Innovation Simplified: Why Simple Wins Imagine what you could do with the time you spend drowning in mundane tasks like meetings, reports, and emails? Complexity is holding most of us back from creating an innovative culture that embraces really valuable work. Simplification is the solution, and every organization wants to know the techniques to help them eradicate complexity and get back to meaningful work that drives innovative change. Bodell inspires leaders and their teams to consider what it means to have an innovative company. It isn't about creating a culture of cool lounge areas with ping pong tables. More than anything, your culture will be predicated on the work people do every day. If your organization is mired in meetings, emails, and reports, then that is what your culture will be known for; but, wouldn't you rather be known as the company where people are engaged in truly meaningful work every day? Lisa gives you the tools to make this a reality. This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies.
Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
About this Training Course Within the energy industry, it is a requirement, both contractual and in some areas legislative, to ensure effective internal systems are in place which support employee development and provide evidence of their competence. A Competence Management and Assurance process - if correctly developed and applied - provides employees and organisations with the tools to demonstrate competence and contributes to career development of the individual. The 3 full-day course focuses on Competence Management Systems (CMS) which are typically in use within the Energy Industry, their structure and process development requirements. In addition, the course details the assessment process, the role of the competency assessors within the organisation and the relationship between competence management and training provision. For impactful learning, the course instructor uses a variety of instructional methodologies such as lectures, discussions, individual reflection, games, mystery puzzles, video, case studies, team syndication, group presentations, sharing and feedback. Training Objectives This course will provide attendees with an understanding of: The role of competencies in the Energy industry The benefits of Competency Management System to the organisation The components of a Competency of Competency Management System The know how to implement the Competency Management System The roles and responsibilities within a Competency Management System The know how to develop Competency Models The relationship between Competency Management and Capability Development The know how to conduct Organisational Analysis The know how to conduct Job Analysis and Task Analysis The know how to develop Competency Standards and Development Guides using the 70:20:10 principle The competency assessment process, tools and methodologies The know how to package and communicate the Competency Assessment Reports to Management Competency Management Case Studies in the Energy Industry Target Audience This course will benefit professionals from Human Resource and Capability Development as well as Line Managers. Course Level Basic or Foundation Trainer Your expert course leader is an independent consultant trainer with more than 30 years of experience in People & Organizational Development. She has retired from her full-time job and is currently serving as an Associate Consultant / Trainer with several Learning & Development organizations operating in Malaysia and Singapore. A chemist by training, her interest in People & Organizational Development was so intense that she decided to switch profession during her earlier years of employment, and she has never looked back since. She has gathered extensive hands-on experience, leading key projects and delivering learning programs in her field of expertise with numerous leading organizations in South East Asia, the Middle East and Europe. A project that she is particularly proud in completing was the transformation of PETRONAS Management Training Institute into a regional Leadership Centre. While leading this project, she was given the opportunity to be seconded to General Electric (GE), a Fortune 500 multinational known for its cutting-edge leadership development innovation. She was instrumental in the development of the existing leadership model for PETRONAS. In addition, she was also extensively involved in the development and implementation of Technical Competency Development process that is currently being used by more than 20 disciplines in the organization. Another massive project that she was heavily involved in was the creation of the quality culture for PETRONAS. The project saw the establishment of PETRONAS' own quality principles where she played a key role in propagating the desired mindset towards the creation of a high performing culture. Her involvement in this project took her to many PETRONAS Operating Companies which spanned into several countries across the globe including Malaysia, Indonesia, Vietnam, Sudan, South Africa and Switzerland, creating awareness through learning programs and consultancy services. The PETRONAS Quality Principles have since evolved into shared values that are now known as the PETRONAS Culture Beliefs. In keeping