LOOKING FOR: ADULT FICTION, NON-FICTION Publisher / editor Scott Pack is now in his third decade working in the world of books. During that time he has been Head of Buying for Waterstones, worked for publishers big and small - including a lengthy spell at HarperCollins - and taught numerous workshops and classes on all aspects of writing. These days he splits his time between writing his own books, editing other people's, teaching the editors of tomorrow as part of the Oxford Brookes University MA in Publishing, and he is one of the question setters for BBC's Mastermind. His latest book, Tips From A Publisher, is out now. As a publisher, Scott has published across most genres in fiction and a wide range of non-fiction and is happy to read any style of writing. He will assess your sample and provide feedback on any issues he identifies, the manuscript's commercial potential and what steps he would advise before you submit to agents or publishers. Scott is very direct with his feedback, so expect robust, but always constructive, comments! Scott would like you to submit your fiction as a covering letter, 1-2 page synopsis and the first 5,000 words of your manuscript in a single word document. For non-fiction, he would like to see:- 1-page synopsis – to give an overview of what the book will offer the reader and how it's different from other books out there on this topic A detailed proposed contents list, including proposed sub-section headings as well as chapter headings – to give a sense of the overall reader journey 1000-1500 words of intro text - to showcase context, tone etc 1000-1500 words from later in the book - to showcase the progression of the book (In addition to the paid sessions, Scott is kindly offering one free session for low income/underrepresented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Monday 12th May 2025
LOOKING FOR: PICTURE BOOK TEXTS / ILLUSTRATIONS Lucy Brownridge is Editorial Director at Wide Eyed Editions and Frances Lincoln Children’s Books, and formerly Thames & Hudson where she helped to establish the Children’s list. She has developed and edited books for children with Alan Ahlberg, Quentin Blake, Mariajo Ilustrajo, Kristjana S Williams, Bob & Roberta Smith, Yuval Zommer and Joe Coelho among others. She is the author of The Cat Family series, and many non-fiction titles for children. She is interested in the history of picture books and is always looking for innovative ways to use the book format. Her favourite books are funny, deceptively simple, thoughtfully written, distinctively illustrated and encourage a love for reading both words and pictures. Lucy would like you to submit the following depending on whether you are a picture book writer / illustrator or both. ABOUT YOU Include a covering letter, in a word document, telling Lucy about yourself and your sources of inspiration. If you have one, include a link to your website. She is keen to read stories she hasn't seen before or see artwork with a distinctive style rather than something that fits with trends. She has particular experience with picture books and illustrated narrative non-fiction. AUTHORS Please send a full manuscript (or 3), in a word document, starting with a short summary/blurb. Make the summary punchy and engaging. Remember that the best picture book stories are simple and every word should count. Do you see this book as part of a series? ILLUSTRATORS If you have a picture book idea please send a story board and a summary of the story. Please send a diverse selection of artworks from your portfolio. It is useful to see examples of the following: people of different ages and ethnicities, character studies showing a range of clothes and expressions, animals, a selection of everyday objects, wide-angle vistas, an example of a book cover (i.e. a classic book reimagined). Please send these in PDF where possible. (In addition to the paid sessions, Lucy is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Thursday 15th May 2025
A year of floorwork experience under the belt? Here come the fancy moves!
MEF Carrier Ethernet training course description The course progresses from a overview of the Carrier Ethernet service and how it works onto looking at the concepts in depth. Service attributes and management follow with the course finishing with studies of practical Carrier Ethernet. What will you learn Discuss and understand key Carrier Ethernet Concepts. Understand tasks related to designing, deploying and maintaining a Carrier Ethernet network. Offer effective solutions to implementing a Carrier Ethernet enterprise network given available customer resources and requirements. Carry out informed discussions using industry Carrier Ethernet 'vocabulary. Pass the MEF CECP 2.0 professional accreditation exam. MEF Carrier Ethernet training course details Who will benefit: Anyone working with Carrier Ethernet Prerequisites: The course attendees need to be conversant with data networks, as well as Ethernet and IP technologies. Duration 5 days MEF Carrier Ethernet training course contents Section One: Introduction to Carrier Ethernet Introduction to Carrier Ethernet: What is Carrier Ethernet? Evolution, advantages, The MEF, MEF specifications; UNI, EVC, OVC, EPL/EVPL, EP-LAN/ EVP-LAN, EP-Tree/EVP-Tree, etc, overview. How Carrier Ethernet Works: Service Frame Handling. Carrier Ethernet at Customer Premises, metro and core. Carrier Ethernet Workings, UNI attributes, Service Attributes (EVC and EVC per UNI attributes), Bandwidth Profiles, service multiplexing, L2 protocol processing; Carrier Ethernet equipment, CPE, aggregation and homing nodes, core equipment; management systems. The Setting Up of a Carrier Ethernet Service: Step 1: Choose service type, EPL/EVPL, EP-LAN/EVP-LAN, EPTree/EVP-Tree, EVLine...; Step 2: CPE tasks, UNI-C tasks (UNI attributes, service attributes (EVC and EVC per UNI) and bandwidth profiles), UNI-N tasks (L2 protocol handling). Step 3: Non-CPE tasks, Access, metro and core connections set up. Section Two: Carrier Ethernet Concepts in depth Carrier Ethernet Definitions in Depth: UNI, UNI I & II, UNI-N and UNI-C, etc.; NNI/ENNI; EVC; OVC, OVC type (P2P, M2M, Rooted MP), OVC end point (root, leaf, trunk), OVC end point map, OVC end point bundling; Service types in detail, EPL/EVPL, EP-LAN/EVP-LAN, EP-Tree/EVP-Tree, EVLine, Access EPL, Access EVPL . Carrier Ethernet Service Frame Handling: Unicast, multicast and broadcast frame delivery, Tagged, untagged and priority; Tagging, C and S-Tags, 802.3, 802.1d, 802.1q, 802.1ad, 802.1ah evolution, VLAN ID translation/preservation. CoS preservation. Other Key Carrier Ethernet Concepts: MTU, MTU at UNI, MTU at ENNI; Physical Layer Attributes, FE, GbE and 10GbE, Service Multiplexing and Bundling Concept and detail, rules and implications; Hairpin Switching Managing Bandwidth in a Carrier Ethernet Network: Token Bucket Algorithm, EIR, CIR, CBS, EBS, Coupling Flag; Frame Colors, recoloring, Color Awareness attribute, Color Forwarding; Bandwidth Profiles, rules and concepts. MEF CoS identifiers, DEI bit (in S-Tag), PCP bit (in C-Tag or S-Tag), or DSCP (in IP header), Multiflow bandwidth concepts; CoS Label/Color Identification. Section Three: Carrier Ethernet Service Attributes Overview: Carrier Ethernet 2.0; Blueprint C Service Attributes: Per UNI, Physical interfaces, Frame format, Ingress/egress Bandwidth Profiles, CEVLAN ID/EVC Map, UNI protection. EVC per UNI, Ingress/egress Bandwidth Profiles, etc.; Per EVC, CEVLAN ID Preservation, CoS ID Preservation, Relationship between SLA and SLP, Class of Service, etc. OVC, ENNI, OVC End Point per UNI and OVC End Point per ENNI, Ingress/egress bandwidth profiles, etc. Section Four: Managing Carrier Ethernet Networks Overview: MEF Service Lifecycle.Carrier Ethernet maintenance: Port, Link & NE failure, Service Protection Technologies, Fault Identification and Recovery, LAG, Active/Standby EVC, Single EVC with transport protection, G.8031, G.8032, MPLS FRR. SOAMs: Connectivity fault management, connectivity Monitoring, Loopback, Linktrace; Performance Management, Frame Delay, Inter Frame Delay Variation, Availability, Frame Loss Ratio, Resiliency, HLI, DMM, DMR, SLM, SLR; Key Concepts, Single vs dual ended, ordered UNI pair calculations. LOAMs: Link discovery, link monitoring, etc. Terminology and Concepts: MEG levels, MIPs. Section Five: Practical Carrier Ethernet Carrier Ethernet Transport Technologies:Layer 1: SDH. Layer 2: Bridging, provider bridging, PBB, PBBTE. Layer 2.5: MPLS VPWS, MPLS VPLS, MPLS-TP. Carrier Ethernet Access Technologies: fiber, SDH, active fiber, PON, GPON, 10G PON, OTN, WDM; copper, PDH, G-SDSL, 10Pass-TS, HFC; packet radio. Optimising mobile backhaul with Carrier Ethernet Key challenges solutions: Market pressure, LTE evolution, elements and architecture (RAN BS, NC, GWIF.), synchronization, bandwidth management. Circuit Emulation over Ethernet: Purpose, needs and applications. Synchronization: Phased, ToD, External Reference source, SynchE ,NTP, IEEE-1588 v2/ PTP, ACR; MEF Service Definitions for emulated circuits. Applying what you know: Practical examples and scenarios, Carrier Ethernet solutions; Practice Scenarios, Given a scenario, determine appropriate Ethernet services
Ethernet LANS training course description This course has been replaced as part of our continuous curriculum development. Please see our Definitive Ethernet switching course What will you learn Describe what Ethernet is and how it works. Install Ethernet networks Troubleshoot Ethernet networks Analyse Ethernet packets Design Ethernet networks Recognise the uses of Hubs, Bridges, switches and routers. Ethernet LANS training course details Who will benefit: Those wishing to find out more about how their LAN works. Prerequisites: Intro to Data comms & networking. Duration 3 days Ethernet LANS training course contents What is Ethernet? LANS, What is Ethernet?, history, standards, the OSI reference model, how Ethernet works, CSMA/CD. Ethernet Cabling UTP, cat 3,4,5, Cat 5e, Cat 6, Cat 7, fibre optic cable, MMF, SMF. Hands on Making a cable. 802.3 physical specifications Distance limitations, hubs and repeaters, 5-4-3-2-1 rule, 10BaseT, 10BaseF, 100BaseTX, 100BaseFX, 1000BaseSX, 1000BaseT, 10gbe. Hands on Working with hubs. Ethernet layer 2 Overview, NICS, device drivers, MAC addresses, broadcasts, multicasts, frame formats, Ether II, 802.3, 802.2, SNAP, compatibility, Ethernet type numbers, Ethernet multicast addresses, Ethernet vendor codes. Hands on Installing Ethernet components, analysing MAC headers. IP and Ethernet ARP Hands on Analysing ARP packets. Ethernet extensions Full/half duplex, auto negotiation, flow control methods, 802.3ad, 802.3af, 802.3ah. Hands on Configuration of full/half duplex. Ethernet speed enhancements Encoding, Carrier extension, packet bursting, jumbo frames. Prioritisation 802.1P, 802.1Q, TOS, WRR, QOS, VLANs. Hands on 802.1p testing Interconnecting LANS Broadcast domains, Collision domains, What are bridges, transparent bridging, What are switches? STP, VLANS, What are routers? Layer 3 switches, Connecting Ethernet to the WAN. Hands on STP, Analysing Ethernet frames in a routed architecture. Troubleshooting and maintaining Ethernet Utilisation, performance, TDR and other testers, bottlenecks, statistics, RMON. Hands on Monitoring performance, troubleshooting tools.
Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
RQF level 1 Awareness of First Aid for Mental Health Each year approximately 1 in 4 people in the UK will experience a mental health condition and at least 1 in 6 employees experience common mental health problems in the workplace. Research has shown that work is the biggest cause of stress which can stop people performing at their best. Mental health conditions are often hidden due to stigma and fear of discrimination and research has shown that a culture of fear and silence around mental health is costly to employers. The HSE guidance 'First aid needs assessment’ refers to mental health in the workplace. This 4-hour qualification provides learners with the knowledge to recognise a range of mental health conditions, how to start a supportive conversation and when and how to signpost a person to seek appropriate professional help. Learners will know how to recognise and manage stress. Learners will not diagnose or treat mental health conditions as this can only be carried out by healthcare professionals but will gain the knowledge to identify when a person may have a condition and know where they can go to get help. Suitability - Who should attend? Here are some examples of who may benefit from attending the RQF Level 1 Award in Awareness of First Aid for Mental Health: Employees and workers: This course is relevant for individuals in any industry who may encounter colleagues or clients experiencing mental health difficulties. It can be particularly valuable for human resources personnel, line managers, supervisors, or team leaders responsible for the well-being of employees. Teachers and educators: Professionals working in schools, colleges, or other educational institutions can benefit from this training to better understand and support the mental health needs of students. Healthcare and social care workers: Individuals working in healthcare or social care settings, such as nurses, care assistants, support workers, or counsellors, can enhance their understanding of mental health issues and improve their ability to provide appropriate support. Community and voluntary workers: People involved in community or voluntary organizations, including youth workers, social workers, volunteers, or community leaders, can gain valuable insights into mental health awareness and support. Personal relationships and caregivers: The Level 1 training can also be beneficial for individuals who have personal relationships with someone experiencing mental health challenges. This may include family members, friends, or caregivers who want to enhance their understanding and offer appropriate assistance. It is important to note that the Level 1 Award in Awareness of First Aid for Mental Health RQF is an introductory course and does not qualify participants to provide formal mental health interventions or therapy. However, it serves as a foundation for further training and can contribute to creating a more mentally healthy and supportive environment in various settings. Outcome / Qualification etc. Upon successful completion of the RQF Level 1 Awareness of First Aid for Mental Health course, participants can expect to achieve the following outcomes: Increased Awareness and Understanding: Participants will develop a basic awareness and understanding of mental health and mental health issues. They will gain knowledge about common mental health conditions, their signs and symptoms, and the importance of mental health in overall well-being. Recognition of Mental Health Signs: Participants will learn to recognize common signs of mental health issues in themselves and others. They will gain an understanding of the importance of early identification and intervention in promoting mental health and seeking appropriate support. Reduced Stigma and Improved Attitudes: The course aims to challenge stigmas and stereotypes associated with mental health. Participants will develop a more empathetic and supportive attitude towards individuals experiencing mental health challenges, promoting a positive and inclusive environment. Enhanced Communication Skills: Participants will learn basic communication skills for engaging with individuals experiencing mental health issues. They will gain an understanding of the importance of active listening, empathy, and non-judgmental communication in providing initial support. Signposting and Seeking Help: Participants will be equipped with knowledge about available resources, services, and support networks for mental health. They will learn about signposting individuals to appropriate professional help and self-help resources. Self-Care and Well-being Strategies: The course may provide participants with practical strategies for maintaining their own mental well-being. They may learn basic self-care techniques and stress management strategies to support their own mental health. Certificate of Completion: Upon successful completion of the course, participants will receive a certificate indicating their achievement of the RQF Level 1 Awareness of First Aid for Mental Health qualification. It's important to note that the Level 1 course provides a basic introduction to mental health awareness and first aid. It is not intended to provide participants with the qualifications or skills to diagnose or treat mental health conditions. Instead, it aims to promote mental health literacy, reduce stigma, and provide individuals with the knowledge to offer initial support and signposting to individuals in need. The Level 1 course can serve as a foundation for further learning and progression in the field of mental health. Individuals may choose to pursue higher-level courses or qualifications to develop more advanced skills and knowledge in mental health first aid or other related areas. Training Course Content MODULE 1 INTRODUCTION Session content Trainer/assessor introduction Learner introductions Course information • Administration • Learning outcomes and assessment criteria • Reasonable adjustments • Certification • Complaints and appeals • Assessment information Session duration 15 minutes MODULE 2 WHAT IS FIRST AID FOR MENTAL HEALTH? Session content Definitions Role and responsibilities of a First Aider The impact of mental health issues Mental health stigma Statistics Session duration 25 minutes MODULE 3 IDENTIFYING MENTAL HEALTH CONDITIONS Session content Mental health continuum Mental health risk factors Early warning signs Session duration 25 minutes MODULE 4 PROVIDING ADVICE AND STARTING A CONVERSATION Session content How to start a difficult conversation Non-judgemental listening skills When to contact the emergency services The First Aider’s own health and emotions Session duration 40 minutes MODULE 5 STRESS Session content What is stress? Causes of stress Effects of stress Coping strategies Session duration 25 minutes MODULE 6 MENTAL HEALTH CONDITIONS Session content Depression Anxiety Psychosis Eating disorders Suicide Self-harm Session duration 70 minutes MODULE 7 ASSESSMENT AND COURSE CLOSURE Session content Written assessment paper Course administration Course closure Session duration 40 minute Course delivery details Classroom-Based A minimum of 4 hours spread over at least one day. Ideally, the course should be run in one day, but must be completed within 2 weeks of starting the course, with each training session a minimum of two hours. Online/Virtual classroom The qualification has 2 assigned guided learning hours (GLH) and 5 hours total qualification time (TQT). GLH indicates the number of contact hours that the learner will have with the trainer/assessor. TQT includes GLH but considers unsupervised learning and is an estimate of how long the average learner will take to achieve the qualification. Why choose Madeleys First Aid Plus Founded in 2021 after Louise left 30 years in the NHS as an Advanced practitioner in A&E/ITU, had spent 1.5 years in Covid ITU Won FSB Best start-up business in the West Midlands in May 2023 Now trained 100's of delegates in Physical and Mental Health First Aid Expenses Travel costs and lunch required, there are many cafes and sandwich bars here in Much Wenlock to buy your lunch, you may eat it in the training room. All training material, books, qualification certificates are included in the price. Continuing Studies After completing the RQF Level 1 Awareness of First Aid for Mental Health course, individuals can consider various progression options to further their knowledge and skills in mental health support. Here are some potential pathways: RQF Level 2 Award in First Aid for Mental Health: This qualification builds upon the knowledge gained in the Level 1 course and provides a more comprehensive understanding of mental health issues and how to provide appropriate support. It covers topics such as recognizing mental health conditions, promoting well-being, and providing initial support to those in crisis. RQF Level 3 Award in Supervising First Aid for Mental Health: For individuals who aspire to take on leadership or supervisory roles in mental health support, the Level 3 qualification is a logical progression. It provides in-depth knowledge and skills to supervise and manage a team of individuals providing first aid for mental health. Continued Professional Development (CPD): Engaging in ongoing CPD activities is essential for staying updated with the latest developments in mental health support. Individuals can attend workshops, seminars, or conferences related to mental health, trauma, or specific areas of interest within the field. Applied Practice: Applying the knowledge gained from the Level 1 course in real-world settings is crucial for developing practical skills. Individuals can seek opportunities to work or volunteer in environments where mental health support is needed, such as community organizations, schools, or helplines. Mental Health Support Training Programs: There are various specialized training programs available that focus on specific aspects of mental health support, such as suicide prevention, trauma-informed care, or supporting individuals with specific mental health conditions. These programs can provide individuals with additional expertise and deepen their understanding of specific areas within mental health support. Higher Education: Individuals who wish to pursue a more in-depth study of mental health can consider higher education programs in psychology, counseling, social work, or related fields. These programs provide comprehensive knowledge and training in mental health support and may lead to professional certifications or degrees. It's important for individuals to research and explore progression options that align with their specific career goals, interests, and local requirements. Different countries or regions may have varying certification or training requirements for mental health support roles, so it's advisable to check with relevant regulatory bodies or professional associations for specific guidance.
Definitive Ethernet switching course description A hands on comprehensive look at Ethernet switches with extensive coverage of VLANs. The course focuses on the technology and not any one manufacturers product enabling delegates to configure switches from any manufacturer. What will you learn Configure and troubleshoot switches using: Console port telnet HTTP TFTP Configure and troubleshoot switch features such as: Duplex/speed Port based MAC security Spanning Tree Link aggregation Tagged ports Configure and troubleshoot VLANs. Definitive Ethernet switching course details Who will benefit: Technical staff. Prerequisites: Intro to data communications & networking. Duration 3 days Definitive Ethernet switching course contents What is Ethernet? LANs, network cards and cables, CSMA/CD, Ethernet frames, Ethernet evolution, 802.3. Hands on: ping, Ethernet speeds, CSMA/CD. Ethernet layer 2 Layer 2 functions, NICs, MAC addresses, unicasts, multicasts and broadcasts, frame formats. Hands on: Configuring NICs, Analysing MAC addresses with Wireshark IP and Ethernet Relationship Hands on: ARP. What is a switch? Switches connect multiple devices, switches versus hubs, simultaneous conversations, switches work at layer 2, the forwarding database, how the forwarding database is built, broadcast and collision domains Hands on: Difference between hubs and switches. Switch configuration Switch configuration Managed/unmanaged switches, configuration methods, reasons to configure switches. Console ports, HyperTerminal (and alternatives). Hands on: Using the console port to troubleshoot and configure switches. Switches in more detail Latency, forwarding mechanisms, switch fabrics. Hands on: Using telnet and HTTP to switches. Ethernet extensions Auto negotiation, Power over Ethernet. Hands on:Configuring and troubleshooting switch ports: Speed, duplex and security. Redundant links Loops, broadcast storms, STP, BPDU format, STP convergence. Hands on: Tracking blocked ports. STP convergence. Backbone links Architectures, link aggregation, LACP, load sharing, resilience. Hands on: fail over times. VLANs Virtual versus physical LANs, Why have VLANs? Broadcast domains, Creating VLANs, Assigning ports to VLANs. Hands on: Analysing the effect of VLANs on traffic. Enterprise VLANs VLANS are internal, multiple VLANs, Load balancing, Default VLAN, VLAN registration protocols: VTP, GVRP, MVRP. Hands on: VLANs on multiple switches. Tagging/Trunking Reason for tagging, terminology, tagging process, 802.1Q, Tag format, VLAN stacking. Hands on: Configuring and troubleshooting tags. STP variants RSTP, Common STP, Multiple STP, PVST, ring alternatives. Hands on: RSTP. Inter VLANs Layer 3 switching, IP addressing rules, Interconnecting VLANs. Hands on: Routing between VLANs. Troubleshooting Ethernet Methods, tools, locating faults, layer 1 issues, layer 2 issues Hands on: Fixing the network.
Carrier Ethernet training course description Ethernet is now the interface of choice for nearly all networking. This comprehensive course looks at the ways carriers can provide this Ethernet interface for their WANs and MANs. The course assumes delegates already have a solid foundation in Ethernet switching and so concentrates on just the Ethernet technologies for Carrier Ethernet. What will you learn Describe the main Carrier Ethernet services. Evaluate transports for Carrier Ethernet. Explain how Ethernet can work over MPLS and SDH. Explain the Ethernet technologies used to enable Carrier Ethernet. Carrier Ethernet training course details Who will benefit: Network engineers. Staff working for carriers. Prerequisites: Definitive Ethernet switching for engineers. Duration 2 days Carrier Ethernet training course contents Introduction What is Ethernet? LANs, MANs, WANs, Ethernet and switches in the LAN. Traditional LAN/WAN integration, routers. The Ethernet interface for the WAN. Standards: IEEE, MEF, OIF, Ethernet Alliance. Carrier Ethernet Services E-line: EPL, EVPL. E-LAN: EP-LAN, EVP-LAN. E-Tree: EP-Tree, EVP-Tree. Ethernet Services attributes. Applications: Carrier Ethernet for businesses, Mobile backhaul. Multicasting. Service attributes Bandwidth profiles, bandwidth parameters, Class of Service, QoS, MTU, Protection mechanisms: STP, RSTP, MSTP, Link aggregation, G.8031, G.8032. Transporting Carrier Ethernet The main options. 'Pure' Ethernet, Ethernet over SDH, Ethernet over WDM, Ethernet over MPLS. Ethernet switching, addresses and MAC address tables. Carrier Ethernet access technologies. EFM. Ethernet over MPLS What is MPLS, MPLS-TE, MPLS-VPN, L2 VPNs, VPLS, VPWS. MPLS Fast Reroute. CET 'Pure' Ethernet, Provider bridging 802.1d, Provider Backbone Bridges 802.1ah. Traffic engineering 802.1Qay. Carrier Ethernet technologies 802.1ad VLAN stacking, 802.1AX Link aggregation. 802.1Q QoS. OAM Standards, layers, interworking