• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1327 Health courses in Bentley delivered Live Online

Foundations in Palliative and End of Life Care

By M&K Update Ltd

This course provides the necessary knowledge and skills to facilitate development in palliative and end of life care.

Foundations in Palliative and End of Life Care
Delivered in person or OnlineFlexible Dates
Price on Enquiry

Reiki Level 2 Practitioner Online Course

By Margaret Cook - Learn More About Reiki

I am a Reiki Teacher in Manchester and one of the few traditionally trained Reiki Masters in the UK who have been trained by international best-selling Reiki author Penelope Quest. My teaching methods use traditional Reiki techniques perfected over many years and you can be assured of my support during and after your course. I teach all three levels of Reiki courses, level 1 reiki. level 2 reiki and reiki master level 3

Reiki Level 2 Practitioner Online Course
Delivered Online
£297

Journey of Your (JOY) Birth Hypnobirthing

5.0(22)

By The Northern College Of Clinical Hypnotherapy

Want to teach Hypnobirthing? My JOY hypnobirthing course will equip you with the skills to empower expectant mothers on their childbirth journey. Gain insights into how hypnotherapy fosters a calm mindset, alleviates discomfort, and prepares women for childbirth.

Journey of Your (JOY) Birth Hypnobirthing
Delivered OnlineJoin Waitlist
£150

Recognising the Unwell Patient for GP Receptionists and HCAs

By M&K Update Ltd

Aimed for GP reception staff and HCAs, who work face to face booking patients in or HCAs doing the initial triage/observations. Receptionists and HCAs working in the urgent care setting or walk in centres may also find this beneficial as they also book patients in and monitor the waiting room.

Recognising the Unwell Patient for GP Receptionists and HCAs
Delivered in person or OnlineFlexible Dates
Price on Enquiry

Wellness Lab: Supporting colleagues who experience anxiety

5.0(3)

By The Self Leadership Initiative

Learn tools to support colleagues who experience anxiety

Wellness Lab: Supporting colleagues who experience anxiety
Delivered Online
£10

Obsessive Compulsive Disorder

By Human Givens College

Join Dr Andrew Morrice for a deep dive into what the latest mind-body research tells us about the impact of sleep, the microbiome, nutrition, culinary practices and more on our mental and physical health, and recovery … Accredited CPD: 6 hours Length: 1 day (9.15am - 4.00pm GMT) Excellent content and practical applications for treating OCDPETA DUNN, GP Live training delivered online – Join Miriam Chachamu on Tuesday 13th February 2024 for this live online OCD course workshop via Zoom. The content covered is the same as our original attended workshop, with some modifications to the exercises – you will have plenty of opportunities to ask Miriam questions. We will send details of how to join the Zoom workshop by email the day before the event. BONUS RECORDING – the training is recorded, in case anyone experiences technical difficulties on the day, so you will also get a recording for a limited time afterwards to maximise your learning. Why take this course Obsessive compulsive disorder (OCD) is not only distressing for sufferers but for their family members and friends too. Contrary to the popular view of OCD being harmless over-cleanliness or simply checking things over and over again, people living with OCD experience a high level of anxiety – and the condition can damage their relationships, social and work lives, and physical health. Many sufferers are ashamed of their problem and hide it. Sometimes therapists fail to recognise the rarer forms of OCD and therefore fail to offer effective treatment. And many people with milder forms of OCD do not realise that they can be helped, and do not seek help until their condition becomes much more severe. This accredited live online course offers an in-depth look at OCD in all its guises and focuses on practical and effective methods of treatment – OCD recovery is possible in most cases. The day is interactive and includes demonstration videos of therapy sessions, short video clips, in-depth discussions and case studies. The films of the therapy sessions and the video of dealing with intrusive thoughts were particularly usefulSCHOOL NURSE What will you learn New information that will enable you to help OCD sufferers more effectively A better understanding of OCD, what it is and how it develops The ability to recognise the less familiar types of OCD – these are often missed by both client and therapist An effective 4-step method for treating OCD New ways to help people overcome their compulsive tendencies Illuminating video clips of OCD sufferers describing their experience Helpful ways parents and educators can prevent signs of OCD in children and teenagers from developing further The important role of guided imagery in treatment and why it improves success rates How to separate the person from their OCD ‘Pure O’ – we look at ‘purely obsessional’ OCD, where people experience distressing intrusive thoughts without any external signs of compulsions The chance to observe effective therapy for OCD and discuss case studies How obsessive compulsive disorder fits with other psychological conditions – and with autism What to do when OCD symptoms are firmly entrenched The opportunity to discuss some of your own cases with a highly knowledgeable tutor How to handle challenging cases successfully and more… Course Programme The ‘Obsessive Compulsive Disorder – understanding OCD and how best to treat it’ online course starts at 9.15am and runs until 4.00pm. (GMT). 9.15am Join the Zoom meeting 9.30am Understanding OCD 11.00am Comfort break and discussion 11.30am How to treat OCD successfully and quickly 1.00pm Lunch break 1.45pm OCD treatment – what to do when symptoms persist 2.45pm Comfort break and discussion 3.00pm Dealing with unusual or challenging cases 4.00pm Day ends Who is this online course suitable for? Anyone who works with, lives with, teaches or treats people suffering from OCD, or who thinks they may have OCD but isn’t sure Psychotherapists, counsellors, health and social care professionals, mental health and wellbeing professionals, educators, school counsellors, individuals working in a variety of capacities in any number of organisations who are looking for OCD training for professionals Anyone who has family members or friends who suffer from OCD would also benefit from this live online course – it contains essential, practical information about how to help OCD sufferers The day is also valuable for anyone struggling to deal with their own obsessive thoughts or actions Please Note: This course is not a substitute for individual therapy This course looks at a range of OCD behaviours, including: Compulsive checkingContamination / Mental ContaminationSymmetry and orderingRuminations / Intrusive thoughts (Pure O)HOCD – Homosexual OCDPOCD – Paedophile OCD / Prenatal and postpartum OCDand more This course has been independently accredited by the internationally recognised CPD Standards Office for 6 hours of CPD training. On completion of this training you’ll receive CPD certificates from the College and the CPD Standards Office.