her expertise current after retiring from full-time employment since 2017, she has continued to deliver learning programs, providing coaching and consultancy services to selected Oil & Gas companies in Malaysia, Indonesia, Singapore, India, Oman and Thailand. Among her most recent work are virtual learning deliveries and consultancies during the COVID-19 pandemic to some government linked companies / agencies in Malaysia and PTT Exploration & Production Company of Thailand. Outside her professional circle, she is an avid cyclist, a jungle tracker and a mount climber. She is also an accredited trainer from the Human Resource Development Corporation (HRD CORP). POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Dyslexia Online Training This dyslexia course was designed with meticulous care and research. This dyslexia course will take you to step by step through the entire learning process, making it easy and enjoyable for you. The dyslexia course will teach you about the various types of dyslexia and learning disabilities and how to identify them. This dyslexia course has covered all of the most recent subjects to better prepare you for your dyslexia career. So, why put it off any longer? Join our Dyslexia course today to advance your career. 6 Courses Bundle Are Course 01: Dyslexia Course Course 02: Speech & Language Therapy Course 03: Teaching Assistant Course 04: Primary Teaching Course 05: Autism Course Course 06: Diploma in Child Counselling Dyslexia You can learn how to deal with and cope with dyslexia by using cognitive strategies. This Dyslexia course is broken down into ten modules, each of which teaches you everything you need to know about dyslexia. It will give you the skills and industry information you need to advance your career in the dyslexia profession. <<Course Curriculum>> Module 1: An Overview Module 2: Learning Difficulties Module 3: Impact of Dyslexia in the Educational Setting Module 4: Helping Adults with Dyslexia Module 5: Dyslexia in the Workplace Module 6: Approaches in Dyslexia Module 7: Strengths and Rewards Module 8: Assessment and Evaluation Module 9: Dyslexia-Friendly Learning Environment Module 10: Relevant Law Assessment Method After completing each module, of Dyslexia course, you will find automated MCQ quizzes. To unlock the next module, you need to complete the quiz task and get at least 60% marks. Certification After completing the MCQ/Assignment assessment for this Dyslexia course, you will be entitled to a Certificate of Completion from Training Tale which is completely free to download. Who is this course for? This Dyslexia course is ideal for - Job Seekers Teachers Fresh Graduates Requirements There are no specific requirements for this Dyslexia course because it does not require any advanced knowledge or skills. Certificates Certificate of completion Digital certificate - Included
Are you ready to embark on an enlightening journey of wisdom with the Data Science bundle, and pave your way to an enriched personal and professional future? If so, then Step into a world of knowledge with our course bundle - Data Science with Python. Delve into eight immersive CPD Accredited courses, each a standalone course: Python from Scratch Quick Data Science Approach from Scratch Python Data Science with Numpy, Pandas and Matplotlib Complete Python Machine Learning & Data Science Fundamentals SQL for Data Science, Data Analytics and Data Visualization Data Science & Machine Learning with R from A-Z Statistics & Probability for Data Science & Machine Learning R Programming for Data Science Traverse the vast landscapes of theory, unlocking new dimensions of understanding at every turn. Let the Data Science with Python bundle illuminate your path to wisdom. The Data Science with Python bundle offers a comprehensive exploration into a rich tapestry of vast knowledge across eight carefully curated courses. The journey is designed to enhance your understanding and critical thinking skills. Each course within the bundle provides a deep-dive into complex theories, principles, and frameworks, allowing you to delve into the nuances of the subject matter at your own pace. In the framework of the Data Science with Python package, you are bestowed with complimentary PDF certificates for all the courses included in this bundle, all without any additional charge. Adorn yourself with the Data Science bundle, empowering you to traverse your career trajectory or personal growth journey with self-assurance. Register today and ignite the spark of your professional advancement! So, don't wait further and join the Data Science with Python community today and let your voyage of discovery begin! Learning Outcomes: Attain a holistic understanding in the designated areas of study with the Data Science bundle. Establish robust bases across each course nestled within the Data Science bundle. Decipher intricate concepts through the articulate content of the Data Science bundle. Amplify your prowess in interpreting, scrutinising, and implementing theories. Procure the capacity to engage with the course material on an intellectual and profound level. Become proficient in the art of problem-solving across various disciplines. Stepping into the Data Science bundle is akin to entering a world overflowing with deep theoretical wisdom. Each course within this distinctive bundle is an individual journey, meticulously crafted to untangle the complex web of theories, principles, and frameworks. Learners are inspired to explore, question, and absorb, thus enhancing their understanding and honing their critical thinking skills. Each course invites a personal and profoundly enlightening interaction with knowledge. The Data Science bundle shines in its capacity to cater to a wide range of learning needs and lifestyles. It gives learners the freedom to learn at their own pace, forging a unique path of discovery. More than just an educational journey, the Data Science bundle fosters personal growth, enabling learners to skillfully navigate the complexities of the world. The Data Science bundle also illuminates the route to a rewarding career. The theoretical insight acquired through this bundle forms a strong foundation for various career opportunities, from academia and research to consultancy and programme management. The profound understanding fostered by the Data Science bundle allows learners to make meaningful contributions to their chosen fields. Embark on the Data Science journey and let knowledge guide you towards a brighter future. CPD 80 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Individuals keen on deepening their firm understanding in the respective fields. Students pursuing higher education looking for comprehensive theory modules. Professionals seeking to refresh or enhance their knowledge. Anyone with a thirst for knowledge and a passion for continuous learning. Career path Armed with the Data Science bundle, your professional journey can reach new heights. The comprehensive theoretical knowledge from this bundle can unlock diverse career opportunities across several fields. Whether it's academic research, consultancy, or programme management, the Data Science bundle lays a solid groundwork. Certificates CPD Certificate Of Completion Digital certificate - Included 8 Digital Certificates Are Included With This Bundle CPD Quality Standard Hardcopy Certificate (FREE UK Delivery) Hard copy certificate - £9.99 Hardcopy Transcript - £9.99
In today's rapidly evolving business environment, effective knowledge management is crucial for organizations to maintain a competitive advantage. This course will provide learners with a comprehensive understanding of different types of knowledge and how to manage them successfully. Topics covered include the difference between explicit and tacit knowledge, the importance of knowledge management strategies, and how to capture and classify knowledge. You will also learn about the strategic levers available for managing knowledge and the strategies for effective implementation. By the end of the course, you will be equipped with the knowledge and skills necessary to drive success through effective knowledge management. After the successful completion of the course, you will be able to learn about the following, Understanding Organisation Knowledge. Learning Explicit Versus Tacit Knowledge. Understanding Successful Knowledge Management Strategies. Learning Knowledge Capture and Classification. Understanding Strategic Levers. Understanding Strategies for Managing Knowledge. In today's rapidly evolving business environment, effective knowledge management is crucial for organizations to maintain a competitive advantage. This course will provide learners with a comprehensive understanding of different types of knowledge and how to manage them successfully. Topics covered include the difference between explicit and tacit knowledge, the importance of knowledge management strategies, and how to capture and classify knowledge. You will also learn about the strategic levers available for managing knowledge and the strategies for effective implementation. By the end of the course, you will be equipped with the knowledge and skills necessary to drive success through effective knowledge management. VIDEO - Course Structure and Assessment Guidelines Watch this video to gain further insight. Navigating the MSBM Study Portal Watch this video to gain further insight. Interacting with Lectures/Learning Components Watch this video to gain further insight. Fundamentals of Organisational Knowledge Self-paced pre-recorded learning content on this topic. Fundamentals of Organisational Knowledge Put your knowledge to the test with this quiz. Read each question carefully and choose the response that you feel is correct. All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course. The certificate is designed to enhance the learner's knowledge in the field. This certificate is for everyone eager to know more and get updated on current ideas in their respective field. We recommend this certificate for the following audience. CEO, Director, Manager, Supervisor Knowledge managers and officers Human resources managers and officers Organizational development consultants Business analysts and consultants Information technology professionals Operations and supply chain managers Quality and process improvement professionals Project managers Average Completion Time 2 Weeks Accreditation 3 CPD Hours Level Advanced Start Time Anytime 100% Online Study online with ease. Unlimited Access 24/7 unlimited access with pre-recorded lectures. Low Fees Our fees are low and easy to pay online.
About this Training Course This 3 full-day course will provide a comprehensive understanding of the various types of transformer maintenance including breakdown maintenance, preventive maintenance, total productive maintenance, condition-based maintenance, proactive maintenance, and reliability-centered maintenance. All the expected problems in dry and oil-filled transformers will be discussed in detail. All the diagnostics, troubleshooting and maintenance required to ensure adequate operation of transformers will be covered thoroughly. This course will focus on maximizing the efficiency, reliability, and longevity of all types of transformers by providing an understanding of all commissioning requirements, repair and refurbishment methods of transformers. Training Objectives Equipment Diagnostics and Inspection: Learn in detail all the diagnostic techniques and inspections required of critical components of transformers Equipment Testing: Understand thoroughly all the routine tests, type tests, and special tests required for the various types of transformers Equipment Maintenance and Troubleshooting: Determine all the maintenance and troubleshooting activities required to minimize transformer downtime and operating cost Equipment Repair and Refurbishment: Gain a detailed understanding of the various methods used to repair and refurbish transformers Efficiency, Reliability, and Longevity: Learn the various methods used to maximize the efficiency, reliability, and longevity of transformers Equipment Sizing: Gain a detailed understanding of all the calculations and sizing techniques used for transformers Design Features: Understand all the design features that improve the efficiency and reliability of transformers Equipment Selection: Learn how to select all types of transformers by using the performance characteristics and selection criteria that you will learn in this course Equipment Commissioning: Understand all the commissioning requirements for transformers Equipment Codes and Standards: Learn all the codes and standards applicable for transformers Equipment Causes and Modes of Failure: Understand the causes and modes of failure in transformers System Design: Learn all the requirements for designing different types of transformer systems Target Audience Engineers of all disciplines Managers Technicians Maintenance personnel Other technical individuals (this course is suitable for individuals who do not have an electrical background) Course Level Basic or Foundation Training Methods Your specialist course leader relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught to their own organization. Each delegate will receive a copy of the following materials written by the instructor: Excerpt of the relevant chapters from the 'ELECTRICAL EQUIPMENT HANDBOOK' published by McGraw-Hill in 2003 (600 pages) Transformer Testing, Maintenance and Commissioning Manual (covering all the tests, maintenance activities, protective systems and all commissioning procedures for all types of transformers - 350 pages) Trainer Your specialist course leader has more than 32 years of practical engineering experience with Ontario Power Generation (OPG), one of the largest electric utility in North America. He was previously involved in research on power generation equipment with Atomic Energy of Canada Limited at their Chalk River and Whiteshell Nuclear Research Laboratories. While working at OPG, he acted as a Training Manager, Engineering Supervisor, System Responsible Engineer and Design Engineer. During the period of time, he worked as a Field Engineer and Design Engineer, he was responsible for the operation, maintenance, diagnostics, and testing of gas turbines, steam turbines, generators, motors, transformers, inverters, valves, pumps, compressors, instrumentation and control systems. Further, his responsibilities included designing, engineering, diagnosing equipment problems and recommending solutions to repair deficiencies and improve system performance, supervising engineers, setting up preventive maintenance programs, writing Operating and Design Manuals, and commissioning new equipment. Later, he worked as the manager of a section dedicated to providing training for the staff at the power stations. The training provided by him covered in detail the various equipment and systems used in power stations. In addition, he has taught courses and seminars to more than four thousand working engineers and professionals around the world, specifically Europe and North America. He has been consistently ranked as 'Excellent' or 'Very Good' by the delegates who attended his seminars and lectures. He written 5 books for working engineers from which 3 have been published by McGraw-Hill, New York. Below is a list of the books authored by him; Power Generation Handbook: Gas Turbines, Steam Power Plants, Co-generation, and Combined Cycles, second edition, (800 pages), McGraw-Hill, New York, October 2011. Electrical Equipment Handbook (600 pages), McGraw-Hill, New York, March 2003. Power Plant Equipment Operation and Maintenance Guide (800 pages), McGraw-Hill, New York, January 2012. Industrial Instrumentation and Modern Control Systems (400 pages), Custom Publishing, University of Toronto, University of Toronto Custom Publishing (1999). Industrial Equipment (600 pages), Custom Publishing, University of Toronto, University of Toronto, University of Toronto Custom Publishing (1999). Furthermore, he has received the following awards: The first 'Excellence in Teaching' award offered by PowerEdge, Singapore, in December 2016 The first 'Excellence in Teaching' award offered by the Professional Development Center at University of Toronto (May, 1996). The 'Excellence in Teaching Award' in April 2007 offered by TUV Akademie (TUV Akademie is one of the largest Professional Development centre in world, it is based in Germany and the United Arab Emirates, and provides engineering training to engineers and managers across Europe and the Middle East). Awarded graduation 'With Distinction' from Dalhousie University when completed Bachelor of Engineering degree (1983). Lastly, he was awarded his Bachelor of Engineering Degree 'with distinction' from Dalhousie University, Halifax, Nova Scotia, Canada. He also received a Master of Applied Science in Engineering (M.A.Sc.) from the University of Ottawa, Canada. He is also a member of the Association of Professional Engineers in the province of Ontario, Canada. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Designated Safeguarding Lead (DSL) Overview The Designated Safeguarding Lead (DSL) Training Course is highly recommended for anyone employed in the health or social care fields, as well as those responsible for the protection of children or vulnerable adults. It looks at important laws, how to spot abuse, and how to report concerns about safeguarding. Through case studies and hands-on exercises, you will acquire all the necessary competencies to guarantee the well-being of minors and susceptible people under your supervision or care. This course will cover topics such as child sexual exploitation, various forms of abuse, safeguarding obligations, and what should be included in a safeguarding report. Step-by-step instructions on how to react to disclosure, communicate sensitive information, and handle safeguarding referrals are also included in this course for designated safeguarding leads or DSLs. This course is designed for both full-time and part-time students to allow flexible learning. You have the option to study at your own speed and can earn your accreditation in as little as 20 or 30 hours. Why You Should Choose Designated Safeguarding Lead (DSL) Lifetime access to the course No hidden fees or exam charges CPD Accredited certification on successful completion Full Tutor support on weekdays (Monday - Friday) Efficient exam system, assessment and instant results Download Printable PDF certificate immediately after completion Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. Improve your chance of gaining professional skills and better earning potential. Who is this Course for? Designated Safeguarding Lead (DSL) is CPD certified and IAO accredited. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic backgrounds. Requirements Our Designated Safeguarding Lead (DSL) is fully compatible with any kind of device. Whether you are using a Windows computer, Mac, smartphone or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path You will be ready to enter the relevant job market after completing this course. You will be able to gain necessary knowledge and skills required to succeed in this sector. All our Diplomas' are CPD and IAO accredited so you will be able to stand out in the crowd by adding our qualifications to your CV and Resume. Module 01: An Introduction to Safeguarding of Vulnerable Adults An Introduction to Safeguarding of Vulnerable Adults 00:15:00 Module 02: Safeguarding Legislations Safeguarding Legislations 00:25:00 Module 03: Understanding Abuse and Neglect Understanding Abuse and Neglect 00:25:00 Module 04: Safeguarding Vulnerable AdultsPolicy, Roles and Responsibilities Safeguarding Vulnerable AdultsPolicy, Roles and Responsibilities 00:23:00 Module 05: Understanding the Importance of Communication in Care Understanding the Importance of Communication in Care 00:20:00 Module 06: Sharing Information and Responding To a Disclosure Sharing Information and Responding To a Disclosure 00:20:00 Module 07: Reporting Your Concern Reporting Your Concern 00:17:00