This course covers some of the different ways of communication, how to identify barriers to communication and how to reduce these, making sure the person you are communicating with understands what you are communicating, how to get help with communication issues and much more.
This course will start by defining the various terms used when talking about nutrition and hydration in care environments, the basic elements of nutrition and eating a healthy balanced diet, identify the reasons why vulnerable people might suffer with dehydration and the tools you can use to identify people that are at risk of malnutrition and the steps you can take to deal with this condition.
This course describes in detail the many facets and procedures of the Mental Capacity Act. This includes who the act affects, when it applies, how to assess capacity and the procedures that can be put in place in the home or workplace to ensure best practices are followed and people are treated fairly at all times.
This course will start by defining infection prevention and control and explaining the impact of good and bad infection control. It then goes into detail about the legislation that applies to infection control, the different types of microorganisms, how bacteria are transmitted, the chain of infection, and much more.
This course explains, in brief, why fires occur and what actions you must take to help prevent them starting and the actions you must take when they do. By completing this course you will be making your workplace a safer environment. This course is a variation on the Basic Fire Awareness course that contains information that is specific to employees of care and residential homes.
Duration 5 Days 30 CPD hours This course is intended for This course is geared toward Windows system administrators, network administrators, and other system administrators who are interested in supplementing current skills or backstopping other team members, in addition to Linux system administrators who are responsible for these tasks: Configuring, installing, upgrading, and maintaining Linux systems using established standards and procedures Providing operational support Managing systems for monitoring system performance and availability Writing and deploying scripts for task automation and system administration Successful completion of Red Hat System Administration I (RH124) is recommended. Experienced Linux administrators seeking to accelerate their path toward becoming a Red Hat Certified System Administrator should start with the RHCSA Rapid Track course (RH199). Overview You should be able to demonstrate these skills: - Install Red Hat Enterprise Linux using Kickstart - Manage file systems and logical volumes - Manage scheduled jobs - Access network file systems - Manage SELinux - Control firewalls - Perform troubleshooting tasks Red Hat System Administration II (RH134) is designed as the second part of the Red Hat© Certified System Administrator (RHCSA©) training track for IT professionals who have taken Red Hat System Administration I (RH124). The course goes deeper into core Linux© system administration skills, including storage configuration, security feature management, task control, and installation and deployment of Red Hat© Enterprise Linux. Prerequisites Successful completion of Red Hat System Administration I (RH124) is recommended. 1 - Automate installation with Kickstart Automate the installation of Red Hat Enterprise Linux systems with Kickstart. 2 - Use regular expressions with grep Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files. 3 - Create and Edit text files with vim Introduce the vim text editor, with which you can open, edit, and save text files. 4 - Schedule future Linux tasks Schedule tasks to automatically execute in the future. 5 - Manage priority of Linux processes Influence the relative priorities at which Linux processes run. 6 - Control access to files with access control lists (ACL) Manage file security using POSIX access control lists. 7 - Manage SELinux security Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise. 8 - Connect to network-defined users and groups Configure systems to use central identity management services. 9 - Add disks, partitions, and file systems to a Linux system Manage simple partitions and file systems. 10 - Manage logical volume management (LVM) storage Manage logical volumes from the command line. 11 - Access networked attached storage with network file system (NFS) Access (secure) NFS shares. 12 - Access networked storage with SMB Use autofs and the command line to mount and unmount SMB file systems. 13 - Control and troubleshoot the Red Hat Enterprise Linux boot process 14 - Limit network communication with firewall Configure a basic firewall. 15 - Comprehensive review Practice and demonstrate knowledge and skills learned in this course.
Duration 4 Days 24 CPD hours This course is intended for This course is for IT Professionals with expertise in designing and implementing solutions running on Microsoft Azure. They should have broad knowledge of IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platform, budgeting, and governance. Azure Solution Architects use the Azure Portal and as they become more adept they use the Command Line Interface. Candidates must have expert-level skills in Azure administration and have experience with Azure development processes and DevOps processes. Overview Recommend solutions to minimize costs Recommend a solution for Conditional Access, including multi-factor authentication Recommend a solution for a hybrid identity including Azure AD Connect and Azure AD Connect Recommend a solution for using Azure Policy Recommend a solution that includes KeyVault Recommend a solution that includes Azure AD Managed Identities Recommend a storage access solution Design an Azure Site Recovery solution Recommend a solution for autoscaling Recommend a solution for containers Recommend a solution for network security Recommend a solution for migrating applications and VMs Recommend a solution for migration of databases This course teaches Solutions Architects how to translate business requirements into secure, scalable, and reliable solutions. Lessons include design considerations related to logging, cost analysis, authentication and authorization, governance, security, storage, high availability, and migration. This role requires decisions in multiple areas that affect an overall design solution. Design a Compute Solution Recommend a Solution for Compute Provisioning Determine Appropriate Compute Technologies Recommend a Solution for Containers Recommend a Solution for Automating Compute Management Design a Network Solution Recommend a Solution for Network Addressing and Name Resolution Recommend a Solution for Network Provisioning Recommend a Solution for