Gain comprehensive training in safe holding techniques for medical procedures with our "Clinical Safe Holding Techniques" course. Ensure procedural success and prevent injuries to patients and healthcare providers.
Gain a comprehensive understanding of positive behavior support principles, strategies, and techniques with our course. Ideal for educators, caregivers, and professionals working with individuals with developmental disabilities, mental health issues, or behavioral challenges.
Our Urinary Catheterisation and Catheter Care training course, facilitated by registered nurses with first-hand clinical experience, are blended learning courses that allow participants to demonstrate theoretical and practical simulation within a classroom environment.
This verification of expected death training is suitable for nurses who are interested in taking on the extended role of verification of expected death within various healthcare settings.
Gain comprehensive knowledge and practical skills to manage epilepsy and administer buccal midazolam with the Level 3 Award in Epilepsy and Administration of Buccal Midazolam (RQF). Ideal for healthcare professionals and caregivers.
Gain a comprehensive understanding of suprapubic catheters with our course. Learn about indications, insertion procedures, and ongoing care to ensure optimal outcomes for patients.
Nasogastric tube training ensures healthcare professionals have the correct clinical knowledge and skills to provide excellent care and support for individuals who may require treatment via NG tube for nutrition, hydration or medication.
Cyber Security training course description The reliance of the world on the Internet and computer systems means the protection of information systems is vitally important. This is even more important smart devices and the Internet of Things increase the number of devices. This Cyber Security provides a concise overview on the threats and attacks that can happen along with the counter measures that can be taken. What will you learn Recognise the different types of attack. Describe the attacks that can be made against information systems. Describe the counter measures available. Cyber Security training course details Who will benefit: Non-technical staff working with computers. Prerequisites: None. Duration 1 day Cyber Security training course contents What is Cyber Security? Computer security, Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Attacks Physical access, Social engineering, Privilege escalation, Malware, Trojans, worms, viruses, rootkits, Backdoors, Denial of Service (DOS), Distributed DOS, Eavesdropping, Spoofing, Man the middle tampering. Countermeasures Prevention, detection, response. Physical, user accounts, Firewalls, IDS, AAA, authentication, cryptography, encryption, data integrity. Cyber security standards ETSI, ISO 27001, 27002, NIST, ISA/IEC 62443.
WiFi demystified training course description A concise overview aimed at less technical staff requiring an overview of WiFi networks. The course covers the technologies at a high level allowing delegates to discuss WiFi networks with others recognising the buzzwords used. The course will also allow the delegates to recognise the issues involved in planning and installing WiFi networks as well as securing them. What will you learn Recognise the different WiFi technologies available. Describe the architecture of WiFi networks including the role of Access Points. Recognise the distance limitations of WiFi networks. Describe the buzzwords used in WiFi. Recognise the security issues of WiFi networks. WiFi demystified training course details Who will benefit: Anyone working with WiFi networks. Prerequisites: None. Duration 1 day WiFi demystified training course contents Introduction When to use wireless, when to use wired, WiFi technologies: 802.11, 802.11a, 802.11b, 802.11g, 802.11n, WiFi speeds and distances, comparison to other wireless technologies, 802.15 (Bluetooth), 802.16 (WiMax). Simple WiFi networks Network cards, Antennae, Access Points, WiFi routers. Enterprise WiFi networks SSIDs, Multiple WiFi networks, Repeaters, Wireless bridges, Controller based access points, Wireless switches, Power Over Ethernet. RF site surveys Steps and techniques, tools, analysing the feasibility of WiFi, range, performance, roaming. Security How safe are WiFi networks? Encryption, Authentication, WEP WPA WPA2. 802.1x, EAP, RADIUS.
Gain the knowledge and skills to manage ear wax buildup with our "Management of Ear Wax Training" course. Ideal for healthcare professionals.