• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2040 Motivation courses in Bargoed delivered Online

First Aid for Mental Health | RQF Level 2

By Madeleys First Aid Plus

First Aid for Mental Health | RQF Level 2 First Aid for Mental Health qualification is designed to provide individuals with the knowledge and skills to support individuals experiencing mental health issues. This course aims to increase awareness of mental health, reduce stigma, and promote early intervention and support. The course covers various aspects of mental health, including common mental health conditions, signs and symptoms, and the impact of mental health issues on individuals and society. Participants will learn about different approaches to mental health, including self-help, accessing support, and signposting to appropriate services. The content of the RQF Level 2 First Aid for Mental Health course typically includes: Understanding Mental Health: An overview of mental health, including common mental health conditions such as depression, anxiety disorders, and stress. Participants will learn about the prevalence of mental health issues and their impact on individuals and society. Recognizing Mental Health Conditions: Understanding the signs, symptoms, and potential triggers of various mental health conditions. Participants will learn to identify early warning signs and risk factors for mental health issues. Promoting Positive Mental Health: Strategies and techniques for promoting positive mental health and well-being. This may include stress management techniques, self-care practices, and maintaining good mental health hygiene. Providing Mental Health First Aid: Techniques for providing initial support to individuals experiencing mental health crises or deteriorating mental health. Participants will learn how to offer non-judgmental listening, empathy, and reassurance to individuals in distress. Signposting and Referral: Understanding the importance of signposting individuals to appropriate professional help and support services. Participants will learn about local resources, helplines, and mental health organizations that can provide ongoing assistance. Self-Help and Resilience: Exploring self-help strategies and resilience-building techniques that individuals can use to manage their mental health and well-being. This may include relaxation techniques, mindfulness exercises, and developing healthy coping mechanisms. The course may be delivered through a combination of classroom-based instruction, group discussions, case studies, and practical activities. All our trainers are qualified and experienced in mental health education and support. Upon successful completion of the RQF Level 2 First Aid for Mental Health course, participants will receive a qualification that demonstrates their understanding of mental health issues and their ability to provide initial support to individuals experiencing mental health challenges. It's important to note that this course is not intended to replace professional mental health services or provide participants with the qualifications to diagnose or treat mental health conditions. It aims to equip individuals with the knowledge and skills to provide initial support and signposting to appropriate services. Suitability - Who should attend? First Aid for Mental Health course is suitable for a wide range of individuals who are interested in gaining knowledge and skills to provide initial support to individuals experiencing mental health challenges. Here are some examples of who the course may be suitable for: General Public: The course is open to anyone who wants to increase their understanding of mental health and learn how to support others effectively. It is suitable for individuals who want to develop their knowledge and skills in mental health first aid for personal reasons or to support friends, family members, or colleagues. Workplace Settings: The course is particularly relevant for individuals working in various professional settings, including but not limited to workplaces, schools, colleges, universities, community organizations, and voluntary sectors. It can benefit employees, supervisors, managers, and HR professionals who want to create a mentally healthy and supportive work environment. Healthcare Professionals: Healthcare professionals, such as nurses, doctors, paramedics, and allied health professionals, can benefit from the course to complement their existing medical knowledge and skills. The course equips them with additional tools and strategies to effectively respond to the mental health needs of their patients. Customer Service and Support Roles: Individuals working in customer service, hospitality, retail, or other client-facing roles can benefit from the course to enhance their ability to provide empathetic and supportive interactions with customers or clients who may be experiencing mental health challenges. Community Leaders and Volunteers: Community leaders, volunteers, and individuals involved in community organizations, charities, or support groups can gain valuable knowledge and skills from the course. It enables them to offer informed support and signposting to individuals within their communities who may be in need. It's important to note that the course does not require any previous qualifications or specific professional background in mental health. Participants should have a willingness to learn, an open mind, and a compassionate attitude toward individuals experiencing mental health challenges. However, it's also important to recognize that the course does not provide participants with the qualifications to diagnose or treat mental health conditions. Instead, it focuses on providing initial support, promoting awareness, and signposting individuals to appropriate professional help and services. Before enrolling in the course, individuals should consider their personal interest, commitment to learning about mental health, and their motivation to support others in this area. It is also recommended to check any specific requirements or prerequisites set by the training provider to ensure suitability for participation. Overall, the RQF Level 2 First Aid for Mental Health course is suitable for individuals from various backgrounds who want to develop their understanding of mental health and gain practical skills to provide initial support and signposting to individuals in need. Outcome / Qualification etc. Upon successful completion of the First Aid for Mental Health course, participants can