This Health & Safety in the Care Sector Course works alongside, and helps, learners understand Standard 13 of the Care Certificate. This Standard touches on the legislation, policies & responsibilities relating to Health & Safety in the care sector, as well as looking at accidents and sudden illnesses.
Duration 5 Days 30 CPD hours This course is intended for IS Security Owners Security Officers Ethical Hackers Information Owners Penetration Testers System Owners and Managers Cyber Security Engineers Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the C)PEH exam. To protect an information system you need to be able to see that system through the eyes of the attacker.ÿThe Certified Professional Ethical Hackerÿcertification course is the foundational training to Mile2?s line of penetration testing courses because it teaches you to think like a hacker.ÿ Therefore, you can set up dynamic defenses to prevent intrusion. First, you will learn the value of vulnerability assessments.ÿ Then, you will discover how to use those assessments to make powerful changes in an information system?s security. Additionally, you will learn how malware and destructive viruses function and how to implement counter response and preventative measures when it comes to a network hack. Course Introduction Introduction to Ethical Hacking Linux Fundamentals Protocols Cryptography Password Cracking Malware Security Devices Information Gathering ? Passive Reconnaissance Social Engineering Active Reconnaissance Vulnerability Assessment Network Attacks Hacking Servers Hacking Web Technologies Hacking Wireless Technologies Maintaining Access and Covering Tracks
Duration 3 Days 18 CPD hours This course is intended for Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, Network Engineers, and Support Staff Overview The Palo Alto Networks Firewall 11.0: Troubleshooting course is three days of instructor-led training that will help you: Investigate networking issues using firewall tools including the CLI Follow proven troubleshooting methodologies specific to individual features Analyze advanced logs to resolve various real-life scenarios Solve advanced, scenario-based challenges Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern threats. Their approach identifies all network traffic based on applications, users, content and devices, and lets you express your business policies in the form of easy-to-understand security rules. Flexible deployment options and native integration with their next-generation security platform extend the policy enforcement and cyberthreat prevention to everywhere your users and data are located: in your network, on your endpoints and in the cloud. Course Outline Module 1 - Tools and Resources Module 2 - CLI Primer Module 3 - Flow Logic Module 4 - Packet Captures Module 5 - Packet-Diagnostics Logs Module 6 - Host-Inbound Traffic Module 7 - Transit Traffic Module 8 - System Services Module 9 - Certificate Management and SSL Decryption Module 10 - User-ID Module 11 - GlobalProtect Module 12 - Support Escalation and RMAs Module 13 - Next Steps
Discover effective new ways to: find out what the problem is, communicate with reluctant teens, discover their hidden strengths, promote positive behaviour change, improve their mental health – and much more… Accredited CPD Certificate: 6 hours Length: 1 day (9.15am - 4.00pm GMT) The best live online I have attended so far and I’ve done eight! Everything was relevant – completely spot onTEACHER / TUTOR Live Online – Join Richard Brook on Tuesday 19th March for this live online training event via Zoom. Simply book your place and we will email you details of how to join the Zoom workshop the day before. BONUS RECORDING – the training is recorded, in case anyone experiences technical difficulties on the day, so you will also get a recording for a limited time afterwards to maximise your learning. Why take this course This live online training event gives you the essential knowledge, tips and practical skills you need to help troubled teenagers unlock their potential and begin to build lives for themselves that work well. Tutor Richard Brook has a wealth of hands-on practical experience in adolescent mental health and social work which he draws on throughout the day – you will have plenty of time to ask questions and discuss how you can implement the skills and techniques in your own work or with the teens you care for. The programme is varied and intensive, yet lively with a strong focus on gaining skills. It clarifies what healthy teenage development looks like, why things can go wrong and the best ways to help young people overcome obstacles and begin to create lives for themselves that work well. Richard also shows how, by working with the ‘givens’ of human nature, and ensuring that sound knowledge of how people really function is applied intelligently to teenagers, you can speed up progress, reduce anti-social behaviour and teen depression, and bring young people real benefits. At the end of the day you will find yourself more empowered to respond effectively to each individual’s needs and temperament, whilst avoiding yourself the emotional pitfalls of working in stressful situations. Such a realistic and logical approach – it's given me lots of ideas for working with a variety of people, not just teenagers!PROBATION OFFICER What will you learn An increased understanding of what drives most problematic behaviour, including anti-social behaviour Essential knowledge and skills to deliver effective interventions to young people, both individually and in groups A deeper understanding of the causes of adolescent mental health problems Simple yet effective techniques for engaging uncommunicative young people, building rapport and promoting behavioural changes Constructive ways to help prevent teenage depression, anxiety and stress Four vital guiding principles that ensure your work with young people is relevant and effective Ways to motivate young people and help them set achievable goals How to discover and build upon a young person’s strengths and engage them in practical problem-solving Knowledge of how the insights from the human givens approach can dramatically improve interventions and their outcomes The opportunity to discuss how you could implement these in your own work with a highly knowledgeable tutor who has years of hands-on experience Also covered: The common misconceptions about adolescence What healthy teenage development looks like – this may bring you some surprises! A clear and logical foundation upon which to structure creative and effective interventions Ways to respond effectively to each individual’s needs, temperament and learning style How to avoid the emotional pitfalls of working in stressful situations An expanded repertoire of skills and a refined understanding of what works and – most importantly – why Course Programme The ‘How to help troubled and troublesome teenagers’ course starts at 9.15am and runs until 4.00pm. 9.15am Join the Zoom meeting 9.30am What’s the trouble? 11.00am Comfort break and discussion 11.30am How to communicate with teenagers 1.00pm Lunch break 1.45pm Practical problem solving 2.45pm Comfort break and discussion 3.00pm How to help them create a life that works well 4.00pm Day ends This course has been independently accredited by the internationally recognised CPD Standards Office for 6 hours of CPD training. On completion of this training you’ll receive CPD certificates from the College and the CPD Standards Office.
