• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

20716 Other courses

Healthy Eating & Diet Planning - Nutrition Online Training Course

By Study Plex

What you will learn from this course? Gain comprehensive knowledge about weight loss and fitness Understand the core competencies and principles of weight loss and fitness Explore the various areas of weight loss and fitness Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert weight loss coach or fitness coach Course Highlights Course Type: Self-paced online course Duration: 3 hours 18 minutes Tutor Support: Full tutor support is included Customer Support: 24/7 customer support is available Healthy Eating & Diet Planning - Nutrition Online Training Course Master the skills you need to propel your career forward in weight loss and fitness. This course will equip you with the essential knowledge and skillset that will make you a confident weight loss coach or fitness coach and take your career to the next level. This comprehensive healthy eating & diet planning - nutrition course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this healthy eating & diet planning - nutrition course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This comprehensive course will teach you the theory of effective weight loss and fitness practice and equip you with the essential skills, confidence and competence to assist you in the weight loss and fitness industry. You'll gain a solid understanding of the core competencies required to drive a successful career in weight loss and fitness. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for weight loss coach or fitness coach or for people who are aspiring to specialise in weight loss and fitness. Enrol in this healthy eating & diet planning - nutrition course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive healthy eating & diet planning - nutrition course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this weight loss and fitness can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This healthy eating & diet planning - nutrition course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This healthy eating & diet planning - nutrition course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This healthy eating & diet planning - nutrition course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Study Plex Subscription Study plex also provides a subscription option that allows you unlimited access to more than 700+ CPD courses for learning. You only need to spend £79 to take advantage of this fantastic offer, and you'll get an unlimited subscription for a full year. Additionally, you can cancel your membership from your account at any time by getting in touch with our friendly and devoted customer care team. Visit our subscriptions page for more details if you're interested. Why you should train with Study Plex? At Study Plex, you will have the chance to build social, technical and personal skills through a combination of extensive subjects tailored according to your interest. Along with receiving comprehensive knowledge and transferable skills, there are even more reasons o be involved with us, which include: Incredible Customer Support: We offer active customer service in the form of live chat, which you can access 24/7 Expert Tutor Support: You'll have access to our devoted and dedicated tutor support with all of our courses whenever you need it. Price Justified by Quality: We ensure that you will have the best experience possible for the price you are paying for the course. Money-back Guarantee: We provide a money-back guarantee if you are not satisfied with the course's quality. There is a 14-day time limit on this option (according to the terms and conditions). Instalment Facility: If your course costs more than £50, you can pay in three instalments using the instalment option. Satisfaction Guarantee: Our courses are designed to meet your demands and expectations by all means. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Introduction Introduction & What you will learn in the course 00:03:00 who this course is for 00:01:00 What Is Nutrition? 00:01:00 The 5 principles of healthy Eating 00:04:00 The True Dieting Pyramid 00:04:00 Calorie Balance Calories Explained 00:03:00 Bodyweight And Health 00:05:00 Calories & Bodyweight In A Healthy Diet 00:01:00 The Twinkie Diet - An Extreme Example 00:01:00 Weight Loss And Health 00:02:00 How Many Calories Should You Consume Per Day? 00:02:00 Healthy Weight Ranges Explained 00:01:00 How To Lose Weight Part 1 00:03:00 How To Lose Weight Part 2 00:02:00 How To Take Diet Breaks Correctly 00:05:00 How To Properly Track Your Calories 00:05:00 How To Lose Weight Without Tracking Calories 00:04:00 Food Composition Food Composition Explained 00:02:00 Protein Composition 00:02:00 Carbohydrates Composition 00:03:00 Fat Composition 00:01:00 Recommendations Food Composition 00:03:00 Macronutrients Macronutrients Explained 00:01:00 The Relationship Between Protein And Health 00:02:00 Complete & Incomple Protein 00:01:00 Protein Needs For General Health 00:02:00 Fat Needs For General Health 00:03:00 Carbohydrate Needs For General Health 00:01:00 Macronutrients Recommendations 00:03:00 Nutrient Timing Nutrient Timing Explained 00:02:00 Nutrient Timing Pros & Cons 00:03:00 Nutrient Timing Recommendations 00:02:00 Supplements Supplements Explained 00:03:00 Why Multivitamins Aren't A Good Idea 00:02:00 The Best Supplements To Boost Immunity 00:04:00 The Best Supplements For Vegans & Vegetarians 00:02:00 The Best Supplements For Joint & Bone Health 00:02:00 The Best Supplements For Fat Loss 00:04:00 The Best Supplements For Improved Sleep 00:02:00 The Best Supplements For More Focus & Concentration 00:02:00 How To Boost Testoterone 00:06:00 Supplements Recommendations 00:01:00 Common Diet Trends Explained The Fundamentals Of Healthy Eating 00:02:00 Making Small Changes Towards A Healthier Diet 00:03:00 How To Read A Nutrition Label 00:03:00 Healthy Eating Fundamentals Health Myths Overview 00:01:00 Dieting Myth #1: Carbs Are Bad For You 00:01:00 Dieting Myth #2: Fat Is Bad For You 00:01:00 Dieting Myth #3: Protein Is Bad For You 00:03:00 Dieting Myth #4: Eating Eggs Raises Cholesterol 00:01:00 Dieting Myth # 5: Avoid Salt At All Cost 00:01:00 Dieting Myth #6: Eat Several Small Meals To Boost Metabolism 00:01:00 Dieting Myth #7: Diet Foods Lead To Fat Loss 00:01:00 Dieting Myth #8: Red Meat Causes Cancer 00:02:00 How To Do Your Own Research 00:04:00 Health Myths, Diet Fads & More Common Diets Introduction 00:01:00 Gluten Free Diet Explained 00:03:00 Paleo Diet Explained 00:03:00 Low Carb Explained 00:03:00 Intermittent Fasting 00:03:00 Vegan Diet Explained 00:05:00 Micronutrients (Vitamins & Minerals) Vitamin A 00:01:00 Vitamin B 00:01:00 Vitamin C 00:01:00 Vitamin D 00:01:00 Vitamin E 00:01:00 Vitamin K 00:01:00 Calcium 00:01:00 Magnesium 00:01:00 Phosphorus 00:01:00 Potassium 00:01:00 Sodium 00:01:00 Copper 00:01:00 Zinc 00:01:00 Water 00:04:00 Certificate of Achievement Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Healthy Eating & Diet Planning - Nutrition Online Training Course
Delivered Online On Demand
£19.99