expect to achieve the following outcomes: Increased Awareness and Understanding: Participants will develop a greater awareness and understanding of mental health, including common mental health conditions, their signs and symptoms, and the impact they can have on individuals and society. They will gain knowledge about the prevalence of mental health issues and the importance of promoting positive mental health. Enhanced Ability to Recognize Mental Health Conditions: Participants will acquire the skills to recognize signs and symptoms of various mental health conditions. They will be better equipped to identify early warning signs and risk factors, enabling them to provide timely support and intervention. Improved Mental Health First Aid Skills: Participants will learn techniques and strategies for providing initial support to individuals experiencing mental health crises or deteriorating mental health. They will develop skills in active listening, non-judgmental communication, and empathy, allowing them to offer appropriate assistance and reassurance to individuals in distress. Knowledge of Signposting and Referral: Participants will gain an understanding of the importance of signposting individuals to appropriate professional help and support services. They will learn about local resources, helplines, and mental health organizations, enabling them to provide accurate information and guide individuals to the appropriate sources of assistance. Enhanced Self-Help and Resilience Strategies: Participants will learn self-help strategies and resilience-building techniques that individuals can use to manage their own mental health and well-being. They will acquire practical tools for stress management, relaxation, and developing healthy coping mechanisms. Confidence in Supporting Others: The course aims to enhance participants' confidence in providing support to individuals experiencing mental health challenges. Through knowledge, skills, and practical exercises, participants will feel more prepared to respond appropriately and effectively in a compassionate and understanding manner. Qualification: Upon successful completion of the course, participants will receive an RQF Level 2 qualification in First Aid for Mental Health. This qualification demonstrates their understanding of mental health issues and their ability to provide initial support to individuals in need. It's important to note that the RQF Level 2 First Aid for Mental Health qualification is not intended to replace professional mental health services or provide participants with the qualifications to diagnose or treat mental health conditions. Instead, it aims to equip individuals with the necessary knowledge and skills to offer initial support and signposting, fostering a supportive and empathetic environment for individuals experiencing mental health challenges. Training Course Content Module 1 Introduction Module 2 What is first aid for mental health? Module 3 Identifying mental health conditions Module 4 Providing advice and starting a conversation Module 5 Stress Module 6 Mental health conditions Module 7 Drugs and alcohol Module 8 First aid action plan for mental health - including practical assessment Module 9 Mental health in the workplace Module 10 Assessment and course closure Course delivery details Classroom-Based or Virtual Instruction: The course may be delivered through traditional classroom-based instruction, where participants attend in-person training sessions led by a qualified instructor. The instructor will cover the course content, facilitate discussions, and provide guidance on practical activities. Blended Learning: Some training providers offer a blended learning approach, combining both online and face-to-face components. Participants may complete certain modules or topics online through interactive e-learning platforms or virtual classrooms. This allows for self-paced learning and flexibility before attending practical sessions or assessments in person. Interactive Discussions: The course often includes interactive discussions where participants can share their experiences, ask questions, and engage in conversations related to mental health. This encourages active participation, promotes peer learning, and provides opportunities for clarification and deeper understanding of the course content. Case Studies and Scenario-Based Activities: To enhance practical application, trainers may present case studies or scenarios related to mental health issues. Participants can work in groups or individually to analyse the situations, identify appropriate responses, and discuss possible strategies for providing support. Practical Skills Demonstrations: Trainers may demonstrate practical skills and techniques for providing mental health first aid, such as active listening, empathetic communication, and crisis intervention. Participants will have the opportunity to observe and learn from these demonstrations before practicing the skills themselves. Role-Playing and Simulations: Role-playing exercises and simulations may be used to simulate real-life scenarios and provide participants with hands-on practice in responding to mental health crises. This allows them to develop their skills in a safe and controlled environment and receive feedback from the trainer and peers. Assessment and Certification: Participants will undergo assessments to demonstrate their understanding of the course content and their ability to apply their knowledge and skills in practical scenarios. Successful completion of the assessments leads to the awarding of the RQF Level 2 First Aid for Mental Health qualification. It's important to note that the specific delivery methods and approaches may vary depending on the training provider, course duration, and the resources available. Participants should check with the training provider for detailed information on the course delivery format and any specific requirements or prerequisites for participation. Overall, the aim of the course delivery is to create an engaging and interactive learning environment that allows participants to gain the necessary knowledge, skills, and confidence to provide effective support to individuals experiencing mental health challenges. Why choose Madeleys First Aid Plus Founded in 2021 after Louise left 30 years in the NHS as an Advanced practitioner in A&E/ITU, had spent 1.5 years in Covid ITU Won FSB Best start-up business in the West Midlands in May 2023 Now trained 100's of delegates in Physical and Mental Health First Aid

