ITIL® 4 Leader: Digital and IT Strategy: In-House Training The ITIL® 4 Leader: Digital and IT Strategy (DITS) is one of the two modules in the ITIL® 4 Strategic Leader (SL) certification scheme. The other module in the SL designation is the ITIL® 4 Strategist: Direct, Plan & Improve. Accredited training for the ITIL® 4 Strategic Leader modules is mandatory to enable full understanding of the core material. The ITIL ® 4 Digital and IT Strategy certification focuses on enabling business success through the creation of digital and IT strategies. The IT and Digital Strategy certification adds a new perspective to the ITIL suite and elevates the discussion around ITIL concepts to a strategic level among business leaders and aspiring leaders. The ITIL® 4 Digital and IT Strategy course is based on the ITIL® 4 Digital and IT Strategy exam specification from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, you will acquire relevant knowledge to pass the certification exam. The core learning material in the course is supported by interactive case study, discussions and activities. What You Will Learn The ITIL ® 4 Digital and IT Strategy course covers the content in relation to the following learning outcomes of the exam specification for ITIL ® 4 Digital and IT Strategy: Demonstrate the use of the ITIL guiding principles in Digital and IT Strategy decisions and activities Understand how to leverage digital strategy to react to digital disruption Understand the relationship between the concepts of Digital and IT Strategy, the service value system and the service value chain, and explain how to utilize them to create value Understand how an organization uses Digital and IT Strategy to remain viable in environments disrupted by digital technology Understand strategic approaches made possible by digital and information technology to achieve customer/market relevance and operational excellence Understand the risks and opportunities of Digital and IT Strategy Understand the steps and techniques involved in defining and advocating for a Digital and IT Strategy Understand how to implement a Digital and IT Strategy Key Concepts of Digital and IT Strategy Digital, Information, and Communication Technology Digital Transformation Services, Products, and Competitive Advantage Tiers of Strategy Business Models Operating Models Strategy and the Service Value System Opportunity and Demand Value Governance ITIL® Guiding Principles Continual Improvement ITIL® Practices What is Vision? Disruptions Vision Digital Disruptions Balanced Strategic Focus Positioning Tools for Digital Organizations Assignment 1: Digital Disruption and Digital Positioning Where Are We Now? Environmental Analysis Opportunity Analysis Digital Readiness Assessment How Do We Get There (Strategic Planning) Strategy Planning Financial Aspects of Digital and IT Strategy Business Models for Strategy Planning Portfolio Optimization How Do We Get There (Strategic Approaches) Strategic Approaches for Digital Organizations Strategic Approaches for Operational Excellence Strategic Approaches to Evolution Strategic Approaches to Social Responsibility and Sustainability Assignment 2: Strategic Approaches for Digital Organizations Take Action (Managing Strategic Initiatives) How Strategies are Implemented Coordinating Strategy and Strategic Initiatives Leading Digital Transformation Digital Leadership Assignment 3: Strategy Planning and Communication Did We Get There? (Measuring Strategy) Key Facts About Measurement Measuring a Strategy Instrumenting Strategy How Do We Keep the Momentum Going Long-Term Momentum: Ensuring Organizational Viability Short-Term Momentum: Parallel Operation Assignment: Digital Strategy in VUCA Environment Managing Innovation and Emerging Technologies Managing Innovation Formal Approach to Innovation Management Culture that Supports Innovation Approaches to Innovation Evaluating and Adopting Emerging Technology Managing Strategic Risk Risk Management Risk Identification Risk Posture Risk Treatment
Scrum Product Owner Exam Prep: In-House Training This workshop prepares you for the Scrum.org PSPO™ I certification. A voucher for the exam and the access information you will need to take the exam will be provided to you via email after you have completed the course. NOTE: If you have participated in any of IIL's other Scrum workshops, you can bypass this program and focus on reading/studying the Scrum Guide and taking practice exams from Scrum.org The Product Owner is responsible for maximizing the value of the product and the work of the Development Team. The Product Owner must be knowledgeable, available, and empowered to make decisions quickly in order for an Agile project to be successful. The Product Owner's key accountability is the Product Backlog. Managing, maintaining, and evolving the Product Backlog involves: Establishing a clear vision that engages the Development Team and stakeholders Clearly expressing Product Backlog items Ordering the items in the Product Backlog to best achieve the vision and goals Ensuring that the Product Backlog is visible, transparent, and clear to all Working with the Development Team throughout the project to create a product that fits the customer's need What you will Learn You'll learn how to: Successfully prepare for the Scrum.org PSPO I exam Identify the characteristics of a successful Product Owner Create