Asbestos Awareness training is a legal requirement for any worker who may encounter asbestos during their work. Modules will provide relevant and detailed knowledge about the dangers of asbestos, the products that contain asbestos, what it looks like, where it may have been used and the practical steps that can be taken to reduce their risk of exposure. In addition to common mandatory modules, learners will also choose a selection of modules relevant to their occupational pathway.
Asbestos Awareness training is a legal requirement for any worker who may encounter asbestos during their work. Modules will provide relevant and detailed knowledge about the dangers of asbestos, the products that contain asbestos, what it looks like, where it may have been used and the practical steps that can be taken to reduce their risk of exposure. In addition to common mandatory modules, learners will also choose a selection of modules relevant to their occupational pathway.
This very practical one-day programme provides participants with the skills and knowledge required to be an effective member of the procurement team and to enable them to procure a wide range of resources for the organisation, in a compliant and cost-effective manner. It also empowers them to be able to collaborate with all key stakeholders. By the end of the programme participants will be able to: Understand the basic concepts of good procurement practice Apply a range of tools and techniques for developing scopes of work and specifications Apply various methods to select and evaluate suppliers Develop robust contract award strategies Appreciate the commercial importance of effective procurement and opportunities to reduce cost and add value Develop appropriate procurement strategies depending on risk and value Appreciate the legal aspects of procurement 1 Welcome Introductions Aims and objectives Plan for the day 2 The basics of procurement The concept of total cost of ownership v price The procurement cycle The roles of the customer and the contractor Impact upon profit 3 Specification process Importance of effective specifications Specification development process Types of specification Team approach Use of performance specifications Early supplier involvement (ESI) / early contractor involvement (ECI) 4 Quality Concepts and practices Defining 'fit for purpose' Conformance to requirements Compliance to standards Role of the supplier Quality assurance tools and techniques 5 Procurement methods RFP RFQ ITT Negotiated procurement Strategic partnerships Outsourcing 6 Tendering How to undertake a formal tendering process Business case to award Critical stages in the process Risks and benefits 7 Tender evaluation How to undertake a quotation analysis Tools of analysis Use of VFM models Role of the customer Comparisons around cost, quality, and delivery 8 Supplier selection and evaluation Developing critical selection criteria Using the 10Cs model Importance of effective selection process Weighting systems Importance of validity and evidence 9 Capital equipment procurement Life cycle cost issues Payback calculations Compatibility issues Maintenance and training issues After-sales support 10 Supplier relationships Corporate social responsibility issues Communication 360 feed-back Open and ethical Initial understanding Clear and fair terms and conditions 11 Close Review of key learning points Personal action planning
This 1 hour on-line training seminar provides an opportunity for employers, HR managers, supervisors, and team leaders to learn how domestic abuse can impact on an employee and the business as well as the next steps to support your staff and protect your business.
