Level 5 Endorsed Diploma | QLS Hard Copy Certificate Included | Plus 5 CPD Courses | Lifetime Access
Registration starts at 7:30 AM. The training will begin promptly at 8:00 AM. Please plan your arrival accordingly to ensure you don't miss any important information. Reduce Emissions, Save Costs, Earn a CPC Hours, and Ensure Full Compliance Topics Covered: FORS Lo-CITY Driver Training (3.5 hours): • Relationship between driving style, fuel consumption, and environmental impact • Benefits of regular vehicle maintenance and checks • Fuel-efficient driving techniques • Utilising in-vehicle technology for fuel economy • Benefits of journey planning • Alternative fuels for commercial vehicles Highway Code Training Content: Course introduction, objectives, and expectations. Introduction to the Highway Code and its relevance. Types of road users and training for various groups. Respecting and understanding the risks to different road user categories. Confirmation of knowledge quizzes covering all aspects of the Highway Code and traffic regulations. Course Details: Format: Remote Session (7 hours) CPC Hours: Yes Cost: £89.50 - Includes course fee, Driver CPC Upload fee, VAT This award-winning program (awarded the prestigious Education in Transport award at the 2017 National Courier Awards) is perfect for any fleet operator looking to: Meet FORS Gold accreditation requirements. Improve driver performance and fuel efficiency. Reduce their environmental footprint. Enhance corporate social responsibility. Please note that this course is delivered online and provides 7 hours of Driver CPC training. Ready to get started? Book online or feel free to contact our training department at training@totalcompliance.co.uk or call 0345 9001312 to register for this valuable course. Please review our Terms and Conditions for more information.
Management of Value (MoV®) Foundation: Virtual In-House Training This interactive MoV® Foundation course provides a modular and case-study-driven approach to learning Management of Value (MoV). The core knowledge is structured and comprehensive; and well-rounded modules cover the methodology and various techniques. A case study is used to help appreciate the relevance of MoV in its practical application. What you will Learn Upon completion of an MoV course candidates should be able to discuss and explain: The main processes and techniques used within MoV and the reasons for using them How MoV may be applied at portfolio, program, project and operational levels The differences in applying MoV at different stages in a project and the expected outputs from a MoV Study at each stage The circumstances under which MoV should be used The concept of value and how value may be improved The main benefits arising from the use of MoV Approaches for implementing MoV How to respond to external and internal influences The principles of embedding MoV into an organization The key topics in document checklists, the toolbox, health check, organizational maturity and individual competence. Upon successful completion of this course, you will be able to: Organize and contribute constructively to a Management of Value (MoV) Study Demonstrate a knowledge of MoV principles, processes, approach and environment Analyse a company, program or project to establish its organizational value; includes identification and weighting of Value Drivers Pass the AXELOS MoV Foundation Examination Introduction to value management and MoV Value and Value Management Capabilities, Outcomes, Benefits and Disbenefits What is Value? What is Management of Value (MoV)? Why use MoV? Where use MoV? When MoV should be used? What using MoV involve? Selected MoV benefits Relationship with other AXELOS Global Best Practices and Models How MoV fits with other AXELOS Global Best Practice Guides MoV principles Align with organization's objectives Focus on functions and required outcomes Balance the variables to maximise value Apply throughout the investment decision Tailor MoV to suit the subject Learn from experience and improve Assign clear roles and responsibilities and build a supportive culture MoV processes Frame the programme or project Gather information Analyse information Process information Evaluate and select Develop Value Improving Proposals Implement and share outputs MoV techniques Function Analysis Function Analysis System Technique (FAST) Traditional (or classic) FAST Technical FAST Customer FAST Value Trees Measuring value Value profiling (a.k.a. value benchmarking) Simple multi-attribute rating technique (a.k.a. SMART) Value index Value metrics Value for money (VfM) ratio Value Engineering / Analysis Common techniques used in MoV Analysis of information Benchmarking Process Mapping Root Cause Analysis Discounted Cash Flow Analysis Generating Ideas Brainstorming Evaluation and option selection Option Selection Matrix Idea selection Allocation to Categories Idea Selection Matrix Weighting techniques Paired Comparisons Points Distribution Developing VIPs Developing Proposals Cost Benefit Analysis Building Decisions Implementing VIPs Implementation