a powerful vision statement Apply techniques to understand your customers and the market Manage and engage stakeholders Write effective user stories with acceptance criteria Utilize techniques to visualize and prioritize the Product Backlog Participate in the 5 Scrum events as the Product Owner Understand the Product Owner's role in closing a Scrum project Getting Started Introductions Workshop orientation Exam prep preview Fundamentals Recap Agile Manifesto, values, and mindset Product Owner characteristics Good vs. great Product Owner Product Ownership Product ownership Project vision Understand your customers and market Personas Stakeholder management and engagement The Product Backlog User Stories and Acceptance Criteria Preparing User Stories for a Sprint The Product Backlog Visualizing the Product Backlog Product Backlog Prioritization Technical Debt Sprint Planning and Daily Standups Sprint Planning Planning Poker Team Engagement Daily Standups Sprint Review, Retrospectives, and Closing Sprint Reviews Key Agile Patterns Retrospectives Closing the Project
Korma Curry – unique Mughlai dish. It has been developed during the Medieval period. Korma was for shahs and other members of royal family.
ITIL® 4 Leader: Digital and IT Strategy: Virtual In-House Training The ITIL® 4 Leader: Digital and IT Strategy (DITS) is one of the two modules in the ITIL® 4 Strategic Leader (SL) certification scheme. The other module in the SL designation is the ITIL® 4 Strategist: Direct, Plan & Improve. Accredited training for the ITIL® 4 Strategic Leader modules is mandatory to enable full understanding of the core material. The ITIL ® 4 Digital and IT Strategy certification focuses on enabling business success through the creation of digital and IT strategies. The IT and Digital Strategy certification adds a new perspective to the ITIL suite and elevates the discussion around ITIL concepts to a strategic level among business leaders and aspiring leaders. The ITIL® 4 Digital and IT Strategy course is based on the ITIL® 4 Digital and IT Strategy exam specification from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, you will acquire relevant knowledge to pass the certification exam. The core learning material in the course is supported by interactive case study, discussions and activities. What You Will Learn The ITIL ® 4 Digital and IT Strategy course covers the content in relation to the following learning outcomes of the exam specification for ITIL ® 4 Digital and IT Strategy: Demonstrate the use of the ITIL guiding principles in Digital and IT Strategy decisions and activities Understand how to leverage digital strategy to react to digital disruption Understand the relationship between the concepts of Digital and IT Strategy, the service value system and the service value chain, and explain how to utilize them to create value Understand how an organization uses Digital and IT Strategy to remain viable in environments disrupted by digital technology Understand strategic approaches made possible by digital and information technology to achieve customer/market relevance and operational excellence Understand the risks and opportunities of Digital and IT Strategy Understand the steps and techniques involved in defining and advocating for a Digital and IT Strategy Understand how to implement a Digital and IT Strategy Key Concepts of Digital and IT Strategy Digital, Information, and Communication Technology Digital Transformation Services, Products, and Competitive Advantage Tiers of Strategy Business Models Operating Models Strategy and the Service Value System Opportunity and Demand Value Governance ITIL® Guiding Principles Continual Improvement ITIL® Practices What is Vision? Disruptions Vision Digital Disruptions Balanced Strategic Focus Positioning Tools for Digital Organizations Assignment 1: Digital Disruption and Digital Positioning Where Are We Now? Environmental Analysis Opportunity Analysis Digital Readiness Assessment How Do We Get There (Strategic Planning) Strategy Planning Financial Aspects of Digital and IT Strategy Business Models for Strategy Planning Portfolio Optimization How Do We Get There (Strategic Approaches) Strategic Approaches for Digital Organizations Strategic Approaches for Operational Excellence Strategic Approaches to Evolution Strategic Approaches to Social Responsibility and Sustainability Assignment 2: Strategic Approaches for Digital Organizations Take Action (Managing Strategic Initiatives) How Strategies are Implemented Coordinating Strategy and Strategic Initiatives Leading Digital Transformation Digital Leadership Assignment 3: Strategy Planning and Communication Did We Get There? (Measuring Strategy) Key Facts About Measurement Measuring a Strategy Instrumenting Strategy How Do We Keep the Momentum Going Long-Term Momentum: Ensuring Organizational Viability Short-Term Momentum: Parallel Operation Assignment: Digital Strategy in VUCA Environment Managing Innovation and Emerging Technologies Managing Innovation Formal Approach to Innovation Management Culture that Supports Innovation Approaches to Innovation Evaluating and Adopting Emerging Technology Managing Strategic Risk Risk Management Risk Identification Risk Posture Risk Treatment
Maximize the value of data assets in the oil and gas sector with EnergyEdge's assessment-based training course on Python programming and analytics.