Sustainable Energy and Environmental Conservation at QLS Level 5

By Imperial Academy

2 QLS Endorsed Courses | CPD Certified | Free PDF & QLS Hardcopy Certificates | 180 CPD Points | Lifetime Access

Sustainable Energy and Environmental Conservation at QLS Level 5
Delivered Online On Demand1 hour
£150

F5 Networks Configuring BIG-IP Advanced WAF - Web Application Firewall (formerly ASM)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is intended for security and network administrators who will be responsible for the installation, deployment, tuning, and day-to-day maintenance of the F5 Advanced Web Application Firewall. In this 4 day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks. The course includes lecture, hands-on labs, and discussion about different F5 Advanced Web Application Firewall tools for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day exploits. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP System Configuration Leveraging F5 Support Resources and Tools Module 2: Traffic Processing with BIG-IP Identifying BIG-IP Traffic Processing Objects Overview of Network Packet Flow Understanding Profiles Overview of Local Traffic Policies Visualizing the HTTP Request Flow Module 3: Web Application Concepts Overview of Web Application Request Processing Web Application Firewall: Layer 7 Protection F5 Advanced WAF Layer 7 Security Checks Overview of Web Communication Elements Overview of the HTTP Request Structure Examining HTTP Responses How F5 Advanced WAF Parses File Types, URLs, and Parameters Using the Fiddler HTTP Proxy Module 4: Common Web Application Vulnerabilities A Taxonomy of Attacks: The Threat Landscape What Elements of Application Delivery are Targeted? Common Exploits Against Web Applications Module 5: Security Policy Deployment Defining Learning Comparing Positive and Negative Security Models The Deployment Workflow Policy Type: How Will the Policy Be Applied Policy Template: Determines the Level of Protection Policy Templates: Automatic or Manual Policy Building Assigning Policy to Virtual Server Deployment Workflow: Using Advanced Settings Selecting the Enforcement Mode The Importance of Application Language Configure Server Technologies Verify Attack Signature Staging Viewing Requests Security Checks Offered by Rapid Deployment Defining Attack Signatures Using Data Guard to Check Responses Module 6: Policy Tuning and Violations Post-Deployment Traffic Processing Defining Violations Defining False Positives How Violations are Categorized Violation Rating: A Threat Scale Defining Staging and Enforcement Defining Enforcement Mode Defining the Enforcement Readiness Period Reviewing the Definition of Learning Defining Learning Suggestions Choosing Automatic or Manual Learning Defining the Learn, Alarm and Block Settings Interpreting the Enforcement Readiness Summary Configuring the Blocking Response Page Module 7: Attack Signatures & Threat Campaigns Defining Attack Signatures Attack Signature Basics Creating User-Defined Attack Signatures Defining Simple and Advanced Edit Modes Defining Attack Signature Sets Defining Attack Signature Pools Understanding Attack Signatures and Staging Updating Attack Signatures Defining Threat Campaigns Deploying Threat Campaigns Module 8: Positive Security Policy Building Defining and Learning Security Policy Components Defining the Wildcard Defining the Entity Lifecycle Choosing the Learning Scheme How to Learn: Never (Wildcard Only) How to Learn: Always How to Learn: Selective Reviewing the Enforcement Readiness Period: Entities Viewing Learning Suggestions and Staging Status Violations Without Learning Suggestions Defining the Learning Score Defining Trusted and Untrusted IP Addresses How to Learn: Compact Module 9: Cookies and Other Headers F5 Advanced WAF Cookies: What to Enforce Defining Allowed and Enforced Cookies Configuring Security Processing on HTTP headers Module 10: Reporting and Logging Overview: Big Picture Data Reporting: Build Your Own View Reporting: Chart based on filters Brute Force and Web Scraping Statistics Viewing F5 Advanced WAF Resource Reports PCI Compliance: PCI-DSS 3.0 The Attack Expert System Viewing Traffic Learning Graphs Local Logging Facilities and Destinations How to Enable Local Logging of Security Events Viewing Logs in the Configuration Utility Exporting Requests Logging Profiles: Build What You Need Configuring Response Logging Module 11: Lab Project 1 Lab Project 1 Module 12: Advanced Parameter Handling Defining Parameter Types Defining Static Parameters Defining Dynamic Parameters Defining Dynamic Parameter Extraction Properties Defining Parameter Levels Other Parameter Considerations Module 13: Automatic Policy Building Overview of Automatic Policy Building Defining Templates Which Automate Learning Defining Policy Loosening Defining Policy Tightening Defining Learning Speed: Traffic Sampling Defining Track Site Changes Lesson 14: Web Application Vulnerability Scanner Integration Integrating Scanner Output Importing Vulnerabilities Resolving Vulnerabilities Using the Generic XML Scanner XSD file Lesson 15: Deploying Layered Policies Defining a Parent Policy Defining Inheritance Parent Policy Deployment Use Cases Lesson 16: Login Enforcement and Brute Force Mitigation Defining Login Pages for Flow Control Configuring Automatic Detection of Login Pages Defining Session Tracking Brute Force Protection Configuration Source-Based Brute Force Mitigations Defining Credentials Stuffing Mitigating Credentials Stuffing Lesson 17: Reconnaissance with Session Tracking Defining Session Tracking Configuring Actions Upon Violation Detection Lesson 18: Layer 7 DoS Mitigation Defining Denial of Service Attacks Defining the DoS Protection Profile Overview of TPS-based DoS Protection Creating a DoS Logging Profile Applying TPS Mitigations Defining Behavioral and Stress-Based Detection Lesson 19: Advanced Bot Protection Classifying Clients with the Bot Defense Profile Defining Bot Signatures Defining Proactive Bot Defense Defining Behavioral and Stress-Based Detection Defining Behavioral DoS Mitigation Lesson 20: Form Encryption using DataSafe Targeting Elements of Application Delivery Exploiting the Document Object Model Protecting Applications Using DataSafe The Order of Operations for URL Classification Lesson 21: Review and Final Labs Review and Final Labs