Plans Feedback Following up Tracking Benefits Approach to Implementation Generic approach to MoV implementation Plan the MoV activities Understand and articulate value Prioritize value Improve value Quantify value Monitor improvements in value Learn lessons Environmental factors Portfolio Considerations Programme considerations Project considerations Operational Considerations Embedding MoV into an organization Benefits of Embedding MoV into an organization MoV Policy MoV Policy Composition Embedding MoV into an organisation Key steps Suggested MoV Management Structure Overcoming barriers We do it anyway It takes up too much time We can't afford to make the changes What's in it for me? Don't fix it if it ain't broke Fixed returns on investment MoV products Briefing Meeting Agenda (A.1) Communications Checklist (A.2) Equipment list for an Effective Study/Workshop (A.3) Invitation to join the Study Team (A.4) Option Evaluation Matrix (A.5) Plan the Study (A.6) Recording Idea Selection (A.7) Reporting Study outputs (A.8) Scoping the Study (A.9) Study or Workshop Handbook (A.10) Value-Improvement Proposal Forms (A.11) Value Improvement Tracking Report (A.12) MoV toolbox MoV health check and maturity model P3M3 Maturity Model MoV Maturity Model (aligned with P3M3)
Course Objectives At the end of this course you will be able to: Identify the components of the Microsoft Project environment Create a new project plan Create the project schedule Use different views to analyse the project plan Create, allocate and manage resources in a project plan Finalise a project plan Track progress View and report project plan information ' 1 year email support service Customer Feedback Very good course. Learnt a lot. Looking forward to the next level. Alexandra - CIAL ' 1 year email support service Take a closer look at the consistent excellent feedback from our growing corporate clients visiting our site ms-officetraining co uk With more than 20 years experience, we deliver courses on all levels of the Desktop version of Microsoft Office and Office 365; ranging from Beginner, Intermediate, Advanced to the VBA level. Our trainers are Microsoft certified professionals with a proven track record with several years experience in delivering public, one to one, tailored and bespoke courses. Our competitive rates start from £550.00 per day of training Tailored training courses: You can choose to run the course exactly as they are outlined by us or we can customise it so that it meets your specific needs. A tailored or bespoke course will follow the standard outline but may be adapted to your specific organisational needs. Introduction to Microsoft Project Recap on project management concepts Project environment overview The 3 databases: Tasks, Resources and Assignments Different ways of displaying the Project Plan Access Help Creating a Project Plan Create a New Project Plan Project Information Create and apply the project calendar Defining recurring exceptions to the calendar Defining the calendar's work weeks Create the Summary tasks Create the Work Breakdown Structure Task creation and scheduling Exploring the Entry Table and its fields Task editing and the Task Information window Task Durations Defining Milestones Manual Scheduling vs Automatic Scheduling Changing the Task's Calendar Create a split in a Task Create Task Relationships Adding Lag or Lead to a Relationship Identifying the Critical Path Adding Constraints and Deadlines to Tasks Create Recurring Activities Adding Notes and links to Tasks Managing Resources Exploring the Entry Table and its fields Resource editing and the Resource Information window Resource Types Fixed Costs vs Variable Costs Adding Resource Costs Defining when costs accrue Changing the Resource Calendar and Availability Project calendar vs Resource and Task Calendar Assigning Resources to Tasks Effort Driven Scheduling Resolving Resource Overallocation Tracking the Project Progress Setting a Project Baseline Entering Actuals Different ways of viewing the Progress Checking if the Project is on track Viewing and Reporting Project Detail Adding Tasks to the Timeline and sharing it Modifying the Timescale and Zoom level Formatting the Gantt View Filtering and Grouping Tasks Print and Troubleshoot the Gantt View Using built-in Reports in Microsoft Project Who is this course for? Who is this course for? This course is designed for a person who has an understanding of project management concepts, who is responsible for creating and modifying project plans, and who needs a tool to manage these project plans. Requirements Requirements General knowledge of the Windows OS Career path Career path Microsoft Office know-how can instantly increase your job prospects as well as your salary. 80 percent of job openings require spreadsheet and word-processing software skills
Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Level 3 & 5 Endorsed Diploma | QLS Hard Copy Certificate Included | Plus 5 CPD Courses | Lifetime Access