Game design training face to face training customised and bespoke.
Duration 4 Days 24 CPD hours This course is intended for Students in this course are interested in designing and implementing DevOps processes or in passing the Microsoft Azure DevOps Solutions certification exam. This course provides the knowledge and skills to design and implement DevOps processes and practices. Students will learn how to plan for DevOps, use source control, scale Git for an enterprise, consolidate artifacts, design a dependency management strategy, manage secrets, implement continuous integration, implement a container build strategy, design a release strategy, set up a release management workflow, implement a deployment pattern, and optimize feedback mechanisms Prerequisites Successful learners will have prior knowledge and understanding of: Cloud computing concepts, including an understanding of PaaS, SaaS, and IaaS implementations. Both Azure administration and Azure development with proven expertise in at least one of these areas. Version control, Agile software development, and core software development principles. It would be helpful to have experience in an organization that delivers software. AZ-104T00 - Microsoft Azure Administrator AZ-204T00: Developing Solutions for Microsoft Azure 1 - Introduction to DevOps What is DevOps? Explore the DevOps journey Identify transformation teams Explore shared goals and define timelines 2 - Choose the right project Explore greenfield and brownfield projects Decide when to use greenfield and brownfield projects Decide when to use systems of record versus systems of engagement Identify groups to minimize initial resistance Identify project metrics and key performance indicators (KPIs) 3 - Describe team structures Explore agile development practices Explore principles of agile development Define organization structure for agile practices Explore ideal DevOps team members Enable in-team and cross-team collaboration Select tools and processes for agile practices 4 - Choose the DevOps tools What is Azure DevOps? What is GitHub? Explore an authorization and access strategy Migrate or integrate existing work management tools Migrate or integrate existing test management tools Design a license management strategy 5 - Plan Agile with GitHub Projects and Azure Boards Link GitHub to Azure Boards Configure GitHub Projects Manage work with GitHub Project boards Customize Project views Collaborate using team discussions Agile Plan and Portfolio Management with Azure Boards 6 - Introduction to source control Explore DevOps foundational practices What is source control? Explore benefits of source control Explore best practices for source control 7 - Describe types of source control systems Understand centralized source control Understand distributed source control Explore Git and Team Foundation Version Control Examine and choose Git Understand objections to using Git Describe working with Git locally 8 - Work with Azure Repos and GitHub Migrate from TFVC to Git Use GIT-TFS Develop online with GitHub Codespaces 9 - Structure your Git Repo Explore monorepo versus multiple repos Implement a change log 10 - Manage Git branches and workflows Explore branch workflow types Explore feature branch workflow Explore Git branch model for continuous delivery Explore GitHub flow Explore fork workflow Version Control with Git in Azure Repos 11 - Collaborate with pull requests in Azure Repos Collaborate with pull requests Examine GitHub mobile for pull request approvals 12 - Identify technical debt Examine code quality Examine complexity and quality metrics Measure and manage technical debt Integrate other code quality tools Plan effective code reviews 13 - Explore Git hooks Implement Git hooks 14 - Plan foster inner source Explore foster inner source Implement the fork workflow Describe inner source with forks 15 - Manage Git repositories Work with large repositories Purge repository data Manage releases with GitHub Repos Automate release notes with GitHub 16 - Explore Azure Pipelines Explore the concept of pipelines in DevOps Describe Azure Pipelines Understand Azure Pipelines key terms 17 - Manage Azure Pipeline agents and pools Choose between Microsoft-hosted versus self-hosted agents Explore job types Explore predefined agent pool Understand typical situations for agent pools Communicate with Azure Pipelines Communicate to deploy to target servers Examine other considerations Describe security of agent pools Configure agent pools and understanding pipeline styles 18 - Describe pipelines and concurrency Understand parallel jobs Estimate parallel jobs Describe Azure Pipelines and open-source projects Explore Azure Pipelines and Visual Designer Describe Azure Pipelines and YAML 19 - Explore continuous integration Learn the four pillars of continuous integration Explore benefits of continuous integration Describe build properties Enable Continuous Integration with Azure Pipelines 20 - Implement a pipeline strategy Configure agent demands Implement multi-agent builds Explore source control types supported by Azure Pipelines 21 - Integrate with Azure