Ethernet LANS training course description This course has been replaced as part of our continuous curriculum development. Please see our Definitive Ethernet switching course What will you learn Describe what Ethernet is and how it works. Install Ethernet networks Troubleshoot Ethernet networks Analyse Ethernet packets Design Ethernet networks Recognise the uses of Hubs, Bridges, switches and routers. Ethernet LANS training course details Who will benefit: Those wishing to find out more about how their LAN works. Prerequisites: Intro to Data comms & networking. Duration 3 days Ethernet LANS training course contents What is Ethernet? LANS, What is Ethernet?, history, standards, the OSI reference model, how Ethernet works, CSMA/CD. Ethernet Cabling UTP, cat 3,4,5, Cat 5e, Cat 6, Cat 7, fibre optic cable, MMF, SMF. Hands on Making a cable. 802.3 physical specifications Distance limitations, hubs and repeaters, 5-4-3-2-1 rule, 10BaseT, 10BaseF, 100BaseTX, 100BaseFX, 1000BaseSX, 1000BaseT, 10gbe. Hands on Working with hubs. Ethernet layer 2 Overview, NICS, device drivers, MAC addresses, broadcasts, multicasts, frame formats, Ether II, 802.3, 802.2, SNAP, compatibility, Ethernet type numbers, Ethernet multicast addresses, Ethernet vendor codes. Hands on Installing Ethernet components, analysing MAC headers. IP and Ethernet ARP Hands on Analysing ARP packets. Ethernet extensions Full/half duplex, auto negotiation, flow control methods, 802.3ad, 802.3af, 802.3ah. Hands on Configuration of full/half duplex. Ethernet speed enhancements Encoding, Carrier extension, packet bursting, jumbo frames. Prioritisation 802.1P, 802.1Q, TOS, WRR, QOS, VLANs. Hands on 802.1p testing Interconnecting LANS Broadcast domains, Collision domains, What are bridges, transparent bridging, What are switches? STP, VLANS, What are routers? Layer 3 switches, Connecting Ethernet to the WAN. Hands on STP, Analysing Ethernet frames in a routed architecture. Troubleshooting and maintaining Ethernet Utilisation, performance, TDR and other testers, bottlenecks, statistics, RMON. Hands on Monitoring performance, troubleshooting tools.
RQF level 1 Awareness of Safeguarding The RQF Level 1 Awareness of Safeguarding course is designed to provide individuals with a basic understanding of safeguarding principles and practices. It aims to raise awareness about the importance of safeguarding and promote the well-being and protection of vulnerable individuals, such as children, young people, and adults at risk. The course covers the following topics: Introduction to Safeguarding: Definition and importance of safeguarding. Key legislation, policies, and guidance related to safeguarding. Roles and responsibilities of individuals and organizations in safeguarding. Types of Abuse and Neglect: Overview of different types of abuse, including physical, emotional, sexual, and financial abuse. Recognizing signs and indicators of abuse and neglect. Understanding the impact of abuse on individuals' well-being. Vulnerable Groups: Identifying vulnerable groups, such as children, young people, older adults, and individuals with disabilities or mental health issues. Understanding the specific safeguarding concerns and considerations for each group. Reporting and Responding to Safeguarding Concerns: Procedures for reporting safeguarding concerns or disclosures. Understanding the importance of maintaining confidentiality and handling sensitive information appropriately. Responding to safeguarding concerns in a timely and appropriate manner. Promoting Safeguarding and Preventing Abuse: Strategies for promoting a safe and inclusive environment. Recognizing potential risk factors and implementing preventative measures. Understanding the importance of creating a culture of safeguarding within organizations. Multi-Agency Collaboration: Collaboration between different agencies and organizations involved in safeguarding, such as social services, law enforcement, and healthcare. Sharing information and working together to ensure effective safeguarding practices. Case Studies and Scenarios: Reviewing case studies and scenarios to apply safeguarding principles and practices. Analysing potential safeguarding dilemmas and decision-making processes. Personal Responsibilities: Recognizing personal boundaries and limitations when working with vulnerable individuals. Understanding the importance of self-care and managing emotional well-being when dealing with safeguarding issues. It is important to ensure that the course meets local safeguarding guidelines and requirements. Suitability - Who should attend? The RQF Level 1 Awareness of Safeguarding course is suitable for a wide range of individuals who may come into contact with vulnerable