• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

17288 Other courses in Rothwell delivered Online

Special Educational Needs Coordinator (SENCO)

4.7(160)

By Janets

A Special Educational Needs Coordinator or known as SENCO, is a teacher who is responsible for the day-to-day operation of the school's special educational needs. All mainstream schools are obliged to appoint a teacher to be their SENCO who will coordinate additional support for pupils with learning disabilities and liaise with their parents, teachers and other professionals who are involved with them. The SENCO Training - Special Educational Needs Coordinator is a wonderful learning opportunity for anyone who has a passion for this topic and is interested in enjoying a long career in the relevant industry. It's also for anyone who is already working in this field and looking to brush up their knowledge and boost their career with a recognised certification. You'll learn different techniques to help special students and be efficient in developing relationships with pupils and parents. This SENCO course covers a wide range of topics from the responsibilities within whole school coordination to developing inclusive strategies. The course is offered online at a very affordable price. That gives you the ability to study at your own pace in the comfort of your home. You can access the modules from anywhere and from any device. Learning Outcomes Learn about the SENCO role in policy and practice Get familiar with supporting teaching and learning You'll also learn supporting colleagues and working with professionals and organisations beyond school Know the fundamentals of developing relationships with pupils and parents You'll also learn about SENCO's Role in Leading and Managing SEND Administration Develop your inclusive practice and the future SENCO role Why Choose this Course? Earn a digital Certificate upon successful completion. Accessible, informative modules taught by expert instructors Study in your own time, at your own pace, through your computer tablet or mobile device Benefit from instant feedback through mock exams and multiple-choice assessments Get 24/7 help or advice from our email and live chat teams Full tutor support on weekdays Course Design This SENCO Training Course is delivered through our online learning platform, accessible through any internet-connected device. No formal deadlines or teaching schedules are included, that aids a flexible study plan.  We broke down the course into several manageable modules which we believe will assist you to grasp each concept more efficiently - from the fundamentals to the most advanced aspects of the course. The experts will teach you through a combination of: Online study materials Mock exams Multiple-choice assessment Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. A print copy by post is also available at an additional cost of £9.99 and a PDF Certificate at £4.99. Why study this course You will learn everything in depth that is needed regarding SENCO roles and responsibilities. This is an excellent opportunity for anyone from any academic backgrounds to learn more and advance their learning, launch a new career or reinvigorate an existing one. Who is this course for This is one of the best SENCO training online courses and suitable for anyone who wants to gain extensive knowledge, potential experience, and professional skills in the related field. Industry experts designed this course, so you don't have to worry about the quality. Requirements This course is open to all, with no formal entry requirements. All you need is a passion for learning, a good understanding of the English language, numeracy and IT, and to be over the age of 16. Career Path Special educational needs coordinator training offers so many things that could potentially benefit a range of roles, but would particularly enhance careers in- SENCO Special Teaching Other related professional roles

Special Educational Needs Coordinator (SENCO)
Delivered Online On Demand3 hours 22 minutes
£9.99

SENCO - Special Educational Needs Coordination

4.7(160)

By Janets

A Special Educational Needs Coordinator or known as SENCO, is a teacher who is responsible for the day-to-day operation of the school's special educational needs. All mainstream schools are obliged to appoint a teacher to be their SENCO who will coordinate additional support for pupils with learning disabilities and liaise with their parents, teachers and other professionals who are involved with them. The SENCO Training - Special Educational Needs Coordination is a wonderful learning opportunity for anyone who has a passion for this topic and is interested in enjoying a long career in the relevant industry. It's also for anyone who is already working in this field and looking to brush up their knowledge and boost their career with a recognised certification. You'll learn different techniques to help special students and be efficient in developing relationships with pupils and parents. This SENCO course covers a wide range of topics from the responsibilities within whole school coordination to developing inclusive strategies. The course is offered online at a very affordable price. That gives you the ability to study at your own pace in the comfort of your home. You can access the modules from anywhere and from any device. Learning Outcomes Learn about the SENCO role in policy and practice Get familiar with supporting teaching and learning You'll also learn supporting colleagues and working with professionals and organisations beyond school Know the fundamentals of developing relationships with pupils and parents You'll also learn about SENCO's Role in Leading and Managing SEND Administration Develop your inclusive practice and the future SENCO role Why Choose this Course? Earn a digital Certificate upon successful completion. Accessible, informative modules taught by expert instructors Study in your own time, at your own pace, through your computer tablet or mobile device Benefit from instant feedback through mock exams and multiple-choice assessments Get 24/7 help or advice from our email and live chat teams Full tutor support on weekdays Course Design This SENCO Training Course is delivered through our online learning platform, accessible through any internet-connected device. No formal deadlines or teaching schedules are included, that aids a flexible study plan.  We broke down the course into several manageable modules which we believe will assist you to grasp each concept more efficiently - from the fundamentals to the most advanced aspects of the course. The experts will teach you through a combination of: Online study materials Mock exams Multiple-choice assessment Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate. A print copy by post is also available at an additional cost of £9.99 and a PDF Certificate at £4.99. Why study this course You will learn everything in depth that is needed regarding SENCO roles and responsibilities. This is an excellent opportunity for anyone from any academic backgrounds to learn more and advance their learning, launch a new career or reinvigorate an existing one. Who is this course for This is one of the best SENCO training online courses and suitable for anyone who wants to gain extensive knowledge, potential experience, and professional skills in the related field. Industry experts designed this course, so you don't have to worry about the quality. Requirements This course is open to all, with no formal entry requirements. All you need is a passion for learning, a good understanding of the English language, numeracy and IT, and to be over the age of 16. Career Path Special educational needs coordinator training offers so many things that could potentially benefit a range of roles, but would particularly enhance careers in- SENCO Special Teaching Other related professional roles

SENCO - Special Educational Needs Coordination
Delivered Online On Demand3 hours 22 minutes
£9.99

Supervision of supervision - online bi-monthly reflective group

5.0(2)

By Supervision Institute

bi-monthly online group for supervisors of counsellors, psychotherapists or coaches who want a reflective space to discuss your supervision practice with other supervisors

Supervision of supervision - online bi-monthly reflective group
Delivered OnlineFlexible Dates
Price on Enquiry

Workshop: Academic Language & Skills Module 4

By Scotland Study Centre (SSC)

Advanced Level workshop that introduces you to the basic Techniques of Academic English that will help you to: i)  Read and Write Academic tests more effectively, and ii)  give effective Academic Presentations. 

Workshop: Academic Language & Skills Module 4
Delivered OnlineFlexible Dates
£95

Workshop: Academic Language & Skills Module 3

By Scotland Study Centre (SSC)

Advanced Level workshop that introduces you to the basic Techniques of Academic English that will help you to: i)  Read and Write Academic tests more effectively, and ii)  give effective Academic Presentations. 

Workshop: Academic Language & Skills Module 3
Delivered OnlineFlexible Dates
£95

Workshop: Academic Language & Skills Module 2

By Scotland Study Centre (SSC)

Advanced Level workshop that introduces you to the basic Techniques of Academic English that will help you to: i)  Read and Write Academic tests more effectively, and ii)  give effective Academic Presentations. 

Workshop: Academic Language & Skills Module 2
Delivered OnlineFlexible Dates
£95

Workshop: Academic Language & Skills Module 1

By Scotland Study Centre (SSC)

Advanced Level workshop that introduces you to the basic Techniques of Academic English that will help you to: i)  Read and Write Academic tests more effectively, and ii)  give effective Academic Presentations. 

