• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4397 Courses delivered Online

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou

Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to Linux Systems Administration (TTLX2220)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This is an introductory-level systems administration course geared for Systems Administrators and users who wish to learn how to how to install, configure and maintain an Enterprise Linux system in a networked environment. Overview This course is about 50% lab to lecture ratio, combining expert instructor-led discussions with practical hands-on skills that emphasize current techniques, best practices and standards. Working in this hands-on lab environment, guided by our expert practitioner, attendees will explore Installing the Linux operating system and configuring peripherals Performing and modifying startup and shutdown processes Configuring and maintaining basic networking services Creating and maintaining system users and groups Understanding and administering file permissions on directories and regular files Planning and creating disk partitions and file systems Performing maintenance on file systems Identifying and managing Linux processes Automating tasks with cron Performing backups and restoration of files Working with system log files Troubleshooting system problems Analyzing and taking measures to increase system performance Configuring file sharing with NFS Configuring Samba for file sharing with the Windows clients Setting up a basic Web server Understanding the components for setting up a LAMP server Implementing basic security measures Linux System Administration is a comprehensive hands-on course that teaches students how to install, configure and maintain an Enterprise Linux system in a networked environment. This lab-intensive class explores core administrative tasks such as: creating and managing users, creating and maintaining file systems, determining and implementing security measures and performing software installation and package management. Linux networking topics include installing and supporting SSH, NFS, Samba and the Apache Web server. Students will explore common security issues, as well as several tools, such as the PAM modules that help secure the operating system and network environment. Upon successful completion of this course, students will be prepared to maintain Linux systems in a networked business environment. Although the course includes installing and configuring a CentOS 7 / RHEL 7 Linux system, much of the course content also applies to Oracle, Ubuntu, Scientific and other current versions of mainstream Linux distributions. Labs include user and group maintenance, system backups and restoration, software management, administration tasks automation, file system creation and maintenance, managing remote access, working with cron, and configuring basic file sharing and Web services, as well as working with system logging utilities such as rsyslog and much more. System Administration Overview UNIX, Linux and Open Source Duties of the System Administrator Superusers and the Root Login Sharing Superuser Privileges with Others (su and sudo Commands) TCP/IP Networking Fundamentals Online Help Installation and Configuration Planning: Hardware and Software Considerations Site Planning Installation Methods and Types Installation Classes Partitions Logical Volume Manager - LVM File System Overview Swap Partition Considerations Other Partition Considerations The Linux Boot Loader: grub Software Package Selection Adding and Configuring Peripherals Printers Graphics Controllers Basic Networking Configuration Booting to Recovery Mode Booting and Shutting Down Linux Boot Sequence The systemd Daemon The systemctl Command Targets vs. Run Levels Modifying a Target Service Unit Scripts Changing System States Booting into Rescue Mode Shutdown Commands Managing Software and Devices Identifying Software Packages Using rpm to Manage Software Using yum to Manage Software Installing and Removing Software Identifying Devices Displaying Device and System Information (PCI, USB) Plug and Play Devices Device Configuration Tools Managing Users and Groups Setting Policies User File Management The /etc/passwd file The /etc/shadow file The /etc/group file The /etc/gshadow file Adding Users Modifying User Accounts Deleting User Accounts Working with Groups Setting User Environments Login Configuration Files The Linux File System Filesystem Types Conventional Directory Structure Mounting a File System The /etc/fstab File Special Files (Device Files) Inodes Hard File Links Soft File Links Creating New File Systems with mkfs The lost+found Directory Repairing File Systems with fsck The Journaling Attribute File and Disk Management Tools Linux File Security File Permissions Directory Permissions Octal Representation Changing Permissions Setting Default Permissions Access Control Lists (ACLs) The getfacl and setfacl commands SUID Bit SGID Bit The Sticky Bit Controlling Processes Characteristics of Processes Parent-Child Relationship Examining Running Processes Background Processes Controlling Processes Signaling Processes Killing Processes Automating Processes cron and crontab at and batch System Processes (Daemons) Working with the Linux Kernel Linux Kernel Components Types of Kernels Kernel Configuration Options Recompiling the Kernel Shell Scripting Overview Shell Script Fundamentals Bash Shell Syntax Overview Shell Script Examples System Backups Backup Concepts and Strategies User Backups with the tar Command System Backup Options The xfsdump and xfsrestore Commands Troubleshooting the System Common Problems and Symptoms Troubleshooting Steps Repairing General Boot Problems Repairing the GRUB 2 Boot Loader Hard Drive Problems Restoring Shared Libraries System Logs and rsyslogd Basic Networking Networking Services Overview NetworkManager Introduction Network Configuration Files Locations and Formats Enabling and Restarting Network Services with systemtcl Configuring Basic Networking Manually Configuring Basic Networking with NetworkManager LAMP Server Basics LAMP Overview Configuring the Apache Web Server Common Directives Apache Virtual Hosting Configuring an Open Source Database MySQL MariaDB PHP Basics Perl CGI Scripting Introduction to System Security Security Overview Maintaining System Security Server Access Physical Security Network Security Security Tools Port Probing with nmap Intrusion Detection and Prevention PAM Security Modules Scanning the System Maintaining File Integrity Using Firewalls Introduction to firewalld The Samba File Sharing Facility Configure Samba for Linux to Linux/UNIX File Sharing Configure Samba for Linux to Windows File Sharing Use the smbclient Utility to Transfer Files Mount/Connect Samba Shares to Linux and Windows Clients Networked File Systems (NFS) Using NFS to Access Remote File Systems Configuring the NFS Server Configuring the NFS Client Exporting File Systems from the NFS Server to the NFS Client

