• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

17895 Health courses in Cardiff delivered Online

Safer Recruitment Training Course - CPD Certified

5.0(3)

By School Of Health Care

Safer Recruitment: Safer Recruitment Training Course Online Unlock the Power of Safer Recruitment: Safer Recruitment Training Course: Enrol Now! All settings where children and young adults are present require Safer Recruitment: Safer Recruitment Training Course practices. For example, when hiring and supervising new employees, it is important to understand how to make sure they are safe to work with children. This begins with a thorough safer recruitment process that ensures that the people you hire have the same child protection attitudes and values as you do. Throughout this Safer Recruitment: Safer Recruitment Training Course, you will learn about best practices in the recruitment process. You will learn how to check suitability throughout the hiring process, from selection to a recruit starting in a role. The Safer Recruitment: Safer Recruitment Training Course covers the various checks that must be performed when hiring someone new to work with children, such as DBS checks, overseas checks, and eligibility to work in the UK. Main Course: Safer Recruitment Training Course Free Courses included with Safer Recruitment: Safer Recruitment Training Course: Course 01: Level 4 Logistics Management Course 02: Level 4 Time Management Course Course 03: HR and Payroll Management Course [ Note: Free PDF certificate as soon as completing the Safer Recruitment: Safer Recruitment Training Course] Safer Recruitment: Safer Recruitment Training - Course Online This Safer Recruitment: Safer Recruitment Training - Course consists of 06 modules. Course Curriculum of the Safer Recruitment: Safer Recruitment Training - Course Module 01: Introduction to Safer Recruitment Module 02: Step 1: Create the Job Description and Application Pack Module 03: Step 2: Shortlist Candidates, Contact Referees and Review Disclosures Module 04: Step 3: Interview Shortlisted Candidates Module 05: Step 4: Pre-Appointment and DBS Checks Module 06: Step 5: The Induction Process and Maintaining a Safe Workplace Assessment Method of Safer Recruitment: Safer Recruitment Training - Course After completing Safer Recruitment: Safer Recruitment Training - Course, you will get quizzes to assess your learning. You will do the later modules upon getting 60% marks on the quiz test. Certification of Safer Recruitment: Safer Recruitment Training - Course After completing the Safer Recruitment: Safer Recruitment Training - Course, you can instantly download your certificate for FREE. Who is this course for? Safer Recruitment: Safer Recruitment Training Course Online This Safer Recruitment: Safer Recruitment Training Course is ideal for anyone in charge of hiring and/or supervising new staff members who work with children and young people. This applies whether you are hiring full-time, part-time, or volunteer employees. Requirements Safer Recruitment: Safer Recruitment Training Course Online To enrol in this Safer Recruitment: Safer Recruitment Training Course, students must fulfil the following requirements: Good Command over English language is mandatory to enrol in our Safer Recruitment: Safer Recruitment Training Course. Be energetic and self-motivated to complete our Safer Recruitment: Safer Recruitment Training Course. Basic computer Skill is required to complete our Safer Recruitment: Safer Recruitment Training Course. If you want to enrol in our Safer Recruitment: Safer Recruitment Training Course, you must be at least 15 years old.

Safer Recruitment Training Course - CPD Certified
Delivered Online On Demand35 hours
£12

