The Buccal (Oromucosal) Midazolam Competent Reviewer / Assessor Training is designed to provide participants with comprehensive knowledge and skills necessary to assess and review the administration of buccal (oromucosal) midazolam for the management of acute prolonged and repetitive seizures.
Mikrotik routers training course description A fast paced practical hands on introduction to Mikrotik routers concentrating on basic product knowledge needed for the real world. Starts with the basics of accessing the routers through configuring static routes, RIP and OSPF, ending with firewalls. Hands on sessions follow all the major chapters. What will you learn Use Winbox. Use the Mikrotik command line. Perform basic troubleshooting. Configure Interfaces, RIP and OSPF. Perform housekeeping tasks such as: - save and load configurations - upgrade the OS - recover lost passwords Mikrotik routers training course details Who will benefit: Anyone who will be working with Mikrotik routers. Prerequisites: TCP/IP foundation for engineers Duration 2 days Mikrotik routers training course content Mikrotik routers RouterOS, RouterBoard. System resources. Getting started Accessing the router, Winbox, Webfig, Quickset. telnet. The command line interface Contexts, online help, basic troubleshooting. Configuring Interfaces Basics, Enabling interfaces. Ethernet, loopback interfaces. Adding IP addresses. Static routes Why use static routes? Configuring static routes, default routes. Configuring RIP How RIP works, configuration, troubleshooting. OSPF Configuration and troubleshooting. Housekeeping Configuration management, offline editing and FTP usage. RouterOS upgrades. Packages. Bypassing passwords. Other functions DHCP server. Firewall Connections, chains, actions, filters.
SNMPc training course description A hands on course providing a solid foundation on network management using SolarWinds. The course specifically focusses on SolarWinds Orion Network Performance Monitor. The course starts with configuring agents and device discovery, onto exploiting SNMP with SolarWinds and then Alerts, reports and customisation of menus, views and maps. What will you learn Discover devices using Solarwinds. Use Solarwinds. Poll and monitor devices using Solarwinds. Create Alarms and reports. Diagnose faults using Solarwinds. SNMPc training course details Who will benefit: Technical staff working with Solarwinds. Prerequisites: None. Duration 2 days SNMPc training course content Getting started with SNMPc Manual discovery, automatic discovery, controlling IP discovery, mapping network devices. Hands on Using SNMPc. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. MIBs. Hands on Device discovery. Adding devices. Customising maps. Using SNMPc Polling, obtaining MIB information, MIB walking. Compiling MIBs. Hands on Monitoring devices. Groups. MIB walking. SNMP traps. Alarms Events and alarms, thresholds, event actions. Hands on Automatic alarms. Reports Creating reports, trend reports, customising reports. Hands on Performance reports. Graphs. Administration Users, customised views, backups, the database. Hands on Adding a user. Backups.
One of our greatest strengths is our ability to tailor any of our open management courses to the needs and requirements of different businesses in different industries. We understand that whilst our open management training courses provide a wealth of knowledge in their particular area of focus, not all of it may be relevant for your business and the particular industry you operate in.Rather than making delegates sit through management training that is irrelevant to their job role, we offer bespoke management training where we tailor the course to cover the specific needs of your organisation, ultimately relieving the inevitable boredom and "switching off" that would come with having to sit through training that a person knew they would not need. Why choose us for your bespoke management training needs? We have provided tailored, bespoke management training courses to some of the largest organisations in the UK. Using our acquired experience and knowledge of running these courses, we will be able to work with you to create a bepoke management training programme that delivers a significant return on investment, both in terms of tangible and intangible results. ILM accredited management training courses Because we charge a daily training rate rather than a per delegate fee, if you have a number of delegates requiring management training, a bespoke management training course can often be less expensive than putting them all on an open course. A number of courses have been accredited by the ILM, which means you can be assured as to the standard of the course content and delivery. For more information on these, please see our page on ILM Management Training. All of our ILM Programmes are provided in partnership with BCF Group Limited, which is the ILM Approved Centre we deliver under. Interested in finding out more about bespoke management training? Between us, we can come up with a training plan which will provide relevant, bespoke management training for your delegates which will maximise the return on both your time and cost. We are happy to come to your premises or arrange training facilities nearer to your location if this would be more convenient. Feedback Below is a small selection of past feedback for our management training and development courses and programmes: "Excellent instructor. I looked forward to our monthly lectures knowing that I would have a good laugh but also that I would learn more about the subject and myself. He has been very helpful to me and the rest of the students, not just during the lectures but often in his own time. His enthusiasm for all of the subjects covered during the course was evident throughout, which again helped me to enjoy and understand the subjects and lectures. If I get the chance in future to attend a further course with you, I would jump at the chance."Senior Acquisitions SurveyorGalliford Try "A very accomplished trainer and someone who I would very much like to be involved in our business training going forward. The feedback I have had from all levels of our team structure is excellent."Group HR OperationsEADS Personnel Services UK "Phil has a lot of energy which he throws into the course. This visably broke down resistance and attendees entered into the exercises wholeheartedly."Senior QSBullock Construction Scheduled Courses Unfortunately this course is not one that is currently scheduled as an open course, and is only available on an in-house basis. Please contact us for more information.
