• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

223 Courses in Cardiff delivered On Demand

Preventing Suicide Course

By Training Tale

Preventing Suicide course This Preventing Suicide course qualification aims to provide learners with an understanding of the scale and context of suicide in the United Kingdom. This Preventing Suicide course also teaches the learners the associated stigma and risk factors and increase their understanding that suicide is preventable. Through this Preventing Suicide course, the learners will consider how difficult situations affect mood and behaviour. Moreover, they will learn how this can lead to negative thoughts and feelings. Through this Preventing Suicide course, the learners will raise awareness of how suicidal thoughts can arise and identify those at risk of committing suicide. Learning Outcomes After completing this Preventing Suicide course, the learner will be able to: Gain a solid understanding of the context of suicide in the UK and the importance of suicide awareness. Understand different stressful situations an individual may face in their lives that may increase their suicidal thoughts. Understand stress vulnerability and how an individual's ability to cope influences their response to stressful situations and the likelihood of suicidal thoughts. Understand the impact stressful situations may have on an individual's mental health. Understand the importance of a conversation with an individual at risk of suicide. Know how to sign-post the individual to appropriate support and professional services. Why Choose Preventing Suicide Course from Us Self-paced course, access available from anywhere. Easy to understand, high-quality study materials. Course developed by industry experts. MCQ quiz after each module to assess your learning. Automated and instant assessment results. 24/7 support via live chat, phone call or email. Free PDF certificate as soon as completing the course. Preventing Suicide Course 01: Level 2 Award in Suicide Awareness Course 02: Introduction to Psychology Course 03: Child and Adolescent Mental Health Course Course 04: Level 5 Mental Health First Aid Certification Other Benefits of Preventing Suicide Free 4 PDF Certificate Lifetime Access Free Retake Exam Tutor Support [ Note: Free PDF certificate will provide as soon as completing the Preventing Suicide course] Preventing Suicide course Course Curriculum of- Preventing Suicide Module 1: Understanding Suicide Understand the context of suicide in the UK and the importance of suicide awareness Understand different stressful situations an individual may face in their lives that may increase their suicidal thoughts Understand stress vulnerability and how an individual's ability to cope influences their response to stressful situations and the likelihood of them having suicidal thoughts Understand the impact stressful situations may have on an individual's mental health, the use of helpful coping strategies and how the stressors (and unhelpful coping strategies) may lead to suicidal thoughts Understand the importance of a conversation taking place with an individual at risk of suicide. The learner will be able to identify solutions focused responses The learner will know how to sign-post the individual to appropriate support and professional services Assessment Method of Preventing Suicide course After completing each module of the Preventing Suicide course, you will find automated MCQ quizzes. To unlock the next module, you need to complete the quiz task and get at least 60% marks. Certification of Preventing Suicide course After completing the MCQ/Assignment assessment for this Preventing Suicide course, you will be entitled to a Certificate of Completion from Training Tale. The certificate is in PDF format, which is completely free to download. A printed version is also available upon request. It will also be sent to you through a courier for £13.99. Who is this course for? Preventing Suicide course This Preventing Suicide course is ideal for teachers, mental health workers, crisis helpline volunteers, support workers, individuals in a safeguarding role, parents or guardians, and others who work with individuals at increased risk of self-harm or suicide. Requirements Preventing Suicide course There are no specific requirements for this Preventing Suicide course because it does not require any advanced knowledge or skills. Students who intend to enrol in this Preventing Suicide course must meet the following requirements: Good command of the English language Must be vivacious and self-driven Basic computer knowledge A minimum of 16 years of age is required Career path Preventing Suicide course Teachers, mental health workers, crisis helpline volunteers, support workers, individuals in a safeguarding role, parents or guardians, and others working with individuals who may be at increased risk of self-harm or suicide may advantage from this Preventing Suicide course. Certificates Certificate of completion Digital certificate - Included