First Aid for Mental Health | RQF Level 2
Delivered in Much Wenlock or UK Wide or OnlineFlexible Dates
Price on Enquiry

Carpe Diem Motivational Networking Group

By Geoffrey Prince

A unique Zoom Motivational-Networking Group meets every Wednesday from 1-15 pm (BST). Each week I have a different theme. It is based on my Monday morning Blog. Three questions are talked through in breakout rooms on Wednesday at 1-15 pm Motivational-Networking Group. It works and works very well because it brings together people from around the world who are able to talk about their businesses and what they do and would like to accomplish in their lives. Many different problems are raised during the meetings by the people in the group but mainly it helps others on their business journey. Couple this with Gurugeoffrey’s Motivational talking by imparting his 50-plus years of business knowledge, lecturing, workshops, after-dinner talks and all this with his anecdotal experiences.  

Carpe Diem Motivational Networking Group
Delivered OnlineFlexible Dates
FREE

Docker Enterprise Bootcamp

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Motivations: Quickly learn the foundations of containerization and orchestration with Docker Swarm, and become familiar with all the features of Docker Enterprise. Roles: System Operators & Administrators Overview This course combines all topics of CN100 , CN110 , CN210 In this intense cloud native bootcamp, you?ll encounter containers for the first time, learn to orchestrate them into scalable, highly available applications orchestrated by Docker Swarm, and finally discover how to enhance the security of your entire software supply chain and production environments using Docker Enterprise. This bundle is ideal for students who are just starting out with containerization and want to leverage the full power of the Docker Enterprise platform as soon as possible. In this intense cloud native bootcamp, you'll encounter containers for the first time, learn to orchestrate them into scalable, highly available applications orchestrated by Docker Swarm, and finally discover how to enhance the security of your entire software supply chain and production environments using Docker Enterprise. This bundle is ideal for students who are just starting out with containerization and want to leverage the full power of the Docker Enterprise platform as soon as possible.

Docker Enterprise Bootcamp
Delivered OnlineFlexible Dates
Price on Enquiry

Coaching skills for sales (In-House)

By The In House Training Company

Maximising the team's sales capability is the key aim for any sales manager. When sales people struggle to hit their targets, it falls to the sales manager to provide support and help colleagues to find their way again. One of the most effective techniques for sales managers to improve and maintain sales performance is by providing live sales coaching. Sales coaching encourages sales people to find their own solutions and take responsibility for their own development. This course will help participants: Develop people to fulfil their sales potential Provide motivational feedback Identify strengths and weaknesses of their team members Understand personal learning styles Identify and adapt for different personality styles Prepare and conduct on-the-job observations Motivate sales people to greater performance 1 How is sales coaching different from sales training? What is coaching? Discover how coaching empowers sales people Learn the best time to use sales coaching Decide which people should be coached first Creating a development plan 2 Understanding learning, behavioural and communication styles Use practical tools to help you assess individual styles Tap into the essence and energy of the person you are developing Understand your own learning, behavioural and communication preferences Develop a strategy to adopt for each member of your team Discover what motivates you and your salespeople to perform Appreciate how this knowledge will improve your sales conversion 3 Using the GROW coaching model Learn the secrets of a successful coaching session Discover the importance of SMART objectives and instructions Understand and capture what coachees are currently doing right Develop their problem-solving and decision-making skills Help your colleagues crystalise their plans and actions Provide follow-up opportunities to embed the learning 4 Giving motivational feedback Understand why effective feedback is so powerful in sales Learn key models for motivational feedback Discover how to manage and structure more difficult conversations Understand the power of positive reinforcement Encourage sales people to coach and support colleagues 5 Putting it into practice Use realistic scenarios to provide opportunities for practice Discover what it feels like to be coached Receive immediate feedback on your coaching style Share common performance issues with fellow sales managers Create a personal development plan 6 Preparing on-the-job observations and joint visits Build a strategy for coaching and team development Prepare an observation template for effective coaching Learn the key elements of preparation for your next coaching session Agree common areas to focus on with coachees 7 Action planning Personal action plans

Coaching skills for sales (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Cloud Native Operations Bootcamp

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Motivations: Use and manage containers from first principles & architect basic applications for Kubernetes Roles: general technical audiences & IT professionals CN251 is an intensive cloud native training bootcamp for IT professionals looking to develop skills in deploying and administering containerized applications in Kubernetes. Over the course of five days, students will start with learning about first principles for application containerization followed by learning how to stand up a containerized application in Kubernetes, and, finally, ramping up the skills for day-1 operating tasks for managing a Kubernetes production environment. CN251 is an ideal course for those who need to accelerate the development of their IT skills for a rapidly-changing technology landscape. Additional course details: Nexus Humans Cloud Native Operations Bootcamp training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cloud Native Operations Bootcamp course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cloud Native Operations Bootcamp
Delivered OnlineFlexible Dates
Price on Enquiry

