This manual handling course is for businesses who have workers who are exposed to the dangers of manual handling. This course will fulfil requirements set out by the HSE to train staff on how to correctly handle items whilst lifting, pushing and pulling.
A comprehensive two days, delivered using a variety of teaching styles, by professionals who manage medical emergencies on a day-to-day basis. A number of the more common presenting conditions are covered providing a structured approach to the pathophysiology, initial assessment and management of the acutely ill medical patient.
Gold CSCS Card NVQ Level 4 Diploma in Construction Site Supervision This qualification is for managers on-site who are working as a site supervisor or assistant site manager. You should be liaising with contractors, supervisors, and construction site management, organising resources, and have responsibility for health and safety and quality control such as inductions, briefings toolbox talks and inspections. You may work across one or more of the following Pathways: Building and Civil Engineering Highways Maintenance Residential Development Conservation Demolition Induction - As soon as you register you will be given a dedicated assessor. They will arrange an induction and together with your assessor you'll get to decide on the pathway which best proves your competency. The induction is used to plan out how you will gather the relevant evidence to complete the course. During the course - The assessor will work with you to build a portfolio of evidence that allows you to showcase your knowledge, skills and experience. The assessor will also regularly review and provide you with feedback. This will allow you to keep on track to progress quickly. You will be assessed through various methods such as observations, written questions, evidence generated from the workplace, professional discussion and witness testimonials. On completion - Once all feedback has been agreed, the Internal Quality Assurer will review your portfolio and in agreement with the assessor your certificate will be claimed. To download our PDF for this course then please click here.
Gain essential knowledge and practical skills to provide effective care for patients with stomas with our "An Understanding of Stoma Care" course. Learn how to maintain stoma health and support patients through their journey.
Gain comprehensive understanding of caring for individuals with psychosis and schizophrenia. Enhance knowledge and skills to provide effective care and support. Designed for caregivers, family members, support workers, and healthcare professionals.
About this VILT Tripod can be used in any area of business where the organisation has a management system in place to prevent unwanted events e.g., health, safety, environment, quality, security, productivity, project management, and many more Tripod Beta is one of several tools based on Tripod's fundamental principles. Tripod Beta is based on proven theories, man years of academic research, and testing in the workplace. The Swiss Cheese Model originated from this work. Features of the methodology are: 1) the Tripod Beta diagram; it provides an easy-to-read summary of the entire investigation on a single page, 2) it accommodates deficiencies in leadership and worker participation, 3) it accommodates deficiencies in human behaviour, and 4) it highlights missing controls (not just controls that failed). Quality throughout all aspects of Tripod is assured by the Stichting Tripod Foundation (STF) and the Energy Institute. The participants will gain a theoretical understanding of the Tripod Beta methodology and terminology. They will be able to read Tripod diagrams and reports, and be able to assist incident investigation/analysis as a team member. This is the first step to becoming an accredited silver or gold practitioner. Tripod Beta Practitioner Accreditation is meant to build these skills, through a blend of support, coaching and assessments. Feedback is provided on Tripod incident investigation reports, giving the Practitioner the opportunity to hone their skills and become confident in their ability to use Tripod effectively. Training Objectives Upon completion of this course, participants will be able to: Pass the Tripod Beta Practitioner (Bronze Level) exam Act as a team member or Tripod facilitator on an incident investigation Plan and schedule activities for an incident investigation Focus line of enquiry during an investigation Engage with the most relevant people at each stage of the investigation Describe the incident causation paths in terms that align with their management system Consider issues relating to leadership, worker participation and human behaviour Assess the quality of an incident report Apply the process to any type of unwanted event that should have been prevented by a management system e.g., health, safety, environment, financial, security, productivity, quality, project management etc. Combine the findings from many incidents with data from other initiatives e.g., audits and inspections, to spot trends to prioritise actions and product a single improvement plan Target Audience The course is recommended for anyone who is expected to play a role in designing, reviewing, auditing, and following your organizations OH&S management system. Successful participants will be awarded the Stitching Tripod Foundation Tripod Beta Bronze certificate. The following oil & gas company personnel will benefit from the knowledge shared in this course: CEO Team Leaders Legal, insurance and finance departments Managers (Line and Function) Maintenance Engineers Quality Assurance Engineers Process Engineers Incident Investigators (Team member & Tripod facilitator) Project Managers System Custodians Technical Authorities Key Contractor's Management Contract Managers/Holders Safety Representatives Risk Management Engineers HSE Advisors Supervisors Auditors Regulators Course Level Basic or Foundation Trainer Your expert course leader has over 30 years of experience in construction, operations and maintenance with the upstream exploration and production sector. He joined Shell International E&P in 1971 and for 28 years worked in several locations around the world. Following the Piper Alpha incident he led Shell's two year, £10M major overhaul of their permit to work system. He first made use of the Tripod Beta principles during this period and since then he has delivered over 100 Tripod Beta courses in more than 25 locations around the world. He is a Chartered Engineer, a member of the Institution of Engineering and Technology and holds a postgraduate diploma from the University of Birmingham (UK). POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