Level 2 HACCP RSPH Training Course
Duration 3 Days 18 CPD hours This course is intended for This course is recommended for technical professionals who perform advanced deployment configurations of Check Point products. Overview Provide an overview of the upgrade service and options available. Explain how to perform management upgrade and migration. Articulate the process using CPUSE features. Articulate the purpose and function of Management High Availability. Explain Primary vs Secondary, Active vs Standby and Synchronization. Explain disaster recovery steps in case the primary management server becomes unavailable. Provide overview of Central Deployment in SmartConsole. Articulate an understanding of Security Gateway cluster upgrade methods. Explain about Multi Version Cluster (MVC) upgrades. Discuss Gaia Commands and how they are used. Explain the main processes on s and s. Describe how to work with scripts and SmartTasks to configure automatic actions. Explain the Management Data Plane Separation (MDPS) Explain kernel operations and traffic flow Articulate Dynamic and Updatable Objects in Security Gateways Explain the policy installation flow and files used. Describe the use of policy installation history. Explain concurrent and accelerated install policy. Describe an overview of APIs and ways to use and authenticate. Explain how to make changes in GAIA and management configuration. Explain how to install policy using API. Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance. Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance. Articulate how utilizing multiple traffic queues can make traffic handling more efficient. Discuss Site-to-Site VPN basics, deployment and communities. Describe how to analyze and interpret VPN tunnel traffic. Explain Link Selection and ISP Redundancy options. Explain tunnel management features. Discuss Check Point Remote Access solutions and how they differ from each other. Describe how client security can be provided by Remote Access . Explain authentication methods including machine authentication. Explain Multiple Entry Point (MEP). Discuss the Mobile Access Software Blade and how it secures communication and data exchange during remote connections. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. Course Outline Prepare for a Security Management Server Upgrade Upgrade the Security Management Server Deploy a Secondary Security Management Server Configure a Distributed Log Server Upgrade a Security Gateway from SmartConsole Work with the Command Line Use Scripts and SmartTasks Configure Dynamic Objects Monitor Traffic Verify Policy Installation and Status Work with Gaia and Management APIs Work with Acceleration Features Configure a Locally Managed Site to Site VPN Configure a Site to Site VPN with an Interoperable Device Configure Remote Access VPN Configure Mobile Access VPN Configure a High Availability Cluster Work with ClusterXL Configure Policy Compliance Deploy SmartEvent
Spill Management Training Course Overview This Spill Management Training course provides a comprehensive understanding of how to effectively manage and respond to spill incidents in various settings. Covering a range of topics, from hazardous substances and pollution response planning to spill clean-up and prevention, the course prepares learners to handle spill incidents with confidence. Through clear guidelines and site-specific solutions, the course ensures that learners are equipped to minimise environmental impact, reduce risks, and comply with relevant regulations. Learners will gain valuable skills in spill management, safety practices, and regulatory compliance, ensuring a safer work environment. Course Description The Spill Management Training course delves deeper into key areas essential for spill management, including hazardous substances identification, response strategies, and effective clean-up methods. Learners will explore pollution incident response planning, spill management techniques for different environments, and site-specific pollution control options. Each module is designed to offer valuable insights into best practices for spill prevention and control, while encouraging a culture of responsibility and environmental awareness. By the end of the course, learners will have the skills to manage spills efficiently, ensuring safety and compliance within their workplace. Spill Management Training Curriculum Module 01: Introduction to Spill Management Module 02: Hazardous Substances Module 03: Pollution Incident Response Planning Module 04: Managing a Spill Module 05: Spill Clean-Up Guideline Module 06: Spills on a Road or Highway Module 07: Diesel Spillages: An Overview Module 08: Site-Specific Pollution Control Options Module 09: Spill Prevention & Control Checklist Module 10: Ways to Encourage Best Practice (See full curriculum) Who is this course for? Individuals seeking to enhance their environmental safety skills. Professionals aiming to specialise in spill management or environmental protection. Beginners with an interest in pollution control and safety procedures. Organisations requiring staff training in spill management and compliance. Career Path Environmental Health and Safety Officer Spill Response Coordinator Environmental Consultant Pollution Control Specialist Health and Safety Manager
