Gain comprehensive knowledge and practical skills for safe and effective oral suctioning procedures with our "Understanding Oral Suctioning Techniques" course. Prevent respiratory complications and maintain optimal respiratory function with thorough training in techniques, considerations, and patient care.
Gain comprehensive knowledge and practical skills for safe and effective fine-bore nasogastric tube insertion with our healthcare professional course.
This workshop is designed to give those who have to give bad news and broach difficult conversations increased confidence. Participants will leave the workshop with the tools and techniques to prepare for a difficult conversation and ensure that they are supporting patients and relatives through a stressful time in their lives.
This course is designed to enable learners to increase their understanding of risk assessment and risk management in Health and Social Care settings.
This one-day Suicide First Aid training course gives learners the knowledge and tools to understand that suicide is one of the most preventable deaths and some basic skills can help someone with thoughts of suicide stay safe from their thoughts and stay alive.
If you want your employees to improve their customer service skills and deliver an amazing experience to your customers, feel free to check out my Training course focusing on telephone etiquettes, communication and behaviours.
Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.
The "An Understanding of Aspiration and Choking" course is designed to equip participants with essential knowledge and skills related to recognising, responding to, and managing incidents of aspiration and choking. This course is suitable for healthcare professionals, caregivers, parents, educators, and anyone interested in learning how to effectively respond to situations involving aspiration and choking.
What are the aims of this course? Define mental health Identify and explain mental health facts and fiction Understand key legislation relating to mental health Explain how mental health care has evolved over time Identify common signs and symptoms Understand common mental health disorders Recognise common attitudes towards mental ill-health and the impacts these can have Explain the concept of parity of esteem Know how to support people and offer advice