We couldn't find any listings for your search. Explore our online options and related educators below to see if they help you.
Know someone teaching this? Help them become an Educator on Cademy.
As a qualified homeopath of 5yrs, I've put together a brilliant offer for newly-qualified homeopaths who know all about remedies but almost nothing about running a successful, busy homeopathy practice. Very limited spaces, and the last time it will be this cheap before prices go up. You'll get a mix of group learning and direct access to me (learning from my mistakes so you don't have to waste time and money on making the same!).
LOOKING FOR: ADULT FICTION Sarah Williams is a Director of the Sophie Hicks Agency which she joined in 2014 and she has worked as a literary agent for over 10 years. Sarah represents a wide range of adult fiction and non-fiction and as she runs the film and television side of the agency, she is particularly interested in books that have screen potential. She is looking for literary fiction, reading group fiction, memoir and lifestyle/personal development - basically any book that can surprise, change and challenge a reader. Recent favourites are Tides by Sara Freeman, The Paper Palace by Miranda Cowley Heller, Early Morning Riser by Katherine Heiney and In The Dream House by Carmen Maria Machado. Sarah would like you to submit a covering letter, 1 page synopsis and the first 20 - 30 pages of your manuscript in a single word document. (In addition to the paid sessions, Sarah is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Tuesday 19 November 2024
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is any IT, facilities or data centre professional who works in and around the data centre and has the responsibility to achieve and improve efficiency and environmental sustainability, whilst maintaining the availability and manageability of the data centre. Overview After completion of the course the participant will be able to: Understand the impact of data centres on the environment Describe the various environmental/energy management standards Understand the purpose and goals of the legally binding international treaties on climate change Implement various sustainable performance metrics and how to use them in the data centre environment Manage data centre environmental sustainability using international standards Set up the measurement, monitoring and reporting of energy usage Use power efficiency indicators in a variety of data centre designs Use best practices for energy savings in the electrical infrastructure and in the mechanical (cooling) infrastructure Use best practices for energy savings for the ICT equipment and data storage Understand the importance of water management and waste management Understand the different ways to use sustainable energy in the data centre Get practical tips and innovative ideas to make a data centre more sustainable The CDESS© course is aimed at providing knowledge of the standards and guidelines related to environmental sustainability, and how to move your data centre (existing or new) to a more environmentally sustainable design and operations. Impact of Data Centres on the Environment Predictions in 2010 Current situation Outlook and commitments What is Environmental Sustainability The importance of sustainability Senior management commitment Environmental sustainability framework Sustainability policies Performance standards and metrics Information policies Transparency Awareness Service charging models Environmental Management Environmental sustainability framework (ISO 14001) Standards and guidelines ? ISO 50001 / ISO 30134 Measurement and categories Baselining Trend analysis Reporting Power Effiðciency Indicators Various eðfficiency indicators Power Usage Effectiveness (PUE) PUE measurement levels Factors affecting PUE Measurement points and intervals PUE in mixed source environments Measuring PUE in a mixed-use building PUE reporting Impact of PUE after optimising IT load Electrical Energy Savings (Electrical) Identifying the starting point for saving energy Sizing of power DC power Generators UPS systems Power Factor (PF) Energy savings on lighting Electrical Energy Savings (Mechanical) Energy savings on the cooling infrastructure Temperature and humidity setpoints Various energy eðcient cooling technologies Energy savings on the airflow Liquid cooling Energy reusage PUE, ERE/ERF and Control Volume Electrical Energy Savings (ICT) Procurement IT equipment energy eðfficiency ITEEsv, SMPE, SMPO IT equipment utilisation Server virtualisation Open compute project Electrical Energy Savings (Data Storage) Data management Data storage management Data storage equipment effiðciency Water Management Water Usage Effectiveness (WUE) Improving WUE Water usage at the power generation source Energy Water Intensity Factor (EWIF) Waste Management Waste management policies Life-cycle assessment (Cradle to the grave) 3 R?s for waste management Reduce Reuse Second-hand market Recycle Sustainable Energy Usage Sustainable energy sources Power purchase agreements Energy attribute certificates Renewable Energy Factor (REF) Matching renewable energy supply and demand Sustainable energy storage Carbon trading Automated Environmental Management Systems Use of AI and machine learning Load migration Data Centre Infrastructure Management (DCIM) solutions
PYTHON BOOTCAMP: This 12-week Python Data Analytics Data Boot Camp is designed to give you a complete skill set required by data analysts . You will be fully fluent and confident as a Python data analyst, with full understanding of Python Programming. From Data, databases, datasets, importing, cleaning, transforming, analysing to visualisation and creating awesome dashboards The course is a practical, instructor-lead program.
Duration 1 Days 6 CPD hours This course is intended for To ensure success, students should have completed Excel Essentials and Excel Functions Including Pivot Tables and Lookups or have the equivalent knowledge and experience. Overview Upon successful completion of this course, students will be able to enhance productivity and efficiency by streamlining workflow, collaborate with others, and audit and analyse data. This course is designed for students desiring to gain skills necessary to create macros, collaborate with others, audit and analyse data, incorporate multiple data sources, and import data. Working with Multiple Worksheets and Workbooks Working with Named Ranges Link Cells Across Worksheets and Workbooks Use 3D References to Calculate Across Worksheets Consolidate Data Use Formula Auditing and Error Checking Reveal Formulas Trace Cell Precedents and Dependents Locate Errors in Formulas Watch and Evaluate Formulas Reviewing and Protecting Workbooks Control Data Entry via Data Validation Protect Workbook Access Protect Worksheets and Cell Content Add and Edit Comments Prepare a Workbook for Distribution Modify Excel's Default Settings Using Macros to Automate Workbook Functionality Create Macros via Recording Run Macros via Buttons and Shortcuts Assign Macros to the Quick Access Toolbar and Ribbon Assign Macros to Objects View Macro Code Forecasting and Analysis Data Use Conditional Formatting to Highlight, Sort and Filter Key Data Advanced Conditional Formatting using Formulas Create Sparklines to Visualise Data Add Trendlines to Charts to Visualise and Forecast Trends Use Data Tables and Scenarios to Project Potential Outcomes Use Goal Seek to Calculate Outcomes Forecast Data Trends Using Solver
Are you new to mac? Want to learn how to operate a mac? Want to learn the tips and tricks of having fun with mac? If yes then enrol now to benefit the most out of this course. Description: This course is designed for individuals who are willing to switch from PC to Mac. Mac is continuously bringing up more inventive thoughts to incorporate into the present elements available. In this course, you will have an overview of the Mac desktops and the features that makes it more convenient then other systems. In this course, you will learn how to operate mac using the simplest method. You will also learn about networking process for Mac and how can user network 2 or more macs without any underlying issues usually related to other networking practices. Through this course, you will learn about many other interesting things you can do easily. Our professional, as well as experienced tutors, will make this course more fun and informative. Who is the course for? This course is designed for individuals who are interested in exploring the benefits of using MAC. It is also beneficial for the graphic designers as Mac system is preferable for handling the graphic software. Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Assessment: At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After you have successfully passed the test, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. PDF certificate's turnaround time is 24 hours and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognised accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path: MAC Operating Course is a useful qualification to possess, and would be beneficial for the following careers: Mac operator. Production artist. Pre-press technician. Graphics designer. Creative art worker. Gamers. Video editors. Chapter-01 Introduction to Mac 01:00:00 Chapter-02 Features of Mac Desktops 01:00:00 Chapter-03 Networking System of Mac 01:00:00 Chapter-04 Types of Mac 01:00:00 Chapter-05 Mac your way to cyberspace 00:30:00 Chapter-06 Benefits of Using Mac 01:00:00 Chapter-07 How to print & fax using Mac 01:00:00 Chapter-08 Managing music with iTunes 01:00:00 Chapter-09 Having fun with photos 01:00:00 Chapter-10 Wrapping Up 00:15:00 Mock Exam Mock Exam- MAC Operating Course 00:20:00 Final Exam Final Exam- MAC Operating Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Learn how to perform and read an ECG ... Nationally Recognised Qualification OCN Accredited - Level 3 (advanced level) CPD Accredited - The CPD Certification Service Introduces you to the fundamentals of setting up and operating an ECG machine Includes patient preparation Produce a valid (error free) ECG Learn and understand ECG traces Recognise recordings that require urgent attention Basic understanding of English language required OPEN TO ALL APPLICANTS VIRTUAL CLASSROOM OPTION INCLUDES COMPREHENSIVE PRACTISE@HOME ECG TRAINING KIT Final interpretation of all ECG recordings is the responsibility of a medical professional.
Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Are you a MAC user and want to increase your knowledge on the MAC operating system? Enroll in our MAC Operating System Accredited Training for a better understanding and adaptability of such complex OS. Course Description: The course is designed for the new MAC users. MAC OS continuously brings more creative thoughts to incorporate into the present elements available. In the course, you will learn the features of MAC desktop operating System and will be able to know the differences between MAC OS and other operating systems. Why makes MAC OS is more user-friendly and convenient to use will be discussed here. If you want to be an expert user of MAC OS, the course will surely guide you to learn all the necessary features and functions of MAC OS. The course not only covers the basics operating system of MAC but also provides detailed information about the networking process of MAC. By the end of the course, you will be confident enough to use MAC OS. Course Highlights MAC Operating System Accredited Training is an award winning and the best selling course that has been given the CPD Certification & IAO accreditation. It is the most suitable course anyone looking to work in this or relevant sector. It is considered one of the perfect courses in the UK that can help students/learners to get familiar with the topic and gain necessary skills to perform well in this field. We have packed MAC Operating System Accredited Training into 10 modules for teaching you everything you need to become successful in this profession. To provide you ease of access, this course is designed for both part-time and full-time students. You can become accredited in just 8 hours, 45 minutes hours and it is also possible to study at your own pace. We have experienced tutors who will help you throughout the comprehensive syllabus of this course and answer all your queries through email. For further clarification, you will be able to recognize your qualification by checking the validity from our dedicated website. Why You Should Choose MAC Operating System Accredited Training Lifetime access to the course No hidden fees or exam charges CPD Accredited certification on successful completion Full Tutor support on weekdays (Monday - Friday) Efficient exam system, assessment and instant results Download Printable PDF certificate immediately after completion Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. Improve your chance of gaining professional skills and better earning potential. Who is this Course for? MAC Operating System Accredited Training is CPD certified and IAO accredited. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic backgrounds. Requirements Our MAC Operating System Accredited Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path You will be ready to enter the relevant job market after completing this course. You will be able to gain necessary knowledge and skills required to succeed in this sector. All our Diplomas' are CPD and IAO accredited so you will be able to stand out in the crowd by adding our qualifications to your CV and Resume. Chapter-01 Introduction to Mac 01:00:00 Chapter-02 Features of Mac Desktops 01:00:00 Chapter-03 Networking System of Mac 01:00:00 Chapter-04 Types of Mac 01:00:00 Chapter-05 Mac your way to cyberspace 00:30:00 Chapter-06 Benefits of Using Mac 01:00:00 Chapter-07 How to print & fax using Mac 01:00:00 Chapter-08 Managing music with iTunes 01:00:00 Chapter-09 Having fun with photos 01:00:00 Chapter-10 Wrapping Up 00:15:00 Mock Exam Final Exam
THIS COURSE PACKAGE INCLUDES: 1: INTRODUCTION TO ECG COURSE - RECORDING & BASIC INTERPRETATION (GPT009) 2: ADVANCED ECG COURSE - INTERPRETATION & ANALYSIS (GPT010) Learn how to set up and record a basic ECG trace, followed by advanced analysis and interpretation FAST-TRACK YOUR ECG TRAINING WITH OUR BEGINNER TO ADVANCED TRAINING PACKAGE 20% off - Multi-Course Discount Cover all stages from Level 1 through to Level 4 (FDSc) Cover your theory training online Practical training in Classroom or Virtual Classroom Comprehensive Practise@Home training kits for VC Awards 2 accredited qualifications Dual Accreditations are awarded for all courses (Open College Network and CPD) Covers all steps required to competently set up and perform an ECG trace. Practical sessions include electrode placement on mannequin, running traces and identifying anomalies. Learn beginner to advanced skills and interpretation. Basic understanding of English language required. OPEN TO ALL APPLICANTS About these courses 1: INTRODUCTION TO ECG COURSE - RECORDING AND BASIC INTERPRETATION (GPT009) PART 1 - Theory Allow approx. 5-6 hours PART 2 - Practical Training Attend a classroom location or join us in our virtual classroom * - 3-4 hours ACCREDITED LEVEL 3 QUALIFICATION * Virtual Classroom option includes a free comprehensive Practise@Home ECG training kit. 2: ADVANCED ECG COURSE - INTERPRETATION AND ANALYSIS (GPT010) E-LEARNING - Theory Allow approx. 6-8 hours ACCREDITED LEVEL 4 QUALIFICATION OPTIONAL: GETTING STARTED IN ECG (GPT002) A free starter ECG Course (unassessed) developed to help you understand the basics of ECG recording: 3 modules in total with no Questions! If you are already familiar with ECGs then you may prefer to save time and opt out of this mini-course at booking stage. This "mini-course" is available at no charge. Learning Outcomes GPT009: Understanding different ECG equipment types ECG equipment - set-up and calibration Includes professionalism, consent, IPC and legal requirement Patient preparation How to correctly apply electrodes to limbs and chest Identify artifacts (equipment and patients Identify and recognise routine traces Identify and recognise non-routine traces Identify traces requiring urgent attention Labelling and reporting GPT010: Understand the acceptable variations within the normal ECG of healthy adults. Recognise the expected patterns of an ECG from a healthy child from birth onwards and identify abnormalities. Interpret abnormal ECG patterns in adults. Diagnose arrhythmias as an underlying cause of palpitations and syncope. Exploring sinus rhythm, extrasystoles, paroxysmal tachycardia and the importance of a physical examination. Identifying syncopal episodes attributable to cardiovascular disease as opposed to arrhythmias. Recognise ECG markers for tachycardias, bradycardias, pre-excitation syndromes, bi-fascicular block, and first-degree block with bundle branch block. Differentiate between supraventricular and ventricular extrasystoles and be able to diagnose broad complex tachycardias, ventricular flutter and fibrillation, sick sinus syndrome, and Stokes-Adams attacks. Recognise and identify symptoms associated with the causes of acute or chronic chest pain in patients who present with myocardial infarction (heart attack), pulmonary embolism, significant central pulmonary embolism, pericarditis, aortic dissection, oesophageal rupture, spinal disorders, vertebral collapse, posterior infarction, and angina. Recognise symptoms indicative of conditions such as pulmonary oedema, chest diseases, and pulmonary congestion. After the course GPT009: Safely and competently set up an ECG machine Introduce patients to the ECG test, adhering to compliancy requirements before and after testing Perform an ECG test to national guidelines Understand basic traces and their correlation to cardiac issues Recognise normal and erroneous recordings Recognise recordings that require urgent medical follow-up Complete the recording and label (or record digital copies) as per guidelines GPT010: Appreciate normal and abnormal ECG variations in the context of varying pathologies. Be able to determine whether an arrhythmia has an underlying cause that requires medical intervention. Interpret ECGs as a function of the patient's ongoing cardiac management. Understand and apply the Burce Protocol exercise test in relevant clinical situations. Know how to clinically respond to a patient with chest pain including further investigations required, pain relief, history and examination and echocardiogram. Understand and apply the fundamental principles of arrhythmia management. Understand the primary causes of heart disease and the diagnostic process. Appreciate the importance of the ECG as a diagnostic tool alongside the patient’s history and clinical presentation and recognising its limitations. Course Package Components: PACKAGE - Beginner to Advanced ECG - Virtual Classroom - INTRO - Part 1 online Part 2 Virtual Classroom (AM) + ADVANCED - E-learning