Preventing Suicide Course
Delivered Online On Demand33 hours
£12

CompTIA PenTest+ (Ethical Hacking)

4.9(27)

By Apex Learning

Overview This comprehensive course on CompTIA PenTest+ (Ethical Hacking) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA PenTest+ (Ethical Hacking) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA PenTest+ (Ethical Hacking). It is available to all students, of all academic backgrounds. Requirements Our CompTIA PenTest+ (Ethical Hacking) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 6 sections • 67 lectures • 10:48:00 total length •Introduction: 00:09:00 •Planning a Pen Test: 00:09:00 •Rules of Engagement: 00:11:00 •Resources and Budget: 00:07:00 •Impact and Constraints: 00:05:00 •Support Resources: 00:13:00 •Legal Groundwork: 00:12:00 •Scope Considerations: 00:11:00 •Lab Environment Setup: 00:23:00 •Project Strategy and Risk: 00:09:00 •Scope Vulnerabilities: 00:14:00 •Compliance-Based Assessments: 00:05:00 •Scanning and Enumeration: 00:05:00 •Scanning Demo: 00:11:00 •Packet Investigation: 00:08:00 •Packet Inspection Demo: 00:06:00 •Application and Open-Source Resources: 00:12:00 •Vulnerability Scanning: 00:09:00 •Vulnerability Scanning Demo: 00:17:00 •Target Considerations: 00:16:00 •Nmap Timing and Performance Options: 00:07:00 •Prioritization of Vulnerabilities: 00:09:00 •Common Attack Techniques: 00:12:00 •Credential Attacks: 00:15:00 •Weaknesses in Specialized Systems: 00:18:00 •Remote Social Engineering: 00:07:00 •Spear Phishing Demo: 00:10:00 •In-Person Social Engineering: 00:12:00 •Network-Based Exploits: 00:07:00 •FTP Exploit Demo: 00:08:00 •Man-in-the-middle Exploits: 00:07:00 •Wireless Exploits: 00:14:00 •Application Exploits, Part 1: 00:06:00 •SQL Injection Demo: 00:09:00 •Application Exploits, Part 2: 00:08:00 •Application Exploits, Part 3: 00:09:00 •Cross-Site Scripting Demo: 00:07:00 •Code Vulnerabilities: 00:17:00 •Local Host Vulnerabilities: 00:05:00 •Privilege Escalation (Linux): 00:10:00 •Privilege Escalation (Windows): 00:06:00 •Misc. Privilege Escalation: 00:08:00 •Misc. Local Host Vulnerabilities: 00:08:00 •Physical Security: 00:11:00 •Post-Exploitation Techniques: 00:11:00 •Persistence and Stealth: 00:11:00 •Nmap Scoping & Output Options: 00:21:00 •Pen Testing Toolbox: 00:07:00 •Using Kali Linux: 00:06:00 •Scanners & Credential Tools: 00:10:00 •Code-Cracking Tools: 00:05:00 •Open-Source Research Tools: 00:07:00 •Wireless and Web Pen Testing Tools: 00:11:00 •Remote Access Tools: 00:06:00 •Analyzers and Mobile Pen Testing Tools: 00:03:00 •Other Pen Testing Tools: 00:05:00 •Using Scripting in Pen Testing: 00:13:00 •Bash Scripting Basics: 00:15:00 •Bash Scripting Techniques: 00:10:00 •PowerShell Scripts: 00:04:00 •Ruby Scripts: 00:07:00 •Python Scripts: 00:06:00 •Scripting Languages Comparison: 00:11:00 •Writing Reports: 00:16:00 •Post-Report Activities: 00:06:00 •Mitigation Strategies: 00:05:00 •Communication: 00:10:00

CompTIA PenTest+ (Ethical Hacking)
Delivered Online On Demand10 hours 48 minutes
£12

Burp Suite Unfiltered - Go from a Beginner to Advanced

By Packt

Welcome to this course on Burp Suite that will help you progress from absolute zero to an advanced level. Together, we will explore how all the tools and tabs of the Burp Suite work and how we can use them effectively to our advantage. This complete hands-on course will help you ace Burp Suite with no prior hacking experience.