Obsessive Compulsive Disorder
Delivered OnlineFlexible Dates
£145

Care Home Legionella Responsible Person Course (3 to 4h CPD)

By The First Principle Group Ltd

SEO Description: Elevate the standard of health and safety in your care home with our comprehensive 3-hour CPD Care Home Legionella Management Course. Specifically crafted for care home professionals, this online course empowers facility managers, maintenance teams, and health and safety officers with essential skills and knowledge to manage legionella risks effectively. Aligned with HSE ACOP L8 guidelines, the course offers in-depth learning about prevention, assessment, and control of legionella in care environments. Gain a CPD Certificate upon completion, showcasing your commitment to upholding the highest standards in care home safety. Join our expert-led live sessions for a practical and engaging learning experience, ensuring your care home remains a safe and compliant haven for residents and staff.

Care Home Legionella Responsible Person Course (3 to 4h CPD)
Delivered OnlineFlexible Dates
Price on Enquiry

Mindfulness Based Stress reduction

By The Innocence Guru

Mindfulness-Based Stress Reduction (MBSR) is an effective, scientifically researched method for reducing physical and psychological suffering while building resilience, balance, and peace of mind.

Mindfulness Based Stress reduction
Delivered OnlineFlexible Dates
£240

MS-102T00 Microsoft 365 Administrator Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for persons aspiring to the Microsoft 365 Administrator role and have completed at least one of the Microsoft 365 role-based administrator certification paths. This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance. In Microsoft 365 tenant management, you learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, security groups, and administrative roles. You then transition to configuring Microsoft 365, with a primary focus on configuring Office client connectivity. Finally, you explore how to manage user-driven client installations of Microsoft 365 Apps for enterprise deployments. The course then transitions to an in-depth examination of Microsoft 365 identity synchronization, with a focus on Microsoft Entra Connect and Connect Cloud Sync. You learn how to plan for and implement each of these directory synchronization options, how to manage synchronized identities, and how to implement password management in Microsoft 365 using multifactor authentication and self-service password management. In Microsoft 365 security management, you begin examining the common types of threat vectors and data breaches facing organizations today. You then learn how Microsoft 365?s security solutions address each of these threats. You are introduced to the Microsoft Secure Score, as well as to Microsoft Entra ID Protection. You then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Safe Attachments, and Safe Links. Finally, you are introduced to the various reports that monitor an organization?s security health. You then transition from security services to threat intelligence; specifically, using Microsoft 365 Defender, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint. Once you have this understanding of Microsoft 365?s security suite, you then examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Microsoft Purview message encryption, and data loss prevention (DLP). You then delve deeper into archiving and retention, paying particular attention to Microsoft Purview insider risk management, information barriers, and DLP policies. You then examine how to implement these compliance features by using data classification and sensitivity labels. Prerequisites Completed a role-based administrator course such as Messaging, Teamwork, Security, Compliance, or Collaboration. A proficient understanding of DNS and basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices. A working knowledge of PowerShell. 