Introduction to Linux Systems Administration (TTLX2220)
Delivered OnlineFlexible Dates
Price on Enquiry

55320 Programming with HTML, CSS, and JavaScript

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for students new to computer programming or experienced programmers who are new to client-side web development. Overview After completing this course, you will be able to: Describe the technologies involved in web development. Create HTML pages with links and images. Explain the benefits of CSS. Style HTML pages with CSS. Explain the concepts of objects, methods, and properties. Work with JavaScript variables. Create their own custom functions in JavaScript. Write flow control logic in JavaScript. Write JavaScript code that listens for and handles events, such as mouse clicks and page loads. Create forms with HTML and validate them with JavaScript. Use regular expressions in JavaScript for advanced form validation. This course is intended for IT professionals interested in becoming client-side web developers. who need to get a jump start on all three technologies. The course includes more than 30 exercises, providing a rapid hands-on introduction to the three major client-side languages: HTML, CSS, and JavaScript. Students should be prepared to cover a lot of ground quickly.This material updates and replaces course Microsoft course 20480 which was previously published under the title Programming in HTML5 with JavaScript and CSS3. Module 1: A Quick Overview of Web Development HTML is Part of a Team Client-side Programming Server-side Programming Web Development Technologies Module 2: Introduction to HTML Exercise: A Simple HTML Document Getting Started with a Simple HTML Document HTML Elements, Attributes, and Comments The HTML Skeleton Viewing the Page Source Special Characters HTML Elements and Special Characters History of HTML The lang Attribute Module 3: Paragraphs, Headings, and Text Paragraphs Heading Levels Breaks and Horizontal Rules Exercise: Paragraphs, Headings, and Text The div Tag Creating an HTML Page Quoted Text Preformatted Text Inline Semantic Elements Exercise: Adding Inline Elements Module 4: HTML Links Links Introduction Text Links Absolute vs. Relative Paths Targeting New Tabs Email Links Exercise: Adding Links Lorem Ipsum The title Attribute Linking to a Specific Location on the Page Targeting a Specific Location on the Page Module 5: HTML Images Inserting Images Image Links Adding Images to the Document Exercise: Adding Images to the Page Providing Alternative Images Module 6: HTML Lists Unordered Lists Ordered Lists Definition Lists Exercise: Creating Lists Module 7: Crash Course in CSS Benefits of Cascading Style Sheets CSS Rules Selectors Combinators Precedence of Selectors How Browsers Style Pages CSS Resets CSS Normalizers External Stylesheets, Embedded Stylesheets, and Inline Styles Exercise: Creating an External Stylesheet Exercise: Creating an Embedded Stylesheet Exercise: Adding Inline Styles div and span Exercise: Styling div and span Media Types Units of Measurement Inheritance Module 8: CSS Fonts font-family @font-face font-size font-style font-variant font-weight line-height font shorthand Exercise: Styling Fonts Module 9: Color and Opacity About Color and Opacity Color and Opacity Values Color Opacity Exercise: Adding Color