• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3818 Courses in Cardiff delivered Live Online

AZ-500T00 Microsoft Azure Security Technologies

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data. This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization?s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations. Prerequisites AZ-104T00 - Microsoft Azure Administrator Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model. Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods. Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information. Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI. 1 - Manage identities in Microsoft Entra ID Secure users in Microsoft Entra ID Secure groups in Microsoft Entra ID Recommend when to use external identities Secure external identities Implement Microsoft Entra Identity protection 2 - Manage authentication by using Microsoft Entra ID Configure Microsoft Entra Verified ID Implement multifactor authentication (MFA) Implement passwordless authentication Implement password protection Implement single sign-on (SSO) Integrate single sign-on (SSO) and identity providers Recommend and enforce modern authentication protocols 3 - Manage authorization by using Microsoft Entra ID Configure Azure role permissions for management groups, subscriptions, resource groups, and resources Assign built-in roles in Microsoft Entra ID Assign built-in roles in Azure Create and assign a custom role in Microsoft Entra ID Implement and manage Microsoft Entra Permissions Management Configure Microsoft Entra Privileged Identity Management Configure role management and access reviews by using Microsoft Entra Identity Governance Implement Conditional Access policies 4 - Manage application access in Microsoft Entra ID Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants Manage app registrations in Microsoft Entra ID Configure app registration permission scopes Manage app registration permission consent Manage and use service principals Manage managed identities for Azure resources Recommend when to use and configure a Microsoft Entra Application Proxy, including authentication 5 - Plan and implement security for virtual networks Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs) Plan and implement User-Defined Routes (UDRs) Plan and implement Virtual Network peering or gateway Plan and implement Virtual Wide Area Network, including secured virtual hub Secure VPN connectivity, including point-to-site and site-to-site Implement encryption over ExpressRoute Configure firewall settings on PaaS resources Monitor network security by using Network Watcher, including NSG flow logging 6 - Plan and implement security for private access to Azure resources Plan and implement virtual network Service Endpoints Plan and implement Private Endpoints Plan and implement Private Link services Plan and implement network integration for Azure App Service and Azure Functions Plan and implement network security configurations for an App Service Environment (ASE) Plan and implement network security configurations for an Azure SQL Managed Instance 7 - Plan and implement security for public access to Azure resources Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management Plan, implement, and manage an Azure Firewall, Azure Firewall Manager and firewall policies Plan and implement an Azure Application Gateway Plan and implement an Azure Front Door, including Content Delivery Network (CDN) Plan and implement a Web Application Firewall (WAF) Recommend when to use Azure DDoS Protection Standard 8 - Plan and implement advanced security for compute Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access Configure network isolation for Azure Kubernetes Service (AKS) Secure and monitor AKS Configure authentication for AKS Configure security for Azure Container Instances (ACIs) Configure security for Azure Container Apps (ACAs) Manage access to Azure Container Registry (ACR) Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption Recommend security configurations for Azure API Management 9 - Plan and implement security for storage Configure access control for storage accounts Manage life cycle for storage account access keys Select and configure an appropriate method for access to Azure Files Select and configure an appropriate method for access to Azure Blob Storage Select and configure an appropriate method for access to Azure Tables Select and configure an appropriate method for access to Azure Queues Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage Configure Bring your own key (BYOK) Enable double encryption at the Azure Storage infrastructure level 10 - Plan and implement security for Azure SQL Database and Azure SQL Managed Instance Enable database authentication by using Microsoft Entra ID Enable and monitor database audit Identify use cases for the Microsoft Purview governance portal Implement data classification of sensitive information by using the Microsoft Purview governance portal Plan and implement dynamic mask Implement transparent data encryption? Recommend when to use Azure SQL Database Always Encrypted 11 - Plan, implement, and manage governance for security Create, assign, and interpret security policies and initiatives in Azure Policy Configure security settings by using Azure Blueprint Deploy secure infrastructures by using a landing zone Create and configure an Azure Key Vault Recommend when to use a dedicated Hardware Security Module (HSM) Configure access to Key Vault, including vault access policies and Azure Role Based Access Control Manage certificates, secrets, and keys Configure key rotation Configure backup and recovery of certificates, secrets, and keys 12 - Manage security posture by using Microsoft Defender for Cloud Implement Microsoft Defender for Cloud Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory Assess compliance against security frameworks and Microsoft Defender for Cloud Add industry and regulatory standards to Microsoft Defender for Cloud Add custom initiatives to Microsoft Defender for Cloud Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud Identify and monitor external assets by using Microsoft Defender External Attack Surface Management 13 - Configure and manage threat protection by using Microsoft Defender for Cloud Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS Configure Microsoft Defender for Servers Configure Microsoft Defender for Azure SQL Database Manage and respond to security alerts in Microsoft Defender for Cloud Configure workflow automation by using Microsoft Defender for Cloud Evaluate vulnerability scans from Microsoft Defender for Server 14 - Configure and manage security monitoring and automation solutions Monitor security events by using Azure Monitor Configure data connectors in Microsoft Sentinel Create and customize analytics rules in Microsoft Sentinel Configure automation in Microsoft Sentinel Additional course details: Nexus Humans AZ-500T00 Microsoft Azure Security Technologies training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-500T00 Microsoft Azure Security Technologies course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-500T00 Microsoft Azure Security Technologies
Delivered OnlineFlexible Dates
£2,380