F5 Networks Configuring BIG-IP Advanced WAF - Web Application Firewall (formerly ASM)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Security engineers Security administrators Security architects Operations engineers Network engineers Network administrators Network or security technicians Network managers System designers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and administer the Cisco Email Security Appliance (ESA) Control sender and recipient domains Control spam with Talos SenderBase and anti-spam Use anti-virus and outbreak filters Use mail policies Use content filters Use message filters to enforce email policies Prevent data loss Perform LDAP queries Authenticate Simple Mail Transfer Protocol (SMTP) sessions Authenticate email Encrypt email Use system quarantines and delivery methods Perform centralized management using clusters Test and troubleshoot This course shows you how to deploy and use Cisco© Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA). Describing the Cisco Email Security Appliance Cisco Email Security Appliance Overview Technology Use Case Cisco Email Security Appliance Data Sheet SMTP Overview Email Pipeline Overview Installation Scenarios Initial Cisco Email Security Appliance Configuration Centralizing Services on a Cisco Administering the Cisco Email Security Appliance Distributing Administrative Tasks System Administration Managing and Monitoring Using the Command Line Interface (CLI) Other Tasks in the GUI Advanced Network Configuration Using Email Security Monitor Tracking Messages Logging Controlling Sender and Recipient Domains Public and Private Listeners Configuring the Gateway to Receive Email Host Access Table Overview Recipient Access Table Overview Configuring Routing and Delivery Features Controlling Spam with Talos SenderBase and Anti-Spam SenderBase Overview Anti-Spam Managing Graymail Protecting Against Malicious or Undesirable URLs File Reputation Filtering and File Analysis Bounce Verification Using Anti-Virus and Outbreak Filters Anti-Virus Scanning Overview Sophos Anti-Virus Filtering McAfee Anti-Virus Filtering Configuring the Appliance to Scan for Viruses Outbreak Filters How the Outbreak Filters Feature Works Managing Outbreak Filters Using Mail Policies Email Security Manager Overview Mail Policies Overview Handling Incoming and Outgoing Messages Differently Matching Users to a Mail Policy Message Splintering Configuring Mail Policies Using Content Filters Content Filters Overview Content Filter Conditions Content Filter Actions Filter Messages Based on Content Text Resources Overview Using and Testing the Content Dictionaries Filter Rules Understanding Text Resources Text Resource Management Using Text Resources Using Message Filters to Enforce Email Policies Message Filters Overview Components of a Message Filter Message Filter Processing Message Filter Rules Message Filter Actions Attachment Scanning Examples of Attachment Scanning Message Filters Using the CLI to Manage Message Filters Message Filter Examples Configuring Scan Behavior Preventing Data Loss Overview of the Data Loss Prevention (DLP) Scanning Process Setting Up Data Loss Prevention Policies for Data Loss Prevention Message Actions Updating the DLP Engine and Content Matching Classifiers Using LDAP Overview of LDAP Working with LDAP Using LDAP Queries Authenticating End-Users of the Spam Quarantine Configuring External LDAP Authentication for Users Testing Servers and Queries Using LDAP for Directory Harvest Attack Prevention Spam Quarantine Alias Consolidation Queries Validating Recipients Using an SMTP Server SMTP Session Authentication Configuring AsyncOS for SMTP Authentication Authenticating SMTP Sessions Using Client Certificates Checking the Validity of a Client Certificate Authenticating User Using LDAP Directory Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate Establishing a TLS Connection from the Appliance Updating a List of Revoked Certificates Email Authentication Email Authentication Overview Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing Verifying Incoming Messages Using DKIM Overview of Sender Policy Framework (SPF) and SIDF Veri?cation Domain-based Message Authentication Reporting and Conformance (DMARC) Verification Forged Email Detection Email Encryption Overview of Cisco Email Encryption Encrypting Messages Determining Which Messages to Encrypt Inserting Encryption Headers into Messages Encrypting Communication with Other Message Transfer Agents (MTAs) Working with Certificates Managing Lists of Certificate Authorities Enabling TLS on a Listener?s Host Access Table (HAT) Enabling TLS and Certi?cate Verification on Delivery Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services Using System Quarantines and Delivery Methods Describing Quarantines Spam Quarantine Setting Up the Centralized Spam Quarantine Using Safelists and Blocklists to Control Email Delivery Based on Sender Configuring Spam Management Features for End Users Managing Messages in the Spam Quarantine Policy, Virus, and Outbreak Quarantines Managing Policy, Virus, and Outbreak Quarantines Working with Messages in Policy, Virus, or Outbreak Quarantines Delivery Methods Centralized Management Using Clusters Overview of Centralized Management Using Clusters Cluster Organization Creating and Joining a Cluster Managing Clusters Cluster Communication Loading a Configuration in Clustered Appliances Best Practices Testing and Troubleshooting Debugging Mail Flow Using Test Messages: Trace Using the Listener to Test the Appliance Troubleshooting the Network Troubleshooting the Listener Troubleshooting Email Delivery Troubleshooting Performance Web Interface Appearance and Rendering Issues Responding to Alerts Troubleshooting Hardware Issues Working with Technical Support References Model Specifications for Large Enterprises Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch O?ces Cisco Email Security Appliance Model Specifications for Virtual Appliances

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)
Delivered OnlineFlexible Dates
Price on Enquiry

Diploma in Massage Therapist at QLS Level 3

4.8(9)

By Skill Up

Level 3 QLS Endorsed | 120 CPD Points| +Gifts: QLS Certificate + PDF Certificate | Lifetime Access| 24/7 Learner Support

Diploma in Massage Therapist at QLS Level 3
Delivered Online On Demand14 days
£100

Cognitive Behavioural Therapy (CBT) Practitioner

By IOMH - Institute of Mental Health

Overview of Cognitive Behavioural Therapy (CBT) Practitioner Cognitive Behavioural Therapy (CBT) Practitioner is a proven method for improving mental health. This course offers a clear introduction to CBT, making it easy to understand and apply. Many people today face challenges like anxiety and depression, and CBT provides practical tools to help manage these issues. Throughout the course, you will learn the key concepts of CBT Practitioners and how to use various techniques. Each module builds on the last, guiding you through the process step by step. You will also see how CBT can support personal growth and aid children with autism. By the end of this course, you will feel confident using CBT strategies in your own life or helping others. Whether you're a caregiver or looking to enhance your skills, this course opens doors to valuable knowledge in mental health. Join us and take the first step toward making a positive impact. Become proficient in Cognitive Behavioural Therapy (CBT) Practitioner by grasping all the essential knowledge from our top-quality course step by step. Enrol now to ensure that your Cognitive Behavioural Therapy (CBT) Practitioner mastery is not limited to only conceptual frameworks! This Cognitive Behavioural Therapy (CBT) Practitioner will assist you in standing out from the crowd and being more efficient in your chosen area of expertise. Furthermore, if you require assistance with the Cognitive Behavioural Therapy (CBT) Practitioner, we will provide experts who will support and guide you. So, add this Cognitive Behavioural Therapy (CBT) Practitioner to your cart and boost your personal and career development. In this Cognitive Behavioural Therapy (CBT) Practitioner, you will: Sharpen your skills to help you advance your career. Acquire a comprehensive understanding of various related topics and tips from industry experts. Learn in-demand knowledge and skills in high demand among UK employers, which will help to kickstart your Cognitive Behavioural Therapy (CBT) Practitioner career. Enrolling in the Cognitive Behavioural Therapy (CBT) Practitioner can assist you in getting into your desired career faster than you ever imagined. So, without further ado, start now! Details Perks of Learning with IOMH One-To-One Support from a Dedicated Tutor Throughout Your Course. Study Online - Whenever and Wherever You Want. Instant Digital/ PDF Certificate. 100% Money Back Guarantee. 12 Months Access. Process of Evaluation After studying the course, an MCQ exam or assignment will test your skills and knowledge. You have to get a score of 60% to pass the test and get your certificate. Certificate of Achievement Certificate of Completion - Digital / PDF Certificate After completing the Cognitive Behavioural Therapy (CBT) Practitioner course, you can order your CPD Accredited Digital / PDF Certificate for £5.99.  Certificate of Completion - Hard copy Certificate You can get the CPD Accredited Hard Copy Certificate for £12.99. Shipping Charges: Inside the UK: £3.99 International: £10.99 Who Is This Course for? This Cognitive Behavioural Therapy (CBT) Practitioner is suitable for anyone aspiring to start a career in relevant field; even if you are new to this and have no prior knowledge, this course is going to be very easy for you to understand.  On the other hand, if you are already working in this sector, this course will be a great source of knowledge for you to improve your existing skills and take them to the next level.  This course has been developed with maximum flexibility and accessibility, making it ideal for people who don't have the time to devote to traditional education. Requirements You don't need any educational qualification or experience to enrol in the Cognitive Behavioural Therapy (CBT) Practitioner course. Do note: you must be at least 16 years old to enrol. Any internet-connected device, such as a computer, tablet, or smartphone, can access this online course. Career Path The certification and skills you get from this Cognitive Behavioural Therapy (CBT) Practitioner Course can help you advance your career and gain expertise in several fields, allowing you to apply for high-paying jobs in related sectors. Course Curriculum Module 01: Introduction to CBT Introduction to CBT 00:37:00 Module 02: CBT Theories and Principles CBT Theories and Principles 00:50:00 Module 03: CBT Tools and Strategies CBT Tools and Strategies 00:49:00 Module 04: CBT Process CBT Process 00:50:00 Module 05: CBT for Personal Growth CBT for Personal Growth 00:42:00 Module 06: Overcoming Anxiety and Depression Overcoming Anxiety and Depression 01:00:00 Module 07: CBT for Children with Autism CBT for Children with Autism 00:49:00 Assignment Assignment - Cognitive Behavioural Therapy (CBT) Practitioner 00:00:00

Cognitive Behavioural Therapy (CBT) Practitioner
Delivered Online On Demand5 hours 37 minutes
£11.99

Creating Circles of Support

By Inclusive Solutions

A 1 hour guide to building a Circle of Support around a disabled adult

Creating Circles of Support
Delivered Online On Demand
£149

Make natural lashes into maximum effect natural lashes with our Lash Lift and Tint course. No infills required No down time Quick and effective treatment

Lash lift and Tint
Delivered In-Person in BirkenheadFlexible Dates
£100

ISO 27001 Lead Implementer

By Nexus Human

Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Project managers and consultants involved in and concerned with the implementation of an ISMS, expert advisors seeking to master the implementation of an ISMS, individuals responsible for ensuring conformity to information security requirements within an organization Overview Master the concepts, approaches, methods and techniques used for the implementation and effective management of an ISMS Learn how to interpret the ISO/IEC 27001 requirements in the specific context of an organization Learn how to support an organization to effectively plan, implement, manage, monitor and maintain an ISMS Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks Acquire the expertise to advise an organization in implementing Information Security Management System best practices This training course is designed to prepare you to implement an information security management system (ISMS) based on the requirements of ISO/IEC 27001. It aims to provide a comprehensive understanding of the best practices of an ISMS and a framework for its continual management and improvement. Introduction to ISO/IEC 27001 and initiation of an ISMS Training course objectives and structure Standards and regulatory frameworks Information Security Management System (ISMS) Fundamental information security concepts and principles Initiation of the ISMS implementation Understanding the organization and its context ISMS scope Planning the implementation of an ISMS Leadership and project approval Organizational structure Analysis of the existing system Information security policy Risk management Statement of Applicability Implementation of an ISMS Documented information management Selection and design of controls Implementation of controls Trends and technologies Communication Competence and awareness Security operations management ISMS monitoring, continual improvement, and preparation for the certification audit Monitoring, measurement, analysis, and evaluation Internal audit h Management review Treatment of nonconformities Continual improvement Preparing for the certification audit Certification process and closing of the training course

ISO 27001 Lead Implementer
Delivered OnlineFlexible Dates
Price on Enquiry

ISO 14001 Lead Implementer

By Nexus Human

Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Managers or consultants involved in Environmental Management, Expert advisors seeking to master the implementation of an Environmental Management System, Individuals responsible for maintaining conformance with EMS requirements , EMS team members Overview Acknowledge the correlation between ISO 14001, ISO 14040 and other standards and regulatory frameworks Master the concepts, approaches, methods and techniques used for the implementation and effective management of an EMS Learn how to interpret the ISO 14001 requirements in the specific context of an organization Learn how to support an organization to effectively plan, implement, manage, monitor and maintain an EMS Acquire the expertise to advise an organization in implementing Environmental Management System best practices ISO 14001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Environmental Management System (EMS) based on ISO 14001. During this training course, you will also gain a thorough understanding of the best practices of Environmental Management Systems, consequently reducing an organization?s negative environmental impacts and improving its overall performance and efficiency Introduction to ISO 14001 and initiation of an EMS Course objective and structure Standard and regulatory framework Environmental Management System (EMS) Fundamental principles of environmental management Initiating the EMS implementation Understanding the organization and clarifying the environmental objectives Analysis of the existing management system Plan the implementation of the EMS Leadership and approval of the EMS project EMS scope Policies for environmental management Risk assessment Definition of the organizational structure of environmental management Implementation of an EMS Definition of the document management process Design of controls and drafting of specific policies & procedures Communication plan Training and awareness plan Implementation of controls Incident Management Operations Management EMS monitoring, measurement, continuous improvement and preparation for certification audit Monitoring, measurement, analysis and evaluation Internal audit Management review Treatment of problems and non-conformities Continual improvement Preparing for the certification audit Competence and evaluation of implementers Closing the training

ISO 14001 Lead Implementer
Delivered OnlineFlexible Dates
Price on Enquiry