• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1678 Environment courses in Ewell delivered Live Online

Risk Assessing

By Prima Cura Training

This course is designed to enable learners to increase their understanding of risk assessment and risk management in Health and Social Care settings.

Risk Assessing
Delivered in person or OnlineFlexible Dates
Price on Enquiry

Personal Productivity

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for In this course, students will learn how to establish routines, set goals, create an efficient environment, and use time-honored planning and organizational tools to use their time more effectively. Overview Upon successful completion of this course, students will take ownership of their time management in order to achieve their goals and lead a more productive life. In this course, students will learn how to establish routines, set goals, create an efficient environment, and use time-honored planning and organizational tools to use their time more effectively. Getting Started Icebreaker Housekeeping Items The Parking Lot Workshop Objectives Setting SMART Goals The Three P's The SMART Way Prioritizing Your Goals Evaluating and Adapting The Power of Routines What is a Routine? Personal Routines Professional Routines Six Easy Ways to Simplify Your Life Scheduling Yourself The Simple Secret of Successful Time Management Developing a Tracking System Scheduling Appointments Scheduling Tasks Keeping Yourself on Top of Tasks The One-Minute Rule The Five-Minute Rule What To Do When You Feel Like You're Sinking Tackling New Tasks and Projects Why We Procrastinate Nine Ways to Overcome Procrastination Eat That Frog! Using Project Management Techniques The Triple Constraint Creating the Schedule Using a RACI Chart Creating a Workspace Setting Up the Physical Layout Ergonomics 101 Using Your Computer Efficiently Organizing Files and Folders Organizing Paper Files Organizing Electronic Files Scheduling Archive and Clean-Up Managing E-Mail Using E-mail Time Wisely Taking Action! Making the Most of Your E-mail Program Taking Time Back from Handheld Devices Tackling Procrastination Why We Procrastinate Nine Ways to Overcome Procrastination Eat That Frog Wrapping Up Words from the Wise Review of Parking Lot Lessons Learned Completion of Action Plans and Evaluations