Inclusion Facilitation (IF) is an approach to enhancing the inclusion, in a mainstream community of any child or young person who is experiencing difficulties in the world because of disability, personal crisis or because of their challenging behaviour towards others. The IF approach works by mobilising the young person’s natural supports to provide support and engage with the person in difficulty. Inclusion Facilitation is designed to create a better life for an individual by the provision of an intense input designed to being about social change. This usually entails a series of visits focused on getting the person out and about to increase confidence, social skills and presence in their local community and to pursue goals and dreams. Uniquely, the work is carried out under the close clinical supervision of a practicing psychologist. What is Inclusion Facilitation Work? ‘We do whatever it takes!’ Usually a Person Centred Planning event would be carried out using the PATHor MAP process – majoring on dreams and goal setting leading to precise action planning. An experienced psychologist alongside the inclusion facilitator would carry out a PATH. A large graphic will be one of the outcomes of the meetings this is a great visual record and a shared memory of the event. This will also inform the priorities for the inclusion facilitation work Optionally following the PATH event a ‘scoping report’ is created outlining what Inclusion Facilitation could offer and highlighting what dreams and goals the individual has. The PATH is also provides a good opportunity for the Facilitator to meet the focus person in a comfortable positive environment. 12 weekly visits from the Inclusion Facilitator followed by 5 monthly visits is our preferred model but we can be flexible with the delivery of this input. This is just a guideline, however we have received good results using this time frame. After this intensive input the Inclusion Facilitator will hand over to the existing family, carers and PA team to carry on where he or she has left off. This transition time is planned from the outset. An experienced psychologist is there to support the facilitator at all times and will guide all work done by the inclusion facilitator. Is this just Support work? No! This is proactive engagement – doing whatever is required. We are not just passively or reactively providing what is asked for – we are actively pursuing a good life for the individual. Our work is built on careful research around a person’s interests and what opportunities exist locally. We carry out community mapping. We actively work to tackle an individual’s own resistance and reluctance to engage more socially. We actively engage with people in social settings that the individual attends to build bridges and connections – we are bridge builders. We build circles around a person. We create the conditions in which friendships can flourish. We have direct psychological supervision and support throughout. This work is short term and intense. Enjoy participating in a multimedia workshop that will challenge, entertain and reach for your emotions. Learning Objectives 1.To be able to understand the values and wider context of inclusion. 2.To be able to set up and run an ‘Inclusion Facilitation project to improve the life chances and connections of a child or young person. 3.To understand and be able to maximise the power of the peer group in supporting relationships, achievement and behaviour. Course Content The course answers the questions: What do you do with the child who is isolated by their aggression and anger, through being different, disabled or new to the school or community? Practically how do we go about including high profile children or young people? How can we help some children be friends? We will cover: Inclusion values underpinning this work The Intentional Building of Relationships –‘Inclusion Facilitation’ work as an example Not doing it alone – The Importance of Teams in developing inclusive practice Practical setting up and running of IF work Lessons learned Stories of IF work
The Learning College Group offers this Teaching Assistant qualification that is fully Regulated and accepted in all schools across the UK. It enables you to work with children between the ages of 5-18 years. This Level 3 Teaching Assistant course is a recognised (RQF) qualification that can be studied in your own time from home. 1-2-1 Tutor support is provided with this Teaching Assistant course. OFSTED accepted and regulated by OFQUAL this qualification will be the required course to secure your job as a Teaching Assistant.
The Learning College Group offers this Teaching Assistant qualification that is fully Regulated and accepted in all schools across the UK. It enables you to work with children between the ages of 5-18 years. If you are looking to become a Teaching Assistant and wish to gain the required 'recognised' qualification that's accepted in all UK schools, this is the perfect Teaching Assistant certificate course for you. This guided Teaching Assistant certificate qualification is simple to follow and supported fully by a personal 1-2-1 Tutor that will assist you step by step.