Understand the Mental Toughness model and look at how to improve your mental toughness with the 4c’s. Course overview Duration: 1 day (6.5 hours) Mental toughness is the ability to resist, manage and overcome doubts, worries, concerns and circumstances that prevent you from succeeding, or excelling at a task or towards an objective or a performance outcome that you set out to achieve. Our one day programme can help you to achieve this by using tools and techniques to help you perform under pressure and ensure your wellbeing. Objectives By the end of the course you will to: Identify the causes of stress and how to prevent them Assess your mental toughness using the MTQ48 measure Use tools and techniques to develop your mental toughness Content Understanding Stress, Pressure and Challenge The causes of stress How stress can manifest itself Threat response The Stress performance curve Stress, challenge and pressure Positive stress Mental Toughness, Stress Management and Resilience Defining stress management, resilience and mental toughness How they differ and how they affect each other Mental Toughness Understanding mental toughness The importance of mental toughness The benefits of developing your mental toughness The 4 Cs of Mental Toughness How we approach Challenge Control our emotions Develop Confidence Create Commitment MTQ48 Profile Understanding your MTQ48 profile Looking at your mental toughness Areas for development Developing Mental Toughness Managing physical energy to deal with stress Developing healthy habits for managing stress Multitasking and the ability to focus Identifying unhelpful thought patterns Positive and pragmatic thinking approaches Managing your approach to change and challenge Ways of developing mental toughness
All employees should be aware of and knowledgeable about health and safety in the workplace. This course is ideal for all staff and employees at all levels, providing them with the underpinning health and safety knowledge that they will require to work safely and efficiently on a daily basis.
Duration 3 Days 18 CPD hours This course is intended for Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks. Overview Deploy the appropriate operation mode for your network. Use the GUI and CLI for administration. Identify the characteristics of the Fortinet security fabric. Control network access to configured networks using firewall policies. Apply port forwarding, source NAT, and destination NAT. Authenticate users using firewall policies. Understand encryption functions and certificates. Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies. Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites. Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports. Fight hacking and denial of service (DoS). Defend against data leaks by identifying files with sensitive data, and block them from leaving your private network. Offer an SSL VPN for secure access to your private network. Implement a dial-up IPsec VPN tunnel between FortiGate and FortiClient. Collect and interpret log entries. In this three-day course, you will learn how to use basic FortiGate features, including security profiles. Course Outline Module 1. Introduction to FortiGate and the Security Fabric Module 2. Firewall Policies Module 3. Network Address Translation (NAT) Module 4. Firewall Authentication Module 5. Logging and Monitoring Module 6. Certificate Operations Module 7. Web Filtering Module 8. Application Control Module 9. Antivirus Module 10. Intrusion Prevention and Denial of Service Module 11. SSL VPN Module 12. Dial-Up IPsec VPN Module 13. Data Leak Prevention (DLP)
Diabetes is serious. It can be life-threatening, however, people with diabetes can live long, healthy lives if their condition is kept well-controlled. In this training course, we explain what diabetes is and what to look out for. We cover how it is diagnosed and how to provide care and support to a person living with diabetes.
Duration 4 Days 24 CPD hours This course is intended for Information Assurance Managers/Auditors System Implementors/administrators IT Administrators Auditors/Auditees Federal Agencies/Contractors Security Vendors and Consulting Groups Overview Upon completion, the IS20 Security Controls candidate will be able to not only competently take the IS20 Controls exam but will also have an understanding of how to implement the top 20 most critical controls in the work place. IS20 controls are the Top Twenty Most Critical Security Controls in Information Technology.ÿ This 4 day training course covers proven tools and methodologies needed to execute and analyze the Top Twenty Most Critical Security Controls. Nearly all organizations that maintain sensitive information are adopting these Security Controls. These controls were chosen by leading government and private organizations who are experts on how attacks work and what can be done to prevent them from happening. The controls were selected as the best way to block known attacks as well as help search for and alleviate any damage from the attacks that are successful. This course allows the security professional to see how to implement controls in an existing network through highly effective and economical automation. For management, this training is the best way to distinguish how you will assess whether these security controls are effectively being administered. Introduction Critical Control 1 Critical Control 2 Critical Control 3 Critical Control 4 Critical Control 5 Critical Control 6 Critical Control 7 Critical Control 8 Critical Control 9 Critical Control 10 Critical Control 11 Critical Control 12 Critical Control 13 Critical Control 14 Critical Control 15 Critical Control 16 Critical Control 17 Critical Control 18 Critical Control 19 Critical Control 20