and Opacity to Text Module 10: CSS Text letter-spacing text-align text-decoration text-indent text-shadow text-transform white-space word-break word-spacing Exercise: Text Properties Module 11: JavaScript Basics JavaScript vs. EcmaScript The HTML DOM JavaScript Syntax Accessing Elements Where Is JavaScript Code Written? JavaScript Objects, Methods, and Properties Exercise: Alerts, Writing, and Changing Background Color Module 12: Variables, Arrays, and Operators JavaScript Variables A Loosely Typed Language Google Chrome DevTools Storing User-Entered Data Exercise: Using Variables Constants Arrays Exercise: Working with Arrays Associative Arrays Playing with Array Methods JavaScript Operators The Modulus Operator Playing with Operators The Default Operator Exercise: Working with Operators Module 13: JavaScript Functions Global Objects and Functions Exercise: Working with Global Functions User-defined Functions Exercise: Writing a JavaScript Function Returning Values from Functions Module 14: Built-In JavaScript Objects Strings Math Date Helper Functions Exercise: Returning the Day of the Week as a String Module 15: Conditionals and Loops Conditionals Short-circuiting Switch / Case Ternary Operator Truthy and Falsy Exercise: Conditional Processing Loops while and do?while Loops for Loops break and continue Exercise: Working with Loops Array: forEach() Module 16: Event Handlers and Listeners On-event Handlers Exercise: Using On-event Handlers The addEventListener() Method Anonymous Functions Capturing Key Events Exercise: Adding Event Listeners Benefits of Event Listeners Timers Typing Test Module 17: The HTML Document Object Model CSS Selectors The innerHTML Property Nodes, NodeLists, and HTMLCollections Accessing Element Nodes Exercise: Accessing Elements Dot Notation and Square Bracket Notation Accessing Elements Hierarchically Exercise: Working with Hierarchical Elements Accessing Attributes Creating New Nodes Focusing on a Field Shopping List Application Exercise: Logging Exercise: Adding EventListeners Exercise: Adding Items to the List Exercise: Dynamically Adding Remove Buttons to the List Items Exercise: Removing List Items Exercise: Preventing Duplicates and Zero-length Product Names Manipulating Tables Module 18: HTML Forms How HTML Forms Work The form Element Form Elements Buttons Exercise: Creating a Registration Form Checkboxes Radio Buttons Exercise: Adding Checkboxes and Radio Buttons Fieldsets Select Menus Textareas Exercise: Adding a Select Menu and a Textarea HTML Forms and CSS Module 19: JavaScript Form Validation Server-side Form Validation HTML Form Validation Accessing Form Data Form Validation with JavaScript Exercise: Checking the Validity of the Email and URL Fields Checking Validity on Input and Submit Events Adding Error Messages Validating Textareas Validating Checkboxes Validating Radio Buttons Validating Select Menus Exercise: Validating the Ice Cream Order Form Giving the User a Chance Module 20: Regular Expressions Getting Started Regular Expression Syntax Backreferences Form Validation with Regular Expressions Cleaning Up Form Entries Exercise: Cleaning Up Form Entries A Slightly More Complex Example

55320 Programming with HTML, CSS, and JavaScript
Delivered OnlineFlexible Dates
Price on Enquiry

Environmental legislation (In-House)

