• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

37572 Courses delivered Online

Maritime Mental Health Awareness Training: Module 3 - Suicide Prevention

4.2(46)

By International Seafarers' Welfare and Assistance Network

Understand the common myths and stigmas about suicide, and learn how to talk to someone who is struggling to cope in ISWAN's Suicide Prevention training.

Maritime Mental Health Awareness Training: Module 3 - Suicide Prevention
Delivered OnlineFlexible Dates
£150

Personal Trainer, Fitness Instructor & Nutritionist Training - CPD Certified

4.7(26)

By Academy for Health and Fitness

24-Hour Knowledge Knockdown! Prices Reduced Like Never Before Do you want to feel the excitement of guiding someone to their best self, teaching them the ropes of nutrition, the thrill of conquering a fitness program, and the art of maintaining a healthy mind in a healthy body? With over 10 million active gym members seeking professional guidance across the UK, this could be your chance to get into this sector. So, if you're ready to jumpstart your journey by making a tangible impact on people's lives, this is where it all begins. This bundle covers every crucial aspect of Fitness, Nutrition, and Wellness. From the basics of Personal Training and Gym Instruction to specialised areas like HIIT, Pilates, and Physiotherapy, you'll gain a thorough understanding of physical health. The nutrition and dieting courses range from general nutrition principles to specific dietary plans. Additional modules in Anatomy, Pain Management, Mental Health First Aid, and Stress Management provide a holistic approach to health and fitness, ensuring you are well-prepared to meet the diverse needs of your clients. Courses Included In this Personal Trainer, Fitness Instructor & Nutritionist Training Are: Course 01: Personal Trainer at QLS Level 5 Course 02: Fitness Instructor Course 03: Gym Instructor Training Course 04: Fitness and Muscle Building Training Course 05: HIIT Training & Bodyweight Exercises Course 06: Pilates Diploma Course Course 07: Anatomy and Physiology of Human Body Course 08: Diet and Nutrition Diploma Course 09: Sports Nutrition Course Course 10: Advanced Nutrition and Weight Management Diploma Course 11: Nutrition: 60+ Foods For Health, Fitness & Dieting Course 12: Health & Nutrition Level 3 Course 13: Muscle Building & Losing Fat Course 14: Pain Management Course 15: Acupressure Pain Management Course 16: Physiotherapy Course Course 17: Stress Management Course 18: Understanding of Sports Injuries Course 19: Wellness Coaching Certification Course 20: Mental Health First Aid Certification So, are you ready to jumpstart your journey in the health and fitness world? Take this course as a pathway to a career filled with rewarding challenges and the joy of making a tangible difference in people's lives. Whether you dream of coaching someone for their first marathon, advising on the perfect nutrition plan, or helping someone recover from an injury, it all starts here. Enrol Now! Learning Outcomes of Personal Trainer, Fitness Instructor & Nutritionist Training Master personal training and fitness instruction techniques. Understand detailed anatomy and physiology relevant to fitness. Design effective nutrition plans for nutritious diets. Manage and alleviate pain through physiotherapy and acupressure. Recognise and treat sports injuries and provide first aid. Support mental wellness alongside physical health in training regimes. Why Prefer this Personal Trainer, Fitness Instructor & Nutritionist Course? Get a free QLS Endorsed Certificate upon completion of the Personal Trainer course Get a Free Student ID Card with Personal Trainer Training The Personal Trainer course is Affordable and Simple to understand Lifetime Access to the Personal Trainer course materials The Personal Trainer course comes with 24/7 Tutor Support Start your learning journey straight away! Course Curriculum Course 01: Personal Trainer at QLS Level 5 Module 01: 7 Day Work Program Module 02: Bodybuilding Tips Module 03: HIT Module 04: Hypertrophy Module 05: Joint Health Module 06: Workout Course 02: Fitness Instructor Module 01: Introduction Module 02: Anatomy Module 03: Client Assessment Module 04: Resistance Training Module 05: Exercise Instruction Videos Module 06: Cardio & Endurance Training Module 07: Flexibility Course 03: Gym Instructor Training Module 01: Introduction Module 02:The Major Muscle Groups Explained Module 03:Muscle Growth Fundamentals Module 04:Client Assessment Module 05:Workout Design Module 06:Sample Workouts Module 07:Exercise Videos Module 08:Exercise Videos: Isolation Exercises Module 09:Setting Up A Bodybuilding Diet Module 10:Supplements Module 11:Rest & Recovery =========>>>>> And 17 More Courses <<<<<========= How will I get my Certificate? After successfully completing the course, you will be able to order your Certificates as proof of your achievement. PDF Certificate: Free (Previously it was £12.99*30 = £390) CPD Hard Copy Certificate: Free ( For The First Course: Previously it was £29.99)) CPD 200 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone interested in learning more about the topic is advised to take this bundle. This bundle is ideal for: Fitness enthusiasts Aspiring personal trainers Nutrition advisors Wellness coaches Sports therapists Health educators Requirements You will not need any prior background or expertise to enrol in this course. Career path After completing this bundle, you are to start your career or begin the next phase of your career. Personal Trainer - £20,000 to £60,000 Fitness Instructor - £18,000 to £30,000 Nutritionist - £20,000 to £50,000 Physiotherapist - £25,000 to £40,000 Wellness Coach - £20,000 to £35,000 Sports Therapist - £22,000 to £35,000 Certificates CPD Accredited Digital Certificate Digital certificate - Included Upon passing the Course, you need to order a Digital Certificate for each of the courses inside this bundle as proof of your new skills that are accredited by CPD QS for Free. CPD Accredited Personal Trainer Hard Copy Certificate Hard copy certificate - Included Hard copy certificate - Included Please note that International students have to pay an additional £10 as a shipment fee. Diploma in Personal Trainer Training at QLS Level 5 Hard copy certificate - Included Hard copy certificate - Included Please note that International students have to pay an additional £10 as a shipment fee.

