THIS COURSE PACKAGE INCLUDES: 1: INTRODUCTION TO ECG COURSE - RECORDING & BASIC INTERPRETATION (GPT009) 2: ADVANCED ECG COURSE - INTERPRETATION & ANALYSIS (GPT010) Learn how to set up and record a basic ECG trace, followed by advanced analysis and interpretation FAST-TRACK YOUR ECG TRAINING WITH OUR BEGINNER TO ADVANCED TRAINING PACKAGE 20% off - Multi-Course Discount Cover all stages from Level 1 through to Level 4 (FDSc) Cover your theory training online Practical training in Classroom or Virtual Classroom Comprehensive Practise@Home training kits for VC Awards 2 accredited qualifications Dual Accreditations are awarded for all courses (Open College Network and CPD) Covers all steps required to competently set up and perform an ECG trace. Practical sessions include electrode placement on mannequin, running traces and identifying anomalies. Learn beginner to advanced skills and interpretation. Basic understanding of English language required. OPEN TO ALL APPLICANTS About these courses 1: INTRODUCTION TO ECG COURSE - RECORDING AND BASIC INTERPRETATION (GPT009) PART 1 - Theory Allow approx. 5-6 hours PART 2 - Practical Training Attend a classroom location or join us in our virtual classroom * - 3-4 hours ACCREDITED LEVEL 3 QUALIFICATION * Virtual Classroom option includes a free comprehensive Practise@Home ECG training kit. 2: ADVANCED ECG COURSE - INTERPRETATION AND ANALYSIS (GPT010) E-LEARNING - Theory Allow approx. 6-8 hours ACCREDITED LEVEL 4 QUALIFICATION OPTIONAL: GETTING STARTED IN ECG (GPT002) A free starter ECG Course (unassessed) developed to help you understand the basics of ECG recording: 3 modules in total with no Questions! If you are already familiar with ECGs then you may prefer to save time and opt out of this mini-course at booking stage. This "mini-course" is available at no charge. Learning Outcomes GPT009: Understanding different ECG equipment types ECG equipment - set-up and calibration Includes professionalism, consent, IPC and legal requirement Patient preparation How to correctly apply electrodes to limbs and chest Identify artifacts (equipment and patients Identify and recognise routine traces Identify and recognise non-routine traces Identify traces requiring urgent attention Labelling and reporting GPT010: Understand the acceptable variations within the normal ECG of healthy adults. Recognise the expected patterns of an ECG from a healthy child from birth onwards and identify abnormalities. Interpret abnormal ECG patterns in adults. Diagnose arrhythmias as an underlying cause of palpitations and syncope. Exploring sinus rhythm, extrasystoles, paroxysmal tachycardia and the importance of a physical examination. Identifying syncopal episodes attributable to cardiovascular disease as opposed to arrhythmias. Recognise ECG markers for tachycardias, bradycardias, pre-excitation syndromes, bi-fascicular block, and first-degree block with bundle branch block. Differentiate between supraventricular and ventricular extrasystoles and be able to diagnose broad complex tachycardias, ventricular flutter and fibrillation, sick sinus syndrome, and Stokes-Adams attacks. Recognise and identify symptoms associated with the causes of acute or chronic chest pain in patients who present with myocardial infarction (heart attack), pulmonary embolism, significant central pulmonary embolism, pericarditis, aortic dissection, oesophageal rupture, spinal disorders, vertebral collapse, posterior infarction, and angina. Recognise symptoms indicative of conditions such as pulmonary oedema, chest diseases, and pulmonary congestion. After the course GPT009: Safely and competently set up an ECG machine Introduce patients to the ECG test, adhering to compliancy requirements before and after testing Perform an ECG test to national guidelines Understand basic traces and their correlation to cardiac issues Recognise normal and erroneous recordings Recognise recordings that require urgent medical follow-up Complete the recording and label (or record digital copies) as per guidelines GPT010: Appreciate normal and abnormal ECG variations in the context of varying pathologies. Be able to determine whether an arrhythmia has an underlying cause that requires medical intervention. Interpret ECGs as a function of the patient's ongoing cardiac management. Understand and apply the Burce Protocol exercise test in relevant clinical situations. Know how to clinically respond to a patient with chest pain including further investigations required, pain relief, history and examination and echocardiogram. Understand and apply the fundamental principles of arrhythmia management. Understand the primary causes of heart disease and the diagnostic process. Appreciate the importance of the ECG as a diagnostic tool alongside the patient’s history and clinical presentation and recognising its limitations. Course Package Components: PACKAGE - Beginner to Advanced ECG - Virtual Classroom - INTRO - Part 1 online Part 2 Virtual Classroom (AM) + ADVANCED - E-learning
The NCSP® 800-53 Practitioner accredited (APMG International), certified (NCSC/GCHQ-UK), and recognized (DHS-CISA-USA) certification course teaches Digital Business, Operational Stakeholders, Auditors, and Risk Practitioners a Fast-Track approach to adopting and adapting the NIST Cybersecurity Framework and its 800-53 controls across an enterprise and its supply chain.The course also teaches candidates how to build a Digital Value Management System (DVMS) CPD overlay model capable of enabling the quick adoption and adaption of new frameworks and models (NIST-CSF, NIST Privacy Framework, CMMC, etc.) that may be required to address internal, external (regulatory), and cyber threat landscape changes. Finally, the course teaches candidates how to ensure the organization's DVMS is designed for use within the organization and auditable by government regulators looking to verify regulatory outcomes. The NCSP Practitioner 800-53 course is designed for both the Implementer and Auditor topics and participants select the exam they want to take (or an additional exam can be ordered to be certified as both an implementer and auditor).
