In today's fast-changing competitive environment, people in all roles need to have more commercial awareness and responsibility.
This half-day workshop delivered face-to-face or online is designed for anyone in your organisation that wants to become a Neurodiversity Champion - someone who wants to educate and change the way that Neurodiversity is viewed in the workplace.
This course is ideal for line managers who conduct appraisals for team members. The focus is on the conversations you will have in appraisals and how you can make them a positive experience for you, your employee and the organisation.
FourSquare Training specialise in private, corporate Microsoft Word courses delivered at your premises and tailored to your needs.
The three-day IOSH Managing Safely course is the most popular training of its type in the world.
Black CSCS Card NVQ Level 6 Diploma in Occupational Health and Safety Practice This qualification is aimed at health and safety managers who are responsible for developing and applying health and safety procedures day-to-day in their organisation. They may be a staff member, supervisor or manager looking to improve their knowledge and skills. Furthermore, once you have completed this NVQ you will be able to apply for GRADIOSH status. Induction - As soon as you register you will be given a dedicated assessor. They will arrange an induction and together with your assessor you'll get to decide on the pathway which best proves your competency. The induction is used to plan out how you will gather the relevant evidence to complete the course. During the course - The assessor will work with you to build a portfolio of evidence that allows you to showcase your knowledge, skills and experience. The assessor will also regularly review and provide you with feedback. This will allow you to keep on track to progress quickly. You will be assessed through various methods such as observations, written questions, evidence generated from the workplace, professional discussion and witness testimonials. On completion - Once all feedback has been agreed, the Internal Quality Assurer will review your portfolio and in agreement with your assessor the certificate will be applied for. To download our PDF for this course then please click here.
PQASSO (Practical Quality Assurance Standard for Organisations) is a quality standard designed for the voluntary and community sector. Organisations can choose to use the criteria as a self-assessment tool or can go on to external accreditation and gain the Quality Mark at one of three levels, all of which are recognised and approved by the Charity Commission. This half day course provides an excellent introduction to this quality standard, which is now used by some statutory authorities as a pre-requisite for funding.
This half day course is designed to help relatively inexperienced managers and supervisors to manage their staff effectively. The course can be run as a one-off session or can be incorporated into a series of sessions on managing staff. Alternatively it can be run as a day session and incorporate elements of the Managing the Difficult Staff member course. The course can concentrate on managing paid staff or (for voluntary and community sector organisations) can include aspects of supervising and supporting volunteers as well.
FourSquare Training specialise in private, corporate Microsoft PowerPoint courses delivered at your premises and tailored to your needs.
Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.