Burp Suite Unfiltered - Go from a Beginner to Advanced
Delivered Online On Demand6 hours 6 minutes
£82.99

The Complete Guide to Android Bug Bounty Penetration Tests

By Packt

Get hands-on with specialized tools to scan, attack, and decompile code.

The Complete Guide to Android Bug Bounty Penetration Tests
Delivered Online On Demand1 hour 51 minutes
£69.99

Learn Python and Ethical Hacking from Scratch

By Packt

This course is designed to help you understand the basic and advanced concepts of ethical hacking with ease. The course features interesting examples and coding activities in each video to keep you engaged and guides you effectively through writing programs to hack a system.

Learn Python and Ethical Hacking from Scratch
Delivered Online On Demand24 hours 35 minutes
£13.99

TACCP Training Course

4.9(27)

By Apex Learning

Overview This comprehensive course on TACCP Training Course will deepen your understanding of the food industry.After successful completion of this course you can acquire the required skills in this sector. This TACCP Training Course comes with accredited certification which will enhance your CV and make you worthy in the job market.So enrol in this course today to fast track your career ladder. How will I get my certificate? After successfully completing the course you will be able to order your certificate, these are included in the price. Who is this course for? There is no experience or previous qualifications required for enrolment on this TACCP Training Course . It is available to all students, of all academic backgrounds. Requirements Our TACCP Training Course  is fully compatible with PC's, Mac's, Laptop,Tablet and Smartphone devices. This course has been designed to be fully compatible on tablets and smartphones so you can access your course on wifi, 3G or 4G.There is no time limit for completing this course, it can be studied in your own time at your own pace. Career path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 7 sections • 7 lectures • 02:51:00 total length •An Introduction to TACCP: 00:27:00 •Food Safety Legislation: 00:31:00 •Food Threats: 00:24:00 •Understanding Risk, Threat, and Vulnerability: 00:15:00 •Food Fraud: 00:26:00 •An Overview of TACCP Process: 00:19:00 •TACCP Food Defence: 00:29:00

TACCP Training Course
Delivered Online On Demand2 hours 51 minutes
£12

CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations

4.3(43)

By John Academy

Description: This CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations will help you to understand the anatomy of cyber-attacks. You will gain the skills needed to serve your organizations before, during, and after a breach. A CyberSec First Responder is the first line of defence against cyber-attacks. You will be able to prepare to analyze threats, design secure computing and network environments, proactively defend networks and respond/investigate cybersecurity incidents. It covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a computer security incident response team (CSIRT), and more. So, learn to assess and respond to security threats and operating systems and network security analysis platform by taking this course. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Overview of Wireless Communications Identify the Importance of Risk Management FREE 00:11:00 Assess Risk 00:13:00 Mitigate Risk 00:22:00 Integrate Documentation into Risk Management 00:14:00 Analyzing the Threat Landscape Classify Threats and Threat Profiles 00:07:00 Perform Ongoing Threat Research 00:12:00 Resources that Aid in Research of Threats 00:03:00 Analyzing Recon Threats to Computing and Network Environments Implement Threat Modeling 00:09:00 Assess the Impact of Reconnaissance Incidents 00:10:00 Performing Reconnaissance on a Network 00:07:00 Examining Reconnaissance Incidents 00:08:00 Assess the Impact of Social Engineering 00:10:00 Assessing the impact of Social Engineering 00:07:00 Assessing the Impact of Phishing 00:03:00 Analyzing Attacks on Computing and Network Environments Assess the Impact of System Hacking Attacks 00:10:00 Cracking Passwords Using a Password File 00:08:00 Assess the Impact of Web Based Attacks 00:11:00 Assessing the Impact of Web-Based Threats 00:03:00 Assess the Impact of Malware 00:08:00 Malware Detection and Removal 00:05:00 Assess the Impact of Hijacking and Impersonation Attacks 00:13:00 Assess the Impact of DoS Incidents 00:09:00 Assessing the Impact of DoS Attacks 00:04:00 Assess the Impact of Threats to Mobile Security 00:08:00 Assess the Impact of Threats to Cloud Security 00:10:00 Analyzing Post-Attack Techniques Assess Command and Control Techniques 00:08:00 Assessing Command and Control Techniques 00:10:00 Assess Persistence Techniques 00:05:00 Detecting Rootkits 00:03:00 Assess Lateral Movement and Pivoting Techniques 00:13:00 Assess Data Exfiltration Techniques 00:04:00 Steganography 00:03:00 Assess Anti Forensics Techniques 00:09:00 Assessing Anti-Forensics 00:03:00 Evaluating the Organization's Security Posture Conduct Vulnerability Assessments 00:16:00 Perform a Vulnerability Scan with Nessus 00:07:00 Perform a Vulnerability Scan with MBSA 00:05:00 Conduct Penetration Tests on Network Assets 00:18:00 Follow Up on Penetration Testing 00:06:00 Collecting Cyber security Intelligence Deploy a Security Intelligence Collection and Analysis Platform 00:19:00 Collect Data from Network Based Intelligence Sources 00:15:00 Collecting Network-Based Security Intelligence 00:07:00 Collect Data from Host Based Intelligence Sources 00:13:00 Collecting Host-Based Security Intelligence 00:15:00 Parsing Log files 00:03:00 Analyzing Log Data Use Common Tools to Analyze Logs 00:22:00 Analyzing Linux Logs for Security Intelligence 00:08:00 Use SIEM Tools for Analysis 00:07:00 Incorporating SIEMs into Security Intelligence Analysis 00:18:00 Parse Log Files with Regular Expressions 00:25:00 Performing Active Asset and Network Analysis Analyze Incidents with Windows-Based Tools 00:17:00 Windows-Based Incident Analysis Tools 00:19:00 Analyze Incidents with Linux Based Tools 00:05:00 Linux-Based Incident Analysis Tools 00:07:00 Analyze Malware 00:11:00 Analyzing Malware 00:03:00 Analyze Indicators of Compromise 00:20:00 Analyzing Indicators of Compromise 00:15:00 Responding to Cyber security Incidents Deploy an Incident Handling and Response Architecture 00:22:00 Mitigate Incidents 00:16:00 Hardening Windows Servers 00:14:00 DNS Filtering 00:05:00 Blacklisting and Whitelisting 00:09:00 Prepare for Forensic Investigation as a CSIRT 00:03:00 Investigating Cyber security Incidents Apply a Forensic Investigation Plan 00:10:00 Securely Collect and Analyze Electronic Evidence 00:08:00 Securely Collecting Electronic Evidence 00:05:00 Analyzing Forensic Evidence 00:07:00 Follow Up on the Results of an Investigation 00:04:00 Mock Exam Mock Exam- CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations 00:20:00 Final Exam Final Exam- CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

CyberSec First Responder: Threat Detection and Response (Exam CFR-210)-Logical Operations
Delivered Online On Demand12 hours 7 minutes
£11.99

Cyber Security & Ethical Hacking

4.7(160)