Duration 4 Days 24 CPD hours This course is intended for This course is designed for the aspiring or sitting upper-level manager striving to advance his or her career by learning to apply their existing deep technical knowledge to business problems. In this course, students will learn in-depth content in each of the 5 CCISO Domains Domain 01 - Governance Define, Implement, Manage, and Maintain an Information Security Governance Program Information Security Drivers Establishing an information security management structure Laws/Regulations/Standards as drivers of Organizational Policy/Standards/Procedures Managing an enterprise information security compliance program Risk Management Risk mitigation, risk treatment, and acceptable risk Risk management frameworks NIST Other Frameworks and Guidance (ISO 31000, TARA, OCTAVE, FAIR, COBIT, and ITIL) Risk management plan implementation Ongoing third-party risk management Risk management policies and processes Conclusion Domain 2 - Security Risk Management, Controls, & Audit Management INFORMATION SECURITY CONTROLS COMPLIANCE MANAGEMENT GUIDELINES, GOOD AND BEST PRACTICES AUDIT MANAGEMENT SUMMARY Domain 03 - Security Program Management and Operations PROGRAM MANAGEMENT OPERATIONS MANAGEMENT Summary Domain 04 - Information Security Core Concepts ACCESS CONTROL PHYSICAL SECURITY NETWORK SECURITY ENDPOINT PROTECTION APPLICATION SECURITY ENCRYPTION TECHNOLOGIES VIRTUALIZATION SECURITY CLOUD COMPUTING SECURITY TRANSFORMATIVE TECHNOLOGIES Summary Domain 05 - Strategic Planning, Finance, Procurement and Vendor Management STRATEGIC PLANNING Designing, Developing, and Maintaining an Enterprise Information Security Program Understanding the Enterprise Architecture (EA) FINANCE PROCUREMENT VENDOR MANAGEMENT Summary
Duration 5 Days 30 CPD hours This course is intended for The CCSP is ideal for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration. Overview Upon completing this course, the participants will gain valuable knowledge and skills including the ability to: - Successfully pass the CCSP exam. - Understand the fundamentals of the cloud computing architecture framework. - Understand security challenges associated with different types of cloud services. - Identify and evaluate security risks for their organization?s cloud environments. - Select and implement appropriate controls to ensure secure implementation of cloud services. - Thoroughly understand the 6 essential core domains of the CCSP common body of knowledge: 1. Architectural Concepts & Design Requirements 2. Cloud Data Security 3. Cloud Platform & Infrastructure Security 4. Cloud Application Security 5. Operations 6. Legal & Compliance The goal of the course is to prepare professionals for the challenging CCSP exam by covering the objectives of the exam based on the six domains as defined in the (ISC)2 CCSP common body of knowledge. 1 - Architectural Concepts and Design Requirements Cloud Computing Concepts Cloud Reference Architecture Cloud Computing Security Concepts Design Principles of Secure Cloud Computing Trusted Cloud Services 2 - Cloud Data Security CSA (Cloud Security Alliance) Cloud Data Lifecycle Cloud Data Storage Architectures Data Security Strategies Data Discovery and Classification Technologies Protecting Privacy and PII (Personally Identifiable Information) Data Rights Management Data Retention, Deletion, and Archiving Policies Auditability, Traceability, and Accountability of Data Events 3 - Cloud Platform and Infrastructure Security Cloud Infrastructure Components Cloud Infrastructure Risks Designing and Planning Security Controls Disaster Recovery and Business Continuity Management 4 - Cloud Application Security The Need for Security Awareness and Training in application Security Cloud Software Assurance and Validation Verified Secure Software SDLC (Software Development Life Cycle) Process Secure SDLC Specifics of Cloud Application Architecture Secure IAM (Identity and Access Management) Solutions 5 - Operations Planning Process for the Data Center Design Installation and Configuration of Physical Infrastructure for Cloud Environment Running Physical Infrastructure for Cloud Environment Managing Physical Infrastructure for Cloud Environment Installation and Configuration of Logical Infrastructure for Cloud Environment Running Logical Infrastructure for Cloud Environment Managing Logical Infrastructure for Cloud Environment Compliance with Regulations and Controls Risk Assessment for Logical and Physical Infrastructure Collection, Acquisition, and Preservation of Digital Evidence Managing Communication with Stakeholders 6 - Legal and Compliance Legal Requirements and Unique Risks within the Cloud Environment Relevant Privacy and PII Laws and Regulations Audit Process, Methodologies, and Required Adaptions for a Cloud Environment Implications of Cloud to Enterprise Risk Management Outsourcing and Cloud Contract Design Vendor Management