Workshop: Academic Language & Skills Module 1
Delivered OnlineFlexible Dates
£95

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

AZ-204T00 Developing Solutions for Microsoft Azure

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Students in this course are interested in Azure development or in passing the Microsoft Azure Developer Associate certification exam. This course teaches developers how to create end-to-end solutions in Microsoft Azure. Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services, and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions. Prerequisites To be successful in this course, learners should have the following: Hands-on experience with Azure IaaS and PaaS solutions, and the Azure Portal. Experience writing in an Azure supported language at the intermediate level. (C#, JavaScript, Python, or Java) Ability to write code to connect and perform operations on, a SQL or NoSQL database product. (SQL Server, Oracle, MongoDB, Cassandra or similar) Experience writing code to handle authentication, authorization, and other security principles at the intermediate level. A general understanding of HTML, the HTTP protocol and REST API interfaces. 1 - Explore Azure App Service Examine Azure App Service Examine Azure App Service plans Deploy to App Service Explore authentication and authorization in App Service Discover App Service networking features 2 - Configure web app settings Configure application settings Configure general settings Configure path mappings Enable diagnostic logging Configure security certificates 3 - Scale apps in Azure App Service Examine autoscale factors Identify autoscale factors Enable autoscale in App Service Explore autoscale best practices 4 - Explore Azure App Service deployment slots Explore staging environments Examine slot swapping Swap deployment slots Route traffic in App Service 5 - Explore Azure Functions Discover Azure Functions Compare Azure Functions hosting options Scale Azure Functions 6 - Develop Azure Functions Explore Azure Functions development Create triggers and bindings Connect functions to Azure services 7 - Explore Azure Blob storage Explore Azure Blob storage Discover Azure Blob storage resource types Explore Azure Storage security features Discover static website hosting in Azure Storage 8 - Manage the Azure Blob storage lifecycle Explore the Azure Blob storage lifecycle Discover Blob storage lifecycle policies Implement Blob storage lifecycle policies Rehydrate blob data from the archive tier 9 - Work with Azure Blob storage Explore Azure Blob storage client library Create a client object Manage container properties and metadata by using .NET Set and retrieve properties and metadata for blob resources by using REST 10 - Explore Azure Cosmos DB Identify key benefits of Azure Cosmos DB Explore the resource hierarchy Explore consistency levels Choose the right consistency level Explore supported APIs Discover request units 11 - Work with Azure Cosmos DB Explore Microsoft .NET SDK v3 for Azure Cosmos DB Create stored procedures Create triggers and user-defined functions Explore change feed in Azure Cosmos DB 12 - Manage container images in Azure Container Registry Discover the Azure Container Registry Explore storage capabilities Build and manage containers with tasks Explore elements of a Dockerfile 13 - Run container images in Azure Container Instances Explore Azure Container Instances Run containerized tasks with restart policies Set environment variables in container instances Mount an Azure file share in Azure Container Instances 14 - Implement Azure Container Apps Explore Azure Container Apps Explore containers in Azure Container Apps Implement authentication and authorization in Azure Container Apps Manage revisions and secrets in Azure Container Apps Explore Dapr integration with Azure Container Apps 15 - Explore the Microsoft identity platform Explore the Microsoft identity platform Explore service principals Discover permissions and consent Discover conditional access 16 - Implement authentication by using the Microsoft Authentication Library Explore the Microsoft Authentication Library Initialize client applications 17 - Implement shared access signatures Discover shared access signatures Choose when to use shared access signatures Explore stored access policies 18 - Explore Microsoft Graph Discover Microsoft Graph Query Microsoft Graph by using REST Query Microsoft Graph by using SDKs Apply best practices to Microsoft Graph 19 - Implement Azure Key Vault Explore Azure Key Vault Discover Azure Key Vault best practices Authenticate to Azure Key Vault 20 - Implement managed identities Explore managed identities Discover the managed identities authentication flow Configure managed identities Acquire an access token 21 - Implement Azure App Configuration Explore the Azure App Configuration service Create paired keys and values Manage application features Secure app configuration data 22 - Explore API Management Discover the API Management service Explore API gateways Explore API Management policies Create advanced policies Secure APIs by using subscriptions Secure APIs by using certificates 23 - Explore Azure Event Grid Explore Azure Event Grid Discover event schemas Explore event delivery durability Control access to events Receive events by using webhooks Filter events 24 - Explore Azure Event Hubs Discover Azure Event Hubs Explore Event Hubs Capture Scale your processing application Control access to events Perform common operations with the Event Hubs client library 25 - Discover Azure message queues Choose a message queue solution Explore Azure Service Bus Discover Service Bus queues, topics, and subscriptions Explore Service Bus message payloads and serialization Explore Azure Queue Storage Create and manage Azure Queue Storage and messages by using .NET 26 - Monitor app performance Explore Application Insights Discover log-based metrics Instrument an app for monitoring Select an availability test Troubleshoot app performance by using Application Map 27 - Develop for Azure Cache for Redis Explore Azure Cache for Redis Configure Azure Cache for Redis Interact with Azure Cache for Redis by using .NET 28 - Develop for storage on CDNs Explore Azure Content Delivery Networks Control cache behavior on Azure Content Delivery Networks Interact with Azure Content Delivery Networks by using .NET

AZ-204T00 Developing Solutions for Microsoft Azure
Delivered OnlineFlexible Dates
£2,975

Kick Start Your Career with CompTIA's Data Analysis Certification - Live Classes

5.0(1)

By Media Tek Training Solutions Ltd

Get job ready with CompTIA's Data Analysis Certification. Live Classes - Career Guidance - Exam Included.

Kick Start Your Career with CompTIA's Data Analysis Certification - Live Classes
Delivered OnlineFlexible Dates
£1,595