Personal Productivity
Delivered OnlineFlexible Dates
Price on Enquiry

Pure Healing

By Selena joy lovett

https://www.patreon.com/moonhealinganddivination/membership

Pure Healing
Delivered OnlineFlexible Dates
£54

The Remote Auditing Course

By Research Quality Association

Course Information Join us for a two-day immersive course crafted to equip participants with an in-depth understanding of remote audit methodologies. Delve into the nuances between remote and face-to-face audits, dissecting their respective strengths and limitations. Through practical scenarios tailored for remote audit conduct, this course stands as an essential counterpart to our on-site audits course The Auditing Course. Who Should Attend: Applicable across various domains of regulated research and development, this course proves invaluable in contexts requiring a quality system for audit. Participants with firsthand audit experience stand to gain the most benefit from this programme. Expanding on Previous Learning: This course extends its relevance to all forms of audits and further amplifies concepts explored in RQA's suite of research quality assurance courses, including: 'Research Quality Assurance for Good Laboratory Practice,' 'Good Clinical Practice Auditing – Principles and Practice,' and 'Good Manufacturing Practice for Investigational Medicinal Products.' Benefits include improved: Understand the processes of planning, conducting, reporting and follow-up of audits Recognising the importance of personal approach in developing positive audit outcomes Ability to analyse evidence and present logical audit findings Appreciate the importance of audit in continuing improvement. This course is structured to encourage delegates to: Discuss and develop ideas Solve problems Exchange information. Tutors Tutors will be comprised of (click the photos for biographies): Andrew Waddell Founder Director, Tower Mains Ltd Rosemary Ichaba Senior QA Associate, Tower Mains Ltd Cate Ovington Director, The Knowlogy Group Ltd Jean McWilliam Associate Director, Alexion Programme Please note timings may be subject to alteration. Day 1 09:00 Course Registration 09:15 Welcome and Introductions 09:35 Introduction to Audits Delegates explore the range of audits which they have experienced, define the purpose of each audit type and establish which of those audits are performed to meet regulatory requirements. 10:05 Introduction to Remote Audits Presentation to introduce the major differences between face-to-face audits and remote audits. The major elements of audits will be examined to determine where there may be differences. 10:30 Break 10:45 Workshop 1 - Remote Audits This workshop will examine participants experience or understanding of the differences between face-to-face and remote audits. 11:15 Workshop 1 - Feedback 11:35 Audit Preparation The essential steps in preparation for audits will be discussed with emphasis on remote audits. 12:05 Workshop 2 - Remote Audit Preparation Factors relating to the preparation for remote audits will be considered in discussion groups. 12:35 Workshop 2 - Feedback 12:50 Lunch 13:30 Audit Logistics Preparation for the audit includes many arrangements other than the audit content. 14:00 Workshop 3 - Audit Logistics Delegates will discuss some of the issues that may occur during the set up and conduct of remote audits and how to resolve them. 14:30 Workshop 3 - Feedback 14:45 Break 15:00 The Opening Meeting Presentation regarding the importance and content of the opening meeting. 15:20 Workshop 4 - Opening Meeting Delegates will consider the practicalities of arranging and conducting an opening meeting. 15:45 Workshop 4 - Feedback 16:10 Audit Conduct Tools Practical advice on preparation of some of the tools that will be valuable in the conduct of audits. 16:40 Questions and Answers An overview of the first day and a chance to ask questions 17:00 Close of Day Day 2 09:00 Reflections on Day 1 Recap on the topics covered and a chance for delegates to raise points. 09:15 Gathering Evidence Presentation on challenges of gathering evidence and conducting interviews during remote audits. 09:45 Workshop 5 - Remote Interviews Scenarios of different remote interviews will be played and delegates assess the strengths and weaknesses of each approach. 10:15 Break 10:30 Creating Audit Findings Ideas regarding how to create good audit findings will be discussed during this short presentation. 10:50 Workshop 6 - Creating Audit Findings Delegates will be provided with examples of evidence from an audit. They will discuss these and create their audit findings for presentation at the closing meeting. 11:35 The Closing Meeting The content and conduct of the closing meeting will be discussed. 11:55 Workshop 7(a) - Preparing for the Closing Meeting The findings from workshop 6 will be reviewed and a Lead Auditor selected to provide feedback in workshop 7(b) 12:15 Workshop 7(b) - The Closing Meeting The Lead Auditor from each group will hold a meeting to present the results (role play). 12:45 Lunch 13:30 The Audit Report This presentation will cover not only the essential contents of the audit report but also how to write the report in a manner that will generate the most positive reaction. 14:00 Workshop 8 - The Audit Report Delegates will be provided with an audit report from an audit conducted remotely and will conduct a peer review of the report in their breakout groups. 15:00 Workshop 8 - Feedback 15:20 Break 15:35 Audit Closure Presentation on how to conclude the audit with reference to post-audit activities. 15:55 Open Forum 16:30 Close of Course Extra Information Course material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking You will need a stable internet connection, a microphone and a webcam.  

The Remote Auditing Course
Delivered OnlineFlexible Dates
£750 to £1,000

Cisco Implementing an Integrated Threat Defense Solution (SECUR201) v1.2

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy a Cisco Integrated Threat Defense solution in their network environment. Cisco integrators and partners Systems and network engineers Technical architects Technical support personnel Overview After taking this course, you should be able to: Understand the network security landscape and the Cisco Integrated Threat Defense (ITD) solutions Describe the key components of the ITD solution and their use in the network Configure the Cisco Identity Services Engine (ISE) for a baseline of operation in the ITD solution Configure the integration between the Cisco Stealthwatch and Cisco ISE platforms Configure the integration between the Cisco Firepower and ISE platforms Configure the integration between Cisco Firepower and Cisco Advanced Malware Protection (AMP) for Endpoints The Implementing an Integrated Threat Defense Solution (SECUR201) v1.2 course provides an analysis of the cybersecurity landscape with an emphasis on the importance of an integrated threat defense architecture. Through a combination of lessons and hands-on practice, you will learn to deploy and integrate Cisco©?s Integrated Threat Defense solutions which include: Cisco Identity Services Engine (ISE), Cisco Stealthwatch, Cisco Firepower NGFW, and Cisco AMP for Endpoints. This course provides you with the knowledge and skills to implement and integrate solution components with existing network services, integrate solution components with the pxGrid (Platform Exchange Grid) framework, integrate network and endpoint-based malware protection, and observation of security dataflow after the introduction of malware. Course Outline Integrated Threat Defense Introduction ITD Products Identity Services Engine Setup Integration of Stealthwatch with Identity Services Engine Integration of Firepower with Identity Services Engine Integration of Firepower with AMP for Endpoints Lab outline Connecting to the Lab Environment Integrating ISE and Active Directory Integrating ISE and Cisco Adaptive Security Appliance (ASA) Configuring pxGrid and Client Certificates Integrating Stealthwatch with Identity Services Engine Integrating Network Visibility Module (NVM) with AnyConnect Integrating Firepower with Identity Services Engine Integrating AMP for Endpoints with Firepower

Cisco Implementing an Integrated Threat Defense Solution (SECUR201) v1.2
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Endpoint Protection 14.X - Configure And Protect