1 - Configure your Microsoft 365 experience Explore your Microsoft 365 cloud environment Configure your Microsoft 365 organizational profile Manage your tenant subscriptions in Microsoft 365 Integrate Microsoft 365 with customer engagement apps Complete your tenant configuration in Microsoft 365 2 - Manage users, licenses, and mail contacts in Microsoft 365 Determine the user identity model for your organization Create user accounts in Microsoft 365 Manage user account settings in Microsoft 365 Manage user licenses in Microsoft 365 Recover deleted user accounts in Microsoft 365 Perform bulk user maintenance in Microsoft Entra ID Create and manage guest users Create and manage mail contacts 3 - Manage groups in Microsoft 365 Examine groups in Microsoft 365 Create and manage groups in Microsoft 365 Create dynamic groups using Azure rule builder Create a Microsoft 365 group naming policy Create groups in Exchange Online and SharePoint Online 4 - Add a custom domain in Microsoft 365 Plan a custom domain for your Microsoft 365 deployment Plan the DNS zones for a custom domain Plan the DNS record requirements for a custom domain Create a custom domain in Microsoft 365 5 - Configure client connectivity to Microsoft 365 Examine how automatic client configuration works Explore the DNS records required for client configuration Configure Outlook clients Troubleshoot client connectivity 6 - Configure administrative roles in Microsoft 365 Explore the Microsoft 365 permission model Explore the Microsoft 365 admin roles Assign admin roles to users in Microsoft 365 Delegate admin roles to partners Manage permissions using administrative units in Microsoft Entra ID Elevate privileges using Microsoft Entra Privileged Identity Management Examine best practices when configuring administrative roles 7 - Manage tenant health and services in Microsoft 365 Monitor the health of your Microsoft 365 services Monitor tenant health using Microsoft 365 Adoption Score Monitor tenant health using Microsoft 365 usage analytics Develop an incident response plan Request assistance from Microsoft 8 - Deploy Microsoft 365 Apps for enterprise Explore Microsoft 365 Apps for enterprise functionality Explore your app compatibility by using the Readiness Toolkit Complete a self-service installation of Microsoft 365 Apps for enterprise Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager Deploy Microsoft 365 Apps for enterprise from the cloud Deploy Microsoft 365 Apps for enterprise from a local source Manage updates to Microsoft 365 Apps for enterprise Explore the update channels for Microsoft 365 Apps for enterprise Manage your cloud apps using the Microsoft 365 Apps admin center 9 - Analyze your Microsoft 365 workplace data using Microsoft Viva Insights Examine the analytical features of Microsoft Viva Insights Explore Personal insights Explore Team insights Explore Organization insights Explore Advanced insights 10 - Explore identity synchronization Examine identity models for Microsoft 365 Examine authentication options for the hybrid identity model Explore directory synchronization 11 - Prepare for identity synchronization to Microsoft 365 Plan your Microsoft Entra deployment Prepare for directory synchronization Choose your directory synchronization tool Plan for directory synchronization using Microsoft Entra Connect Plan for directory synchronization using Microsoft Entra Connect cloud sync 12 - Implement directory synchronization tools Configure Microsoft Entra Connect prerequisites Configure Microsoft Entra Connect Monitor synchronization services using Microsoft Entra Connect Health Configure Microsoft Entra Connect cloud sync prerequisites Configure Microsoft Entra Connect cloud sync 13 - Manage synchronized identities Manage users with directory synchronization Manage groups with directory synchronization Use Microsoft Entra Connect Sync Security Groups to help maintain directory synchronization Configure object filters for directory synchronization Explore Microsoft Identity Manager Troubleshoot directory synchronization 14 - Manage secure user access in Microsoft 365 Manage user passwords Enable pass-through authentication Enable multifactor authentication Enable passwordless sign-in with Microsoft Authenticator Explore self-service password management Explore Windows Hello for Business Implement Microsoft Entra Smart Lockout Implement conditional access policies Explore Security Defaults in Microsoft Entra ID Investigate authentication issues using sign-in logs 15 - Examine threat vectors and data breaches Explore today's work and threat landscape Examine how phishing retrieves sensitive information Examine how spoofing deceives users and compromises data security Compare spam and malware Examine account breaches Examine elevation of privilege attacks Examine how data exfiltration moves data out of your tenant Examine how attackers delete data from your tenant Examine how data spillage exposes data outside your tenant Examine other types of attacks 16 - Explore the Zero Trust security model Examine the principles and components of the Zero Trust model Plan for a Zero Trust security model in your organization Examine Microsoft's strategy for Zero Trust networking Adopt a Zero Trust approach 17 - Explore security solutions in Microsoft 365 Defender Enhance your email security using Exchange Online Protection and Microsoft Defender for Office 365 Protect your organization's identities using Microsoft Defender for Identity Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint Protect against cyber attacks using Microsoft 365 Threat Intelligence Provide insight into suspicious activity using Microsoft Cloud App Security Review the security reports in Microsoft 365 Defender 18 - Examine Microsoft Secure Score Explore Microsoft Secure Score Assess your security posture with Microsoft Secure Score Improve your secure score Track your Microsoft Secure Score history and meet your goals 19 - Examine Privileged Identity Management Explore Privileged Identity Management in Microsoft Entra ID Configure Privileged Identity Management Audit Privileged Identity Management Control privileged admin tasks using Privileged Access Management 20 - Examine Azure Identity Protection Explore Azure Identity Protection Enable the default protection policies in Azure Identity Protection Explore the vulnerabilities and risk events detected by Azure Identity Protection Plan your identity investigation 21 - Examine Exchange Online Protection Examine the anti-malware pipeline Detect messages with spam or malware using Zero-hour auto purge Explore anti-spoofing protection provided by Exchange Online Protection Explore other anti-spoofing protection Examine outbound spam filtering 22 - Examine Microsoft Defender for Office 365 Climb the security ladder from EOP to Microsoft Defender for Office 365 Expand EOP protections by using Safe Attachments and Safe Links Manage spoofed intelligence Configure outbound spam filtering policies Unblock users from sending email 23 - Manage Safe Attachments Protect users from malicious attachments by using Safe Attachments Create Safe Attachment policies using Microsoft Defender for Office 365 Create Safe Attachments policies using PowerShell Modify an existing Safe Attachments policy Create a transport rule to bypass a Safe Attachments policy Examine the end-user experience with Safe Attachments 24 - Manage Safe Links Protect users from malicious URLs by using Safe Links Create Safe Links policies using Microsoft 365 Defender Create Safe Links policies using PowerShell Modify an existing Safe Links policy Create a transport rule to bypass a Safe Links policy Examine the end-user experience with Safe Links 25 - Explore threat intelligence in Microsoft 365 Defender Explore Microsoft Intelligent Security Graph Explore alert policies in Microsoft 365 Run automated investigations and responses Explore threat hunting with Microsoft Threat Protection Explore advanced threat hunting in Microsoft 365 Defender Explore threat analytics in Microsoft 365 Identify threat issues using Microsoft Defender reports 26 - Implement app protection by using Microsoft Defender for Cloud Apps Explore Microsoft Defender Cloud Apps Deploy Microsoft Defender for Cloud Apps Configure file policies in Microsoft Defender for Cloud Apps Manage and respond to alerts in Microsoft Defender for Cloud Apps Configure Cloud Discovery in Microsoft Defender for Cloud Apps Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps 27 - Implement endpoint protection by using Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Configure Microsoft Defender for Endpoint in Microsoft Intune Onboard devices in Microsoft Defender for Endpoint Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management Manage device discovery and vulnerability assessment Reduce your threat and vulnerability exposure 28 - Implement threat protection by using Microsoft Defender for Office 365 Explore the Microsoft Defender for Office 365 protection stack Investigate security attacks by using Threat Explorer Identify cybersecurity issues by using Threat Trackers Prepare for attacks with Attack simulation training 29 - Examine data governance solutions in Microsoft Purview Explore data governance and compliance in Microsoft Purview Protect sensitive data with Microsoft Purview Information Protection Govern organizational data using Microsoft Purview Data Lifecycle Management Minimize internal risks with Microsoft Purview Insider Risk Management Explore Microsoft Purview eDiscovery solutions 30 - Explore archiving and records management in Microsoft 365 Explore archive mailboxes in Microsoft 365 Enable archive mailboxes in Microsoft 365 Explore Microsoft Purview Records Management Implement Microsoft Purview Records Management Restore deleted data in Exchange Online Restore deleted data in SharePoint Online 31 - Explore retention in Microsoft 365 Explore retention by using retention policies and retention labels Compare capabilities in retention policies and retention labels Define the scope of a retention policy Examine the principles of retention Implement retention using retention policies, retention labels, and eDiscovery holds Restrict retention changes by using Preservation Lock 32 - Explore Microsoft Purview Message Encryption Examine Microsoft Purview Message Encryption Configure Microsoft Purview Message Encryption Define mail flow rules to encrypt email messages Add organizational branding to encrypted email messages Explore Microsoft Purview Advanced Message Encryption 33 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 34 - Implement Microsoft Purview Insider Risk Management Explore insider risk management Plan for insider risk management Explore insider risk management policies Create insider risk management policies Investigate insider risk management activities and alerts Explore insider risk management cases 35 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 36 - Explore Microsoft Purview Data Loss Prevention Examine Data Loss Prevention Explore Endpoint data loss prevention Examine DLP policies View DLP policy results Explore DLP reports 37 - Implement Microsoft Purview Data Loss Prevention Plan to implement Microsoft Purview Data Loss Protection Implement Microsoft Purview's default DLP policies Design a custom DLP policy Create a custom DLP policy from a template Configure email notifications for DLP policies Configure policy tips for DLP policies 38 - Implement data classification of sensitive information Explore data classification Implement data classification in Microsoft 365 Explore trainable classifiers Create and retrain a trainable classifier View sensitive data using Content explorer and Activity explorer Detect sensitive information documents using Document Fingerprinting 39 - Explore sensitivity labels Manage data protection using sensitivity labels Explore what sensitivity labels can do Determine a sensitivity label's scope Apply sensitivity labels automatically Explore sensitivity label policies 40 - Implement sensitivity labels Plan your deployment strategy for sensitivity labels Examine the requirements to create a sensitivity label Create sensitivity labels Publish sensitivity labels Remove and delete sensitivity labels Additional course details: Nexus Humans MS-102T00: Microsoft 365 Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-102T00: Microsoft 365 Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-102T00 Microsoft 365 Administrator Essentials
Delivered OnlineFlexible Dates
£2,975

Knowing More About Epilepsy

5.0(50)

By Pochat Training

CPD Accredited, Interactive Short Course 2 hr session This training session gives a good introduction to epilepsy How can you best understand and help those affected with different types of seizures Great for those who have contact with people with epilepsy, such as family and friends, those working in education and afterschool clubs, sports and good CPD for nurses Course Contents: What is Epilepsy The different types of seizures Keeping someone safe while they're having a seizure Understand how having epilepsy affects someone's life Great for teachers and TAs in schools, for those working in care or community events, and those close to people with epilepsy Benefits of this Short Course: Epilepsy is one of the most common neurological conditions In the UK, there are over 600,000 people with a diagnosis of epilepsy That is about 1 in 103 people, or 1 child or young person in every 3 classrooms Every year, 1000 people in the UK die due to their epilepsy Help avoid unnecessary suffering or even death by knowing what to do to help while they're having an epileptic seizure, and keep them safe

Knowing More About Epilepsy
Delivered Online + more
£20