Writing and Managing Requirements Documents: In-House Training This course is part of IIL's Business Analysis Certificate Program (BACP), a program designed to help prepare individuals pass the IIBA™ Certification exam to become a Certified Business Analysis Professional (CBAP™). Learn more at www.iil.com/bacp. Once a business analyst has completed the information gathering and analysis to produce the solution to a business problem, the results must be documented for all stakeholders to see and understand. This course will enhance the skill set needed for writing and managing the complex readership that business analysts interact with on a day-to-day basis. What you will Learn Upon completion, participants will be able to: Write an understood requirements document that is approvable and acceptable Validate a requirements document Manage the changes to requirements documents through the SDLC Foundation Concepts The role of the business analyst An introduction to the BABOK® Guide The business analyst and the product/project life cycle The requirements documentation process Planning for Effective Requirements Documentation Overview of requirements planning Planning for validation Planning for verification: well-formed criteria Planning for verification: understood and usable criteria Writing Effective Requirements Documents Overview of writing requirements documents Using a standard structure / template Applying formatting techniques Meeting the challenge of writing non-functional requirements Baselining Requirements Documents Overview of the requirements baseline process Validation Verification Approval Managing Requirements Change through the Product Life Cycle Overview of requirements change management Establishing a formal change management process Tracing requirements through design and development (build, test, and implementation) Following through to post-implementation (transition and early production)
The "Emergency Response for Care Homes" course is designed to provide care home staff with essential knowledge and skills to effectively respond to a wide range of emergency situations. This course aims to reinforce and update the participants' understanding of emergency protocols, procedures, and best practices, ensuring a safe and coordinated response in times of crisis.
Masterclasses? Refreshers? Introductions? It depends what you're looking for and where you want to pitch them, but here are six tried-and-tested highly focused sessions that organisations can take individually or as a series, to help develop their teams' project management capabilities one topic at a time. Objectives for each individual session are set out below, as part of the session outlines. Taken together, as a series, however, these modules are an ideal opportunity to develop your team's levels of project management capability maturity, whether that's by introducing them to the basic principles, refreshing them on best practice, or giving them the opportunity to really drill down into a specific area of challenge in your particular operating environment. Session outlines 1 Stakeholder management Session objectives This session will help participants: Understand why stakeholders matter to projects Be able to identify and engage stakeholders Be able to categorise stakeholders by their significance 1 Key principles What does 'stakeholder' mean - in theory? What does this mean in practice? Why stakeholders matter Consequences of missing stakeholders The stakeholder management process:IdentifyAssessPlanEngage 2 Identifying stakeholders Rapid listing CPIG analysis PESTLE analysis Drawing on the knowledge and experience of others Other ways to identify stakeholders 3 Assessing stakeholders Which stakeholders are significant? Stakeholder radar Power-interest maps Power-attitude maps 4 Planning The adoption curve Dealing with obstacles Who should engage which stakeholder? How should the project's organisation be structured? How will communication happen? 5 Engaging Seven principles of stakeholder engagement 2 Requirements and prioritisation Session objectives This session will help participants: Understand how clarity of requirements contributes to project success Use different techniques for prioritising requirements Agree requirements with stakeholders Manage changes to requirements 1 Understanding and managing stakeholder needs and expectations What are 'requirements'? What is 'requirements management'? Sources of requirements - and the role of stakeholders Are stakeholders sufficiently expert to specify their needs? Do they understand the detail of what they want, or do they need help to tease that out? What do stakeholders want to achieve? Working within constraints Prioritising requirements - three techniques 2 MoSCoW prioritisation 'Must have', should have', 'could have, 'won't have this time' When to use MoSCoW 3 The Kano Model Customer satisfaction - 'attractive' and 