By Janets

Register on the Cyber Security & Ethical Hacking today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The Cyber Security & Ethical Hacking is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Cyber Security & Ethical Hacking Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Cyber Security & Ethical Hacking, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Introduction to Ethical Hacking Hacking Terms 00:07:00 VA vs PT and Rule of Engagement 00:09:00 Methodologies 00:07:00 Type of Pen Testing 00:06:00 Phases of Penetration Test 00:04:00 10 Steps to Follow 00:04:00 Setting up a Penetration Testing Lab What is Linux OS - Benefits 00:04:00 What is Kali Linux 00:03:00 Virtual Box Installation 00:06:00 Kali Linux Installation in VB 00:12:00 Install Metasploitable on Virtual Box 00:09:00 Install DVWA in Kali 00:18:00 Install TOR 00:09:00 Executing Basic Commands in Kali 00:12:00 Executing Advance Commands in Kali 00:14:00 Information Gathering What is Information Gathering 00:04:00 Maltego Part 1 00:07:00 Maltego Part 2 00:06:00 HTTrack 00:05:00 The Harvester 00:02:00 NSLookup 00:03:00 RedHawk 00:05:00 SHODAN 00:09:00 OSNIT Framework 00:05:00 Scanning and Enumeration What is Scanning 00:07:00 What is Nmap 00:05:00 Zenmap GUI 00:17:00 What is Enumeration 00:03:00 Types of Enumeration 00:03:00 Enumeration Using Hyena - 1 00:07:00 Enumeration Using Hyena - 2 00:06:00 VAPT What is Vulnerability Assessment 00:04:00 Phases of Vulnerability Assessment 00:08:00 Vulnerability Scoring Systems 00:09:00 Introduction to Nessus 00:05:00 Create and Configure Nessus Network Policy 00:08:00 Nessus Launch Scan and Analyse Result 00:08:00 Firewalls What is IDS 00:11:00 What Are Firewalls 00:10:00 What is DMZ 00:06:00 IDS Evasion Techniques 00:08:00 Firewall Evasion Techniques 00:09:00 Firewall Pentesting 00:02:00 WAPT Introduction to Web Servers 00:05:00 Types of Web Server Attacks 00:05:00 Web Server Penetration Testing 00:04:00 Countermeasures of Web Servers? 00:05:00 OWASP Top 10 Attacks Part 1 00:05:00 OWASP Top 10 Attacks Part 2 00:07:00 Website Foot Printing Part 1 00:05:00 Website Foot Printing Part 2 00:03:00 Command Execution Low 00:06:00 Command Execution Medium 00:07:00 Configuring Burp Suite 00:16:00 File Upload Low 00:10:00 File Upload Medium 00:07:00 File Upload High 00:08:00 SQL Injection 00:04:00 SQL Injection II 00:05:00 Manual SQL 00:17:00 Automating SQL 00:09:00 Countermeasures of SQL Injection 00:03:00 What Is XSS 00:03:00 Types of XSS 00:06:00 XSS Low 00:11:00 XSS Medium 00:05:00 XSS High 00:11:00 Countermeasures of XSS 00:04:00 What is CSRF 00:06:00 CSRF Practical 00:07:00 What is a Brute Force Attack? 00:05:00 Brute Force Political 00:18:00 Web Application Penetration Testing? 00:09:00 Web Application Countermeasures 00:06:00 Denial of Service What is Denial of Service (DOS)? 00:03:00 Types of DOS attack? 00:05:00 What is a BOTNET? 00:03:00 Malware Threats Introduction to Malware 00:09:00 Trojan 00:08:00 Types of Trojans 00:08:00 Viruses and Worms 00:07:00 Types of Viruses 00:10:00 Countermeasures 00:07:00 Social Engineering Introduction to Social Engineering 00:05:00 Social Engineering 00:06:00 Installing BeEF Framework 00:09:00 Getting User Credentials Using BeEF Framework 00:11:00 Cryptography Introduction to Cryptography 00:05:00 Symmetric Encryption 00:03:00 DES and AES 00:06:00 Asymmetric Encryption 00:03:00 RSA and Diffie 00:07:00 Hashing 00:07:00 Public Key Infrastructure (PKI) and Certificate Authority (CA) 00:10:00 Digital Signatures 00:09:00 Transport Layer Security (TLS) 00:04:00 Calculating One Way Hashes Using HashCal 00:04:00 Basic Data Encryption Advance and Decryption Package 00:05:00 Report Writing Introduction to Report Writing 00:08:00 Component of a Report 00:14:00 Bonus Section Why we need to fix vulnerabilities 00:05:00 Hacker Sponsored Security 00:03:00 Key Terms in Bug Bounty Program 00:05:00 Bug Bounty Definition 00:03:00 Public or Private Bug Bounty Program 00:04:00 What is HackerOne 00:05:00 Why Organizations will hire you 00:08:00