Personal Trainer, Fitness Instructor & Nutritionist Training - CPD Certified
Delivered Online On Demand5 days
£109

Essential RFID

5.0(3)

By Systems & Network Training

RFID training course description This training course focuses on the technologies used in Radio Frequency Identification (RFID). What will you learn Describe the RFID architecture. Design RFID systems. Evaluate tag types. Recognise common RFID problems. RFID training course details Who will benefit: RFID technologists and system engineers. Prerequisites: RF fundamentals. Duration 2 days RFID training course contents What is RFID? Review of RF basics, what is RFID, RFID history, RFID base system architecture, frequency bands used by RFID, comparison with barcodes. RFID applications Supply chain, asset tracking, theft reduction, retail, access control, tolls. Tags Tag features, types of tag, passive and active, chips, read only, read write, affixing tags, selecting location to affix a tag, tag orientation and location, tag stacking, impact of rate of movement, tag data formats. Interrogators/readers Interrogation zones, interrogator types, antennas, read distance tests, multiple interrogators, synchronisation, dense interrogator environment issues. RFID peripherals. Standards and regulations Global regulatory requirements, regional regulatory requirements, ISO, ETSI, FCC, EPC, safety regulations/issues. Testing and troubleshooting Read rate problems, improperly tagged items, tag failure. RFID system design Antenna types, interference, antenna location and spacing, how many antennas? How many interrogators? tag types, grounding considerations, cabling, site diagrams.

Essential RFID
Delivered in Internationally or OnlineFlexible Dates
£2,477

Credit Analysis

5.0(10)

By GBA Corporate

Overview This training course will give participants a developed knowledge of credit analysis. Through a mix of lectures and interactive case studies, participants will be able to perform detailed credit analysis, including analysing market and environment, computing key financial ratios, interpreting cash flows and analysing financing needs. Key Topics Financial needs and the business operating cycle Review of financial statements Financial ratio analysis Corporate cash flow analysis Cash flow projections for debt service Key lending policy guidelines