Enhance your dental practice's safety and compliance with our 3-hour CPD accredited Dental Practice Legionella Responsible Person Course. Designed for Practice Owners, Registered Managers, and Senior Infection Control Leads, this online course offers expert guidance on legionella management, aligning with HSE ACOP L8, HSG274 Part 2, HTM 04-01, and HTM01-05 standards. Gain advanced understanding and confidence in legionella prevention in dental settings. Receive a GDC-compliant CPD Certificate upon completion. Join our live sessions led by skilled instructors for a transformative learning experience in dental health and safety management.
Duration 5 Days 30 CPD hours This course is intended for This course is targeted toward an IT Professional that has the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. Students should have a minimum of 10 years experience including at least 5 years of hands-on technical security experience. Overview Upon successful completion of this course, students will be able to: Identify enterprise security fundamentals. Apply enterprise security technology solutions. Implement security design and solutions. Manage risk, policies and procedures within an enterprise. Integrate security solutions within an enterprise. Conduct security research and analysis. In this course, students will examine advanced security concepts, principles, and implementations that pertain to enterprise level security. Prerequisites CompTIA Cybersecurity Analyst (CySA+) Certification 1 - Enterprise Security Architecture The Basics of Enterprise Security The Enterprise Structure Enterprise Security Requirements 2 - Enterprise Security Technology Common Network Security Components and Technologies Communications and Collaboration Security Cryptographic Tools and Techniques Advanced Authentication 3 - Enterprise Resource Technology Enterprise Storage Security Issues Distributed, Shared, and Virtualized Computing Cloud Computing and Security 4 - Security Design and Solutions Network Security Design Conduct a Security Assessment Host Security 5 - Application Security Design Application Security Basics Web Application Security 6 - Managing Risk, Security Policies, and Security Procedures Analyze Security Risk Implement Risk Mitigation Strategies and Controls Implement Enterprise-Level Security Policies and Procedures Prepare for Incident Response and Recovery 7 - Enterprise Security Integration The Technology Life Cycle Inter-Organizational Change Integrate Enterprise Disciplines to Achieve Secure Solutions 8 - Security Research and Analysis Perform an Industry Trends and Impact Analysis Perform an Enterprise Security Analysis
Duration 5 Days 30 CPD hours This course is intended for The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to: Early-career IT professionals, IT managers, career changers, and career advancers Students and recent graduates Overview After completing this course, you will understand: Key concepts in cybersecurity, including information security and network security Information security threats, vulnerabilities, and attacks The different types of malware Identification, authentication, and authorization Network security controls Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management) Application security design and testing techniques Fundamentals of virtualization, cloud computing, and cloud security Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures Cryptography and public-key infrastructure Data security controls, data backup and retention methods, and data loss prevention techniques Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic The incident handling and response process Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation Concepts in business continuity and disaster recovery Risk management concepts, phases, and frameworks EC-Council?s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs. Course Outline Information Security Threats and Vulnerabilities Information Security Attacks Network Security Fundamentals Identification, Authentication, and Authorization Network Security Controls: Administrative Controls Network Security Controls: Physical Controls Network Security Controls: Technical Controls Network Security Assessment Techniques and Tools Application Security Virtualization and Cloud Computing Wireless Network Security Mobile Device Security Internet of Things (IoT) and Operational Technology (OT) Security Cryptography Data Security Network Troubleshooting Network Traffic Monitoring Network Log Monitoring and Analysis Incident Response Computer Forensics Business Continuity and Disaster Recovery Risk Management