Cyber Security & Ethical Hacking
Delivered Online On Demand12 hours 17 minutes
£25

Step Ladder Safety Awareness

By OnlineCoursesLearning.com

Step Ladder Safety Awareness Workplace accidents can have serious consequences for both the casualty and their organisation. It is important that both employees and their employers understand the risks associated with working from height and that they know how to use equipment in a safe, appropriate manner. An individual can sustain an injury falling just a couple of metres. They can also suffer a back injury if they fail to take precautions when moving and positioning equipment. Stepladders are used frequently in the workplace, so it is essential that employees know when and how to use them. This course will provide you with a comprehensive overview of the risks associated with stepladders, how to put in place effective precautionary measures and how to ensure that equipment is fit for purpose. Not all accidents are preventable, but when everyone knows how to work safely, the majority of incidents can be avoided. You Will Learn:- Why you need to take the risk of accidents and injury seriously and why the proper use of stepladders should be of concern to all employees and employers. How to assess whether a stepladder is the most appropriate form of equipment for a task and the factors you must take into consideration when conducting a risk assessment. How to check that a stepladder is fit for purpose, how to spot the signs that indicate it should be withdrawn from use and how to ensure that a faulty piece of equipment is not used by mistake. What you need to remember when working with a stepladder, including how to position your body and work effectively with tools whilst carrying out a task. How to move and store a stepladder safely and securely, taking into account its material, intended purpose and points of structural vulnerability. Benefits Of Taking This Course:- You will be able to use a stepladder confidently and safely, both at home and in the workplace. You will be able to offer guidance to others who are inexperienced in stepladder use. You will have a greater understanding of health and safety concerns at work, which is especially beneficial if you are in a management or HR role. You will be in a position to advise your organisation regarding stepladder and work at height policies, which may make an appreciable difference to the number of accidents recorded at your place of work. Course Modules: Module 1: The Importance of Stepladder Safety Module 2: When is a Stepladder the Most Appropriate Piece of Equipment? Module 3: What Should You Check Before Using a Stepladder? Module 4: Using a Stepladder Safely Module 5: How to Store and Handle a Stepladder

