counselling sessions will be tailored to address your specific concerns, ensuring that you receive the most relevant and effective support. Emotional Support: Our therapists provide a compassionate and empathetic space where you can freely express your feelings and experiences. Confidentiality: Private counselling ensures complete confidentiality, allowing you to discuss sensitive topics with confidence and peace of mind. Coping Strategies: We’ll equip you with practical coping strategies to manage stress, anxiety, and other emotional difficulties. Self-Exploration: Private counselling encourages self-discovery and personal growth, helping you gain insights into your thoughts, behaviours, and motivations. Goal Setting: Together with your counsellor, you’ll set achievable goals to work towards positive change and improved well-being. Flexible Sessions: Private counselling offers flexibility in scheduling sessions, making it convenient for your busy lifestyle. The Private Counselling Package at Miss Date Doctor is designed to provide you with personalized support and guidance on your journey to emotional well-being and personal growth. Our skilled therapists are committed to helping you overcome challenges, enhance your resilience, and lead a more fulfilling life. Invest in your mental and emotional health and take the first step towards positive change with the Private Counselling Package. Embrace the opportunity to explore your thoughts and feelings in a confidential and supportive environment. Let our experienced counsellors guide you towards a brighter and more empowered future. 3 x 1 hour https://relationshipsmdd.com/product/private-counselling-package/
Support and advice Confidentiality and directional advice Daily support Self-esteem building Domestic advice helpline assistance Help understanding individuals situation Progressive coaching Moving forward and finding true love 30 mins x 4 a week 4 weeks package https://relationshipsmdd.com/product/domestic-violence-support-package/
"Empower educators and healthcare professionals with evidence-based teaching strategies and practical assessment methods through our 'Promoting Best Practice in Teaching and Assessing Medicines Management' course. Ensure safe and competent medication administration practices among healthcare learners. Enroll now."
LTE Architecture and Protocols course description This course provides a comprehensive tour of the LTE architecture along with services provided and the protocols used. What will you learn Describe the overall architecture of LTE. Explain the information flows through LTE. Describe the LTE security. Describe LTE mobility management. Recognise the next steps for LTE. LTE Architecture and Protocols course details Who will benefit: Anyone working with LTE. Prerequisites: Mobile communications demystified Duration 3 days LTE Architecture and Protocols course contents Introduction History, LTE key features. The 4G ITU process. The LTE 3GPP specifications. Specifications. System Architecture LTE hardware architecture. UE architecture and capabilities. E-UTRAN and eNB. EPC, MME functions, SGW, PGW and PCRF. System interfaces and protocol stacks. Example information flows. Dedicated and default bearers. EMM, ECM, RRC state diagrams. Radio transmission and reception OFDMA, SC-FDMA, MIMO antennas. Air interface protocol stack. Logical, transport and physical channels. Frame and slot structure, the resource grid. Resource element mapping of the physical channels and signals. Cell acquisition, data transmission and random access. MAC, RLC, PDCP protocols. LTE spectrum allocation. Power-on procedures Network and cell selection. RRC connection establishment. Attach procedure, including IP address allocation and default bearer activation. LTE detach procedure. Security in LTE networks LTE security features, identity confidentiality, ciphering and integrity protection. Architecture of network access security in LTE. Secure key hierarchy. Authentication and key agreement procedure. Security mode command procedure. Network domain security architecture. Security associations using IKE and IPSec. Mobility management RRC_IDLE, RRC_CONNECTED. Cell reselection, tracking area updates. Measurement reporting. X2 and S1 based handovers. Interoperation with UMTS, GSM and non-3GPP technologies such as cdma2000. QoS, policy control and charging QoS in LTE, EPS bearers, service data flows and packet flows. The architecture and signalling procedures for policy and charging control. Data transport using GPRS, differentiated services and MPLS. Offline and online charging in LTE. Delivery of voice and text messages over LTE Difficulties and solutions for Voice over LTE. Architecture and call setup procedures for circuit switched fallback. Architecture, protocols and call setup procedures in IP multimedia subsystem. Enhancements in release 9 LTE location services. Multimedia broadcast / multicast service and MBSFN. Cell selection, commercial mobile alert service. LTE Advanced and release 10 Impact of carrier aggregation on LTE air interface. Enhanced MIMO processing on uplink and downlink. Relaying. Release 11 and beyond. OAM and self organising networks Operation, administration, maintenance and provisioning for LTE. Self-configuration of base station parameters. Fractional frequency re-use, inter-cell interference co-ordination. Self-optimisation of base station procedures. Self-healing to detect and recover from faults.
CWISA training course description This CWISA course covers wireless technologies with reference to IoT. It examines from an IoT perspective how wireless works, and is an excellent introduction to IoT for the wireless engineer. Topics range from wireless technologies, RF, to mobile networks, IoT, and security. What will you learn Describe wireless networking and IoT technologies. Explain basic RF communications. Plan wireless solutions. Describe how to implement wireless solutions. Use best practices in implementing wireless solutions. CWISA training course details Who will benefit: Anyone working with IoT technologies. Prerequisites: RF fundamentals. Duration 4 days CWISA training course contents Introduction to wireless technologies History of wireless, radio waves and frequencies, wireless technologies and related components, common components of wireless solutions, LAN networking requirements, Network security, Implementing wireless solutions, staging, documentation, security updates, Industry organizations, IEEE, compatibility and certification groups. Wireless network use cases Wireless BANs, Wireless PANs, Wireless LANs, Wireless MANs, Wireless WANs, Wireless sensor networks, New network driver-Internet of Things, IoT for industry (IIoT), IoT for connected vehicles, Residential environments, Retail, Education (K12), Higher education, Agriculture, Smart cities / Public access, Health care, Office buildings, Hospitality, Industry, Stadiums, arenas, and large public venues. Planning wireless solutions Identifying use cases and applications, common wireless requirements and constraints, performing a wireless system design, selecting and evaluating design parameters. RF communications RF wave characteristics, RF propagation behaviours, RF signal metrics, fundamentals of wireless modulation. other wireless carriers, common frequency bands. Radio frequency hardware Hardware levels, basic RF hardware components (circuit board level), RF link types (use category). RF device types. Mobile communications networks Mobile networks, LTE, 5G, Use cases. Short-range, low-rate, and low-power networks RF and speed, RF and range, RF and power, 802.11, 802.15.4, Bluetooth, LoRa (Long range) / LoRaWAN, ZigBee, 6LoWPAN, NB-IoT and LTE-M. Wireless sensor networks What is a Wireless Sensor Network (WSN)? WSN applications, Sensors and actuators, WSN architectures, Planning a WSN. Internet of Things (IoT) Internet of Things (IoT) defined, IoT history and its definition revisited, one more comment on the definition of IoT, IoT verticals, Oil & Gas, IoT structure/ architecture basics, IoT connected objects. Securing wireless networks Confidentiality, integrity and availability, Privacy, non-repudiation, authenticity & safety, Importance of authentication in wireless networks, Key cryptographic technologies & concepts, Authentication methods, Authorisation, OAuth 2.0 authorisation framework, monitoring. Troubleshooting wireless solutions Proper solutions design, designing and implementing wireless solutions, basic installation procedures, general configuration considerations, troubleshooting and remediation, troubleshoot common problems in wireless solutions. Programming, scripting and automation What is an API? categories of APIs, common API communication methods, choosing a language, why are we integrating systems? Application & integration architectures. Data structures & types, XML, YAML, API types.
Cavitation, also known as Ultrasound Cavitation, is a treatment that has been around for a number of years now, as a non-surgical alternative to liposuction for the reduction of Fat. Cavitation uses ultrasound waves to break down the excess fat. We call it the 'non-surgical liposuction' because there is no need for anesthesia, no pain, no incision and no recovery time. The ultrasound waves are delivered through the surface of the skin via an ultrasound probe. Cavitation can be dangerous if not used correctly due to the depth of penetration of the ultrasound beam but with the correct training and understanding safe practices can be used to ensure great results to remove excess fat without the need for surgery. Cavitation can also be used in the treatment of cellulite, skin tightening and stretch marks. Cavitation is a great treatment on its own but can also be combined with other treatments to increase its effectiveness such as Radio-frequency for skin tightening and Shock-wave therapy for cellulite. Course prerequisites Minimum 18 years of age Good command of English Be able to learn independently Course structure You are required to complete 20 hours of theory study via our accessible e-learning portal and 5 practical hours onsite. All courses are kept intimate with a maximum of 6 learners in a class. Areas covered within the course: Core knowledge Health and safety and data protection Confidentiality, privacy Hygiene and sterilisation Equipment maintenance and set-up Cellulite and full understanding Body types and fat tissue Fat assessment including BMI Candidates for cavitation Cellulite History of ultrasound and uses Principle of cavitation Objections and how it works Benefits of cavitation Consultation, contra-indications, skin sensitivity, treatment times, safety, risk, side effects, recovery and aftercare Live demo