Pipelines Describe the anatomy of a pipeline Understand the pipeline structure Detail templates Explore YAML resources Use multiple repositories in your pipeline 22 - Introduction to GitHub Actions What are Actions? Explore Actions flow Understand workflows Describe standard workflow syntax elements Explore events Explore jobs Explore runners Examine release and test an action 23 - Learn continuous integration with GitHub Actions Describe continuous integration with actions Examine environment variables Share artifacts between jobs Examine Workflow badges Describe best practices for creating actions Mark releases with Git tags Create encrypted secrets Use secrets in a workflow Implement GitHub Actions for CI/CD 24 - Design a container build strategy Examine structure of containers Work with Docker containers Understand Dockerfile core concepts Examine multi-stage dockerfiles Examine considerations for multiple stage builds Explore Azure container-related services Deploy Docker containers to Azure App Service web apps 25 - Introduction to continuous delivery Explore traditional IT development cycle What is continuous delivery? Move to continuous delivery Understand releases and deployments Understand release process versus release 26 - Create a release pipeline Describe Azure DevOps release pipeline capabilities Explore release pipelines Explore artifact sources Choose the appropriate artifact source Examine considerations for deployment to stages Explore build and release tasks Explore custom build and release tasks Explore release jobs Configure Pipelines as Code with YAML 27 - Explore release recommendations Understand the delivery cadence and three types of triggers Explore release approvals Explore release gates Use release gates to protect quality Control Deployments using Release Gates 28 - Provision and test environments Provision and configure target environments Configure automated integration and functional test automation Understand Shift-left Set up and run availability tests Explore Azure Load Testing Set up and run functional tests 29 - Manage and modularize tasks and templates Examine task groups Explore variables in release pipelines Understand variable groups 30 - Automate inspection of health Automate inspection of health Explore events and notifications Explore service hooks Configure Azure DevOps notifications Configure GitHub notifications Explore how to measure quality of your release process Examine release notes and documentation Examine considerations for choosing release management tools Explore common release management tools 31 - Introduction to deployment patterns Explore microservices architecture Examine classical deployment patterns Understand modern deployment patterns 32 - Implement blue-green deployment and feature toggles What is blue-green deployment? Explore deployment slots Describe feature toggle maintenance 33 - Implement canary releases and dark launching Explore canary releases Examine Traffic Manager Understand dark launching 34 - Implement A/B testing and progressive exposure deployment What is A/B testing? Explore CI-CD with deployment rings 35 - Integrate with identity management systems Integrate GitHub with single sign-on (SSO) Explore service principals Explore Managed Identity 36 - Manage application configuration data Rethink application configuration data Explore separation of concerns Understand external configuration store patterns Examine Key-value pairs Examine App configuration feature management Integrate Azure Key Vault with Azure Pipelines Manage secrets, tokens and certificates Examine DevOps inner and outer loop Integrate Azure Key Vault with Azure DevOps Enable Dynamic Configuration and Feature Flags 37 - Explore infrastructure as code and configuration management Explore environment deployment Examine environment configuration Understand imperative versus declarative configuration Understand idempotent configuration 38 - Create Azure resources using Azure Resource Manager templates Why use Azure Resource Manager templates? Explore template components Manage dependencies Modularize templates Manage secrets in templates Deployments using Azure Bicep templates 39 - Create Azure resources by using Azure CLI What is Azure CLI? Work with Azure CLI 40 - Explore Azure Automation with DevOps Create automation accounts What is a runbook? Understand automation shared resources Explore runbook gallery Examine webhooks Explore source control integration Explore PowerShell workflows Create a workflow Examine checkpoint and parallel processing 41 - Implement Desired State Configuration (DSC) Understand configuration drift Explore Desired State Configuration (DSC) Explore Azure Automation State configuration (DSC) Examine DSC configuration file Explore hybrid management Implement DSC and Linux Automation on Azure 42 - Implement Bicep What is Bicep? Install Bicep Understand Bicep file structure and syntax 43 - Introduction to Secure DevOps Describe SQL injection attack Understand DevSecOps Explore Secure DevOps Pipeline Explore key validation points Explore continuous security validation Understand threat