'must-be' qualities When to use Kano 4 Value-based prioritisation Understanding risk v value Using risk v value to prioritise features and schedules 5 Agreeing requirements Perfect v 'good enough' Establishing acceptance criteria Requirements traceability Agreeing project scope 6 Changing requirements Why requirements change Why change control matters Impact on projects A formal change control process Paying for change - managing change for different types of project 3 Estimating Session objectives This session will help participants: Understand the different purposes estimates satisfy Be able to use different estimating techniques Understand how to achieve different levels of accuracy 1 Key principles What's an estimate? Informed guesswork What needs to be estimated? Costs, resources, effort, duration Tolerances Precision v accuracy 2 Estimating through the lifecycle Start Plan Do 3 Early estimates Comparative ('analogous') estimating Parametric estimating Using multiple estimating techniques 4 Bottom-up estimating Bottom-up ('analytical') estimating Pros Cons 5 Three-point estimating Three-point ('PERT': Programme Evaluation and Review Technique) estimating Uncertainty and the range of estimates Calculating a weighted average Three-point with bottom-up 4 Scheduling Session objectives This session will help participants: Understand how to create a viable schedule Be able to use different forms of schedule Understand the concept of the critical path 1 Key principles The planning horizon Rolling wave planning Release planning 2 Viable scheduling Creating a viable schedule Define the scope Sequence the work Identify the risks and build in mitigations Identify the resources Estimate the effort and durations Check resource availability Refine until a workable schedule is produced 3 Critical path analysis The critical path Network diagrams Sequence logic Practical application:Network diagram with estimated durationsThe 'forward pass'The 'backward pass'Calculating total floatIdentifying the critical pathCalculating free float Gantt charts 5 Risk and issue management Session objectives This session will help participants: Understand the difference between risks and issues Be able to identify and assess risks Understand ways of mitigating risks Manage issues 1 Key principles Understanding risk Threats and opportunities The risk management processPreparation - proactive risk managementThe process - identify, assess, plan, implementStakeholder communication Roles and responsibilities Risk management strategy The risk register Risk appetite 2 Risk identification Brainstorming Interviews Assumption analysis Checklists 3 Risk assessment and prioritisation Probability, impact and proximity Triggers Qualitative risk assessment Qualitative impact assessment Qualitative probability assessment Probability / impact grid Bubble charts Risk tolerance 4 Planning countermeasures To mitigate or not to mitigate? Categories of risk response Avoid and exploit Reduce and enhance Transfer Share Accept Contingency Secondary risks 5 Issue management What is an issue? Tolerances Issues and tolerances The PRINCE2 view of issues Ownership of issues An issue management process Issue register 6 Budgeting and cost control Session objectives This session will help participants: Understand what to include in a budget - and why Choose - and use - the appropriate estimating technique Align the budget with the schedule Understand how to monitor spend and control costs Trouble-shoot effectively to get projects back within budget Session format Flexible. The session can be tailored to the participants' average level of project management maturity - a 60-minute session (delivered virtually) is an effective introduction. A 90-minute session allows for more in-depth treatment. A half-day session (face-to-face or virtual) gives time for a more challenging workshop, particularly to discuss specific cost control issues with any of the participants' current projects. 1 Where is the money coming from? Can we pay from revenue? Do we need to borrow? How long will the project take to pay back? The lifecycle of the budget Through-life costs Stakeholder involvement 2 Estimating costs Reminder: the relationship between estimates Reminder: possible estimating techniques What do we need to estimate?PeopleEquipmentMaterialsFacilities and operating costsWork package estimateEstimated project costs Estimating agile projects 3 Aligning budget and schedule Scheduling and financial periods Spreading the budget 4 Reserves and agreeing the budget Contingency reserve Management reserve Agreeing the budget 5 Cost control Planned spend over time Actual spend over time Work completed over time Evaluating different scenarios: delivery v spend 6 Trouble-shooting Why are we where we are? What has caused the project to spend at the rate it is? Why is it delivering at the rate it is? What are the root causes? What can we do about it?