Credit Analysis
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,779

Crisis Management Training

By Compete High

Overview With the ever-increasing demand for Crisis Management in personal & professional settings, this online training aims at educating, nurturing, and upskilling individuals to stay ahead of the curve - whatever their level of expertise in Crisis Management may be. Learning about Crisis Management or keeping up to date on it can be confusing at times, and maybe even daunting! But that's not the case with this course from Compete High. We understand the different requirements coming with a wide variety of demographics looking to get skilled in Crisis Management . That's why we've developed this online training in a way that caters to learners with different goals in mind. The course materials are prepared with consultation from the experts of this field and all the information on Crisis Management is kept up to date on a regular basis so that learners don't get left behind on the current trends/updates. The self-paced online learning methodology by compete high in this Crisis Management course helps you learn whenever or however you wish, keeping in mind the busy schedule or possible inconveniences that come with physical classes. The easy-to-grasp, bite-sized lessons are proven to be most effective in memorising and learning the lessons by heart. On top of that, you have the opportunity to receive a certificate after successfully completing the course! Instead of searching for hours, enrol right away on this Crisis Management course from Compete High and accelerate your career in the right path with expert-outlined lessons and a guarantee of success in the long run. Who is this course for? While we refrain from discouraging anyone wanting to do this Crisis Management course or impose any sort of restrictions on doing this online training, people meeting any of the following criteria will benefit the most from it: Anyone looking for the basics of Crisis Management , Jobseekers in the relevant domains, Anyone with a ground knowledge/intermediate expertise in Crisis Management , Anyone looking for a certificate of completion on doing an online training on this topic, Students of Crisis Management , or anyone with an academic knowledge gap to bridge, Anyone with a general interest/curiosity Career Path This Crisis Management course smoothens the way up your career ladder with all the relevant information, skills, and online certificate of achievements. After successfully completing the course, you can expect to move one significant step closer to achieving your professional goals - whether it's securing that job you desire, getting the promotion you deserve, or setting up that business of your dreams. Course Curriculum Module 1 - Introduction to Crisis Management Introduction to Crisis Management 00:00 Module 2 - Conducting the Crisis Audit Conducting the Crisis Audit 00:00 Module 3 - Performing a Risk Level Analysis Performing a Risk Level Analysis 00:00 Module 4 - Incident Management Techniques Incident Management Techniques 00:00 Module 5 - Crisis Management Skills for Business Leaders Crisis Management Skills for Business Leaders 00:00 Module 6 - Crisis Management Plan Crisis Management Plan 00:00 Module 7 - How to Get a Career in Crisis Management How to Get a Career in Crisis Management 00:00 Module 8 - The HR Role in Crisis Management - Process and Tips The HR Role in Crisis Management - Process and Tips 00:00

Crisis Management Training
Delivered Online On Demand8 hours
£25

Traffic Marshal Training

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step

Traffic Marshal Training
Delivered Online On Demand2 hours 44 minutes
£25

Python for network engineers

5.0(3)

By Systems & Network Training

Python training course description This Python course focusses on teaching Python for use in network automation and network DevOps. We focus on getting delegates up and running with Python and network automation as quickly as possible rather than making them great programmers. In other words we concentrate on enabling delegates to use network automation libraries such as netmiko, NAPALM and Nornir, and APIs such as NETCONF and RESTCONF rather than enabling delegates to produce object oriented programs. Hands on sessions use Cisco and Juniper devices. What will you learn Run Python programs. Read Python programs. Write Python programs. Debug Python programs. Automate network tasks with Python programs. Configure network devices with Python. Collect data from network devices with Python. Python training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 5 days Python training course contents What is Python? Programming languages, Why Python? Python in interactive mode, Python scripts, ipython, Python version 2 versus version 3. A simple Python script. Comments. Hands on Installing Python, Hello world. A network example On box vs off box Python. telnet, ssh, NETCONF, HTTP, APIs, manufacturers and API support, analysis of a simple telnetlib program. Hands on Using Python to retrieve the configuration from a network device. Using wireshark to analyse the actions. Python basics I/O, operators, variables and assignment, types, indentation, loops and conditionals. Hands on Modifying the telnet program, changing configurations on a network devices. Functions, classes and methods What are functions, calling functions, builtin functions, useful builtin functions, file handling, classes, objects, creating instances. Hands on Storing configurations in files, configuring devices from files, using an inventory file to work on multiple devices. Libraries and modules Modules, files and packages, import, from-import, Python standard library, other packages, pip install, executing other programs. Managing python libraries. Hands on Using pip, installing and using ipaddress, subprocess to access netsnmp. For the more advanced, using the sockets library. Paramiko and netmiko SSH, enabling SSH on devices, keys. Paramiko versus netmiko, example scripts. pexpect. Hands on Configuring VLANs from Python. pySNMP Gathering facts using previous methods, SNMP review, pySNMP GET, pySNMP and SNMPv3. easySNMP library. Hands on Walking a MIB from Python. NETCONF What is NETCONF? Enabling NETCONF on devices, A first ncclient script, device handlers, get_config, edit_config, copy_config, delete_config, commit, validate, pyEZ, utils_config, utils.sw. Hands on Configuration using ncclient and PyEZ. This session is expanded for those interesting in JunOS automation. Manipulating configuration files Builtin functions, string handling. Unicode. Sequences, strings, lists, tuples. Dictionaries. TextFSM. Regular expressions. JSON, YAML, XML, YANG, Jinja2, templates. Hands on Jinja2 templating with Python to configure network devices. NAPALM Getters, configuration operations, supported devices, NAPALM transport, Config-replace, Config-merge, Compare config, Atomic changes, rollback. Example NAPLAM scripts. Hands on Using NAPALM to gather facts, Using NAPALM for configuration management REST and RESTCONF What is REST, HTTP methods, GET, POST, cURL, Postman, Python requests library. RESTCONF, a RESTCONF example. Hands on Modifying a configuration using RESTCONF. Scapy What is scapy, Scapy in interactive mode, Scapy as a module. Hands on Packet crafting from Python. Warning Errors and exceptions, Exception handling, try, except. Memory management. Garbage collection. Context management, With. Hands on Improving Python code. Nornir What is Nornir? A network automation framework, inventories, connection management and parallelization. Nornir architecture and other libraires. Hands on Setting up nornir, nornir fact gathering, nornir tasks. Optional Writing your own functions, Writing your own classes. pyntc. Hands on Writing reusable code.

Python for network engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Securing Linux systems

5.0(3)

By Systems & Network Training

Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing Linux systems
Delivered in Internationally or OnlineFlexible Dates
£3,697

Cyber security for engineers

5.0(3)

By Systems & Network Training

Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.

Cyber security for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Definitive Tetra

5.0(3)

By Systems & Network Training

TETRA training course description This 2 day training course covers the network architecture required for TETRA. It also looks at the Air Interface, TETRA Functions and Procedures. What will you learn Describe the TETRA Architecture Describe the Air Interface Explain the TETRA Functions Explain the TETRA Procedures TETRA training course details Who will benefit: Anyone working with TETRA. Prerequisites: None. Duration 2 days TETRA training course contents Introduction History of PMR, ETSI development, Tetra function, Tetra markets, Tetra standards, Tetra supplier base, Tetra Release 1, Tetra Release 2. Network Architecture Mobile network Identity, Mobile stations, Base station, Switching & Management, Addresses & Identitie. Air Interface Modulation, TDMA Format, FD, Framin, Burst format, Traffic Channel TCH, Dedicated Channel DCC, Common Control Channel CCC, Signalling Channel SCH, Logical Control mapping LCM, Protocol stack, Voice coded. TETRA Functions Trunked mode operation, User hierarchies, Individual calling, Group calling, Supplementary services, Voice and Data, Data services, Direct mode operation, Tetra WAP, Circuit mode priorities, Circuit mode data, Packet mode data, Discrete and Ambient listening. Automatic vehicle locator. TETRA Procedures MS operational modes, Mobility management, Cell selection, Security & Authentication, Decryption options, Cell setup, Channel assignment, Network management - internal, Network management -external, PSTN Gateway, ISDN Gateway, Control Room Gateway.

Definitive Tetra
Delivered in Internationally or OnlineFlexible Dates
£2,477