Information Management Course Overview This Information Management course provides a comprehensive understanding of the principles and practices essential for effectively managing information in today’s data-driven world. It covers core topics such as strategic planning, databases, management information systems, and the auditing of information systems. The course is designed to enhance learners' understanding of how information can be efficiently organised, secured, and utilised for decision-making within organisations. Upon completion, learners will be equipped with the skills to manage data, ensure compliance with data protection laws, and address ethical and social issues surrounding information management. This course is ideal for individuals looking to advance their knowledge in information management and pursue a career in this dynamic field. Course Description The Information Management course explores critical aspects of managing data and information systems, offering in-depth insights into the processes and tools used in modern organisations. The course covers a broad range of topics, including developing information management strategies, understanding and implementing databases, and examining management information systems (MIS) for efficient decision-making. Learners will also gain knowledge of auditing information systems to ensure accuracy, integrity, and security. The ethical, legal, and social considerations of data protection and information governance are also discussed. Throughout the course, learners will engage with key theories and practices, preparing them to apply their knowledge to various industries, ensuring organisations meet legal requirements and maximise the value of their information assets. Information Management Curriculum Module 01: Introduction to Information Management Module 02: Information Management Strategy Module 03: Databases and Information Management Module 04: Management Information Systems (MIS) Module 05: Auditing Information Systems Module 06: Ethical and Social Issues and Data Protection (See full curriculum) Who is this course for? Individuals seeking to understand the principles of information management. Professionals aiming to enhance their knowledge of information governance and security. Beginners with an interest in data management and organisational systems. Anyone looking to develop skills for improving organisational efficiency and compliance. Career Path Data Analyst Information Manager Records Manager IT Compliance Officer Data Protection Officer Information Systems Auditor
Duration 0.5 Days 3 CPD hours This course is intended for This course is intended for: Line of Business (LoB) owners, IT leaders, and executives Overview In this course, you will learn to: Explain the role of information technology (IT) in an organization for business transformation Explain the customer value proposition for using the cloud across industries Define key characteristics of cloud computing Explain the cloud business model Identify key security practices of cloud computing Frame the cloud business value using the Cloud Value Framework In this course, you will learn the fundamental concepts of cloud computing and how a cloud strategy can help companies meet business objectives. It explores the advantages and possibilities of cloud computing. It also introduces addresses concepts such as security and compliance to help facilitate better discussions with line of business (LOB) professionals, information technology (IT) LoB, IT leaders, and executives. Module 1: Course Introduction Course Introduction Module 2: Information Technology for Business Transformation Role of IT in an organization for business transformation Brief history of IT Legacy approach to IT What drives customers to move from traditional infrastructure to the cloud Module 3: Cloud Computing Define cloud computing Key characteristics of cloud technology The cloud business model Key security practices within the cloud Module 4: Business Value of the Cloud The customer value proposition Identify who is using cloud computing Industry trends Customer examples Module 5: The Cloud Value Framework Introduction to the Cloud Value Framework Cost Savings Staff Productivity Operational Resilience Business Agility Module 6: Business Value Activity Business Value Activity Additional course details: Nexus Humans AWS Cloud Essentials for Business Leaders training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Cloud Essentials for Business Leaders course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Solutions architects, cloud engineers, including security engineers, delivery and implementation engineers, professional services, and Cloud Center of Excellence (CCOE) Overview In this course, you will learn to: Design and implement a secure network infrastructure Design and implement compute security Design and implement a logging solution Currently, the average cost of a security breach can be upwards of $4 million. AWS Security Best Practices provides an overview of some of the industry best practices for using AWS security and control types. This course helps you understand your responsibilities while providing valuable guidelines for how to keep your workload safe and secure. You will learn how to secure your network infrastructure using sound design options. You will also learn how you can harden your compute resources and manage them securely. Finally, by understanding AWS monitoring and alerting, you can detect and alert on suspicious events to help you quickly begin the response process in the event of a potential compromise. Module 1: AWS Security Overview Shared responsibility model Customer challenges Frameworks and standards Establishing best practices Compliance in AWS Module 2: Securing the Network Flexible and secure Security inside the Amazon Virtual Private Cloud (Amazon VPC) Security services Third-party security solutions Module 3: Amazon EC2 Security Compute hardening Amazon Elastic Block Store (EBS) encryption Secure management and maintenance Detecting vulnerabilities Using AWS Marketplace Module 4: Monitoring and Alerting Logging network traffic Logging user and Application Programming Interface (API) traffic Visibility with Amazon CloudWatch Enhancing monitoring and alerting Verifying your AWS environment Additional course details: Nexus Humans AWS Security Best Practices training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Security Best Practices course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.