By The In House Training Company

A thorough account of the UK and European legal framework and its requirements as regards managing environmental performance. This course will help staff to understand: The framework of UK and European legislation and its enforcement The principal features of the legislation as they apply to your organisation's activity/product/service The benefit of having an Environmental Management System such as ISO 14001 How their own actions and decisions can either expose or protect the organisation in relation to its legal obligations 1 Introduction and objectives 2 Introduction to environmental law and enforcement Sources of law (European and UK) Structure and enforcement Key legislation 3 Integrated Pollution Prevention and Control (IPPC) and Local Air Pollution and Control (LAPC) Pollution and Prevention Control Act 1999 EC Directives on PPC The meaning of BAT Transitional provisions Fit and proper persons Control of emissions to air National Air Quality Strategy 4 Packaging and producer responsibilities Who, what and how The Producer Responsibility Obligations (Packaging Waste) Regulations Obligations and exemptions Registration Recycling and recovery obligations Records Duties of the Environment Agency Offences Developments 5 Waste management National Waste Strategy Waste minimisation (re-use/recycling) Waste definition Disposal and recovery Controlled waste management Hazardous waste management 6 Proposed Legislation and EC Directives EU Commission's waste and resources strategies Implementation of ELV (End of Life Vehicles) Directive WEEE (Waste Electrical and Electronic Equipment) Directive transposition into UK legislation Other producer responsibility initiatives Other proposals from the EU 7 Conclusion Open forum Summary Close

Environmental legislation (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Accuracy Skills (In-House)

By The In House Training Company

This is an essential programme for any member of staff whose role requires a high level of attention to detail. The focus is specifically on the handling of text and data, whether at the input stage or when collating information into reports and documents for use by others. The session looks at both prevention and cure. For 'prevention', it focuses on understanding how common errors occur and on developing an awareness of the factors which influence our level of attentiveness. It introduces key psychological theories around attentiveness including the 'capacity' and 'bottleneck filter' models. And it looks at how working styles can affect attention to detail. For 'cure', the programme looks at how to minimise the effect of stress on concentration as well as introducing a number of tools and techniques for promoting accuracy - at both the input and the checking stages. Particular attention is paid to proof-reading techniques. By the end of the session, participants will: Appreciate why errors occur Understand how stress and other factors can affect focus and accuracy Know how to improve accuracy and reduce errors when handling text and data Be able to proof-read text and number-based documents more accurately 1 The importance of accuracy The impact of mistakes Why accuracy is so important Main reasons why errors occur 2 Attentiveness theory The 'capacity' and 'bottleneck filter' models Selective attention Chunking - big picture / little picture 3 Preparing for accuracy Working styles - how they affect detail-orientation Identifying and minimising the impact of stress on concentration 4 Practical strategies How to improve accuracy and reduce errors when inputting text Managing interruptions and distractions Proofing text and numbers

Accuracy Skills (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Control of Substances Hazardous to Health (COSHH) (In-House)

By The In House Training Company

This short course introduces staff to a range of hazardous substances, the risks and controls available, and what to expect from a control of substances hazardous to health (COSHH) assessment. It prepares them to contribute to the safer use of hazardous substances in their workplaces. 1 Definition and types Defining what constitutes a substance hazardous to health in the workplace Outlining the various types of hazardous substances 2 Health effects Exploring the health effects caused by exposure to hazardous substances Routes of entry - exploring how substances can enter the body and methods of prevention 3 Data COSSH register Data sheets Risk assessments Control options 4 Responsibilities An overview of the responsibilities imposed by the Control of Substances Hazardous to Health Regulations 2002

Control of Substances Hazardous to Health (COSHH) (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Manual Handling (In-House)

By The In House Training Company

Some 60% of injuries at work are caused by lifting heavy objects. This powerful, practical programme is designed to help stop any of your staff from becoming the next statistic. 1 Introduction and objectives 2 Overview of Health and Safety Legislation and HSE Injury Statistics Health and Safety at Work Act 1974 Management of Health and Safety at Work Regulations (MHSWR) 1992 MHSWR 1999 specific duties to risk assess Manual Handling Operations Regulations (MHOR) 1992 Breakdown of injury statistics and costs of poor manual handling 3 The musculoskeletal system explained Prevention and ill-health Ergonomics RSI The spine in detail 4 Risk assessment General principles The TILE method Employees' duties Workplace scenarios

Manual Handling (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Fire Wardens - roles and responsibilities (In-House)