individuals or have a general interest in understanding safeguarding principles. Here are some key groups of people who should attend the course: Employees and Staff: The course is relevant for employees and staff members across various sectors and industries, including but not limited to education, healthcare, social services, hospitality, sports and recreation, and community organizations. It helps them develop a basic understanding of safeguarding principles and their responsibilities in ensuring the well-being and protection of vulnerable individuals they may encounter in their work. Volunteers: Individuals who volunteer their time and services in organizations that work with vulnerable individuals should attend the course. It equips them with essential knowledge and awareness of safeguarding issues, helping them provide appropriate support and maintain the safety and dignity of those they interact with. Parents and Caregivers: The course can benefit parents, guardians, and caregivers by providing them with a foundation in safeguarding principles. It helps them recognize potential risks and signs of abuse or neglect, enabling them to create safer environments for the children or vulnerable individuals under their care. Community and Youth Workers: Individuals involved in community work, youth organizations, or youth clubs should attend the course to enhance their understanding of safeguarding. It enables them to promote the well-being and safety of young people and recognize signs of potential abuse or exploitation. Volunteers or Trustees of Charitable Organizations: Individuals serving as volunteers or trustees in charitable organizations that work with vulnerable populations can benefit from the course. It helps them fulfill their responsibilities in safeguarding the individuals the organization serves and ensures they are aware of their legal and ethical obligations. General Public: The course is open to the general public as it provides valuable knowledge and awareness of safeguarding principles. It can benefit individuals who have an interest in understanding the rights and protection of vulnerable individuals in society. It's important to note that the RQF Level 1 Awareness of Safeguarding course provides foundational knowledge and awareness. For individuals who require more in-depth training or who have specific safeguarding roles or responsibilities, higher-level courses may be more suitable. Outcome / Qualification etc. Certification The qualification does not have an expiry date but refresher training and keeping up to date with changes to policies, procedures and new legislation through ongoing CPD is vital. Training Course Content Module 1 Introductions Module 2 Safeguarding legislation and guidance Module 3 Roles and responsibilities Module 4 Abuse and neglect Module 5 Identifying concerns and disclosure Module 6 Making judgements Module 7 Reporting concerns Module 8 Course closure and assessment MODULE 1 INTRODUCTIONS Session content Trainer/Assessor introduction Learner introductions Course syllabus Learning outcomes and assessment criteria Session duration 20 minutes MODULE 2 SAFEGUARDING LEGISLATION AND GUIDANCE Session content Introduction to safeguarding Definitions Assessment framework Safeguarding statistics Safeguarding legislation and guidance Rights of a child/adult at risk Session duration 40 minutes MODULE 3 ROLES AND RESPONSIBILITIES Session content Safeguarding partnerships Local authority safeguarding officer Social care services Multi-agency safeguarding hubs Organisational safeguarding policies Safeguarding lead Session duration 30 minutes MODULE 4 ABUSE AND NEGLECT Session content Definitions Types of abuse and neglect Physical abuse Emotional abuse Sexual abuse Neglect Signs and indicators Parent/carer abuse Radicalisation FGM Forced marriage Modern slavery County line gangs Electronic media abuse - Internet and social networking dangers Session duration 50 minutes MODULE 5 IDENTIFYING CONCERNS AND DISCLOSURE Session content Identifying concerns Being a point of disclosure Recording disclosure information Session duration 20 minutes MODULE 6 MAKING JUDGEMENTS Session content Child development needs Identifying a safeguarding concern Group activity making judgements Session duration 30 minutes MODULE 7 REPORTING CONCERNS Session content Silencing factors Barriers to raising concerns Reporting concerns Importance of sharing concerns Session duration 20 minutes MODULE 8 COURSE CLOSURE AND ASSESSMENT Session content Course summary Assessment paper Course evaluation Course closure Session duration 30 minutes Course delivery details Qualification delivery The qualification has 4 assigned guided learning hours (GLH) and 5 hours total qualification time (TQT). GLH indicates the number of classroom contact hours that the learner will undertake. TQT includes GLH but also takes into account any unsupervised learning and is an estimate of how long the average learner will take to complete the qualification. The minimum classroom contact time of 4 hours should be delivered over a minimum of half a day. The course can be spread over a maximum of 2 weeks, ensuring that each session is a minimum of two hours. The class ratio for this qualification is a maximum of 16 learners to 1 Trainer/Assessor Why choose Madeleys First Aid Plus Founded in 2021 after Louise left 30 years in the NHS as an Advanced practitioner in A&E/ITU, had spent 1.5 years in Covid ITU Won FSB Best start-up business in the West Midlands in May 2023 Now trained 100's of delegates in Physical and Mental Health First Aid Expenses Travel costs and lunch required, there are many cafes and sandwich bars here in Much Wenlock to buy your lunch, you may eat it in the training room. All training material, books, qualification certificates are included in the price Continuing Studies The RQF Level 1 Awareness of Safeguarding course serves as an introductory course that provides individuals with a basic understanding of safeguarding principles. While it is a standalone qualification, individuals who complete the course may choose to progress further in their safeguarding training and education. Here are some potential progression options: RQF Level 2 Award in Safeguarding: This qualification builds upon the knowledge gained in the Level 1 course and provides a more comprehensive understanding of safeguarding principles, policies, and procedures. It covers topics such as risk assessment, responding to safeguarding concerns, and effective communication in safeguarding contexts. Specialized Safeguarding Courses: Individuals who wish to focus on specific areas of safeguarding can pursue specialized courses related to their field of interest. These courses may include Child Protection, Adult Safeguarding, Domestic Abuse Awareness, Online Safety, or Safeguarding in Healthcare. Specialized courses delve deeper into the specific risks, regulations, and best practices associated with safeguarding vulnerable individuals in those particular contexts. Safeguarding Training for Specific Professions: Many professions have specific safeguarding training requirements tailored to their sector. For example, teachers may need to complete safeguarding training specific to the education setting, healthcare professionals may have training focused on safeguarding vulnerable patients, and social workers may have specialized safeguarding training in line with their role. Progression may involve undertaking profession-specific safeguarding courses or qualifications. Safeguarding Leadership and Management Training: Individuals in supervisory or managerial positions may consider pursuing training that focuses on the leadership and management aspects of safeguarding. This can include courses on developing and implementing safeguarding policies and procedures, managing safeguarding incidents, conducting internal investigations, and providing guidance and support to staff. Continued Professional Development (CPD): Engaging in ongoing CPD activities is essential for staying updated with the latest developments in safeguarding practices and policies. Individuals can attend conferences, workshops, or seminars related to safeguarding, child protection, or specific areas of interest within the field. This allows for continued learning and networking with other professionals. Higher Education: Individuals who wish to pursue a more in-depth study of safeguarding can consider higher education programs in social work, psychology, criminology, or related fields. These programs provide comprehensive knowledge and training in safeguarding practices, policies, and research. They may lead to professional certifications or degrees that enhance career opportunities in safeguarding roles. It's important for individuals to research and explore progression options that align with their specific career goals, interests, and local requirements. Different countries or regions may have varying certification or training requirements for safeguarding roles, so it's advisable to check with relevant regulatory bodies or professional associations for specific guidance.
LOOKING FOR: PICTURE BOOK TEXTS / ILLUSTRATIONS Lucy Brownridge is Editorial Director at Wide Eyed Editions and Frances Lincoln Children’s Books, and formerly Thames & Hudson where she helped to establish the Children’s list. She has developed and edited books for children with Alan Ahlberg, Quentin Blake, Mariajo Ilustrajo, Kristjana S Williams, Bob & Roberta Smith, Yuval Zommer and Joe Coelho among others. She is the author of The Cat Family series, and many non-fiction titles for children. She is interested in the history of picture books and is always looking for innovative ways to use the book format. Her favourite books are funny, deceptively simple, thoughtfully written, distinctively illustrated and encourage a love for reading both words and pictures. Lucy would like you to submit the following depending on whether you are a picture book writer / illustrator or both. ABOUT YOU Include a covering letter, in a word document, telling Lucy about yourself and your sources of inspiration. If you have one, include a link to your website. She is keen to read stories she hasn't seen before or see artwork with a distinctive style rather than something that fits with trends. She has particular experience with picture books and illustrated narrative non-fiction. AUTHORS Please send a full manuscript (or 3), in a word document, starting with a short summary/blurb. Make the summary punchy and engaging. Remember that the best picture book stories are simple and every word should count. Do you see this book as part of a series? ILLUSTRATORS If you have a picture book idea please send a story board and a summary of the story. Please send a diverse selection of artworks from your portfolio. It is useful to see examples of the following: people of different ages and ethnicities, character studies showing a range of clothes and expressions, animals, a selection of everyday objects, wide-angle vistas, an example of a book cover (i.e. a classic book reimagined). Please send these in PDF where possible. (In addition to the paid sessions, Lucy is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Thursday 15th May 2025
Definitive Ethernet switching course description A hands on comprehensive look at Ethernet switches with extensive coverage of VLANs. The course focuses on the technology and not any one manufacturers product enabling delegates to configure switches from any manufacturer. What will you learn Configure and troubleshoot switches using: Console port telnet HTTP TFTP Configure and troubleshoot switch features such as: Duplex/speed Port based MAC security Spanning Tree Link aggregation Tagged ports Configure and troubleshoot VLANs. Definitive Ethernet switching course details Who will benefit: Technical staff. Prerequisites: Intro to data communications & networking. Duration 3 days Definitive Ethernet switching course contents What is Ethernet? LANs, network cards and cables, CSMA/CD, Ethernet frames, Ethernet evolution, 802.3. Hands on: ping, Ethernet speeds, CSMA/CD. Ethernet layer 2 Layer 2 functions, NICs, MAC addresses, unicasts, multicasts and broadcasts, frame formats. Hands on: Configuring NICs, Analysing MAC addresses with Wireshark IP and Ethernet Relationship Hands on: ARP. What is a switch? Switches connect multiple devices, switches versus hubs, simultaneous conversations, switches work at layer 2, the forwarding database, how the forwarding database is built, broadcast and collision domains Hands on: Difference between hubs and switches. Switch configuration Switch configuration Managed/unmanaged switches, configuration methods, reasons to configure switches. Console ports, HyperTerminal (and alternatives). Hands on: Using the console port to troubleshoot and configure switches. Switches in more detail Latency, forwarding mechanisms, switch fabrics. Hands on: Using telnet and HTTP to switches. Ethernet extensions Auto negotiation, Power over Ethernet. Hands on:Configuring and troubleshooting switch ports: Speed, duplex and security. Redundant links Loops, broadcast storms, STP, BPDU format, STP convergence. Hands on: Tracking blocked ports. STP convergence. Backbone links Architectures, link aggregation, LACP, load sharing, resilience. Hands on: fail over times. VLANs Virtual versus physical LANs, Why have VLANs? Broadcast domains, Creating VLANs, Assigning ports to VLANs. Hands on: Analysing the effect of VLANs on traffic. Enterprise VLANs VLANS are internal, multiple VLANs, Load balancing, Default VLAN, VLAN registration protocols: VTP, GVRP, MVRP. Hands on: VLANs on multiple switches. Tagging/Trunking Reason for tagging, terminology, tagging process, 802.1Q, Tag format, VLAN stacking. Hands on: Configuring and troubleshooting tags. STP variants RSTP, Common STP, Multiple STP, PVST, ring alternatives. Hands on: RSTP. Inter VLANs Layer 3 switching, IP addressing rules, Interconnecting VLANs. Hands on: Routing between VLANs. Troubleshooting Ethernet Methods, tools, locating faults, layer 1 issues, layer 2 issues Hands on: Fixing the network.