modeling 44 - Implement open-source software Explore how software is built What is open-source software Explore corporate concerns with open-source software components Explore common open-source licenses Examine license implications and ratings 45 - Software Composition Analysis Inspect and validate code bases for compliance Explore software composition analysis (SCA) Integrate Mend with Azure Pipelines Implement GitHub Dependabot alerts and security updates Integrate software composition analysis checks into pipelines Examine tools for assess package security and license rate Interpret alerts from scanner tools Implement security and compliance in an Azure Pipeline 46 - Static analyzers Explore SonarCloud Explore CodeQL in GitHub Manage technical debt with SonarCloud and Azure DevOps 47 - OWASP and Dynamic Analyzers Plan Implement OWASP Secure Coding Practices Explore OWASP ZAP penetration test Explore OWASP ZAP results and bugs 48 - Security Monitoring and Governance Implement pipeline security Explore Microsoft Defender for Cloud Examine Microsoft Defender for Cloud usage scenarios Explore Azure Policy Understand policies Explore initiatives Explore resource locks Explore Azure Blueprints Understand Microsoft Defender for Identity 49 - Explore package dependencies What is dependency management? Describe elements of a dependency management strategy Identify dependencies Understand source and package componentization Decompose your system Scan your codebase for dependencies 50 - Understand package management Explore packages Understand package feeds Explore package feed managers Explore common public package sources Explore self-hosted and SaaS based package sources Consume packages Publish packages Package management with Azure Artifacts 51 - Migrate consolidating and secure artifacts Identify existing artifact repositories Migrate and integrating artifact repositories Secure access to package feeds Examine roles Examine permissions Examine authentication 52 - Implement a versioning strategy Understand versioning of artifacts Explore semantic versioning Examine release views Promote packages Explore best practices for versioning 53 - Introduction to GitHub Packages Publish packages Install a package Delete and restore a package Explore package access control and visibility 54 - Implement tools to track usage and flow Understand the inner loop Explore Azure Monitor and Log Analytics Examine Kusto Query Language (KQL) Explore Application Insights Implement Application Insights Monitor application performance with Application Insights 55 - Develop monitor and status dashboards Explore Azure Dashboards Examine view designer in Azure Monitor Explore Azure Monitor workbooks Explore Power BI Build your own custom application 56 - Share knowledge within teams Share acquired knowledge within development teams Integrate with Azure Boards Share team knowledge using Azure Project Wiki 57 - Design processes to automate application analytics Explore rapid responses and augmented search Integrate telemetry Examine monitoring tools and technologies 58 - Manage alerts, blameless retrospectives and a just culture Examine when get a notification Explore how to fix it Explore smart detection notifications Improve performance Understand server response time degradation Reduce meaningless and non-actionable alerts Examine blameless retrospective Develop a just culture
WANs training course description A concise overview course covering Wide Area Networks with particular emphasis on the WAN options available including the use of the Internet. What will you learn Choose and evaluate WAN technologies. Recognise the role of service providers. Describe the benefits of VPNs. Describe how the Internet can be used as a WAN. Describe the equipment needed to connect LANS to WANS. List the speeds of various WAN technologies. WANs training course details Who will benefit: Anyone, although the course is particularly aimed at non-technical personnel needing some knowledge of WANS. Prerequisites: Network fundamentals Duration 1 day WANs training course contents WANS WAN architecture, Common WAN terms, Core vs access, service providers, relationship with 7 layer model, WAN equipment, how to choose a WAN. Layer 1 Copper, phone lines, fibre, coaxial, satellite, wireless. Cabling to the building, CPE cabling, interfaces. Layer 2 Dial up vs. Dedicated vs. packet switched networks and when to use them. Packet switching vs. circuit switching. Point to point and point to multipoint. Dialup access technologies Modems, ISDN, BRI, PRI. Access with dedicated lines XDSL, leased lines. WAN services X.25, SMDS, Frame Relay, CIR, ATM, Internet, MANS, dark fibre and other services. Case study: Selecting WAN technologies. Service provider technologies MPLS, SDH, WDM, DWDM. Routers Network addressing, default gateways, routing tables, routing protocols. Internet architecture Service providers, ISPs, private peering, public peering, core WANs in the Internet. VPNs Private networks, public networks, What are VPNs?, benefits of VPNs, tunnelling, encryption, IPSec. Case study: Specifying WAN connectivity.
RQF level 1 Awareness of Safeguarding The RQF Level 1 Awareness of Safeguarding course is designed to provide individuals with a basic understanding of safeguarding principles and practices. It aims to raise awareness about the importance of safeguarding and promote the well-being and protection of vulnerable individuals, such as children, young people, and adults at risk. The course covers the following topics: Introduction to Safeguarding: Definition and importance of safeguarding. Key legislation, policies, and guidance related to safeguarding. Roles and responsibilities of individuals and organizations in safeguarding. Types of Abuse and Neglect: Overview of different types of abuse, including physical, emotional, sexual, and financial abuse. Recognizing signs and indicators of abuse and neglect. Understanding the impact of abuse on individuals' well-being. Vulnerable Groups: Identifying vulnerable groups, such as children, young people, older adults, and individuals with disabilities or mental health issues. Understanding the specific safeguarding concerns and considerations for each group. Reporting and Responding to Safeguarding Concerns: Procedures for reporting safeguarding concerns or disclosures. Understanding the importance of maintaining confidentiality and handling sensitive information appropriately. Responding to safeguarding concerns in a timely and appropriate manner. Promoting Safeguarding and Preventing Abuse: Strategies for promoting a safe and inclusive environment. Recognizing potential risk factors and implementing preventative measures. Understanding the importance of creating a culture of safeguarding within organizations. Multi-Agency Collaboration: Collaboration between different agencies and organizations involved in safeguarding, such as social services, law enforcement, and healthcare. Sharing information and working together to ensure effective safeguarding practices. Case Studies and Scenarios: Reviewing case studies and scenarios to apply safeguarding principles and practices. Analysing potential safeguarding dilemmas and decision-making processes. Personal Responsibilities: Recognizing personal boundaries and limitations when working with vulnerable individuals. Understanding the importance of self-care and managing emotional well-being when dealing with safeguarding issues. It is important to ensure that the course meets local safeguarding guidelines and requirements. Suitability - Who should attend? The RQF Level 1 Awareness of Safeguarding course is suitable for a wide range of individuals who may come into contact with vulnerable individuals or have a general interest in understanding safeguarding principles. Here are some key groups of people who should attend the course: Employees and Staff: The course is relevant for employees and staff members across various sectors and industries, including but not limited to education, healthcare, social services, hospitality, sports and recreation, and community organizations. It helps them develop a basic understanding of safeguarding principles and their responsibilities in ensuring the well-being and protection of vulnerable individuals they may encounter in their work. Volunteers: Individuals who volunteer their time and services in organizations that work with vulnerable individuals should attend the course. It equips them with essential knowledge and awareness of safeguarding issues, helping them provide appropriate support and maintain the safety and dignity of those they interact with. Parents and Caregivers: The course can benefit parents, guardians, and caregivers by providing them with a foundation in safeguarding principles. It helps them recognize potential risks and signs of abuse or neglect, enabling them to create safer environments for the children or vulnerable individuals under their care. Community and Youth Workers: Individuals involved in community work, youth organizations, or youth clubs should attend the course to enhance their understanding of safeguarding. It enables them to promote the well-being and safety of young people and recognize signs of potential abuse or exploitation. Volunteers or Trustees of Charitable Organizations: Individuals serving as volunteers or trustees in charitable organizations that work with vulnerable populations can benefit from the course. It helps them fulfill their responsibilities in safeguarding the individuals the organization serves and ensures they are aware of their legal and ethical obligations. General Public: The course is open to the general public as it provides valuable knowledge and awareness of safeguarding principles. It can benefit individuals who have an interest in understanding the rights and protection of vulnerable individuals in society. It's important to note that the RQF Level 1 Awareness of Safeguarding course provides foundational knowledge and awareness. For individuals who require more in-depth training or who have specific safeguarding roles or responsibilities, higher-level courses may be more suitable. Outcome / Qualification etc. Certification The qualification does not have an expiry date but refresher training and keeping up to date with changes to policies, procedures and new legislation through ongoing CPD is vital. Training Course Content Module 1 Introductions Module 2 Safeguarding legislation and guidance Module 3 Roles and responsibilities Module 4 Abuse and neglect Module 5 Identifying concerns and disclosure Module 6 Making judgements Module 7 Reporting concerns Module 8 Course closure and assessment MODULE 1 INTRODUCTIONS Session content Trainer/Assessor introduction Learner introductions Course syllabus Learning outcomes and assessment criteria Session duration 20 minutes MODULE 2 SAFEGUARDING LEGISLATION AND GUIDANCE Session content Introduction to safeguarding Definitions Assessment framework Safeguarding statistics Safeguarding legislation and guidance Rights of a child/adult at risk Session duration 40 minutes MODULE 3 ROLES AND RESPONSIBILITIES Session content Safeguarding partnerships Local authority safeguarding officer Social care services Multi-agency safeguarding hubs Organisational safeguarding policies Safeguarding lead Session duration 30 minutes MODULE 4 ABUSE AND NEGLECT Session content Definitions Types of abuse and neglect Physical abuse Emotional abuse Sexual abuse Neglect Signs and indicators Parent/carer abuse Radicalisation FGM Forced marriage Modern slavery County line gangs Electronic media abuse - Internet and social networking dangers Session duration 50 minutes MODULE 5 IDENTIFYING CONCERNS AND DISCLOSURE Session content Identifying concerns Being a point of disclosure Recording disclosure information Session duration 20 minutes MODULE 6 MAKING JUDGEMENTS Session content Child development needs Identifying a safeguarding concern Group activity making judgements Session duration 30 minutes MODULE 7 REPORTING CONCERNS Session content Silencing factors Barriers to raising concerns Reporting concerns Importance of sharing concerns Session duration 20 minutes MODULE 8 COURSE CLOSURE AND ASSESSMENT Session content Course summary Assessment paper Course evaluation Course closure Session duration 30 minutes Course delivery details Qualification delivery The qualification has 4 assigned guided learning hours (GLH) and 5 hours total qualification time (TQT). GLH indicates the number of classroom contact hours that the learner will undertake. TQT includes GLH but also takes into account any unsupervised learning and is an estimate of how long the average learner will take to complete the qualification. The minimum classroom contact time of 4 hours should be delivered over a minimum of half a day. The course can be spread over a maximum of 2 weeks, ensuring that each session is a minimum of two hours. The class ratio for this qualification is a maximum of 16 learners to 1 Trainer/Assessor Why choose Madeleys First Aid Plus Founded in 2021 after Louise left 30 years in the NHS as an Advanced practitioner in A&E/ITU, had spent 1.5 years in Covid ITU Won FSB Best start-up business in the West Midlands in May 2023 Now trained 100's of delegates in Physical and Mental Health First Aid Expenses Travel costs and lunch required, there are many cafes and sandwich bars here in Much Wenlock to buy your lunch, you may eat it in the training room. All training material, books, qualification certificates are included in the price Continuing Studies The RQF Level 1 Awareness of Safeguarding course serves as an introductory course that provides individuals with a basic understanding of safeguarding principles. While it is a standalone qualification, individuals who complete the course may choose to progress further in their safeguarding training and education. Here are some potential progression options: RQF Level 2 Award in Safeguarding: This qualification builds upon the knowledge gained in the Level 1 course and provides a more comprehensive understanding of safeguarding principles, policies, and procedures. It covers topics such as risk assessment, responding to safeguarding concerns, and effective communication in safeguarding contexts. Specialized Safeguarding Courses: Individuals who wish to focus on specific areas of safeguarding can pursue specialized courses related to their field of interest. These courses may include Child Protection, Adult Safeguarding, Domestic Abuse Awareness, Online Safety, or Safeguarding in Healthcare. Specialized courses delve deeper into the specific risks, regulations, and best practices associated with safeguarding vulnerable individuals in those particular contexts. Safeguarding Training for Specific Professions: Many professions have specific safeguarding training