CWISA training course description This CWISA course covers wireless technologies with reference to IoT. It examines from an IoT perspective how wireless works, and is an excellent introduction to IoT for the wireless engineer. Topics range from wireless technologies, RF, to mobile networks, IoT, and security. What will you learn Describe wireless networking and IoT technologies. Explain basic RF communications. Plan wireless solutions. Describe how to implement wireless solutions. Use best practices in implementing wireless solutions. CWISA training course details Who will benefit: Anyone working with IoT technologies. Prerequisites: RF fundamentals. Duration 4 days CWISA training course contents Introduction to wireless technologies History of wireless, radio waves and frequencies, wireless technologies and related components, common components of wireless solutions, LAN networking requirements, Network security, Implementing wireless solutions, staging, documentation, security updates, Industry organizations, IEEE, compatibility and certification groups. Wireless network use cases Wireless BANs, Wireless PANs, Wireless LANs, Wireless MANs, Wireless WANs, Wireless sensor networks, New network driver-Internet of Things, IoT for industry (IIoT), IoT for connected vehicles, Residential environments, Retail, Education (K12), Higher education, Agriculture, Smart cities / Public access, Health care, Office buildings, Hospitality, Industry, Stadiums, arenas, and large public venues. Planning wireless solutions Identifying use cases and applications, common wireless requirements and constraints, performing a wireless system design, selecting and evaluating design parameters. RF communications RF wave characteristics, RF propagation behaviours, RF signal metrics, fundamentals of wireless modulation. other wireless carriers, common frequency bands. Radio frequency hardware Hardware levels, basic RF hardware components (circuit board level), RF link types (use category). RF device types. Mobile communications networks Mobile networks, LTE, 5G, Use cases. Short-range, low-rate, and low-power networks RF and speed, RF and range, RF and power, 802.11, 802.15.4, Bluetooth, LoRa (Long range) / LoRaWAN, ZigBee, 6LoWPAN, NB-IoT and LTE-M. Wireless sensor networks What is a Wireless Sensor Network (WSN)? WSN applications, Sensors and actuators, WSN architectures, Planning a WSN. Internet of Things (IoT) Internet of Things (IoT) defined, IoT history and its definition revisited, one more comment on the definition of IoT, IoT verticals, Oil & Gas, IoT structure/ architecture basics, IoT connected objects. Securing wireless networks Confidentiality, integrity and availability, Privacy, non-repudiation, authenticity & safety, Importance of authentication in wireless networks, Key cryptographic technologies & concepts, Authentication methods, Authorisation, OAuth 2.0 authorisation framework, monitoring. Troubleshooting wireless solutions Proper solutions design, designing and implementing wireless solutions, basic installation procedures, general configuration considerations, troubleshooting and remediation, troubleshoot common problems in wireless solutions. Programming, scripting and automation What is an API? categories of APIs, common API communication methods, choosing a language, why are we integrating systems? Application & integration architectures. Data structures & types, XML, YAML, API types.
Copper cabling systems training course description A hands on training course covering installation, termination and testing of copper cables in an internal environment. The course covers all copper cabling but hands on sessions focus on unshielded Twisted Pair. What will you learn Recognise different copper cables and when to use them. Install and terminate UTP cables. Test and certify UTP cables. Copper cabling systems training course details Who will benefit: Professional cable installers. Prerequisites: None Duration 2 days Copper cabling systems training course contents Communications principles Use of cables in data networks, Use of cables in telephone networks, conductors and insulators, current, resistance, voltage and Ohms law. Copper cabling per cabling Coaxial versus twisted pair. UTP and STP. Cat 5, 5e, 6 and 7. Straight through, cross over, others. Hands on: Building a simple network. Cable termination Cable termination Preparing cables for termination, termination techniques, termination tools. Wiring standards, colour codes. Hands on: Making your own cables and using them in the simple network. Cable architectures Structure cabling system components, topologies, horizontal wiring, vertical wiring, telecomms rooms, server rooms. Hubs, switches and routers implications. Trunking. Cabling documentation, symbols and abbreviations. Hands on: punch blocks, testing continuity. Cable installation Site surveys: pathways and spaces, support structures, distance limitations. Recommended installation practices, laying and setup, retrofits. Health and safety factors, fire and building codes. Hands on: Performing a site survey, installing cable with floor boxes. Testing Basic testing, volt meters, tone set, Cat 5 testers, Cat 5e testers, Cat 6 testers. Certifying performance, Cat 5, 5e and 6 performance parameters. External factors. Common faults. Hands on: Testing an installation, troubleshooting faults. Other aspects Telephony cables, shielded cables. Hands on: installing telephone cable, testing continuity.
SIP security training course description A hands-on course covering SIP security. It is assumed that delegates already know SIP as this course focuses purely on the security issues in SIP IP telephony networks. Hands-on practicals follow each major theory session and include use of various SIP security tools such as vomit, sipp, sipsak and sivus amongst others. What will you learn Secure SIP networks Use various SIP security tools SIP security training course details Who will benefit: Technical staff working with SIP. Technical security staff. Prerequisites: SIP for engineers Duration 2 days SIP security training course contents SIP review SIP infrastructure and entities, example SIP session. Hands on Simple SIP network with and without authentication. SIP security attacks DOS attacks, infrastructure attacks, eavesdropping, spoofing, replay, message integrity. Hands on Basic SIP packet capture, infrastructure attacks. SIP tools SIP packet creation: Sivus, SIPsak, PROTOS, SFTF, SIP bomber, SIPp, Seagull, Nastysip. SIP packet generators: SIPNess, NetDude. Monitoring: Wireshark, Cain & Abel, Vomit, Oreka, VoiPong. Scripts and tools: SIP-Fun, Skora.net, kphone-ddos, sip-scan, sip-kill, sip-redirectrtp. Health of different tools. Hands on Generating SIP packets, rebuilding conversations from captured packets, password cracking. VPNs and SIP IPSec, AH, ESP, transport mode, tunnel mode, Pre Shared Keys, Public keys. Hands on SIP calls over IPSec. Secure SIP signaling SIP relationship with HTTP, Deprecated HTTP 1.0 basic authentication, HTTP 1.1 Digest authentication, S/MIME, SIPS, SIPS URI, TLS, DTLS, PKI infrastructures. Hands on SIP with TLS. Secure media streams SRTP, features, packet format, default encryption, default authentication, key distribution. S/MIME, MIKEY, SDP security descriptions. SIP security agreements. Hands on Analysing SRTP packets. Firewalls NAT traversal. Impact of firewall on infrastructure attacks. TLS and firewalls. SIP specific firewalls. Hands on SIP calls through a firewall.
Kubernetes for engineers training course description This course covers how Kubernetes addresses the challenges of distributed systems. Hands on sessions follow all the major theory chapters. What will you learn Explain what Kubernetes is and how it works. Create and run containers on Kubernetes using the Docker image format and container runtime. Kubernetes for engineers training course details Who will benefit: Anyone working with Docker or Kubernetes. Prerequisites: Definitive Docker for engineers. Duration 2 days Kubernetes for engineers training course contents Introduction Velocity, Scaling your service and your teams, Abstracting your infrastructure. Creating and running containers Container images, Building application images with Docker, Storing images in a remote registry, The Docker container runtime. Deploying a Kubernetes cluster Installing Kubernetes on a public cloud provider, Installing Kubernetes locally using minikube, Running Kubernetes on Raspberry Pi, The Kubernetes client, Cluster components. Common kubectl Commands Namespaces, Contexts, Viewing Kubernetes API objects, Creating, Updating, and Destroying Kubernetes objects, Labelling and annotating objects, Debugging commands. Pods Pods in Kubernetes, Thinking with pods, The pod manifest, Running pods, Accessing your pod, Health checks, Resource management, Persisting data with volumes, Putting It all together. Labels and Annotations Labels, Annotations. Service Discovery What Is Service discovery? The service object, Looking beyond the cluster, Cloud integration, Advanced details. ReplicaSets Reconciliation loops, Relating pods and ReplicaSets, Designing with ReplicaSets, ReplicaSet Spec, Creating a ReplicaSet, Inspecting a ReplicaSet, Scaling ReplicaSets, Deleting ReplicaSets. DaemonSets DaemonSet scheduler, Creating DaemonSets, Limiting DaemonSets to specific nodes, Updating a DaemonSet, Deleting a DaemonSet. Jobs The job object, Job patterns. ConfigMaps and secrets ConfigMaps, Secrets, Naming constraints, Managing ConfigMaps and secrets. Deployments Your first deployment, Creating deployments, Managing deployments, Updating deployments, Deployment strategies, Deleting a deployment. Integrating storage solutions and Kubernetes Importing external services, Running reliable singletons, Kubernetes-native storage with StatefulSets. Deploying real-world applications Parse, Ghost, Redis.