Carrier Ethernet training course description Ethernet is now the interface of choice for nearly all networking. This comprehensive course looks at the ways carriers can provide this Ethernet interface for their WANs and MANs. The course assumes delegates already have a solid foundation in Ethernet switching and so concentrates on just the Ethernet technologies for Carrier Ethernet. What will you learn Describe the main Carrier Ethernet services. Evaluate transports for Carrier Ethernet. Explain how Ethernet can work over MPLS and SDH. Explain the Ethernet technologies used to enable Carrier Ethernet. Carrier Ethernet training course details Who will benefit: Network engineers. Staff working for carriers. Prerequisites: Definitive Ethernet switching for engineers. Duration 2 days Carrier Ethernet training course contents Introduction What is Ethernet? LANs, MANs, WANs, Ethernet and switches in the LAN. Traditional LAN/WAN integration, routers. The Ethernet interface for the WAN. Standards: IEEE, MEF, OIF, Ethernet Alliance. Carrier Ethernet Services E-line: EPL, EVPL. E-LAN: EP-LAN, EVP-LAN. E-Tree: EP-Tree, EVP-Tree. Ethernet Services attributes. Applications: Carrier Ethernet for businesses, Mobile backhaul. Multicasting. Service attributes Bandwidth profiles, bandwidth parameters, Class of Service, QoS, MTU, Protection mechanisms: STP, RSTP, MSTP, Link aggregation, G.8031, G.8032. Transporting Carrier Ethernet The main options. 'Pure' Ethernet, Ethernet over SDH, Ethernet over WDM, Ethernet over MPLS. Ethernet switching, addresses and MAC address tables. Carrier Ethernet access technologies. EFM. Ethernet over MPLS What is MPLS, MPLS-TE, MPLS-VPN, L2 VPNs, VPLS, VPWS. MPLS Fast Reroute. CET 'Pure' Ethernet, Provider bridging 802.1d, Provider Backbone Bridges 802.1ah. Traffic engineering 802.1Qay. Carrier Ethernet technologies 802.1ad VLAN stacking, 802.1AX Link aggregation. 802.1Q QoS. OAM Standards, layers, interworking
Key Objectives for the Training provision Effective listening to a client's needs and requirements during various stages of the sales process. Engage in meaningful communication with clients, learn to identify challenges and opportunities that relate to the prospects. Overcome the identified challenge. Build long term rapport and establish trust with the prospect throughout the sales process, Ensure continued customer satisfaction that can turn into repeat business. Be able to build rapport with customers or clients. Know the right questions to ask to fully understand the customer or client’s needs without putting on any pressure. Be able to check you have the right information from the customer or client. Be able to match products and services to the customer or client using the information you have gathered. Be able to influence effectively. Know how to stand out from your competitors. Stage 1 – Research the Company’s ‘Value Propositions’ and USP Analysis Conducting 30 min confidential interviews with a cross-section of the eligible Attendees & the Stakeholders, in order to gain an objective understanding of the various scenarios and clients that the Participants work with. the Company’s ‘Value Propositions’ Unique Selling Points The Customers’ journey(s) The Competition’s offers for analysis and comparisons. From these findings, a carefully calibrated bespoke Programme will be designed and delivered. Stage 2 - Design the Bespoke 2 x day Course nd Stage 3 - Delivery of the Course Programme This Programme can be delivered in 2 x consecutive days, or split between 2 – 3 weeks, to make it more ‘work-friendly’ – if required. It is very practical and commercially focussed in approach, with lots of interactive exercises designed to draw out the learning applications via the debriefings. The ‘Real Play’ scenarios on day 2 will be based on specific case studies drawn from the Research findings so that they are authentic to optimise the learning. Individual Action Plans will be captured at the end of each day to be debriefed by the Participants’ respective Line Managers. Template Programme Day One – Foundation – Strategic Approach Section One – The Principles of Consultative Selling Defining ‘Consultative Selling’ The Company’s ‘Unique Selling Points’ & Value Proposition The Consultative Selling model – the five stages Avoiding appearing ‘pushy’, ‘pressurising’ or ‘talking through the sale’ Section Two –Strategy & Preparation ‘Buy-Class’ Matrix Strategic plan Template – matching services/products to identified needs & opportunities. Preparing a range of objectives Constants and variables – USP’s Researching key Client/Decision Makers’ priorities, profile & background (LinkedIn etc.) Preparing for potential & likely Objections Section Three – Email etiquette & ‘influencing’ email correspondence. Email etiquette A.B.S.U.R.D model Clarity and tone – discovery of clients’ needs & motivational factors. Techniques to influence and ‘nudge’. Ensuring the data and content have a ‘gentle’ motivational & appealing message. Top Tips Day Two – Practical Application Section Four – Rapport Building & Effective Communication skills ‘Behaviour Labelling’ techniques – setting a positive tone. Asking Open Questions – gaining a full understanding of the clients’ priorities & expectations. EQ - Inviting opinions; perspectives; experiences – winning confidence. Active Listening – focus and commitment to understand. ‘Reading the room’ – adapting to responses and reactions. Maintaining focus on relevant topics that the Client cares about; carefully consider the opportunities to influence. But NO PRESSURE! Building a ‘bond of trust’ with commitments and authentic, shared values. Section Five – Explaining the Benefits – aligned to the Customers’ Priorities Understanding ‘Why do People Buy?’ Research data analysis. Open questions that lead to understanding the key issues and Clients’ priorities. Avoiding the danger of ‘pressurising’ the Client. Responding to objections effectively, with confidence and sensitivity. Explaining the benefits that are aligned to the Clients’ stated requirements. Making the Data ‘sing’ – memorable takeaways for the Client. Augmented benefits – Brand confidence; Case studies; Warranty; Service; Range; Flexibility etc. in alignment with their stated preferences/requirements Differentials compared to Competitors Section Six – Winning Commitment Inviting commitment – with confidence Consultative Selling Closing techniques (e.g. Alternative Close/Assumptive Close et al) Avoiding ‘talking through the sale’ – knowing when to ‘Shut UP!’ Confirming agreement – ensuring Clients’ motivation for repeat business Section Seven – Practical Application ‘Real Play’ From the Research findings, carefully devised scenarios can be generated to provide the most valuable learning opportunities to underpin all the skills & techniques covered in the Programme. Potential Real Play scenarios: A well-established customer has indicated that they are soon to be opening up additional new offices – this presents an opportunity to arrange for the Company to support them with their upcoming needs. After some very positive feedback and with the upcoming contract renewal imminent – how can the Company give the Customer more high-quality support in other areas of their business? A Competitor has been to see the client and they have prompted some concerns about ‘value for money’ & ‘quality of service’. How Real Play works… The group is split the group into 2 sub-groups, one with our Professional Actor (option available); the other with the Trainer or a willing Participant. Each group has a brief and has to instruct their Trainer/Actor/Participant on how to approach the scenario supplied. The Actor and Trainer (or willing Participant) perform the role play(s) as instructed by their respective teams; however, during the action they can be paused for further recommendations or direction. The outcome is the responsibility of the team(s) – not the performers. Debrief the full Programme Individual Action Plans - to be followed through. ‘Best Practices’ for application into the business Options for Exercises within the Programme Sample Exercise – Red & White There is a specific time managed agenda and itinerary, which puts the group under pressure. The key challenge is for the sub-groups to maximise the commercial value from the task, however there is always a great danger that the individuals attempt to gain financial progress at the expense of the other group! Debriefing points: Persuasive communication and influence across barriers Gaining buy-in when others are sceptical Strategic planning accounting for others’ behaviours Sample Exercise – Communication Challenge Each Participant has different pieces of information, but are not allowed to share it visually. They are only allowed to communicate to work out the solution hidden among the large amount of data. Debrief: Structured approach Maintaining focus through distractions/interference Active Listening Controlled communication Sample Exercise – Persuasive emails Sample emails are shared to be critiqued and improved upon to be debriefed: Tone & impact Making the Data ‘sing’ Influential & motivational language Customer centric message. Sample Exercise –Juggling Each Participant has to pass the ‘Customers’ (Juggling balls) carefully through the system with all the other Participants to reach a profitable conclusion Debrief: EQ to read the room and effectively communicate, when the pressure is on Customer focus and adapting to challenges Devising a plan that wins buy-in Overcoming competing ideas to get to ‘best practice’ Consistent commitment, communication and motivational drivers that influenced performance. Sample Exercise –Critical Path The group are provided with 30 x discs and some ‘post-it’ notes. (no pens or pencils are allowed) Their brief is to create a grid shape with the 30 x discs, which will act as ‘stepping stones’ for the ‘Critical Path’ But they have to follow the correct order through the grid from the start to finish, which they will have to work out through ‘trial & error’ All of the team must pass through the ‘Critical Path’ worked out on the grid, observing the constraints, within the time limit. No talking is permitted once they start using the materials Debrief: - Clear communication focussing on the ‘client’s journey’ Planning for challenges Identifying risks and mitigating them Role allocations & support Quality control and disciplines Sample Exercise –Back to Back Each Participant is positioned back-to-back with a partner. They have to work out precisely what the ‘statement’ given to the other person is without looking around. Each person has a different brief. Debrief: - Asking Open Questions Active Listening Accuracy in identifying the objective.
Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.
The Postgraduate Certificate (PG Cert.) consists of the first four modules from the MA Business of Motorsport Master’s Degree. You can then achieve a Postgraduate Diploma (PG Dip.) Business of Motorsport by studying the PG Dip. Top-Up, a further three modules from the MA.
For the Postgraduate Diploma (PG Dip.) you will study the four modules (60 credits) from the Postgraduate Certificate (PG Cert.) plus an additional three modules (60 credits) from the MA Business of Motorsport Master’s Degree. N.B. The Postgraduate Diploma (PG Dip.) does not include the Executive Project (Dissertation) the final module of the MA.