Step Ladder Safety Awareness
Delivered Online On Demand
£50

Suicide Prevention and Mental Health Awareness Training

By Training Tale

Suicide Prevention and Mental Health Awareness Training This Suicide Prevention and Mental Health Awareness Training qualification aims to provide learners with an understanding of the scale and context of suicide in the United Kingdom. This Suicide Awareness Training course also teaches the learners the associated stigma and risk factors and increase their understanding that suicide is preventable. Through this Suicide Awareness Training course, the learners will consider how difficult situations affect mood and behaviour. Moreover, they will learn how this can lead to negative thoughts and feelings. Through this Suicide Awareness Training course, the learners will raise awareness of how suicidal thoughts can arise and identify those at risk of committing suicide. Learning Outcomes After completing this Suicide Prevention and Mental Health Awareness Training course, the learner will be able to: Gain a solid understanding of the context of suicide in the UK and the importance of suicide awareness. Understand different stressful situations an individual may face in their lives that may increase their suicidal thoughts. Understand stress vulnerability and how an individual's ability to cope influences their response to stressful situations and the likelihood of suicidal thoughts. Understand the impact stressful situations may have on an individual's mental health. Understand the importance of a conversation with an individual at risk of suicide. Know how to sign-post the individual to appropriate support and professional services. Why Choose Suicide Prevention and Mental Health Awareness Training Course from Us Self-paced Suicide Prevention and Mental Health Awareness Training course, access available from anywhere. Easy to understand, high-quality study materials. Suicide Prevention and Mental Health Awareness Training Course developed by industry experts. MCQ quiz after each module to assess your learning. Automated and instant assessment results. 24/7 support via live chat, phone call or email. Free PDF certificate as soon as completing the Suicide Prevention and Mental Health Awareness Training course. Main Course: Suicide Prevention and Mental Health Awareness Training Course Courses are included in this Suicide Prevention and Mental Health Awareness Training Bundle Course Course 01: Level 3 Diploma in Healthcare Support Course 02: Safeguarding Vulnerable Adults Training Course 03: Drug and Alcohol Awareness Training Course 04: Adults Support Worker Course Other Benefits of Suicide Prevention and Mental Health Awareness Training Free 5 PDF Certificate Lifetime Access Free Retake Exam Tutor Support [ Note: Free PDF certificate will provide as soon as completing the Suicide Prevention and Mental Health Awareness Training course] Suicide Prevention and Mental Health Awareness Training Industry Experts Designed this Suicide Prevention and Mental Health Awareness Training course into 01 detailed modules. Course Curriculum of Suicide Prevention and Mental Health Awareness Training Module 1: Understanding Suicide Understand the context of suicide in the UK and the importance of suicide awareness Understand different stressful situations an individual may face in their lives that may increase their suicidal thoughts Understand stress vulnerability and how an individual's ability to cope influences their response to stressful situations and the likelihood of them having suicidal thoughts Understand the impact stressful situations may have on an individual's mental health, the use of helpful coping strategies and how the stressors (and unhelpful coping strategies) may lead to suicidal thoughts Understand the importance of a conversation taking place with an individual at risk of suicide. The learner will be able to identify solutions focused responses The learner will know how to sign-post the individual to appropriate support and professional services Assessment Method of Suicide Prevention and Mental Health Awareness Training After completing each module of the Suicide Prevention and Mental Health Awareness Training Course, you will find automated MCQ quizzes. To unlock the next module, you need to complete the quiz task and get at least 60% marks. Certification of Suicide Prevention and Mental Health Awareness Training After completing the MCQ/Assignment assessment for this Suicide Prevention and Mental Health Awareness Training course, you will be entitled to a Certificate of Completion from the Training Tale. Who is this course for? Suicide Prevention and Mental Health Awareness Training This Suicide Prevention and Mental Health Awareness Training course is ideal for teachers, mental health workers, crisis helpline volunteers, support workers, individuals in a safeguarding role, parents or guardians, and others who work with individuals at increased risk of self-harm or suicide. Special Note: Our Course is not a regulated Suicide Prevention and Mental Health Awareness Training course. If You want to get qualified, you can consider following options: NVQ Level 3 Mental Health RQF Mental Health Awareness RQF Children and Young People's Workforce Level 2 Certificate for the Children and Young People's Workforce Level 2 Certificate for the Children and Young People's Workforce (RQF) Level 3 Diploma for the Children and Young People's Workforce (RQF) FAA Level 2 Award in First Aid for Youth Mental Health EDI Child Psychology Requirements Suicide Prevention and Mental Health Awareness Training Students who intend to enrol in this Suicide Prevention and Mental Health Awareness Training course must meet the following requirements: Mental Health: Good command of the English language Mental Health: Must be vivacious and self-driven Mental Health: Basic computer knowledge Mental Health: A minimum of 16 years of age is required Career path Suicide Prevention and Mental Health Awareness Training Teachers, mental health workers, crisis helpline volunteers, support workers, individuals in a safeguarding role, parents or guardians, and others working with individuals who may be at increased risk of self-harm or suicide may advantage from this Suicide Prevention and Mental Health Awareness Training course. Certificates Certificate of completion Digital certificate - Included

Suicide Prevention and Mental Health Awareness Training
Delivered Online On Demand25 hours
£12
1...34567...23