Cisco Securing Networks with Cisco Firepower Next Generation Firewall v1.0 (SSNGFW)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security administrators Security consultants Network administrators System engineers Technical support personnel Cisco integrators and partners Overview After taking this course, you should be able to: Describe key concepts of NGIPS and NGFW technology and the Cisco Firepower Threat Defense system, and identify deployment scenarios Perform initial Cisco Firepower Threat Defense device configuration and setup tasks Describe how to manage traffic and implement Quality of Service (QoS) using Cisco Firepower Threat Defense Describe how to implement NAT by using Cisco Firepower Threat Defense Perform an initial network discovery, using Cisco Firepower to identify hosts, applications, and services Describe the behavior, usage, and implementation procedure for access control policies Describe the concepts and procedures for implementing security intelligence features This course gives you knowledge and skills to use and configure Cisco© Firepower Threat Defense technology, beginning with initial device setup and configuration and including routing, high availability, Cisco Adaptive Security Appliance (ASA) to Cisco Firepower Threat Defense migration, traffic control, and Network Address Translation (NAT). You will learn how to implement advanced Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network-based malware detection, and deep packet inspection. You will also learn how to configure site-to-site VPN, remote-access VPN, and Secure Sockets Layer (SSL) decryption before moving on to detailed analysis, system administration, and troubleshooting. Cisco Firepower Threat Defense Overview Examining Firewall and IPS Technology Firepower Threat Defense Features and Components Examining Firepower Platforms Examining Firepower Threat Defense Licensing Cisco Firepower Implementation Use Cases Cisco Firepower NGFW Device Configuration Firepower Threat Defense Device Registration FXOS and Firepower Device Manager Initial Device Setup Managing NGFW Devices Examining Firepower Management Center Policies Examining Objects Examining System Configuration and Health Monitoring Device Management Examining Firepower High Availability Configuring High Availability Cisco ASA to Firepower Migration Migrating from Cisco ASA to Firepower Threat Defense Cisco Firepower NGFW Traffic Control Firepower Threat Defense Packet Processing Implementing QoS Bypassing Traffic Cisco Firepower NGFW Address Translation NAT Basics Implementing NAT NAT Rule Examples Implementing NAT Cisco Firepower Discovery Examining Network Discovery Configuring Network Discovery Implementing Access Control Policies Examining Access Control Policies Examining Access Control Policy Rules and Default Action Implementing Further Inspection Examining Connection Events Access Control Policy Advanced Settings Access Control Policy Considerations Implementing an Access Control Policy Security Intelligence Examining Security Intelligence Examining Security Intelligence Objects Security Intelligence Deployment and Logging Implementing Security Intelligence File Control and Advanced Malware Protection Examining Malware and File Policy Examining Advanced Malware Protection Next-Generation Intrusion Prevention Systems Examining Intrusion Prevention and Snort Rules Examining Variables and Variable Sets Examining Intrusion Policies Site-to-Site VPN Examining IPsec Site-to-Site VPN Configuration Site-to-Site VPN Troubleshooting Implementing Site-to-Site VPN Remote-Access VPN Examining Remote-Access VPN Examining Public-Key Cryptography and Certificates Examining Certificate Enrollment Remote-Access VPN Configuration Implementing Remote-Access VPN SSL Decryption Examining SSL Decryption Configuring SSL Policies SSL Decryption Best Practices and Monitoring Detailed Analysis Techniques Examining Event Analysis Examining Event Types Examining Contextual Data Examining Analysis Tools Threat Analysis System Administration Managing Updates Examining User Account Management Features Configuring User Accounts System Administration Cisco Firepower Troubleshooting Examining Common Misconfigurations Examining Troubleshooting Commands Firepower Troubleshooting

Cisco Securing Networks with Cisco Firepower Next Generation Firewall v1.0 (SSNGFW)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Tanzu Mission Control: Management and Operations 2024

