The course is designed to help improve your understanding of the legal requirements, the theoretical and practical principles for both the initial verification and certification of an electrical installation, further your knowledge and practical skills in the testing and inspection of a range of existing electrical installations, and help improve your understanding of the legal requirements, the theoretical and practical principles for the periodic inspect and testing and certification of an electrical installation.
This session covers the legal aspects of documentation and record keeping in healthcare.
This session covers the legal aspects of documentation and record keeping in healthcare.
This session covers the legal aspects of documentation and record keeping in healthcare for Healthcare Assistants.
Book our accredited Prevention and Management of Violence and Aggression (PMVA) in Healthcare course, meeting Restraint Reduction Network (RRN) training standards and BILD Act Certification. Equip yourself with essential skills to prevent and manage violence in healthcare settings effectively.
City and Guilds level 2 Award in Entrant and Entry Controller for Confined Spaces (Medium Risk) - 6160-09 - This course is designed to provide delegates that need to enter confined spaces and hazardous areas with an in-depth understanding of the Legal requirements and the associated legislation, hazard identification and suitable control measures. Book via our website @ https://www.vp-ess.com/training/confined-spaces/6160-09-city-and-guilds-level-2-award-in-entrant-and-entry-controller-for-confined-spaces-(medium-ri/ or via email at: esstrainingsales@vpplc.com or phone on: 0800 000 346
Aimed specifically at Podiatrists the day provides an excellent clinical complement to in-house established programmes and assumes legal and professional issues regarding the ordering of radiological examination are addressed locally.
Global Project Management: In-House Training: In-House Training In this course, you will dig deeper-and differently-into project management processes, tools, and techniques, developing the ability to see them through the lens of global and cultural project impacts. In today's increasingly global environment, managing a project with customers and support organizations spread across multiple countries and continents is a major challenge. From identifying stakeholders and gathering requirements, to planning, controlling, and executing the project, the basic logistics of a global project present their own standard challenges. However, with additional cultural, language-based, and regional elements, global projects involve more complexities than teams often realize. There are unique communication needs, cultural awareness elements, varying customs and work expectations, and critical legal differences to consider. In this course, you will dig deeper-and differently-into project management processes, tools, and techniques, developing the ability to see them through the lens of global and cultural project impacts. This will leverage you to problem solve differently on global projects, prevent problems, and ensure success. The goal is for you to effectively navigate the challenges of leading projects with multi-regional footprints and globally diverse sets of stakeholders. What you Will Learn At the end of this program, you will be able to: Determine when a project meets the criteria of being a true global one Articulate global project needs based on the project grid and framework Identify and analyze global project stakeholders Recognize cultural differences and articulate how they impact project work Determine global project estimating, scheduling, and staffing challenges Assess global project risks and develop problem-solving responses Analyze complex cultural situations and align optimal project communication and negotiation tools and techniques Apply best practices for conducting virtual team work and mitigating virtual challenges Evaluate ways to control for global project scope, cost, and procurement Align customer management best practices with global customer needs Implement key global project closing activities Foundation Concepts What is a global project? What makes a global project different? A global project management framework Initiating the Global Project Launching a global project Respecting cultural differences Identifying and analyzing stakeholders Developing the communications plan Defining the ideal global project manager Crafting a global project charter Planning the Global Project Gathering requirements for a global project Defining the scope, region by region Estimating and scheduling for global projects Staffing the global project Developing the global risk management plan Executing the Global Project Managing global stakeholder expectations Embracing cultural diversity Honing global negotiation techniques Procuring goods and services on a global basis Managing global legal and regulatory issues at the micro and macro level Monitoring and Controlling the Global Project Status reporting Virtual communication Cost control Schedule control Scope control Customer satisfaction Closing the Global Project Contract closure at the macro and micro levels Administrative closure with global reach Lessons learned
About this training Decarbonization of the Upstream Oil & Gas sector has previously been based on inter-fuel competition. Market actions were seen as the most effective method for reducing the level of emissions. However, the pace of decarbonization is now being led by government policy acting in concert with a coalition of stakeholders such as investors and consumers. The primary focus of this pathway is on the management of carbon emissions to both mitigate and adapt to climate change. Some energy analysts have forecast that global production of oil and natural gas will have to decline annually by 4 to 6 percent in order to meet the global target of Net Zero Emissions by 2050. Oil and gas producers face a difficult challenge in deciding upon the strategy and measures that will best achieve targets set for them while maintaining supply, attracting investments and accessing markets. This 2-day training course will provide participants with an understanding of the strategies and measures for decarbonizing the Upstream Oil and Gas sector within the framework of measures implemented by individual governments through their respective commitments to reduce emissions to achieve their National Determined Contribution under the Paris Agreement. This course offers a unique opportunity to understand the rapidly increasing issues confronting the industry as well as the options for the management of carbon emissions to comply with corporate as well as national policies and the implementation of measures for controlling, reporting and verification. Training Objectives Upon completion of this course, participants will be better equipped to participate in the implementation of measures for the management of carbon emissions in the following areas: Implementation of measures for reducing carbon emissions Establishing systems for monitoring and reporting carbon emissions Evaluating the commerciality of discoveries Reviewing and strategizing future field development plans Meeting Environmental Obligations Target Audience This course has been specifically designed for professionals involved in the international oil and gas industry, whether employed a field operator, national oil company, or government. It offers a unique opportunity to rapidly increase your understanding of the issues confronting the industry as well as the options for the management of carbon emissions to comply with corporate as well as national policies and the implementation of measures for controlling, reporting and verification. Staff with the following roles will find this course particularly useful: Corporate Planners Project Engineers Financial Analysts Environmental Specialists Legal Advisors Regulatory & Compliance Officers Course Level Basic or Foundation Trainer Your expert course leader is an international legal expert in petroleum law who has been listed in the Guide to the World's Leading Energy and Natural Resources Lawyers. In his thirty years of practice, he has been the lead negotiator and acquisitions advisor for oil and gas companies in the US and the Asia-Pacific. These transactions have included both upstream (licences and leases) and downstream (refineries and pipelines) assets. He has been appointed as Distinguished Visiting Professor in Oil and Gas at the University of Wyoming and Honorary Professor at the Centre for Energy, Petroleum & Mineral Law & Policy (CEPMLP) at Dundee University. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.