Learn how to use horse behaviour science to enhance your horse's wellbeing. By making simple additions to the horse's environment (enrichment), you can mimic the horse's natural habitat and expand the range of behaviours they can engage in.
I am able to travel to you to help you develop your partnership with your horse. I specialise in developing confidence in both horse and rider both on the flat and over fences. As a list 5 BD Dressage judge I can help you with test riding for BD Intro, Prelim and Novice tests. I can help with BE 90, 100 & Novice tests. As I am training for list 4 I can also help you with Elementary BD and Intermediate BE The times listed are a general guide of my availability. If you would prefer a time that is not listed please select the time that is closest to you preference, the message me via Email, WhatsApp or Facebook to see if we can arrange a better time for you. Instructions Make sure we have access to an arena, with a poop scoop and poles if you want them.
Commission an original, traditional and quirky Portrait in oils, acrylics or digital sketches
In the world of equestrian sports and care, unique challenges and risks are ever-present. That's why NR Medical Training presents our tailored Equestrian First Aid and Trauma course, designed especially for riders, horse trainers, stable staff, vets, and anyone involved in the equine field. Taught by experienced Paramedics and EMTs who have seen and managed everything on the course. Spanning a comprehensive 2-day workshop, this hands-on, face-to-face course provides real-world solutions to real-world problems. Whether it's handling a sudden injury during a riding session or managing a complex trauma situation, our course offers you the skills, insights, and confidence to act appropriately.
This course is particularly relevant for those wishing to tow a horsebox or caravan and those involved in construction. Car / Jeep and Trailer (Category B+E) training is available as a three day course, with an average training time of some six to eight hours, depending upon driving experience.
The ability to influence others is a life skill but also one that has never been so critically useful at work. This one day workshop will set you on the road to discover what you need to be able to think and do that will help you take people with you. This involves learning some new tools and strategies that fit the situation you are in and making sure you use the right skills and behaviours to influence well, whether it is a single person or a room full of cynical expectant people! This workshop will enable you to: Learn about and understand influencing styles and strategies available and formulate plans and ideas on how to use them in influencing situations Understand which skills and behaviours to use to be the most effective influencer Have greater confidence in situations where they need to influence someone Use thinking, speaking and behavioural techniques that enable influencing to be effective and positive Review and evaluate learning and have an action plan to take back and implement in the workplace 1 Welcome, introductions & getting to know you and why you are here Course objectives 2 Personal objectives Introducing a learning diary 3 Gallery exercise - using images of exemplars brought by participants Plenary discussion The skills and behaviours of an exemplar influencer 4 Group task - what does your self-evaluation say? Discussion and conclusions 5 Influencing - what is it? - why do we need it? The current organisational landscape including values and behaviours the influencer operates in 6 Pit Stop - 'pull / push', 'the lost horse' and 'talking at' 7 Direct / support / delegate / coach: the different choices and approaches to choose from 8 Updating the learning diary 9 Power and types of power - its impact on influencing ability and approach and what is within your control Group task and discussion 10 The 5 influencing styles tool Series of tasks and exercises Drilling down to a personal action plan for maximising influence 11 'The person with the most flexibility has the most influence' Skills and behaviours for effective influencing Exercises and techniques that develop skills for influencing 12 Review and evaluation Action planning
Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.