Gain expertise in IFRS accounting for the oil and gas sector with our industry-focused training course. Enroll today with EnergyEdge.
WCNA training course description Wireshark is a free network protocol analyser. This hands-on course provides a comprehensive tour of using Wireshark to troubleshoot networks. The course concentrates on the information needed in order to pass the WCNA exam. Students will gain the most from this course only if they already have a sound knowledge of the TCP/IP protocols. What will you learn Analyse packets and protocols in detail. Troubleshoot networks using Wireshark. Find performance problems using Wireshark. Perform network forensics. WCNA training course details Who will benefit: Technical staff looking after networks. Prerequisites: TCP/IP Foundation for engineers Duration 5 days WCNA training course contents What is Wireshark? Network analysis, troubleshooting, network traffic flows. Hands on Download/install Wireshark. Wireshark introduction Capturing packets, libpcap, winpcap, airpcap. Dissectors and plugins. The menus. Right click. Hands on Using Wireshark. Capturing traffic Wireshark and switches and routers. Remote traffic capture. Hands on Capturing packets. Capture filters Applying, identifiers, qualifiers, protocols, addresses, byte values. File sets, ring buffers. Hands on Capture filters. Preferences Configuration folders. Global and personal configurations. Capture preferences, name resolution, protocol settings. Colouring traffic. Profiles. Hands on Customising Wireshark. Time Packet time, timestamps, packet arrival times, delays, traffic rates, packets sizes, overall bytes. Hands on Measuring high latency. Trace file statistics Protocols and applications, conversations, packet lengths, destinations, protocol usages, strams, flows. Hands on Wireshark statistics. Display filters Applying, clearing, expressions, right click, conversations, endpoints, protocols, combining filters, specific bytes, regex filters. Hands on Display traffic. Streams Traffic reassembly, UDP and TCP conversations, SSL. Hands on Recreating streams. Saving Filtered, marked and ranges. Hands on Export. TCP/IP Analysis The expert system. DNS, ARP, IPv4, IPv6, ICMP, UDP, TCP. Hands on Analysing traffic. IO rates and trends Basic graphs, Advanced IO graphs. Round Trip Time, throughput rates. Hands on Graphs. Application analysis DHCP, HTTP, FTP, SMTP. Hands on Analysing application traffic. WiFi Signal strength and interference, monitor mode and promiscuous mode. Data, management and control frames. Hands on WLAN traffic. VoIP Call flows, Jitter, packet loss. RTP, SIP. Hands on Playing back calls. Performance problems Baselining. High latency, arrival times, delta times. Hands on Identifying poor performance. Network forensics Host vs network forensics, unusual traffic patterns, detecting scans and sweeps, suspect traffic. Hands on Signatures. Command line tools Tshark, capinfos, editcap, mergecap, text2pcap, dumpcap. Hands on Command tools.
We can come to you and deliver Food Safety courses at your business premises. RSPH Level 4 Managing Food Safety and Hygiene Catering Course! This Level 4 course is perfect for those looking to enhance their knowledge and skills in food safety and hygiene in the catering industry. Throughout the course, you will learn about advanced food safety management, HACCP principles, and how to effectively implement food safety procedures. Special Offer: Book on this Level 4 Food Safety Training from July to August 2024 Contact us for a quote or to schedule training.