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Overview At the completion of the course, you will be able to: Protect against Network Attacks and Enforcing Corporate Policies using the Firewall Policy. Blocking Threats with Intrusion Prevention. Introducing File-Based Threats. Preventing Attacks with SEP. Layered Security. Securing Windows Clients. Secure Mac Clients. Secure Linux Clients. Controlling Application and File Access. Restricting Device Access for Windows and Mac Clients. Hardening Clients with System Lockdown. Customizing Policies based on Location. Managing Security Exceptions. This course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Introduction Course environment Lab environment Introducing Network Threats Describing how Symantec Endpoint Protection protects each layer of the network stack Discovering the tools and methods used by attackers Describing the stages of an attack Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy Preventing network attacks Examining Firewall Policy elements Evaluating built-in rules Creating custom firewall rules Enforcing corporate security policy with firewall rules Blocking network attacks using protection and stealth settings Configuring advanced firewall feature Blocking Threats with Intrusion Prevention Introducing Intrusion Prevention technologies Configuring the Intrusion Prevention policy Managing custom signatures Monitoring Intrusion Prevention events Introducing File-Based Threats Describing threat types Discovering how attackers disguise their malicious applications Describing threat vectors Describing Advanced Persistent Threats and a typical attack scenario Following security best practices to reduce risks Preventing Attacks with SEP Layered Security Virus and Spyware protection needs and solutions Describing how Symantec Endpoint Protection protects each layer of the network stack Examining file reputation scoring Describing how SEP protects against zero-day threats and threats downloaded through files and email Describing how endpoints are protected with the Intelligent Threat Cloud Service Describing how the emulator executes a file in a sandbox and the machine learning engine?s role and function Securing Windows Clients Platform and Virus and Spyware Protection policy overview Tailoring scans to meet an environment?s needs Ensuring real-time protection for clients Detecting and remediating risks in downloaded files Identifying zero-day and unknown threats Preventing email from downloading malware Configuring advanced options Monitoring virus and spyware activity Securing Mac Clients Touring the SEP for Mac client Securing Mac clients Monitoring Mac clients Securing Linux Clients Navigating the Linux client Tailoring Virus and Spyware settings for Linux clients Monitoring Linux clients Providing Granular Control with Host Integrity Ensuring client compliance with Host Integrity Configuring Host Integrity Troubleshooting Host Integrity Monitoring Host Integrity Controlling Application and File Access Describing Application Control and concepts Creating application rulesets to restrict how applications run Monitoring Application Control events Restricting Device Access for Windows and Mac Clients Describing Device Control features and concepts for Windows and Mac clients Enforcing access to hardware using Device Control Discovering hardware access policy violations with reports, logs, and notifications Hardening Clients with System Lockdown What is System Lockdown? Determining to use System Lockdown in Whitelist or Blacklist mode Creating whitelists for blacklists Protecting clients by testing and Implementing System Lockdown Customizing Policies based on Location Creating locations to ensure the appropriate level of security when logging on remotely Determining the criteria and order of assessment before assigning policies Assigning policies to locations Monitoring locations on the SEPM and SEP client Managing Security Exceptions Creating file and folder exceptions for different scan types Describing the automatic exclusion created during installation Managing Windows and Mac exclusions Monitoring security exceptions

Symantec Endpoint Protection 14.X - Configure And Protect
Delivered OnlineFlexible Dates
Price on Enquiry

Train the trainer (In-House)

By The In House Training Company

At some point in your life you will have attended a training course or workshop, but what happens when you are asked to deliver one? Some people relish the opportunity while others are challenged by it. Whatever you feel about training others, it is a skill that is admired and can be studied and learned. With the trainer you will be learning the techniques, skills and understanding you need and you will have the chance to deliver a short training session to others, receive feedback and having the confidence to deliver it for real in your job. The training will comprise one day followed by a half day when all those able to attend will deliver and have feedback on a 20 minute training activity. To be able to create and maintain an environment conducive to learning and engagement To understand basic learning theory and practice and the difference between training, facilitating and learning To understand how adults learn and how to apply it as a trainer To be able to plan and deliver a training activity using the appropriate set of skills and behaviours To be able to review and evaluate learning and identify how outcomes are met To manage the learning process and the participant engagement in the training environment To be able to present effectively and appropriately to a variety of audiences To deliver and receive feedback on a short delivered training activity with peers To review and evaluate learning and have an action plan to take back and put into practice DAY ONE (full-day) 1 Welcome, housekeeping, how the day will be run Introductions (and making the most of them) Warm up - breaking the ice followed by review and feedback Creating an environment conducive to learning and engagement; managing expectations well as a trainer Group task with feedback and review in plenary 2 What is training and how do adults learn? Trainer input: David Kolb's Learning Cycle Group tasks 3 How to plan a session and what to include - trainer input Starting at the end and working backwards Linking outcomes to purposeful activities Practice task and planning time for day two using a template 4 The skills and behaviours of a brilliant trainer Modelling skills and behaviours Creative task and discussion 5 Mini reviewing task De-brief - using reviewing in training 6 How to manage the process Trainer input followed by practice Paying conscious attention to language (verbal and non verbal), feelings and responses in the room and managing yourself as a trainer 7 The trainer's toolkit #1 Key tools, materials and templates Choosing different tools and approaches with different audiences Know your audience 8 The trainer's toolkit #2 Key tools, materials and templates continued Addressing trainer good practice 9 Review, evaluation and action planning activities Why and what should we be evaluating and why it's important Action planning task Group review task DAY TWO (half-day) The day will comprise a series of 30 minute timed sessions where each delegate will present and deliver a training activity with the group. The training activity will be prepared and planned in advance and will take 20 minutes (+ or - 2 minutes) to deliver in real time. This will be followed by review and feedback from the trainer and peers to complete the total of 30 minutes as a time slot. Reiteration of the task and discussion can take place with the trainer if needed, and there is time included in Day One to support the training planning.

Train the trainer (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Driver CPC - 1 Day Periodic 7 Hour Course - Manual Handling / Safe Loading of Vehicles - ONLINE - June 25

By Total Compliance

Our comprehensive online course offers a deep dive into Manual Handling and Safe Loading of Vehicles. Whether you're a seasoned driver or just starting out, this training will equip you with essential knowledge and skills to navigate various road conditions safely and efficiently. Manual Handling Training: Gain a strong foundation in safe lifting techniques to prevent injuries when loading, unloading, and manoeuvring goods. Safe Loading of Vehicles: Acquire essential knowledge and practical skills for securing loads effectively, preventing accidents, and complying with road safety regulations. Invest in your professional development and become a safer, more compliant driver. Please review our Terms and Conditions for more information.

Driver CPC - 1 Day Periodic 7 Hour Course - Manual Handling / Safe Loading of Vehicles - ONLINE - June 25
Delivered Online
£70

Language Courses Abroad

By London Centre Of International Studies

Study abroad is about stepping out of your comfort zone, embracing a new culture and way of life, and coming home with unforgettable memories

Language Courses Abroad
Delivered in London or OnlineFlexible Dates
£1,150

CNS-319 Citrix ADC 12.x Advanced Concepts - Management and Optimization

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for students with previous Citrix ADC experience, and best suited for individuals who will be deploying Citrix Application Delivery Management to administer a Citrix Networking environment or optimize Citrix ADC-managed application delivery traffic. Overview Manage multiple Citrix ADC platforms centrallyOrchestrate configuration changesReport on transactions passing through the Citrix ADC environmentVisualize infrastructure and plan expansion Master the deployment and usage of Citrix Application Delivery Management with this two-day management and optimization course. Students will gain the skills needed to automate and manage network services for scale out of application architectures, and to optimize Citrix ADC-managed application delivery traffic. The curriculum focuses on centrally managing multiple Citrix ADC platforms, orchestrating configuration changes, reporting on transactions, visualizing infrastructure and planning infrastructure expansion. Students will also learn how to implement Citrix ADC features, including caching, frontend optimization, Citrix ADC web logging and TCP/HTTP optimization, to optimize traffic managed by your Citrix networking environment. Citrix Application Delivery Management Introduction An introduction to Application Delivery Management Application Delivery Management Deployment and Configuration Deploying Application Delivery Management in High Availability Application Delivery Management Instance Management Managing and Monitoring Application Delivery Management An introduction to Application Delivery Management Application Delivery Management Deployment and Configuration Deploying Application Delivery Management in High Availability Application Delivery Management Instance Management Managing Citrix ADC Configuration Application Management StyleBooks Configuration Management Citrix ADC Web Logging Understanding Web Traffic Installing and configuring Citrix ADC Web Logging Troubleshooting Citrix ADC Web Logging Citrix ADC Integrated Caching Introduction to Integrated Caching Static and Dynamic Content Request and Response Process Flow Understanding Cache Policies Identifying Content Group Settings Front-End Optimization Improving Content Delivery Front-End Optimization Use Cases Understanding Minification CSS Optimizations Tuning and Optimizations Connections on the Citrix ADC Connection Profiles Queuing on the Citrix ADC Connection Tuning Practices

CNS-319 Citrix ADC 12.x Advanced Concepts - Management and Optimization
Delivered OnlineFlexible Dates
Price on Enquiry