M.D.D DATING ADVICE FOR WOMEN HAVING PROBLEMS WITH THEIR HUSBAND’S PACKAGE (DATING ADVICE FOR WOMEN)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

Talk through problems in the marriage Advice on steps to take moving forward Person-centred and psychodynamic counselling Relationship skills training Objective communication training Marriage training Education on the four pillars of marriage 8 sessions https://relationshipsmdd.com/product/dating-advice-for-women-having-problems-with-their-husbands-package/

M.D.D DATING ADVICE FOR WOMEN HAVING PROBLEMS WITH THEIR HUSBAND’S PACKAGE (DATING ADVICE FOR WOMEN)
Delivered in London or UK Wide or OnlineFlexible Dates
£1,000

Adobe Illustrator Basic to Intermediate Training

By London Design Training Courses

Why Learn Adobe Illustrator Basic to Intermediate Training Course? Course Link With our Illustrator Intermediate Course take your vector graphics to the next level and bring your designs to life with advanced techniques and tools. Gain hands-on skills in creating shapes, patterns, and logos, and learn how to edit images with precision. Duration: 6 hrs. Method: 1-on-1 - Personalized attention Schedule: Schedule by pre-booking a convenient hour of your choice, available from Mon to Sat between 9 am and 7 pm. This course covers fundamental tools and features of Adobe Illustrator, aimed at beginners, to enable them to create and edit vector graphics efficiently and effectively. Adobe Illustrator is the industry-leading vector graphic software for working with vector graphics, providing a comprehensive set of tools for producing exceptional graphics for various media, including print, video, web, and mobile devices. Course Title: Adobe Illustrator  Course Outline: Mastering Advanced Drawing Techniques  In-Depth Curvature Tool Mastery Advanced Pen Tool Usage: Drawing Complex Paths Understanding Path, Anchor Points, and Handles Precision Editing with Direct Selection Tool Slicing and Dividing Paths using Scissors and Knife Tools Exploring Advanced Stroke and Path Options  Custom Width Profiles with the Width Tool Diverse Brushes Exploration in Brush Library Creating Scattered Objects with Scatter Brushes Applying Patterns along Paths with Pattern Brushes Crafting Custom Pattern Brushes Understanding Graphic Styles  Efficient Usage of Graphic Style Libraries Creating, Deleting, and Saving Graphic Styles with Graphic Style Panel Leveraging the Power of Graphic Styles Mastering Pattern Manipulation Techniques  Creating and Editing Patterns using Pattern Mode Modifying Pattern Elements with Precision Adjusting Spacing and Resizing Patterns using the Tile Tool Rectifying Background Errors with Overlap Options Saving and Exporting Custom Patterns Exploring Advanced Gradient Options  Gradient Styles Exploration Fine-Tuning Gradients with the Gradient Annotator Creating Free Transform Gradient Points and Lines Applying Single Gradient across Multiple Objects Gradient and Transparency Integration Creative Applications and Practical Projects  Applying Advanced Techniques to Real-World Projects Creative Problem-Solving Strategies Q&A Session and Feedback Gathering Note: Each section includes practical exercises and hands-on projects to reinforce learning. The course emphasizes practical application, ensuring participants leave with tangible skills and a deep understanding of advanced Adobe Illustrator concepts. Q: What will I learn in the London Design Training Course in Adobe Illustrator? A: In this course, you'll learn essential techniques for creating and editing vector graphics using Adobe Illustrator. The training covers drawing tools, shapes, layers, effects, styles, logo design, Image Trace, Live Paint, and integration into your design workflow. Q: What can I expect to achieve after completing the Illustrator training course? A: By the end of the course, you'll be proficient in Illustrator tools, create graphics for print, web, and mobile, design logos with special effects, and manipulate images. You'll receive an accredited Illustrator training certification and post-course support. Q: Is any prior knowledge of Illustrator required to attend the course? A: No, the course is designed for beginners, and no prior knowledge of Illustrator is necessary. Q: Which version of Illustrator will the training be based on? A: The training is primarily based on Illustrator 2023, but the techniques apply to recent releases. Q: Can I attend the course on either a Windows or Mac computer? A: Yes, Illustrator works identically on both Windows and Mac. Our training centers offer both platforms for your convenience.

Adobe Illustrator Basic to Intermediate Training
Delivered in London or OnlineFlexible Dates
£180

FAMILY CIRCLES

By Inclusive Solutions

Click to read more about this training, in which we demonstrate a live problem solving approach which is based on the active participation of family members. Course Category Inclusion Parents and Carers Behaviour and relationships Problem Solving Description In this training we demonstrate a live problem solving approach which is based on the active participation of family members. ‘Family Circles’ is an evolving new approach to problem solving with families and is based on our years of family work and the development and use of the Circle of Adults process. Inspired by our own Parent Solutions work and the Circle of Adults process as well as Family Group Conferencing and other Restorative Interventions we bring you Family Circles. Essentially the approach involves gathering a family together for a process that is facilitated but majors on the family members offering each other their wisdom and ideas. The approach is capacity focused, person centred approach to working with families rather than the dominant deficit oriented and ‘medical model’ of viewing and planning for or doing things to families. This training can be modelled with a group of professionals or better still with a family. In our work with families we develop the importance of naming stories or theories and seeking linkages and synthesis between what is found out and explored about the family situation and its history. We like participants to sit with the uncertainty, to reflect on the question ‘why’ but without judgement of each other. Deeper reflections may span a whole range of perspectives from ‘within person’ considerations, to situational or systemic possibilities. Health or emotional issues can be reflected on alongside organisational or transactional aspects of what is going on for the family. The better the shared understanding the better the strategy or actions which emerge from these meetings. Quality hypotheses with a close fit to reality lead to more effective implementation in the real world. We encourage ‘loose’ thinking, a search for connections, deeper listening, an ‘open mind’, speculation and exploration without moral judgements. From this stance self-reflection as well as reflection on the situation can produce remarkable insights. The quality of theories or new stories generated is directly influenced by family members’ experiences and the models of learning, behaviour and emotion, systems, educational development, change and so on that they have been exposed to.  Learning Objectives To provide opportunities for: Shared problem solving in a safe exploratory climate in which the family will find its own solutions. Individuals to reflect on their own actions and strategies An exploration of whole-family processes and their impact Emotional support and shared understandings of issues at a child, parent, family, school and community level. Feed back to each other on issues, ideas and strategies that are agreed to be worth sharing with them. Who Is It For? Anyone interested in working with families in a way that builds and makes use of their capacities rather than focus on their challenges and difficulties. Social Care teams School staff Community organisers Educational Psychologists Course Content True family empowerment Deepening shared stories and understandings Facilitating groups Problem solving process Handling family group communication Allowing direct feedback and challenge between participants in a safe way Building relationships Process: Family members are welcomed: Introductions are carried out, ground rules and aims clarified whilst coffee is drunk. A recap from the last session is carried out: To follow up developments and reflections after the last meeting. One issue is selected for the main focus Issue presentation: The family member who raised the concern is asked questions to tell the ‘story’ of the issue or problem. Additional questions/information from the group about the problem are gathered: Ground rules may need to be observed carefully here. Individual participants need to be kept focused and prevented from leaping to premature conclusions or to making ‘helpful’ suggestions about strategy. Relationship aspects to the problem are explored. Metaphors and analogies are invited. How would a fly on the wall see your relationship? If you were alone together on a desert island, what would it be like? Impact of previous relationships/spillage from one relationship to another are explored. Eg what situation they are reminded of? For instance, does this situation remind you of any of those angry but helpless feelings you had with your other son when he was an adolescent? This provides opportunities to reflect on how emotions rub off on other people. The parent feels really frustrated, and on reflection we can see that so does the child System/Organisation factors (Family system/school and community systems and so on): What aspects help or hinder the problem? For instance, does the pastoral system of the local school provide space, or time and skilled personnel able to counsel this young person and work actively with their parents? Synthesis. At this stage the Graphic facilitator summarises what they have heard. They then go on to describe linkages and patterns in what they have heard. This can be very powerful. The person doing the graphic work has been able to listen throughout the presentation process and will have been struck by strong messages, emotions and images as they have arisen. The story and meaning of what is happening in the situation may become a little clearer at this point. Typical links may be ‘mirrored emotions’ strong themes such as loss and separation issues, or repeated processes such as actions triggering rejection. This step provides an excellent grounding for the next process of deepening understanding. What alternative strategies/interventions are open to be used? Brainstormed and recorded. ’Either/ors’ need to be avoided at this time also. This needs to be a shared session in which the family member who is presenting the concern contributes as much as anyone. Care is needed to ensure that this person is not overloaded with other people’s strategies. The final selection of strategy or strategies from the brainstormed list is the problem presenter’s choice. Strategies might include: a special time for the young person, a meeting with the child’s parents to explore how she is being managed at home and to share tactics, a home-school diary, counselling, or an agreed action plan that all are aware of, agreed sanctions and rewards and so forth. Strategies may productively involve processes of restitution and restoration, when ‘sorry’ is not enough. Making it right, rather than punishments or rewards, may then becomes the focus. First Steps. The problem presenter is finally asked to agree one or two first steps which they can carry out over the next 3-7 days. It can help to assign a ‘coach’ who will check in with them to ensure they have carried out the action they have named. This is a time to be very specific. Steps should be small and achievable. The person is just ‘making a start’. A phone call, or making an agreement with a key other person not present at the meeting would be ideal examples. Final reflections. Sometimes referred to as a ‘round of words’ help with closure for all involved. Reflections are on the process not the problem. In large families this is best done standing in a circle. In smaller groups all can remain sitting. Passing around a ‘listening stick’ or something similar such as a stone or light heighten the significance of the process ending and improve listening. Finally the problem presenter is handed the ‘Graphic’ this is their record of the meeting and can be rolled and presented ceremoniously by the facilitators for maximum effect! If you liked this course you may well like: Parent Solutions

FAMILY CIRCLES
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

Writing Clear Business Communication: In-House Training

By IIL Europe Ltd

Writing Clear Business Communication: In-House Training This program is about learning about the writing process and covers the full spectrum of documents used when corresponding in the workplace. The ability to write effectively comes naturally to some people, but for the vast majority, it is a task often approached with a mixture of trepidation and dread. Effective writing seldom, if ever, 'magically materializes' on the spot. In reality, it is most often the product of planning, writing, and rewriting. This is why writing is called a process; it must go through a series of steps before it is clear and complete. This program is about learning about the writing process and covers the full spectrum of documents used when corresponding in the workplace. The ability to write effectively comes naturally to some people, but for the vast majority, it is a task often approached with a mixture of trepidation and dread. However, the ability to communicate in the written word, for whatever purpose, is an important part of our working and personal lives and can have a direct impact on our ability to persuade, gain commitment or agreement and enhance understanding. Good writing sounds like talking on paper, which is why this program is focused on getting the message across and achieving the desired results using the 'keep it simple and direct' approach. What you Will Learn At the end of this program, you will be able to: Write effective e-mails, letters, memos, and reports Clearly articulate the message Achieve desired results from correspondence Organize content for maximum impact Format for enhanced understanding Choose the appropriate communication medium for each document Revise documents to increase clarity and impact Foundations Concepts Business writing as a form of professional communication How business writing compares to other forms of writing Characteristics of good business writing Challenges with business writing The Project Environment Business writing in the project environment The concept of art, science, and optics of business writing Art Economy Precision Action Music Personality Science Purpose, simple, compound, and complex sentence structures Techniques to engage the reader Point of view: tone, attitude, and humor Organization: opening, body, and closing Support and coherence Optics Visual optics Sound optics Feel optics Effective optics Efficient optics Email Formal vs. informal emails Suggestions for improving email communication Instant and text messaging Reports Common types of reports created Formatting of reports Guidelines for meeting minutes Contracts Types of contracts Common agreements Procurement documents Templates, Forms, and Checklists Templates Forms Checklists Other Formatting Good Documentation Practices Good documentation practices Data integrity in business communication

Writing Clear Business Communication: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£495

GDPR Awareness Training

By Training Centre

  The GDPR came into effect in May 2018. This legislation is designed to guide organisations in their obligations relative to the processing of personal and sensitive data. About This Course   Organisations are required to comply with the GDPR regardless of their size of business. If you process 'personal data', there is a potential need to be compliant with the legislation. The scope of the GDPR considers how this information is collected, stored, used, transported, shared and disposed of. To ensure organisations' understand this obligation, this interactive one-day course considers both scoping and auditing of an organisations processing activities, as well as an understanding of compliance with GDPR.  Learning Outcomes; GDPR - what is it and how does it apply to us? Personal and sensitive data Lawful basis for processing Consent and the GDPR The Data Protection Act 2018 Data Subject rights The role of the ICO Data breach or Incident? Privacy by Design and by default GDPR Audit checklist Prerequisites   There are no prerequisites to attend this course, however all attendees are expected to have a basic understanding of the Data Protection principles. What's Included?   Refreshments & Lunch (Classroom courses only) Course Slide Deck Quizzes Who Should Attend?   The course is designed for any member of the organisation whose role includes processing personal data. Data Protection Officers, Information Security team members or Information Governance Leads who may also see benefit in attending. Accreditation Assessment    There is no exam with this course but delegates do receive a Course Attendance Certificate and an 8 hour CPD Certificate. Provided by   This course is Accredited by NACS and administered by the IECB

GDPR Awareness Training
Delivered OnlineFlexible Dates
£425

Total NTP and PTP for engineers

5.0(3)

By Systems & Network Training

NTP and PTP training course description This course looks at timing and synchronization as provided by NTP and PTP. Hands on sessions primarily involve using Wireshark to analyse the protocols. What will you learn Recognise the importance of timing and synchronisation. Explain how NTP works. Explain how PTP works. NTP and PTP training course details Who will benefit: Anyone using NTP or PTP but particularly relevant for those in the broadcast industry. Prerequisites: TCP/IP foundation for engineers Duration 1 day NTP and PTP training course contents Introduction Clock drift. Timing and synchronization. Importance in computing. Importance in broadcasting. NTP NTP versions, v0 to v4. Architecture. The intersection algorithm. Accuracy. Clock strata, Stratum 0, 1, 2 and 3. Protocol modes. Hands on NTP configuration More NTP NTP packet header. Timestamps. Variables in the header. Clock synchronization algorithm. SNTP. The Windows Time service. Hands on Wireshark and NTP analysis. PTP PTP v2, IEEE 1588. Architecture. Accuracy. Synchronization with PTP. Offset and delay. Hands on Analysing PTP packet flows. More PTP Ordinary clocks, boundary clocks, masters and grandmasters. PTP specific switch types. Hardware time stamping. SMPTE ST2059-2. PTP packet header. PTP domains. Best master clock algorithm. Hands on More Wireshark and PTP.

Total NTP and PTP for engineers
Delivered in Internationally or OnlineFlexible Dates
£967

WiFi demystified

5.0(3)

By Systems & Network Training

WiFi demystified training course description A concise overview aimed at less technical staff requiring an overview of WiFi networks. The course covers the technologies at a high level allowing delegates to discuss WiFi networks with others recognising the buzzwords used. The course will also allow the delegates to recognise the issues involved in planning and installing WiFi networks as well as securing them. What will you learn Recognise the different WiFi technologies available. Describe the architecture of WiFi networks including the role of Access Points. Recognise the distance limitations of WiFi networks. Describe the buzzwords used in WiFi. Recognise the security issues of WiFi networks. WiFi demystified training course details Who will benefit: Anyone working with WiFi networks. Prerequisites: None. Duration 1 day WiFi demystified training course contents Introduction When to use wireless, when to use wired, WiFi technologies: 802.11, 802.11a, 802.11b, 802.11g, 802.11n, WiFi speeds and distances, comparison to other wireless technologies, 802.15 (Bluetooth), 802.16 (WiMax). Simple WiFi networks Network cards, Antennae, Access Points, WiFi routers. Enterprise WiFi networks SSIDs, Multiple WiFi networks, Repeaters, Wireless bridges, Controller based access points, Wireless switches, Power Over Ethernet. RF site surveys Steps and techniques, tools, analysing the feasibility of WiFi, range, performance, roaming. Security How safe are WiFi networks? Encryption, Authentication, WEP WPA WPA2. 802.1x, EAP, RADIUS.

WiFi demystified
Delivered in Internationally or OnlineFlexible Dates
£967

PUPIL PARTICIPATION: LISTENING TO THE POWERFUL VOICE OF YOUNG PEOPLE

By Inclusive Solutions

Local authorities are being encouraged to seek the views of young people in relation to the services they receive. Schools and the whole range of support services (e.g. behaviour support, youth offending teams, social services, CAMHS etc.) are being expected to routinely ask young people for their views. This goes beyond involving young people in plans that concern them e.g care plans, individual education plans, pastoral support plans etc. Online Course now available via Teachable Platform – Ask the Children Learn at your own pace… lots of text and video support Course Category Peer Support Description Local authorities are being encouraged to seek the views of young people in relation to the services they receive. Schools and the whole range of support services (e.g. behaviour support, youth offending teams, social services, CAMHS etc.) are being expected to routinely ask young people for their views. This goes beyond involving young people in plans that concern them e.g care plans, individual education plans, pastoral support plans etc. This training will focus on how young people can be effectively engaged in giving their views and will present a model for use in evaluating services to young people based on the concept of resilience. This model enables young people to be clear about what has helped and hindered them in being able to overcome difficulties. It also provides a framework for evaluating the extent to which services are reducing risk and increasing protective factors to enable young people to develop the resilience. Testimonials ‘Yet again inspiring and opening more doors than I can go through’? ‘This opened a lot of avenues for thought and reflection. It will help me to help colleagues to see where they can improve practice to create a more inclusive environment within the whole school.’ ‘Some great ideas and restored my self belief! Fantastic’ Learning Objectives Strategies for engaging young people Knowledge and Understanding of resilience In relation to system and environmental factors Strategies for reducing risk and increasing protective factors In relation to Individual young people and services Evaluation framework for services to young people Who Is It For ? Youth offending teams Social services CAMHS Primary and secondary teachers Heads and Deputies SENCOs Learning Support and Guidance staff Advanced Skills Teachers Parents Local Authority Support Services Community Development workers Early Years and School based Practitioners Social work staff Health Services Course Content The course answers the questions : How can we truly involve pupils? Practically how do we go about listening to pupils views? What if we do not like what they tell us? How can we involve our most disaffected young people? Key themes Tools for engaging young people and gaining their views The concept of resilience System and environmental risk and protective factors that impact on young people’s resilience Reducing risk and Increasing protective factors Resilience planning for Individuals and services Evaluating services to young people If you liked this course you may well like: CIRCLES OF FRIENDS

PUPIL PARTICIPATION: LISTENING TO THE POWERFUL VOICE OF YOUNG PEOPLE
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

Taking Your Book To School 2023

By Isobel Kent

In this live course, I share my insights from my experience as a school librarian and governors’ clerk, into how teachers use children's books in the classroom, what they are looking for in school visits and how to prepare for them. I will be joined by voice coach, Cat Clancy, and confidence coach, Vie Portland.

Taking Your Book To School 2023
Delivered OnlineJoin Waitlist
£337.50 to £450