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Administrators or application owners who are responsible for deploying and managing Kubernetes clusters and workloads Overview By the end of the course, you should be able to meet the following objectives: Describe the VMware Tanzu Mission Control architecture Configure user and group access Create and manage Kubernetes clusters Control access Create image registry, network, quota, security, custom and mutation policies Connect your on-premises vSphere with Tanzu Supervisor to VMware Tanzu Mission Control Create, manage, and back up VMware Tanzu Kubernetes Grid™ clusters Create and manage Amazon Elastic Kubernetes Service clusters Perform cluster inspections Manage packages in your clusters Monitor and secure Kubernetes environments During this two-day course, you focus on using VMware Tanzu© Mission Control? to provision and manage Kubernetes clusters. The course covers how to apply image registry, network, security, quota, custom, and mutation policies to Kubernetes environments. It focuses on how to deploy, upgrade, back up, and monitor Kubernetes clusters on VMware vSphere© with VMware Tanzu©, and it also covers package management using the VMware Tanzu Mission Control catalog. Course Introduction Introduction and course logistics Course Objectives What Is VMware Tanzu Mission Control Describe VMware Tanzu Mission Control Describe vSphere with Tanzu Describe Tanzu Kubernetes Grid Describe VMware Tanzu© for Kubernetes Operations Explain how to request access to VMware Tanzu Mission Control Describe VMware Cloud? services Describe the VMware Cloud services catalog Explain how to access VMware Tanzu Mission Control Identify the components of VMware Tanzu Mission Control Explain the resource hierarchy of VMware Tanzu Mission Control Access, Users, and Groups Explain VMware Cloud services and enterprise federation Describe VMware Cloud services roles Explain multifactor authentication Describe the VMware Tanzu Mission Control UI List the components of the VMware Tanzu Mission Control UI Describe the VMware Tanzu CLI Describe the VMware Tanzu Mission Control API Cluster Lifecycle Management Outline the steps for registering a management cluster to VMware Tanzu Mission Control Discuss what a management cluster is Describe provisioners Explain the purpose of a cloud provider account Describe Amazon Elastic Kubernetes Service Describe Azure Kubernetes Service Workload Clusters Describe Tanzu Kubernetes Grid workload clusters Explain how to create a cluster Explain how to configure a cluster Describe Amazon Elastic Kubernetes Service workload clusters Describe Azure Kubernetes Service workload clusters Explain how to attach a Kubernetes cluster Explain how to verify the connections to the cluster Describe cluster health Policy Management Explain how access policies grant users access to different resources Describe the policy model Describe the available policy types Explain how image registry policies restrict from which image registries container images can be pulled Outline how network policies are applied to clusters Discuss how security policies control deployment of pods in a cluster Discuss how quota policies manage resource consumption in your clusters Discuss how custom policies implement specialized policies that govern your Kubernetes clusters Describe mutation policies Explain how Policy Insights reports VMware Tanzu Mission Control policy issues Control Catalog Describe the VMware Tanzu Mission Control catalog Explain how to install packages Describe cert-manager Explain Service Discovery and ExternalDNS Describe Multus CNI and Whereabouts Describe Fluent-Bit Explain Prometheus and Grafana Describe Harbor Describe Flux Describe Helm Describe Git repositories Tanzu Mission Control Day 2 Operations Describe data protection Describe cluster inspections Explain life cycle management Describe VMware Aria Operations? for Applications Discuss VMware Tanzu© Service Mesh? Advanced edition Describe VMware Aria Cost? powered by CloudHealth©

VMware Tanzu Mission Control: Management and Operations 2024
Delivered OnlineFlexible Dates
Price on Enquiry