By The In House Training Company

All organisations are legally required to have at least one designated Fire Warden. It's also common sense, given that every year there are nearly 20,000 commercial fires in the UK. This course will help participants: Assess their awareness and knowledge of the principles of fire safety and the associated risks involved at work Understand the responsibilities of being a Fire Warden Understand the main types of firefighting equipment 1 Introduction to fire safety What to do in an emergency Causes and effects of fire The fire warden's duties and responsibilities 2 Fire risk control How to raise the alarm Assembly points, roll calls, drills Fire prevention and fire risk assessment Understanding the fire triangle 3 Practical fire safety Types of portable fire extinguishers Maintenance of firefighting equipment Fire signs In-house checks The fire bag/box

Fire Wardens - roles and responsibilities (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Maintenance and operation (M&O) of engineering plant and services (In-House)

By The In House Training Company

M&O of engineering plant and services is becoming more important to the success of the core business. To select the right M&O technique for specific plant and equipment it is necessary to know what options are available, what they deliver and how they should be implemented. This course will help you consider options and techniques that provide best value based on that thorough understanding of the business need. M&O will increasingly be required to demonstrate it is delivering the optimum of cost and value and the main purpose of the course is to show how this can be achieved. Note: this is a purely indicative list of topics that can be covered. The content, duration, objectives and material used would all be adapted to match your specific requirements. This course will help you: Determine what the business needs from the M&O service Determine the cost and value of the various M&O options Prepare and present the business case for the selected M&O strategy Introduce meaningful KPIs based on performance-based service by the M&O provider Undertake a review of current M&O and make recommendations for improvement Introduce energy and carbon management performance criteria in M&O Better deal with project risk and uncertainties Motivate others to deliver a reliable and cost effective M&O service Note: this is a purely indicative list of topics that can be covered. The content, duration, objectives and material used would all be adapted to match your specific requirements. 1 What is maintenance and what is operation? - their relative importance to the business 2 Comparison of the various maintenance options and techniques, including: Planned preventative Run to failure Condition monitoring Business focused Business critical Total productive Reliability centred maintenance 3 Forms of contracts and service, including: Comprehensive Input driven Output driven Limited replacement Performance based M&O 4 Selecting the right options and making the business case 5 Continuous commissioning as a tool for delivering best value 6 Case studies

Maintenance and operation (M&O) of engineering plant and services (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

CDM 2015 - in-depth (In-House)

By The In House Training Company

The learning objectives that we believe you require to be covered within the training include: A detailed understanding of the CDM 2015 Regulations and how they should work in practice An understanding of the key roles (Designer, Principal designer, contractor, principal contractor and client) under CDM 2015 What constitutes design and when you may be acting as a designer The requirements for notification Pre construction information, the construction phase plan and the H&S file An opportunity for delegates to ask questions and gain clarification on specific project requirements 1 Introduction Why manage health and safety? The costs of accidents Construction industry statistics Why CDM 2015? 2 Overview of health and safety law and liabilities Criminal and civil law Liability Enforcement and prosecution Compliance - how far do we go? Statutory duties 3 Health and safety law in construction - the current framework Framework of relevant legislationHealth and Safety at Work etc Act 1974Management of Health and Safety at Work Regulations 1999Construction (Design and Management) Regulations 2015Work at Height Regulations 2005 Who is responsible for the risks created by construction work? Shared workplaces/shared responsibilities Control of contractors - importance of contract law 4 CDM 2015 - the principles and current best practice Scope - what is construction? Application - when do the Regulations apply? The CDM management systemDutyholders (client, designer, principal designer, principal contractor, contractor)Documents (pre construction information, Notification, construction phase Plan, H&S File)Management process The 2015 HSE guidance / industry best practice Clarification of roles and responsibilities 5 Competence under CDM 2015 What is 'Competence'? The criteria to be used in construction Achieving continuous improvement 6 Part 4 Construction Health Safety and Welfare Overview of Part 4 Responsibilities Welfare arrangements 7 Risk assessment and the role of the designer Principles of risk assessment Loss prevention / hazard management What is a suitable risk assessment?Design v construction risk assessmentThe client is a designer?Whose risk is it? 8 Risk assessment exercise Understanding the principles of design risk assessment Identifying hazards under the control of clients and designers Quantifying the risk 9 Questions, discussion and review

CDM 2015 - in-depth (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry