This Health & Safety in the Care Sector Course works alongside, and helps, learners understand Standard 13 of the Care Certificate. This Standard touches on the legislation, policies & responsibilities relating to Health & Safety in the care sector, as well as looking at accidents and sudden illnesses.
Level 2 NVQ Diploma in Drilling Operations - Directional Drilling - Drill Rig Operator
Level 6 NVQ Diploma in Construction Site Management
Introducing Co-Parenting Counseling Package: Nurturing Healthy Co-Parenting Relationships for the Well-being of Your Children Are you facing challenges in co-parenting and seeking support to build a healthy and cooperative co-parenting relationship? Miss Date Doctor’s Co-Parenting Counseling Package offers you a constructive and nurturing environment to enhance communication, resolve conflicts, and prioritize the well-being of your children. Co-parenting after separation or divorce can be complex and emotionally charged. Our experienced counselors specialize in co-parenting dynamics and are here to assist you in navigating the journey of raising your children together in a positive and supportive manner. Here’s how the Co-Parenting Counseling Package can support you: Effective Communication: Our counselors will help you develop open and effective communication strategies, ensuring that you can discuss parenting matters calmly and constructively. Conflict Resolution: Co-parenting counseling focuses on resolving conflicts in a healthy and respectful manner, reducing tension and promoting a harmonious co-parenting relationship. Creating a Co-Parenting Plan: We’ll work with you to create a comprehensive co-parenting plan that outlines responsibilities, schedules, and agreements, providing clarity and structure for both parents and children. Child-Centered Approach: The well-being of your children is paramount. Co-parenting counseling emphasizes a child-centered approach, ensuring that their needs and feelings are considered in decision-making. Co-Parenting Boundaries: Establishing healthy boundaries is essential for successful co-parenting. Our counselors will help you set clear boundaries and expectations for co-parenting interactions. Parenting Consistency: Consistency is crucial for children’s stability. Co-parenting counseling promotes parenting consistency between households to provide a sense of security for your children. Handling Transitions: Our counselors will assist you in managing transitions between households, ensuring that they are as smooth and stress-free as possible for the children. Conflict Minimization: Co-parenting counseling aims to minimize conflict and create a more harmonious environment for all family members involved. The Co-Parenting Counselling Package at Miss Date Doctor is designed to empower you and your co-parent to build a positive and supportive co-parenting relationship. Our counsellors provide guidance and support to ensure that your children grow up in a loving and stable environment, even after separation or divorce. Invest in the well-being of your children and take the first step towards nurturing a healthy co-parenting relationship. Embrace the opportunity to create a positive and cooperative co-parenting dynamic, focused on the best interests of your children. Let our skilled counsellors guide you towards a brighter co-parenting future filled with understanding, cooperation, and mutual respect 3 X 1 hour https://relationshipsmdd.com/product/co-parenting-counselling-package/
Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.
Course Objectives At the end of this course you will be able to: Identify and work with basic Word 2013 tools and features Edit text in a Word document Modify the appearance of text in a Word document Organise data in tables and lists Insert special characters and graphical objects Control the appearance of pages in a Word document Proof a document Customise the Word environment '1 year email support service Take a look at the consistent excellent feedback from our corporate clients visiting our site ms-officetraining co uk Customer Feedback Good pace, questions encoraged, trainer ensured everyone was kept at same level. Jenny Price - ACER ' With more than 20 years experience, we deliver courses on all levels of the Desktop version of Microsoft Office and Office 365; ranging from Beginner, Intermediate, Advanced to the VBA level. Our trainers are Microsoft certified professionals with a proven track record with several years experience in delivering public, one to one, tailored and bespoke courses. Our competitive rates start from £550.00 per day of training Tailored training courses: You can choose to run the course exactly as they are outlined by us or we can customise it so that it meets your specific needs. A tailored or bespoke course will follow the standard outline but may be adapted to your specific organisational needs. Getting Started with Word Identify the Components of the Word Interface Create a Word Document Help Editing a Document Navigate and Select Text