Network Security Recommend a Solution for iInternete Connectivity and On-Premises Networks Recommend a Solution for Automating Network Management Recommend a Solution for Load Balancing and Rraffic Routing Design for Migration Assess and On-Premises Servers and Applications for Migration Recommend a Solution for Migrating Applications and VMs Recommend a Solution for Migration of Databases Design Authentication and Authorization Tips for Identity and Access Management Recommend a Solution for Multi-Factor Authentication Five Steps for Securing Identity Infrastructure Recommend a Solution for Single-Sign On (SSO) Recommend a Solution for a Hybrid Identity Recommend a Solution for B2B Integration Recommend a Hierarchical Structure for Management Groups Design Governance Recommend a Solution for using Azure Policy Recommend a Solution for using Azure Blueprint Design a Solution for Databases Select an Appropriate Data Platform Based on Requirements Overview of Azure Data Storage Recommend Database Service Tier Sizing Dynamically Scale Azure SQL Database and Azure SQL Managed Instances Recommend a Solution for Encrypting Data at Rest, Transmission, and In Use Select an Appropriate Storage Account Understanding Storage Tiers Recommend a Storage Access Solution Recommend Storage Management Tools Design Data Integration Recommend a Data Flow Recommend a Solution for Data Integration Design a Solution for Logging and Monitoring Azure Monitoring Services Azure Monitor Design a Solution for Backup and Recovery Recommend a Recovery Solution for Hybrid and On-Premises Workloads Design and Azure Site Recovery Solution Recommend a Solution for Recovery in Different Regions Recommend a Solution for Azure Backup Management Design a Solution for Data Archiving and Retention Design for High Availability Recommend a Solution for Application and Workload Redundancy Recommend a Solution for Autoscaling Identify Resources that Require High Availability Identify Storage Tpes for High Availability Recommend a Solution for Geo-Redundancy of Workloads Design for Cost Optimization Recommend Solutions for Cost Management Recommended Viewpoints for Minimizing Costs Design an Application Architecture Recommend a Microservices Architecture Recommend an Orchestration Solution for Deployment of Applications Recommend a Solution for API Integration Design Security for Applications Security for Applications and Services Recommend a Solution using Key Vault Recommend Solutions using Azure AD Managed Identities
Eatery Hospitality Management Level 2 The Restaurant Hospitality Management Level 2 course gives colleagues data, abilities and guidance, to assist them with satisfying their job as a café chief and surpass their customers' administration assumptions. Endless supply of the course, colleagues will have the fitness to function as a café supervisor at a 5-star inn or in a neighborhood restaurant. What's Covered in the Course? A prologue to the front-of-house capacity of a café; The part of a café administrator in a wide range of eateries, anyplace on the planet; The various kinds of café foundations and their formats; The significance of fantastic client care inside the friendliness business; Step by step instructions to manage client protests in a quiet and compelling way, to guarantee that the client will return later on; Know your beverages: a far reaching information on drinks and how to serve them; Know your food: the significance of knowing each thing on the menu, what is in each dish and the circumstances and end results of food sensitivities; Café authorizing laws: this covers age check and what you can acknowledge, to confirm the period of clients on authorized premises; Café framework agendas: what agendas are required, how to set up them and how to screen them, to guarantee that the eatery runs easily and cost-adequately; Wellbeing and security laws related with an eatery, from front-of-house to the kitchen; sanitation and capacity; Eatery wording that is normally utilized in the business. What are the Benefits of the Course? Improved vocation possibilities for the worker, joined with more noteworthy capability and certainty for those generally working inside the business; The 21 online modules are available on any gadget, so the colleague can concentrate from anyplace with a web association, utilizing a PC, PC, tablet or cell phone; An industry-perceived certificate, with online help to guide and help the representative all through the course; An available and complete schedule; No passage necessities - café experience is anything but an essential to your staff part finishing the course.
Cell Phones and Driving Certification Cell phones are one of the essential mechanical advances of the 21st Century. Not just have they expanded interpersonal interaction and have changed the manner in which people speak with each other, however they additionally fill in as a powerful type of individual security. In the midst of a crisis or when one is voyaging or potentially alone, a cell phone can help the driver in having a more productive excursion out and about. Nonetheless, utilizing a handheld gadget while driving a vehicle is perilous, unlawful and can regularly prompt wounds or fatalities. It is essential to find out about the dangers related with utilizing a cell phone when in the driver's seat, to keep away from any of these expected risky circumstances. This course gives an intensive comprehension of the sorts of threats a driver faces when utilizing a telephone while driving and the different punishments that are related with it. Moreover, you will find out about how to utilize a cell phone when out and about. What You Will realize The results of utilizing a cell phone while driving Laws and punishments related with utilizing a cell phone when driving What is diverted driving and how to show new drivers the significance of interruption free driving Step by step instructions to securely utilize a sans hands gadget and sat navs without violating the law Safe approaches to utilize a handheld gadget while out and about and what to do in case of a crisis Advantages of the Course You will get mindful of the dangers related with utilizing a cell phone while driving Keep yourself from getting into a hazardous or dangerous circumstances because of utilizing a cell phone while driving You will figure out how to abstain from getting a fine or taking care of a punishment for utilizing a hand-held gadget You will know the dangers and advantages related with utilizing a without hands gadget while driving You will know about the impacts of diverted driving and how to show new drivers not to utilize a telephone when in the driver's seat Figuring out how to appropriately utilize a cell phone if there should be an occurrence of a crisis while out and about