Site Reliability Engineering (SRE) Foundation (DevOps Institute)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The target audience for the SRE Foundation course are professionals including. Anyone starting or leading a move towards increased reliability. Anyone interested in modern IT leadership and organizational change approaches. Business Managers, Business Stakeholders, Change Agents, Consultants, DevOps Practitioners, IT Directors, IT Managers, IT, Team Leaders, Product Owners, Scrum Masters, Software Engineers, Site Reliability Engineers, System Integrators, Tool Providers will benefit from this course. Overview The learning objectives for the SRE Foundation course include a practical understanding of. The history of SRE and its emergence at Google. The inter-relationship of SRE with DevOps and other popular frameworks. The underlying principles behind SRE Service Level Objectives (SLO's) and their user focus Service Level Indicators (SLI's) and the modern monitoring landscape. Error budgets and the associated error budget policies. Toil and its effect on an organization's productivity. Some practical steps that can help to eliminate toil. Observability as something to indicate the health of a service SRE tools. Automation techniques and the importance of security. Anti-fragility, our approach to failure and failure testing. The organizational impact that introducing SRE brings. The SRE (Site Reliability Engineering) Foundation course is an introduction to the principles & practices that enable an organization to reliably and economically scale critical services. Introducing a site-reliability dimension requires organizational re-alignment, a new focus on engineering & automation, and the adoption of a range of new working paradigms. This course prepares you for the SRE Foundation (SREF) certification. Course Introduction Course Goals Course Agenda SRE Principles & Practices What is Site Reliability Engineering? SRE & DevOps: What is the Difference? SRE Principles & Practices Service Level Objectives & Error Budgets Service Level Objectives (SLO?s) Error Budgets Error Budget Policies Reducing Toil What is Toil? Why is Toil Bad? Doing Something About Toil Monitoring & Service Level Indicators Service Level Indicators (SLI?s) Monitoring Observability SRE Tools & Automation Automation Defined Automation Focus Hierarchy of Automation Types Secure Automation Automation Tools Anti-Fragility & Learning from Failure Why Learn from Failure Benefits of Anti-Fragility Shifting the Organizational Balance Organizational Impact of SRE Why Organizations Embrace SRE Patterns for SRE Adoption On-Call Necessities Blameless Post-Mortems SRE & Scale SRE, Other Frameworks, The Future SRE & Other Frameworks The Future Exam Preparations Exam Requirements, Question Weighting, and Terminology List Sample Exam Review Additional course details: Nexus Humans Site Reliability Engineering (SRE) Foundation (DevOps Institute) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Site Reliability Engineering (SRE) Foundation (DevOps Institute) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Site Reliability Engineering (SRE) Foundation (DevOps Institute)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Workspace ONE: UEM Troubleshooting [V22.x]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Workspace ONE administrators, account managers, solutions architects, solutions engineers, sales engineers, technical support engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Summarize the basic troubleshooting methodologies Outline common troubleshooting techniques in the Workspace ONE UEM console Outline common troubleshooting techniques when integrating enterprise solutions in the Workspace ONE UEM console Summarize common troubleshooting strategies for Workspace ONE UEM managed devices Outline common application management troubleshooting techniques in the Workspace ONE UEM console Summarize common troubleshooting techniques for email management in the Workspace ONE UEM console Explain common troubleshooting approaches for the VMware Unified Access Gateway™ platform and individual edge services Outline useful troubleshooting tools, such as the Self-Service Portal and VMware Workspace ONE Assist™ In this two-day course, you learn to investigate, analyze, and determine issues that might occur with all the different components of VMware Workspace ONE© UEM. Troubleshooting is the backbone of service maintenance and management. To effectively troubleshoot product issues, administrators must understand how product services communicate and function. This in turn helps optimize service and software health management. Course Introduction Introductions and course logistics Course objectives Fundamentals of Troubleshooting Workspace ONE UEM Outline software troubleshooting logic and support methods Summarize the main process flows for the Workspace ONE UEM components Explain the importance of Workspace ONE UEM process flows for troubleshooting Identify different Workspace ONE UEM log files Workspace ONE UEM Console Troubleshooting Outline the best practices for troubleshooting Workspace ONE UEM console issues Identify common group management and assignment-related issues Outline common issues for Workspace ONE UEM console roles and system settings Understand how analytic events can be used to identity platform errors Summarize the steps for collecting and analyzing Workspace ONE UEM console logs Integration Troubleshooting Outline the common enterprise integrations in Workspace ONE UEM Outline common troubleshooting techniques for the VMware AirWatch© Cloud Connector? Troubleshoot issues related to Directory Services integration Identify directory user and groups synchronization issues Troubleshoot issues related to certificate authority integration Explain VMware Workspace ONE© Access? integration and VMware Workspace ONE© Intelligent Hub troubleshooting techniques Endpoint Troubleshooting Compare the endpoint connection topologies in Workspace ONE UEM Outline useful tools and resources for endpoint troubleshooting Summarize the best practices for device enrollment troubleshooting Explain device connectivity troubleshooting techniques Understand how to identify and resolve profile-related issues Identify common compliance policy issues and potential root causes Applications Troubleshooting Explain the different scoping questions for troubleshooting applications Review application management configurations Summarize the general tools and resources for application troubleshooting Describe the general logic of troubleshooting public applications Understand internal application issues and potential causes Explain purchased application troubleshooting techniques Unified Access Gateway And Edge Services Troubleshooting Review Unified Access Gateway architecture and edge service workflows Understand Unified Access Gateway general configurations Explain how to utilize Unified Access Gateway related troubleshooting tools and resources Identify and resolve common issues for Content Gateway on Unified Access Gateway Summarize troubleshooting techniques for VMware Workspace ONE© Tunnel? on Unified Access Gateway Email Troubleshooting Review different email architecture and workflows Summarize common errors associated with email profiles Identify tools and resources for email troubleshooting Discuss troubleshooting techniques for VMware AirWatch© Secure Email Gateway? on Unified Access Gateway Outline PowerShell integration issues and techniques to address them Additional Troubleshooting Tools Describe how the Self-Service Portal helps administrators and empowers end-users to resolve issues Understand how Workspace ONE Assist can help endpoint troubleshooting