Modify Text Find and Replace Text Formatting Text and Paragraphs Apply Character Formatting Align Text Using Tabs Display Text as List Items Control Paragraph Layout Apply Borders and Shading Apply Styles Manage Formatting Adding Tables Insert a Table Modify a Table Format a Table Convert Text to a Table Managing Lists Sort a List Renumber a List Customise a List Inserting Graphic Objects Insert Symbols and Special Characters Add Images to a Document Page Setup Apply a Page Border and Color Add a Watermark Add Headers and Footers Control Page Layout Proofing a Document Check Spelling and Grammar Other Proofing Tools Check Accessibility Customising the Word Environment Customise the Word Interface Additional Save Options Who is this course for? Who is this course for? This course is intended for delegates who want to learn the fundamentals skills of working with Microsoft Word Requirements Requirements General knowledge of the Windows OS Certificates Certificates Certificate of completion Digital certificate - Included
Management of Value (MoV®) Practitioner This interactive MoV® Practitioner course provides a modular and case-study-driven approach to learning Management of Value (MoV). The core knowledge is structured and comprehensive; and well-rounded modules cover the methodology and various techniques. A case study is used to help appreciate the relevance of MoV in its practical application. What you will Learn The MoV Practitioner Course prepares you for the MoV Practitioner exam. Individuals certified at the MoV Practitioner level will be able to: Apply Management of Value (MoV) principles, processes and techniques, and advocate the benefits of this application appropriately to the senior Management. Develop a plan of MoV activities for the whole lifecycle of small and large projects and programs. Plan an MoV study, tailoring it to particular projects or programs and developing practical study or workshop handbooks as required. Understand and articulate value in relation to organizational objectives. Prioritize value drivers using function analysis and use these to demonstrate how value might be improved. Quantify monetary and non-monetary value using the Value Index, Value Metrics and the Value for Money ratio. Describe and comment on the application of various techniques relevant to MoV. Monitor improvements in value realized throughout a project lifecycle and capture learning which can be transferred to future projects. Offer suggestions and guidance about embedding MoV into an organization, including policy issues, undertake a health check, assess maturity and competence, and provide guidance on typical roles and responsibilities. Understand and articulate the use of MoV within other Best Management Practice methods and its contributions to them Benefits of Taking This Course Upon successful completion of this course, you will be able to: Organise and contribute constructively to a Management of Value (MoV) Study Demonstrate a knowledge of MoV principles, processes, approach, and environment Analyse a company, programme or project to establish its organisational value includes identification and weighting of Value Drivers Pass the AXELOS Practitioner Examination Function Analysis Customer FAST Diagram Value Tree Development Weighting Attributes Paired Comparisons Developing a Value Profile Developing a Value Index Value for Money Ratio Stimulating Innovation Value Engineering Option Evaluation and Selection Evaluation Matrix Value and Value for Money Timing and Planning Teams and Stakeholders MoV in the Organization Integrating with Best Management Practice Relationship between Process and Approach
Internet of Things training course description A concise overview course covering The Internet of Things and the technologies involved. Particular emphasis is placed on the high level architecture of IoT and the benefits achievable. What will you learn Describe the structure of the IoT List the technologies involved in IoT. Explain how IoT works. Internet of Things training course details Who will benefit: Non-technical staff working with IoT. Prerequisites: None. Duration 1 day Internet of Things training course contents What is IoT The Internet, what is IoT? IoT and M2M, IoT technologies, IoT architecture. Wired and wireless communication. IoT applications; Smart houses, smart cities, smart cars, wearable, environment, other domain specific IoTs. IoT architecture Physical objects, virtual objects, cloud computing, data capture, communications. Big data. Components Hardware, sensors, actuators, chips, firmware, embedded systems. Open source platforms. Power options: Battery, solar, PoE. IoT communication RF, ZigBee, Bluetooth, Bluetooth LE, RFID, WiFi, 802.11ah, mobile technologies. Wired. Arduino (as an example) Microcontrollers, the platform, development, Arduino software, reading from sensors, I2C, SPI. Arduino and the Internet, HTTP, WiFi, GSM. The cloud and IoT: Pachube, nimbits, ThingSpeak Security in IoT Authentication, Encryption, secure booting, firewalls.