• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1327 Health courses in Sheffield delivered Live Online

CentOS system administration

5.0(3)

By Systems & Network Training

CentOS training course description This three day hands on course provides a comprehensive coverage of core Linux administration tasks on CentOS Linux. What will you learn Administer & configure Linux systems. Maintain Linux by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure Linux system. Describe the organisation and implementation of the filesystem. CentOS training course details Who will benefit: System administrators. Network administrators. Prerequisites: Linux fundamentals Duration 3 days CentOS training course contents Managing software Package Concepts, RPM, rpm Commands, Yum, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management, Managing Processes, the Kernel: The First Process, Process Lists, Foreground & Background Processes, Process Priorities, Killing Processes. Configuring hardware Configuring Firmware and Hardware, IRQs, I/O Addresses, DMA Addresses, Boot Disks, Coldplug and Hotplug Devices, Configuring Expansion Cards and PCI Cards, Kernel Modules, USB Devices, Linux USB Drivers, Configuring Hard Disks, Partitioning Systems, LVM, Common Layouts, Creating Partitions and Filesystems, Maintaining Filesystem Health, Tuning, Journals, Checking Filesystems, Monitoring Disk Use, Mounting and Unmounting Filesystems. Managing files File Management Commands, File Naming and Wildcards, File Archiving, Links, Directory Commands, File Ownership and Group, File access control, Permissions, chmod, Defaults, File Attributes, Disk Quotas, Enabling and setting Quotas, Locating Files, The FHS. Booting Linux and editing files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Administering the system Managing Users and Groups, Tuning User and System Environments, Using System Log Files, Understanding syslogd , Setting Logging Options, Manually Logging Data, Rotating Log Files, Reviewing Log File Contents, Maintaining the System Time, Linux Time Concepts, Manually Setting the Time, Using NTP, Running Jobs in the Future, Understanding the Role of cron, Creating System cron Jobs, Creating User cron Jobs, Using anacron, Using at. Configuring basic networking TCP/IP, Network Hardware, Network Addresses, Hostnames, Network Ports, Configuring Linux for a Local Network, Configuring with DHCP, Static IP Address, Configuring Routing, Using GUI Configuration Tools, ifup and ifdown, Diagnosing Network Connections, Testing Connectivity, Tracing a Route, Checking Network Status , Examining Network Traffic, Additional Tools. Securing your systems Administering Network Security, Super Server Restrictions, Disabling Unused Servers, Administering Local Security, Securing Passwords, Limiting root Access, Setting Login, Process, SUID/SGID Files, Configuring SSH, Using GPG, Generating, Importing and Revoking Keys, Encrypting and Decrypting Data, Signing Messages and Verifying Signatures.

CentOS system administration
Delivered in Internationally or OnlineFlexible Dates
£3,497

Highfield Level 3 Award in Health and Safety in the Workplace - Apply Now!

By Caldiston Academy

The Highfield Level 3 Award in Health and Safety in the Workplace (RQF) has been developed to give learners a sound knowledge and understanding of health and safety. Who is this course for? This elearning course has been designed for managers, supervisors and team leaders, or those who are preparing to start work at this level, to gain a good understanding of health and safety that would be relevant within their workplace. What does the course cover? The topics covered in this course include: Introduction to health and safety Accidents, injuries and work-related health Legal aspects of health and safety Risk assessment Hazardous substances (COSHH) The workplace Using equipment safely Fire safety Ergonomics, manual handling and display screen equipment Measuring and monitoring performance The role of line managers and supervisors How is the course delivered? Learners receive access to Caldiston Academy's learning portal where they can access their interactive elearning course and Highfield Level 3 Supervising Health and Safety e-book. Total qualification time (TQT) for this course is 30 hours. These hours include time spent: Working through the interactive e-learning course Reading the Highfield Level 3 Supervising Health and Safety e-book Completing a mock exam How is the course assessed? To acheive the Highfield Level 3 Award in Health and Safety in the Workplace learners must complete a 2 hour remotely invigilated exam.

Highfield Level 3 Award in Health and Safety in the Workplace - 
Apply Now!
Delivered OnlineFlexible Dates
Price on Enquiry

M.D.D HIRE A THERAPIST PACKAGE (SELF IMPROVEMENT)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

Introducing “Hire a Therapist” Package: Personalized Support for Your Mental Health and Emotional Well-being Are you considering seeking professional support for your mental health and emotional well-being? Miss Date Doctor’s “Hire a Therapist” Package offers you personalized and confidential counselling sessions with experienced therapists to help you navigate life’s challenges, overcome obstacles, and achieve personal growth. Therapy provides a safe and supportive space to explore your thoughts, emotions, and concerns with the guidance of a skilled therapist. Our team of dedicated therapists is committed to helping you enhance your overall well-being and lead a more fulfilling life. Here’s how the “Hire a Therapist” Package can support you: Personalized Assessment: Our therapists will conduct a thorough assessment to understand your unique needs and goals for therapy. Individualized Approach: Your therapy sessions will be tailored to address your specific concerns and support your personal growth. Emotional Support: We offer a compassionate and non-judgmental environment where you can freely express your feelings and experiences. Confidentiality: Your therapy sessions are completely confidential, ensuring a safe space for open and honest communication. Coping Strategies: Our therapists will equip you with practical coping strategies to manage stress, anxiety, and other emotional difficulties. Self-Exploration: Therapy encourages self-discovery and self-awareness, helping you gain insights into your thoughts, behaviours, and emotions. Goal Setting: Together with your therapist, you’ll set achievable goals to work towards positive change and personal growth. Flexible Sessions: “Hire a Therapist” Package offers flexibility in scheduling sessions, accommodating your availability and preferences. The “Hire a Therapist” Package at Miss Date Doctor is designed to provide you with personalized support and guidance on your journey to better mental health and emotional well-being. Our skilled therapists are committed to helping you overcome challenges, enhance your resilience, and lead a more fulfilling life. Invest in your mental and emotional health and take the first step towards positive change with the “Hire a Therapist” Package. Embrace the opportunity to explore your thoughts and feelings in a confidential and supportive environment. Let our experienced therapists guide you towards a brighter and more empowered future. 3 x 1 hour sessions https://relationshipsmdd.com/product/hire-a-therapist-package/

M.D.D HIRE A THERAPIST PACKAGE (SELF IMPROVEMENT)
Delivered in London or UK Wide or OnlineFlexible Dates
£500

Level 1, Awareness in Fire Safety

5.0(50)

By Pochat Training

QA Level 1 Award In Fire Safety Awareness (RQF) Face to Face: Half-day course Virtual Classroom: Spread over 2 sessions of 2½ hr duration This course is an ideal way to ensure that all employees have a good understanding of fire safety Candidates will learn basic fire safety principles in order to ensure they are keeping themselves and others in the workplace safe at all times Benefits of this course: Candidates will learn basic fire safety principles in order to ensure they are keeping themselves and others in the workplace safe at all times Candidates will also learn what to do in the event of an emergency and the simple measures that can be taken to control the risk of fires With subjects covered in just half a day, this course is an ideal way to ensure that all employees have a good understanding of fire safety, whilst minimising disruption to your organisation’s day to day activity This course is also good for those who just want to know a bit more about keeping themselves and loved ones safe from possible fires Course Contents: Causes of Fire in the Workplace The Costs of Fires in the Workplace for Employers, Employees and Society Basic Fire Safety Duties and Responsibilities Actions to be taken in the event of a Fire Principles of Fire Risk Control Safe Use of Portable Fire Fighting Equipment Fire Safety Equipment Checks Accredited, Ofqual regulated qualification: TOur Fire Safety Awareness course is a nationally recognised, Ofqual regulated qualification accredited by Qualsafe Awards. This means that you can be rest assured that your Fire Safety Awareness Training is of high quality and is a very good way to make sure your employees have an Awareness in Fire Safety. The Ofqual Register number for this course is 603/2627/X

Level 1, Awareness in Fire Safety
Delivered in person or Online + more
£85

Conflict Management training

5.0(58)

By Safety Solutions Training Ltd.

Course Content: Open discussions - risks associated with the workplace Health and safety legislation in relation to workplace violence - employer and employee duties Digital online security; avoiding online harassment The conflict cycle, dynamic threat assessment Effective use of body language and communication skills during confrontational situations Managing confrontation through distractions and interpersonal skills Lone worker safe systems of work; communication responsibilities Recognising potentially unsafe situations or situations of deteriorating safety i.e., violence and aggression, inappropriate conduct, malicious allegations Case study review Legislation regarding self-defence, emphasising its role as a last resort measure Post-incident procedures, emphasising the formulation of comprehensive and robust incident reports to identify potential risks and provide a thorough account of the situation.

Conflict Management training
Delivered in person or OnlineFlexible Dates
£99

Red Hat system administration

5.0(3)

By Systems & Network Training

Red Hat training course description This three day hands on course provides a comprehensive coverage of core Linux administration tasks on Red Hat Linux. What will you learn Administer & configure Linux systems. Maintain Linux by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure Linux system. Describe the organisation and implementation of the filesystem. Red Hat training course details Who will benefit: System administrators. Network administrators. Prerequisites: Linux fundamentals Duration 3 days Red Hat training course contents Managing software Package Concepts, RPM, rpm Commands, Yum, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management, Managing Processes, the Kernel: The First Process, Process Lists, Foreground & Background Processes, Process Priorities, Killing Processes. Configuring hardware Configuring Firmware and Hardware, IRQs, I/O Addresses, DMA Addresses, Boot Disks, Coldplug and Hotplug Devices, Configuring Expansion Cards and PCI Cards, Kernel Modules, USB Devices, Linux USB Drivers, Configuring Hard Disks, Partitioning Systems, LVM, Common Layouts, Creating Partitions and Filesystems, Maintaining Filesystem Health, Tuning, Journals, Checking Filesystems, Monitoring Disk Use, Mounting and Unmounting Filesystems. Managing files File Management Commands, File Naming and Wildcards, File Archiving, Links, Directory Commands, File Ownership and Group, File access control, Permissions, chmod, Defaults, File Attributes, Disk Quotas, Enabling and setting Quotas, Locating Files, The FHS. Booting Linux and editing files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Administering the system Managing Users and Groups, Tuning User and System Environments, Using System Log Files, Understanding syslogd , Setting Logging Options, Manually Logging Data, Rotating Log Files, Reviewing Log File Contents, Maintaining the System Time, Linux Time Concepts, Manually Setting the Time, Using NTP, Running Jobs in the Future, Understanding the Role of cron, Creating System cron Jobs, Creating User cron Jobs, Using anacron, Using at. Configuring basic networking TCP/IP, Network Hardware, Network Addresses, Hostnames, Network Ports, Configuring Linux for a Local Network, Configuring with DHCP, Static IP Address, Configuring Routing, Using GUI Configuration Tools, ifup and ifdown, Diagnosing Network Connections, Testing Connectivity, Tracing a Route, Checking Network Status , Examining Network Traffic, Additional Tools. Securing your systems Administering Network Security, Super Server Restrictions, Disabling Unused Servers, Administering Local Security, Securing Passwords, Limiting root Access, Setting Login, Process, SUID/SGID Files, Configuring SSH, Using GPG, Generating, Importing and Revoking Keys, Encrypting and Decrypting Data, Signing Messages and Verifying Signatures. Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

Red Hat system administration
Delivered in Internationally or OnlineFlexible Dates
£3,497

Cardiac Pacing for Nurses

By M&K Update Ltd

The course will cover the essential underpinning knowledge to effectively manage the patient throughout the life cycle of the implantable device.

Cardiac Pacing for Nurses
Delivered in person or OnlineFlexible Dates
Price on Enquiry

BOHS P408 - Identification and Quantification of Asbestos in Soils using PLM and PCM

By Airborne Environmental Consultants Ltd

The main subject areas of the course are: Controlling the health risks of asbestos. Sample handling and waste disposal. Identification of asbestos by PLM. Gravimetric quantification of asbestos-containing materials. Discrimination and quantification of free fibres by dispersion and PCM. Analysis of soils - practical application.

BOHS P408 - Identification and Quantification of Asbestos in Soils using PLM and PCM
Delivered in Manchester + 1 more or OnlineFlexible Dates
£1,225

Coaching sessions

By Sinéad Robertson

Simply speaking, Life Coaching is about raising awareness of how we can move from A to B. Sometimes we don't know what place B is, and we can use Coaching to gain clarity on what B looks and feels like. Life Coaching is non-directive, which means as a Coach, I help you to unlock your potential rather than tell you what to do. The experience creates a space for accountability and motivation to take positive action. ​ My role as your Holistic Coach is to provide you with a safe space for you to ground, explore & embrace your emotions, claim your personal power to design & live your dream life.

Coaching sessions
Delivered in Derby + 1 more or OnlineFlexible Dates
FREE to £1,500

SC-300T00 Microsoft Identity and Access Administrator

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization?s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance. Prerequisites SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals AZ-104T00 - Microsoft Azure Administrator 1 - Explore identity in Microsoft Entra ID Explain the identity landscape Explore zero trust with identity Discuss identity as a control plane Explore why we have identity Define identity administration Contrast decentralized identity with central identity systems Discuss identity management solutions Explain Microsoft Entra Business to Business Compare Microsoft identity providers Define identity licensing Explore authentication Discuss authorization Explain auditing in identity 2 - Implement initial configuration of Microsoft Entra ID Configure company brand Configure and manage Microsoft Entra roles Configure delegation by using administrative units Analyze Microsoft Entra role permissions Configure and manage custom domains Configure tenant-wide setting 3 - Create, configure, and manage identities Create, configure, and manage users Create, configure, and manage groups Configure and manage device registration Manage licenses Create custom security attributes Explore automatic user creation 4 - Implement and manage external identities Describe guest access and Business to Business accounts Manage external collaboration Invite external users - individually and in bulk Demo - manage guest users in Microsoft Entra ID Manage external user accounts in Microsoft Entra ID Manage external users in Microsoft 365 workloads Implement and manage Microsoft Entra Verified ID Configure identity providers Implement cross-tenant access controls 5 - Implement and manage hybrid identity Plan, design, and implement Microsoft Entra Connect Implement manage password hash synchronization (PHS) Implement manage pass-through authentication (PTA) Demo - Manage pass-through authentication and seamless single sign-on (SSO) Implement and manage federation Trouble-shoot synchronization errors Implement Microsoft Entra Connect Health Manage Microsoft Entra Health 6 - Secure Microsoft Entra users with multifactor authentication What is Microsoft Entra multifactor authentication? Plan your multifactor authentication deployment Configure multi-factor authentication methods 7 - Manage user authentication Administer FIDO2 and passwordless authentication methods Explore Authenticator app and OATH tokens Implement an authentication solution based on Windows Hello for Business Deploy and manage password protection Configure smart lockout thresholds Implement Kerberos and certificate-based authentication in Microsoft Entra ID Configure Microsoft Entra user authentication for virtual machines 8 - Plan, implement, and administer Conditional Access Plan security defaults Plan Conditional Access policies Implement Conditional Access policy controls and assignments Test and troubleshoot Conditional Access policies Implement application controls Implement session management Implement continuous access evaluation 9 - Manage Microsoft Entra Identity Protection Review identity protection basics Implement and manage user risk policy Monitor, investigate, and remediate elevated risky users Implement security for workload identities Explore Microsoft Defender for Identity 10 - Implement access management for Azure resources Assign Azure roles Configure custom Azure roles Create and configure managed identities Access Azure resources with managed identities Analyze Azure role permissions Configure Azure Key Vault RBAC policies Retrieve objects from Azure Key Vault Explore Microsoft Entra Permissions Management 11 - Plan and design the integration of enterprise apps for SSO Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report Configure connectors to apps Design and implement app management roles Configure preintegrated gallery SaaS apps Implement and manage policies for OAuth apps 12 - Implement and monitor the integration of enterprise apps for SSO Implement token customizations Implement and configure consent settings Integrate on-premises apps with Microsoft Entra application proxy Integrate custom SaaS apps for single sign-on Implement application-based user provisioning Monitor and audit access to Microsoft Entra integrated enterprise applications Create and manage application collections 13 - Implement app registration Plan your line of business application registration strategy Implement application registration Register an application Configure permission for an application Grant tenant-wide admin consent to applications Implement application authorization Manage and monitor application by using app governance 14 - Plan and implement entitlement management Define access packages Configure entitlement management Configure and manage connected organizations Review per-user entitlements 15 - Plan, implement, and manage access review Plan for access reviews Create access reviews for groups and apps Create and configure access review programs Monitor access review findings Automate access review management tasks Configure recurring access reviews 16 - Plan and implement privileged access Define a privileged access strategy for administrative users Configure Privileged Identity Management for Azure resources Plan and configure Privileged Access Groups Analyze Privileged Identity Management audit history and reports Create and manage emergency access accounts 17 - Monitor and maintain Microsoft Entra ID Analyze and investigate sign-in logs to troubleshoot access issues Review and monitor Microsoft Entra audit logs Export logs to third-party security information and event management system Analyze Microsoft Entra workbooks and reporting Monitor security posture with Identity Secure Score

SC-300T00 Microsoft Identity and Access Administrator
Delivered OnlineFlexible Dates
£2,380