requirements tailored to their sector. For example, teachers may need to complete safeguarding training specific to the education setting, healthcare professionals may have training focused on safeguarding vulnerable patients, and social workers may have specialized safeguarding training in line with their role. Progression may involve undertaking profession-specific safeguarding courses or qualifications. Safeguarding Leadership and Management Training: Individuals in supervisory or managerial positions may consider pursuing training that focuses on the leadership and management aspects of safeguarding. This can include courses on developing and implementing safeguarding policies and procedures, managing safeguarding incidents, conducting internal investigations, and providing guidance and support to staff. Continued Professional Development (CPD): Engaging in ongoing CPD activities is essential for staying updated with the latest developments in safeguarding practices and policies. Individuals can attend conferences, workshops, or seminars related to safeguarding, child protection, or specific areas of interest within the field. This allows for continued learning and networking with other professionals. Higher Education: Individuals who wish to pursue a more in-depth study of safeguarding can consider higher education programs in social work, psychology, criminology, or related fields. These programs provide comprehensive knowledge and training in safeguarding practices, policies, and research. They may lead to professional certifications or degrees that enhance career opportunities in safeguarding roles. It's important for individuals to research and explore progression options that align with their specific career goals, interests, and local requirements. Different countries or regions may have varying certification or training requirements for safeguarding roles, so it's advisable to check with relevant regulatory bodies or professional associations for specific guidance.
Duration 2 Days 12 CPD hours This course is intended for The audience for this course is anyone who wants to acquire foundation level knowledge on data centre infrastructure. This course is ideally suited for data centre new hires, internal data centre support staff, IT support staff who work in the data centre, helpdesk staff, vendors/suppliers who install/maintain data centre equipment, building maintenance staff including data centre cleaners and other supporting functions, and fresh graduates. This course is also well suited for individuals working in data centre business support functions such as sales/pre-sales, HR, Finance and business administration. Overview The DCFC course will prepare participants for entry into the exciting and high-growth data centre industry. It will ensure that participants acquire the required basic knowledge to take on a wide variety of jobs in the data centre industry. It will also provide the required knowledge and skill to further their training into specialised areas on data centre design/build, operations/governance or standards/compliance. The Data Centre Foundation Certificate (DCFC©) is a 2-day course designed to deliver foundation knowledge about data centre facilities infrastructure. It provides participants with global overview and knowledge on data centres which will be of advantage to the participants who are looking at joining the ranks of professionals working in the data centre, ICT, infrastructure or the mechanical and electrical (M&E) design industries. It will also form a solid foundation for participants who wish to pursue his/her studies either academically or to further his/her industry specialisation with professional certification courses on data centre design/build, operations/governance and/or standards/compliance. With the tremendous growth of data and the data centres to support it, the demand for data centre professionals will grow in tandem. Introduction to Data Centres History of data centres Definition of different type data centres Data Centre Standards List of standards Rating definitions Data Centre Facilities Areas Listing of all areas and their functions Topology Designs Definition of Ratings Components of the Power Infrastructure Utility power Transformers Generators Fuel systems ATS UPS systems Batteries Electric panels Cabling/busbar systems Power rails/strips Lights Lights Emergency lights Cooling Infrastructure Chillers DX Systems Evaporators CRAC/CRAU/HVAC Raised floor Non-raised floor Containment ICT/Network Infrastructure Equipment racks Network cabling (fibre, copper) Cable trays and pathways TIA-606 labelling Data Centre Security Perimeter security Physical protection CCTV Access control Security management Fire Suppression Detection systems Suppression systems Prevention systems Fire extinguishers Fire Safety Monitoring and reporting DCIM EMS/BMS