VMware Workspace ONE: UEM Troubleshooting [V22.x]
Delivered OnlineFlexible Dates
Price on Enquiry

F5 Networks Troubleshooting BIG-IP

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course assumes that you have successfully completed the Administering BIG-IP course, or equivalent, and have hands-on experience working in a production BIG-IP environment for several months. You should have a solid understanding of the environment in which the BIG-IP is deployed. This course is meant for BIG-IP administrators, network engineers, applications engineers, etc., who will be responsible for troubleshooting problems associated with their BIG-IP system. This course gives networking professionals hands-on knowledge of how to troubleshoot a BIG-IP system using a number of troubleshooting techniques as well as troubleshooting and system tools. This course includes lectures, labs, and discussions. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP System Configuration Module 2: Reviewing Local Traffic Configuration Reviewing Nodes, Pools, and Virtual Servers Reviewing Address Translation Reviewing Routing Assumptions Reviewing Application Health Monitoring Reviewing Traffic Behavior Modification with Profiles Reviewing the TMOS Shell (TMSH) Reviewing Managing BIG-IP Configuration Data Reviewing High Availability (HA) Module 3: Troubleshooting Methodology Step-By-Step Process Step 1: State the Problem Step 2: Specify the Problem Step 3: Map the System Step 4: Develop Possible Causes Step 5: Test Theories Step 6: Iterate Until Root Cause Identified Documenting a Problem Putting Troubleshooting Steps to Use Module 4: Working with F5 Support Leveraging F5 Support Resources AskF5.com DevCentral iHealth Leveraging F5 Labs Working with F5 Technical Support Running End User Diagnostics (EUD) - Hardware Only New Platform Diagnostic Tools Always-On Management (AOM) Subsystem Requesting Return Materials Authorization F5?s Software Version Policy Managing the BIG-IP License for Upgrades Managing BIG-IP Disk Space Upgrading BIG-IP Software Module 5: Troubleshooting ? Bottom to Top Introducing Differences between BIG-IP and LINUX Tools Troubleshooting with Layer 1/Layer 2 Tools Troubleshooting with Layer 2/Layer 3 Tools Troubleshooting with Layer 3 Tools Troubleshooting with LINUX Tools Troubleshooting Memory and CPU Troubleshooting with watch Troubleshooting with Additional tmsh commands Module 6: Troubleshooting Tools tcpdump Wireshark ssldump Fiddler diff KDiff3 cURL Module 7: Using System Logs Configuring Logging Log Files Understanding BIG-IP Daemons Functions Triggering an iRule Deploying and Testing iRules Application Visibility and Reporting Module 8: Troubleshooting Lab Projects Network Configurations for Project Additional course details: Nexus Humans F5 Networks Troubleshooting BIG-IP training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the F5 Networks Troubleshooting BIG-IP course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

F5 Networks Troubleshooting BIG-IP
Delivered OnlineFlexible Dates
Price on Enquiry

Addiction Psychology and Abuse Awareness

By Compliance Central

All in One Bundle Special Discount Offer Are you looking to enhance your Addiction Psychology and Abuse Awareness skills? If yes, then you have come to the right place. Our comprehensive courses on Addiction Psychology and Abuse Awareness will assist you in producing the best possible outcome by learning the Addiction Psychology and Abuse awareness skills. Get 6 CPD Accredited Courses for only £41 with 6 Free PDF Certificates worth £24! Course 01: Counselling and Psychotherapy Course 02: Drugs and Alcohol Awareness Training - Online Certification Course 03: Substance Misuse Awareness Online Certification Course Course 04: Drug and Alcohol Worker Course Course 05: Anti Social Behaviour (ASB) Course 06: Psychology of Anxiety and Stress The Addiction Psychology and Abuse Awareness bundle is for those who want to be successful. In it, you will learn the essential knowledge needed to become well-versed in Addiction Psychology and Abuse Awareness. Our Addiction Psychology and Abuse Awareness bundle starts with the basics of Addiction Psychology and Abuse Awareness and gradually progresses towards advanced topics. Therefore, each lesson of this Addiction Psychology and Abuse Awareness is intuitive and easy to understand. Why would you choose the Addiction Psychology and Abuse Awareness course from Compliance Central: Lifetime access to Addiction Psychology and Abuse Awareness courses materials Full tutor support is available from Monday to Friday with the Addiction Psychology and Abuse Awareness course Learn Addiction Psychology and Abuse Awareness skills at your own pace from the comfort of your home Gain a complete understanding of Addiction Psychology and Abuse Awareness course Accessible, informative Addiction Psychology and Abuse Awareness learning modules designed by expert instructors Get 24/7 help or advice from our email and live chat teams with the Addiction Psychology and Abuse Awareness bundle Study Addiction Psychology and Abuse Awareness in your own time through your computer, tablet or mobile device. A 100% learning satisfaction guarantee with your Addiction Psychology and Abuse Awareness Course Improve your chance of gaining in-demand skills and better earning potential by completing the Addiction Psychology and Abuse Awareness Curriculum Breakdown of the Addiction Psychology and Abuse Awareness Curriculum Breakdown of Counselling and Psychotherapy Introduction to the course Psychotherapy Promo About the Instructor About the Course Understanding Psychotherapy What is Psychotherapy? A Short Historical Introduction Psychology, Counselling & Psychotherapy Where do Psychotherapists work? Starting Psychotherapy Practice Who Can Benefit from Psychotherapy? Short-Term Vs Long-Term Therapy Therapeutic Relationship Your Potential Clients in Therapy What does the First Psychotherapy Session Involve? Psychotherapy for Children Individual and Group Sessions Family Therapy Psychodynamic Approach Different Types of Psychotherapy Unconscious Processes (The Unconscious Mind) Defense Mechanisms Humanistic Approach Cognitive Behavioural Approach (CBT) Face-to-face Vs 'Online' Psychotherapy Internet Based Therapy How to Become an Online Psychotherapist? Thank You and Good Bye! CPD 60 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The Addiction Psychology and Abuse Awareness bundle helps aspiring professionals who want to obtain the knowledge and familiarise themselves with the skillsets to pursue a career in Addiction Psychology and Abuse Awareness. It is also great for professionals who are already working in Addiction Psychology and Abuse Awareness and want to get promoted at work. Requirements To enrol in this Addiction Psychology and Abuse Awareness course, all you need is a basic understanding of the English Language and an internet connection. Career path The Addiction Psychology and Abuse Awareness bundle will enhance your knowledge and improve your confidence in exploring opportunities in various sectors related to Addiction Psychology and Abuse Awareness. Certificates CPD Accredited Certificate of completion Free Digital certificate - Included 6 CPD Accredited PDF Certificate for Free CPD accredited hard copy certificates are available for Hard copy certificate - £9.99 Delivery Charge for Each Hard Copy Certificates: Inside the UK: £3.99 each Outside of the UK: £9.99 each

Addiction Psychology and Abuse Awareness
Delivered Online On Demand16 hours
£41

The Whole Brain Learning Approach in Child Development

5.0(2)

By Institute of Beauty & Makeup

CPD Accredited | Career Oriented Learning Modules | 24x7 Tutor Support | Lifetime Access

The Whole Brain Learning Approach in Child Development
Delivered Online On Demand1 hour
£12

Equality & Diversity: Stereotypes and Prejudices

By Wise Campus

Equality & Diversity: Stereotypes and Prejudices Do you always try to learn new things in order to increase your knowledge and skills? so, you can try out this course on Equality & Diversity. In order to explain the Equality & Diversity component, this specialised Equality & Diversity: Equality & Diversity course has decorated in total 7 different modules. You will be familiar with the objectives of Equality & Diversity: Equality & Diversity as well as relevant legal framework. This Equality & Diversity training will make your understanding of discrimination and diversity promotion apparent. Establishing connections between values, attitudes, and beliefs is the goal of this Equality & Diversity: Equality & Diversity course. You will gain a thorough understanding of stereotypes and prejudices by taking this course on equality & diversity. You will learn about institutional and individual discrimination in the final module of the Equality & Diversity: Equality & Diversity course. If you want to see yourself in productive work, enrol in this equality & diversity course right away! Learning Outcome of Equality & Diversity: Stereotypes and Prejudices You will know a brief about Equality & Diversity. Gain a brief knowledge about Equality & Diversity Legislation. Equality & Diversity course will give you an idea about Discrimination. You will learn about the connections between values, attitudes, and beliefs in the equality & diversity course. Equality & Diversity course will clear your idea about Stereotypes and Prejudices.. You can know about Institutional Discrimination and Individual Discrimination. Equality & Diversity: Stereotypes and Prejudices Course This Equality & Diversity: Equality & Diversity Course includes a FREE PDF Certificate. Lifetime access to this Equality & Diversity: Equality & Diversity Course Instant access to this Equality & Diversity: Equality & Diversityd Course Get FREE Tutor Support to this Equality & Diversity: Equality & Diversity Course Equality & Diversity: Stereotypes and Prejudices Elevate your career and impact with our comprehensive Equality & Diversity course! This Equality & Diversity program is designed across seven expertly crafted modules, offering insights into legal frameworks, discrimination awareness, and effective diversity promotion. Through this Equality & Diversity course, you’ll explore connections between values, beliefs, and attitudes, gaining a strong foundation in recognizing and countering stereotypes and biases. By the final module, you’ll fully understand both institutional and individual discrimination, empowering you to promote inclusivity. Step into meaningful work—enrol in our Equality & Diversity course today to lead positive change! Who is this course for? Equality & Diversity: Stereotypes and Prejudices Students, new graduates, and job seekers alike can enrol in this Equality & Diversity: Equality & Diversity course to advance their knowledge and abilities. Requirements Equality & Diversity: Stereotypes and Prejudices To enrol in this Equality & Diversity: Stereotypes and Prejudices Course, students must fulfil the following requirements: Good Command over English language is mandatory to enrol in our Equality & Diversity: Equality & Diversity Course. Be energetic and self-motivated to complete our LEquality & Diversity: Equality & Diversity Course. Basic computer Skill is required to complete our Equality & Diversity: Equality & Diversity Course. If you want to enrol in our Equality & Diversity: Equality & Diversity Course, you must be at least 15 years old. Career path Equality & Diversity: Stereotypes and Prejudices Courses on Equality & Diversity: Equality & Diversity will enable you to pursue a variety of occupations, including those as an HR professional, a business owner, or in a related field.

Equality & Diversity: Stereotypes and Prejudices
Delivered Online On Demand1 hour 6 minutes
£12

Cross-Cultural Awareness Training

5.0(2)

By Institute of Beauty & Makeup

CPD Accredited | Career Oriented Learning Modules | 24x7 Tutor Support | Lifetime Access

Cross-Cultural Awareness Training
Delivered Online On Demand1 hour
£12