SAPEP SAP Enterprise Portal - Fundamentals

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Application Consultants, Developers, System Administrators, and System Architects Overview Understand the need for an enterprise portalLog on to, navigate, and personalize the portalDescribe the components of SAP Enterprise PortalBuild-up a portal navigation structureAdapt the portal user interface to company specificationsExplain and use the main functions of the SAP Enterprise Portal, Knowledge Management and CollaborationExplain and use the community features of the portal add-ons Forums and WikisExplain and use the SAP Fiori Launchpad on Portal' In this course, students will gain knowledge of the basic fundamentals surrounding the SAP Enterprise Portal. Enterprise Portal Explaining Business Motivations for Portals Describing SAP NetWeaver Explaining the Basics of SAP Enterprise Portal The End User's Perspective Logging On and Navigating in SAP Enterprise Portal Personalizing SAP Enterprise Portal Technical Infrastructure Determining System Requirements Outlining SAP Enterprise Portal's Architecture Portal Platform Content Explaining the Object Model for Portal Content Managing iViews Managing Portal Pages Managing Worksets and Portal Roles Explaining Business Packages Outlining Portal Content Development Tools Translating Portal Content Look and Feel of the Portal Managing Portal Themes Managing Framework Pages Managing Portal Desktops Managing Portal Rules (Rule Collections) Security Aspects Identifying Security Aspects Managing Users and Authentication Options Describing Authorization Concepts Describing Single Sign-On (SSO) Evaluating Network Security Knowledge Management (KM) Outlining Knowledge Management (KM) Describing Content Management (CM) Functions Using Web Page Composer (WPC) Describing Search and Classification (TREX) Enterprise Workspaces Explaining Enterprise Workspaces Managing Personal Workspaces Managing Shared Workspaces Collaboration Outlining Collaboration Functions Using Forums Using Wikis Fiori Launchpad on the Portal Outlining SAP Fiori Launchpad on Portal Additional course details: Nexus Humans SAPEP SAP Enterprise Portal - Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SAPEP SAP Enterprise Portal - Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SAPEP SAP Enterprise Portal - Fundamentals
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Understanding Cisco Industrial IoT Networking Foundation (INFND)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Operational Technology (OT) Engineers IT engineers Generalists, including managers, project leads, and solutions and business architects Overview Define what IIoT is and identify IIoT architectures. Identify IIoT market verticals, and their motivations and requirements. Explore Cisco IIoT networking devices, how they are different from other devices, and use common administrative tools for managing them. Explore industrial communications protocols for control and automation, and how they have been adapted to run on top of a TCP/IP network infrastructure. Describe wireless protocols used in IIoT environments, including architectures and devices used. Understand the TCP/IP protocol stack and how it is used with other protocols in IIoT environments. Discuss network protocols for clock synchronization between network devices, and describe available tools for IIoT network administration. Discuss wireless technologies used in a core LAN, and their relevance to IIoT implementations. Explore field WAN technologies and how they are used in IIoT environments. Explore legacy protocols and explain the methods available to transport non-routable protocols over modern networks. Explain fundamental concepts of Quality of Service (QoS) related to IIoT network environments. Discuss Multiprotocol Label Switching (MPLS) operation, components, terminology, and features, and explore its use in IIoT environments. Explore Layer 2 and Layer 3 VPN technologies and describe the way they can be used on IIoT deployments. Describe Dense Wave Division Multiplexing (DWDM) technology and its use in IIoT environments. Explore Layer 1 and Layer 2 high availability technologies and redundancy mechanisms. Describe Layer 3 high availability and the need for Layer 3 redundancy in IIoT deployments The Understanding Cisco Industrial IoT Networking Foundation (INFND) v1.0 course gives you an overview of the protocols, applications, and network infrastructure you need to support and manage Industrial Internet of Things (IIoT) solutions. You will learn about IIoT industry verticals and how different protocols are used within them. The course also covers configuring and verifying the protocols on Cisco© IIoT networking devices. Course Introduction.Defining Industrial Internet of ThingsExamining Common IIoT Verticals.Examining Cisco IIoT Networking Devices.Examining and Configuring Industrial Communication Protocols.Describing Wireless IIoT Protocols.Explaining and Configuring TCP/IP Protocols, Addressing, and Segmentation.Examining Network Services and Administration.Examining and Configuring Wireless Core LAN Technologies.Describing Field WAN Technologies.Examining and Configuring Transportation of Legacy Protocols.Describing, Configuring, and Verifying Quality of Service (QoS) for IIoT Protocols.Examining and Verifying MPLS and IIoT.Configuring and Explaining VPN Technology and IIoT.Describing DWDM.Configuring and Defining Layer 1 and Layer 2 High Availability Technologies.Defining and Configuring Layer 3 High Availability TechnologiesLab outline Connect to the Cisco IIoT Devices. Use Industrial Protocols with Cisco Industrial Ethernet Switches. Configure an 802.11 Client. Configure an IPv6 Address. Configure Layer 2 Network Address Translation (NAT) and IP Addressing in an Example IoT Deployment.

Cisco Understanding Cisco Industrial IoT Networking Foundation (INFND)
Delivered OnlineFlexible Dates
Price on Enquiry

Palo Alto Networks : Strata Foundations

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Security Engineers Network Engineers Support staff Overview This course is intended to provide an understanding of Palo Alto Networks Next-Generation firewall technologies enable the student to perform a basic installation of Palo Alto Networks Next-Generation firewalls. Upon completion of this course, students will be able to: Explain the features and advantages of the Palo Alto Networks next-generation firewall architecture Understand the capabilities of App-ID, Content-ID, and User-ID Perform the basic configuration of the firewall including: Interfaces and virtual routers NAT Policies Security zones Objects Security policies Content security profiles View logs and basic reports This course was formerly named Palo Alto Networks Foundations of Next Generation Firewalls (EDU-150). ** Our foundation classes are just introductory trainings, NOT a full technical training. Your network has expanded beyond your organization\'s boundaries. Cloud locations and remote users (often using personal devices) have \'distributed\' the surface you need to both enable and protect.At the same time, the motivations of attackers and their sophistication have continued to evolve.Palo Alto Networks' next-generation firewalls are all based on a consistent Single-Pass Architecture, enabling security capability that is unique in the industry. This architecture is implemented in a portfolio of both physical and virtual appliances, designed to cover a range of performance and use case requirements.Features and management are consistent across the portfolio. Integration with GlobalProtect? mobile security service extends policy-based security to mobile devices (whether on-premises or remote). Integration with our threat intelligence services keeps information up to date for the firewall (e.g., URL categories, threat signatures). WildFire? cloud-based malware analysis environment integration supports a rapid \'feedback loop\' that enables the firewall to stop advanced threats throughout the attack lifecycle. Course Outline Module 0: Introduction Module 1: Platforms & Architecture Module 2: Getting Started Module 3: Basic Administration Module 4: Connectivity Module 5: Security Module 6: Logging & Reporting Additional course details: Nexus Humans Palo Alto Networks : Strata Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks : Strata Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Palo Alto Networks : Strata Foundations
Delivered OnlineFlexible Dates
Price on Enquiry

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

Conflict management (In-House)

By The In House Training Company

Conflict is a word that conjures up many emotions. It is something that most people would prefer to avoid, if possible. Work can be an emotive place. Positive relationships can make your life at work exciting, motivating and challenging, whilst relationships that do not hold value to you could make your life very difficult and stressful, especially if there is conflict between you and your manager. This course is essential for people who want to understand where conflict can be used to positive effect and how to manage conflict in your working relationships and see it as something positive that can stimulate the environment. Research has shown that relationships at work are an extremely high motivational factor, and for a lot of people it has a higher importance that salary! Therefore, it is essential that we invest in relationships and search out new ways to make them better in order to have a more positive influence on our surroundings. By understanding why other people are in conflict we can manage the conversation a lot better, with outcomes managed more effectively so the 'conflict' will add value to the organisation. This participative event will cover a wide variety of exercises and personal stories, and leave course participants with a clear strategy to identify when they are in conflict with someone and how they will structure their approach to get to a satisfactory outcome. This is a workshop that targets anyone where conflict needs to be managed and cannot seem to resolve it, whether internally or externally. At the end of the day, participants will: Know their key relationships and the strength of those relationships Complete the Strengths Deployment Inventory (SDI) to identify where you deploy your strengths Understand what is important to you and your key stakeholders Know how motivational value systems can influence behaviour Tailor your communication style to match that of your opposite party Know conflict strategies to resolve conflict in others Learn to be more assertive when challenging Achieve key personal, departmental and organisational objectives 1 Where are you now? How effective are your current working relationships? Can I work effectively without the input from others? Who do you need to be a success? 2 The Strengths Deployment Inventory (SDI) Completion of the SDI questionnaire An understanding of the theory A 'trip around the triangle' Predicting relationship interaction Your scores and what they mean in your relationships 3 Conflict theory What is conflict? The 3 flags of conflict What are your conflict triggers? Your conflict scores plotted The conflict sequence 4 Conflict resolution strategies Early warning signs Most productive behaviours Least productive behaviours Preventable / unwarranted conflict Review of the dynamic triangle Review of the day, personal learning and action planning

Conflict management (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry