• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1571 Courses in Liverpool

NVQ Level 2 Diploma in Roofing Occupations (Construction)

5.0(29)

By Site Competence

Blue CSCS Card NVQ Level 2 Craft This qualification provides you with the opportunity to showcase their knowledge, skills and understanding in their chosen craft. You will have the relevant experience in one of the trade specific areas. You will work in one of the following areas: Trowel Occupations (Bricklayer) Building Maintenance Painting and Decorating Wall and Floor Tiling Stone Masonry Wood Occupations (site Carpentry) Plastering Roofing Induction - As soon as you register you will be given a dedicated assessor. They will arrange an induction and together with your assessor, you will get to decide on the pathway which best proves your competency. The induction is used to plan out how you will gather the relevant evidence to complete the course. During the course - The assessor will work with you to build a portfolio of evidence that allows you to showcase your knowledge, skills and experience. The assessor will also regularly review and provide you with feedback. This will allow you to keep on track to progress quickly. You will be assessed through various methods such as observations, written questions, evidence generated from the workplace, professional discussion, and witness testimonials. On completion - Once all feedback has been agreed, the Internal Quality Assurer will review your portfolio and in agreement with your assessor the certificate will be applied for. To download our PDF for this course then please click here.

NVQ Level 2 Diploma in Roofing Occupations (Construction)
Delivered In-Person in Market Rasen or UK WideFlexible Dates
£840

Managing Stress and Building Resilience: In-House Training

By IIL Europe Ltd

Managing Stress and Building Resilience: In-House Training Stress has an impact on all of us at some point in our professional lives. Learning how to manage stress and build resilience will result in higher professional productivity, better health, and more sustainable living habits. It will also help us create a physical - and emotional - work-life balance. In this one-day workshop, you will learn practical solutions to sustain behavior change that can positively impact your life on both a professional and personal level. When you are able to reduce the level of negative stress that affects you, your performance improves, along with your health and happiness. The objective of this course is therefore not only to create awareness around emotional well-being in a work context, but also to help participants create a better overall balance between the investment they make in their personal and professional lives. This course covers how our perceptions affect our beliefs and how our beliefs affect our actions. You will learn a host of stress-reduction techniques, while exploring your own stress triggers and responses. Highly interactive, the sessions cover a blend of theory, discussions, and exercises. You will explore concepts with fellow participants within a safe environment where skills and habits can be developed, sharpened, and improved. What You Will Learn At the end of this program, you will be able to: Identify what stress feels like and what the typical symptoms and reactions are to stress Analyze your own responses to stressful events and the consequences of those reactions Organize your work structure to reduce stress and build resilience Recognize activities that drain you and those that give you energy Generate relief from stressful events Cultivate a mindset of resilience Better manage your time, work commitments, and personal boundaries in order to be most effective at your job Getting Started What is stress? Beliefs and thinking errors Work-life balance Drainers and energizers Stress reduction techniques Time management Summary and Next Steps

Managing Stress and Building Resilience: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£450

Cyber security for engineers

5.0(3)

By Systems & Network Training

Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.

Cyber security for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Advanced Level - Assessing and Monitoring the Condition of Power Transformers by Oil Analysis

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT) The objective of this 4-half-day Virtual Instructor Led Training (VILT) course is to equip participants with the required knowledge so that they can define and implement an effective oil analysis programme, monitor the condition of transformers and understand oil analysis reports as part of their maintenance strategy. This VILT course is delivered in partnership with ENGIE Laborelec. Training Objectives Participants will be able to go through the following areas during the VILT course: Condition monitoring of power transformers through oil analyses: Transformer Health Index, Transformer Fleet Condition Assessment, Risk Matrix Best practices Which oil analyses/how frequent DGA: focus on partial discharges, sparking, stray gassing, catalytic effects / interpretation systems. Interpretation of results Why and when to perform electrical measurements? International standards: IEEE, IEC, Duval, ASTM, etc Maintenance guidelines Trending and reporting Sampling techniques Use of online monitoring for DGA/water: implementation and real-case advantages etc: New developments: importance of methanol as ageing marker, temperature correction of ageing markers, stray gassing of oils in service etc REX, case studies and real-case exercises concerning power transformers within generation and high-voltage grids Discussion of reports on power transformers Use of unused insulating transformer oils Market trends in the use of inhibited and uninhibited oils Differences, advantages and drawbacks of uninhibited compared with inhibited oils Importance of additives, oxidation stability tests, stray gassing, etc Target Audience The VILT course is intended for a wide audience, including professionals who are maintenance staff, electrical engineers and asset managers responsible for transformers. Typical industries are powerplants, high voltage grids or large industrial sites. Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 4 half-day sessions comprising 4 hours per day, with 2 x 10 minutes break per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 4 half-day sessions, 4 hours per session (16 hours in total). This VILT course is delivered in partnership with ENGIE Laborelec. Trainer Your expert course leader is a senior expert in the field of insulating and lubricating oils and of condition monitoring of power transformers and turbines. He has 20 years of experience within power industry and since 2010 Key Expert within the ENGIE group. He has worked on various international projects such as the Al Dur power plant in Bahrain, Shuweihat II power plant in UAE, PP11 and Jubail Marafiq power plants in Saudi Arabia and Sohar II and Barka III power plants in Oman. He has also been involved in consulting work in Malaysia for Hyrax Oil. Other assignments include Shell, Nynas, Total, ABB, Alstom, CG Pauwels in Europe. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Advanced Level - Assessing and Monitoring the Condition of Power Transformers by Oil Analysis
Delivered in Internationally or OnlineFlexible Dates
£1,719 to £1,999

Python for network engineers

5.0(3)

By Systems & Network Training

Python training course description This Python course focusses on teaching Python for use in network automation and network DevOps. We focus on getting delegates up and running with Python and network automation as quickly as possible rather than making them great programmers. In other words we concentrate on enabling delegates to use network automation libraries such as netmiko, NAPALM and Nornir, and APIs such as NETCONF and RESTCONF rather than enabling delegates to produce object oriented programs. Hands on sessions use Cisco and Juniper devices. What will you learn Run Python programs. Read Python programs. Write Python programs. Debug Python programs. Automate network tasks with Python programs. Configure network devices with Python. Collect data from network devices with Python. Python training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 5 days Python training course contents What is Python? Programming languages, Why Python? Python in interactive mode, Python scripts, ipython, Python version 2 versus version 3. A simple Python script. Comments. Hands on Installing Python, Hello world. A network example On box vs off box Python. telnet, ssh, NETCONF, HTTP, APIs, manufacturers and API support, analysis of a simple telnetlib program. Hands on Using Python to retrieve the configuration from a network device. Using wireshark to analyse the actions. Python basics I/O, operators, variables and assignment, types, indentation, loops and conditionals. Hands on Modifying the telnet program, changing configurations on a network devices. Functions, classes and methods What are functions, calling functions, builtin functions, useful builtin functions, file handling, classes, objects, creating instances. Hands on Storing configurations in files, configuring devices from files, using an inventory file to work on multiple devices. Libraries and modules Modules, files and packages, import, from-import, Python standard library, other packages, pip install, executing other programs. Managing python libraries. Hands on Using pip, installing and using ipaddress, subprocess to access netsnmp. For the more advanced, using the sockets library. Paramiko and netmiko SSH, enabling SSH on devices, keys. Paramiko versus netmiko, example scripts. pexpect. Hands on Configuring VLANs from Python. pySNMP Gathering facts using previous methods, SNMP review, pySNMP GET, pySNMP and SNMPv3. easySNMP library. Hands on Walking a MIB from Python. NETCONF What is NETCONF? Enabling NETCONF on devices, A first ncclient script, device handlers, get_config, edit_config, copy_config, delete_config, commit, validate, pyEZ, utils_config, utils.sw. Hands on Configuration using ncclient and PyEZ. This session is expanded for those interesting in JunOS automation. Manipulating configuration files Builtin functions, string handling. Unicode. Sequences, strings, lists, tuples. Dictionaries. TextFSM. Regular expressions. JSON, YAML, XML, YANG, Jinja2, templates. Hands on Jinja2 templating with Python to configure network devices. NAPALM Getters, configuration operations, supported devices, NAPALM transport, Config-replace, Config-merge, Compare config, Atomic changes, rollback. Example NAPLAM scripts. Hands on Using NAPALM to gather facts, Using NAPALM for configuration management REST and RESTCONF What is REST, HTTP methods, GET, POST, cURL, Postman, Python requests library. RESTCONF, a RESTCONF example. Hands on Modifying a configuration using RESTCONF. Scapy What is scapy, Scapy in interactive mode, Scapy as a module. Hands on Packet crafting from Python. Warning Errors and exceptions, Exception handling, try, except. Memory management. Garbage collection. Context management, With. Hands on Improving Python code. Nornir What is Nornir? A network automation framework, inventories, connection management and parallelization. Nornir architecture and other libraires. Hands on Setting up nornir, nornir fact gathering, nornir tasks. Optional Writing your own functions, Writing your own classes. pyntc. Hands on Writing reusable code.

Python for network engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Securing Linux systems

5.0(3)

By Systems & Network Training

Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing Linux systems
Delivered in Internationally or OnlineFlexible Dates
£3,697

NVQ Level 6 Diploma in Occupational Health and Safety Practice

5.0(29)

By Site Competence

Black CSCS Card NVQ Level 6 Diploma in Occupational Health and Safety Practice This qualification is aimed at health and safety managers who are responsible for developing and applying health and safety procedures day-to-day in their organisation. They may be a staff member, supervisor or manager looking to improve their knowledge and skills. Furthermore, once you have completed this NVQ you will be able to apply for GRADIOSH status. Induction - As soon as you register you will be given a dedicated assessor. They will arrange an induction and together with your assessor you'll get to decide on the pathway which best proves your competency. The induction is used to plan out how you will gather the relevant evidence to complete the course. During the course - The assessor will work with you to build a portfolio of evidence that allows you to showcase your knowledge, skills and experience. The assessor will also regularly review and provide you with feedback. This will allow you to keep on track to progress quickly. You will be assessed through various methods such as observations, written questions, evidence generated from the workplace, professional discussion and witness testimonials. On completion - Once all feedback has been agreed, the Internal Quality Assurer will review your portfolio and in agreement with your assessor the certificate will be applied for. To download our PDF for this course then please click here.

NVQ Level 6 Diploma in Occupational Health and Safety Practice
Delivered In-Person in Market Rasen or UK WideFlexible Dates
£1,800

The Moccasin Manager

5.0(3)

By Lapd Solutions Ltd

The Moccasin Manager, The Moccasin Approach, Management Training, Management Development,

The Moccasin Manager
Delivered in Birmingham + 1 more or UK Wide or OnlineFlexible Dates
£1,250 to £1,500

Effective Negotiation Skills for Business Success: In-House Training

By IIL Europe Ltd

Effective Negotiation Skills for Business Success: In-House Training Become skillful at dealing with unworkable differences - situations where there appears to be no acceptable compromise or acceptable solution. This interactive workshop shows you how to work towards agreements where all parties are satisfied that they have reached a wise outcome efficiently, and where they can come back to the table in the future because the relationship is intact. You will have the opportunity to re-visit a difficult / challenging negotiation that you experienced in the past as well as take part in progressively more challenging case studies that are tailored to the work you do. You will enhance your personal and professional life with powerful new negotiating skills. The goal of this workshop is to improve your negotiation skills by helping you to identify your own preferred negotiation style and strategies, and to learn about the need to plan for any upcoming negotiation. The workshop is also designed for you to experience typical negotiation situations at certain key points of the life cycle of a project, enabling you to develop an awareness of your effectiveness during negotiations at these stages. The majority of time is spent on practicing newly presented negotiation techniques and receiving feedback on application for further development and improvement. What you will Learn At the end of this program, you will be able to: Identify your preferred negotiation style and strategies Examine the Principled Negotiation Model Adapt your negotiation strategy to the progress of the negotiation Experience typical negotiation situations during the life cycle of a project Develop an awareness of your effectiveness during negotiations Improve your negotiation skills Negotiation Model Negotiation defined Negotiation phases Common approaches to negotiating Principled Negotiating Principled negotiation and the four rules Best alternative to a negotiated agreement Project Negotiation Simulation: Part 1 and Part 2 Project Negotiation Simulation: Part 1 Project Negotiation Simulation: Part 2 Negotiating Cases Negotiating cases

Effective Negotiation Skills for Business Success: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,295

Microsoft Project Blue Belt 2016: In-House Training

By IIL Europe Ltd

Microsoft Project Blue Belt® 2016: In-House Training This course introduces Project Server 2016 features that expedite scheduling projects and simplify managing tasks within an enterprise environment. Learn different aspects of Project Server and their benefits to varying roles in the enterprise, and gain hands-on experience and insights on best practices from SMEs around the world. This course introduces Project Server 2016 features that expedite scheduling projects and simplify managing tasks within an enterprise environment. Learn different aspects of Project Server and their benefits to varying roles in the enterprise, and gain hands-on experience and insights on best practices from SMEs around the world. Users in Project online will get the same benefits of this program. What you Will Learn You'll learn how to: Describe the Enterprise Project Management (EPM) environment Apply the basic project management principles of, initiating, planning, executing, monitoring and controlling, and closing your project schedules Discuss new features Explain PWA views project sites Meet deadlines and budget restrictions Keep the workloads of your resources within their available limits Explain tracking methods and manage task assignments Update the schedule Differentiate between updating tasks and timesheets Use standard reports, custom views, and visual reports for your projects Recognize the potential of the Business Intelligence features Getting Started with Microsoft® Project Server 2016 Describing the EPM context Discovering Project Web App Differentiating the users of PWA Working with Project Professional and PWA Initiating Projects New projects with Project Professional, SharePoint lists, Enterprise Projects Importing schedules and managing project owner and permissions Customize the ribbon with enterprise commands Planning Projects - Scope and Schedule Management Scheduling in PWA Using the Deliverables feature Developing components of the risk management plan and issues tracking Linking planning documents Planning Projects - Staffing Management Plan Building a project team Managing resource availability Reviewing the assignment cycle Managing resource engagements Resolving resource overallocation Executing, Monitoring and Controlling Baselines Working with timesheets Reporting administrative time Tracking methods (% work, actual work, single entry mode) Assignment progress and updates in PWA Task progress and updates in Project Professional and PWA Monitor and Control Projects - Measuring Performance and Reporting Progress Reviewing performance metrics and progress reports Using the preloaded reports at the Business Intelligence Center Considerations for defining custom reports Closing Projects Reviewing the closing processes and closing tasks to updates Supporting the closing process

Microsoft Project Blue Belt 2016: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,495