Duration 3 Days 18 CPD hours This course is intended for This course is designed for integration developers who configure service policies on IBM© DataPower Gateways. Overview After completing this course, you should be able to: Describe how DataPower gateways are configured Create and configure cryptographic objects Configure Secure Sockets Layer (SSL) to and from DataPower gateways Configure a multi-protocol gateway (MPGW) to handle multiple protocols from a single service Configure a service level monitoring (SLM) policy to control message traffic Use logs and probes to troubleshoot services Use patterns to define and deploy new services Configure message transformation and routing by using style sheets (XSL) and GatewayScripts Handle errors in service policies This course teaches you the essential skills that are required to configure, implement, and troubleshoot services that are developed on the IBM© DataPower Gateways (IDG) with firmware version 7.5.0, regardless of use case. The DataPower Gateways allow an enterprise to simplify, accelerate, and enhance the security capabilities of its XML and web services deployments, and extend the capabilities of its service-oriented architecture (SOA) infrastructure. The gateways also extend these capabilities into the JSON, REST, and Mobile application areas. Through a combination of instructor-led lectures and hands-on lab exercises, you learn how to develop and debug services that are implemented on the DataPower gateways. These skills include WebGUI and Blueprint Console navigation, service type selection, basic multi-protocol gateway configuration, creating and using cryptographic objects, and configuring SSL connections. You also learn how to use various problem determination tools such as logs, monitors, and probes, and techniques for testing DataPower services and handling errors. Hands-on exercises give you experience working directly with a DataPower Gateway. The exercises focus on skills such as creating multi-protocol gateways, working with cryptographic and SSL objects, configuring service level monitoring, troubleshooting services, handling errors in a service policy, and deploying a service from a pattern. Course introductionQuick introduction to developing on DataPowerExercise: First exposure to the DataPower developer environmentServices overviewStructure of a serviceExercise: Creating a BookingService gatewayMulti-protocol gateway serviceProblem determination toolsExercise: Enhancing the BookingService gatewayHandling errors in a service policyExercise: Adding error handling to a service policyDataPower cryptographic tools and SSL setupExercise: Creating cryptographic objects and configuring SSLService level monitoringExercise: Implementing a service level monitor in a multi-protocol gatewayPatterns for service configurationExercise: Using a DataPower pattern to deploy a serviceCourse summary
Unlock the power of a diverse and inclusive workplace with our Award in Equality, Diversity and Inclusion at QLS Level 2. This course sheds light on the essence of EDI, guiding you through its core principles and their transformative impact on organisations. From understanding protected characteristics to creating an ideal workplace, this programme is your roadmap to fostering a harmonious, productive environment. Equip yourself with the knowledge to champion EDI, and watch as your organisation flourishes in unity and strength. Learning Outcomes Grasp the fundamentals of equality, diversity, and inclusion. Identify and understand the protected characteristics. Recognise and address inappropriate behaviour in the workplace. Integrate EDI effectively into organisational policies. Develop strategies for an inclusive workplace environment. Combat toxic work cultures and promote positive change. Understand the benefits of a diverse and inclusive workforce. Key Features FREE QLS-endorsed certificate 4 Free CPD Accredited Courses with Free e-Certificates CPD Accredited Hard Copy Certificates Fully online, interactive courses Self-paced learning and laptop, tablet, smartphone-friendly 24/7 Learning Assistance Discounts on bulk purchases Free Courses Change Management Effective Communication Training Level-3 People Management Skills Negotiation Skills What Will You Learn from This Course? This course offers a deep dive into the principles and practices that foster a harmonious workplace. Equip yourself with the tools to champion change and create a thriving, inclusive environment. Module 01: Introduction to Equality, Diversity and Inclusion Understand EDI's core concepts. Learn its importance in today's world. Module 02: The Protected Characteristics Explore the key protected traits. Understand their significance in EDI. Module 03: Inappropriate Behaviour and Toxic Work Culture Identify harmful workplace behaviours. Learn strategies to combat them. Module 04: Implementing EDI in Organisational Policy Integrate EDI into company policies. Promote a positive work culture. Module 05: Creating an Ideal Workplace Discover the elements of a harmonious workplace. Learn to foster inclusivity. Certificate Once you've successfully completed your course, you will immediately be sent a CPD Accredited PDF certificate. Also, you can have your printed certificate delivered by post (shipping cost £3.99). After successfully completing the assignment, learners will be able to order a FREE QLS-endorsed certificate. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? HR professionals keen on enhancing workplace culture. Managers aiming for a more inclusive team environment. Business owners striving for a diverse workforce. Equality and diversity officers seeking advanced knowledge. Team leaders focused on fostering unity. Organisational development specialists. Employees aiming to understand and promote EDI. Training and development professionals. Requirements No prior degree or experience is required to enrol in this course. Career path Equality and Diversity Officer HR Manager Inclusion Specialist Organisational Development Consultant Diversity and Inclusion Trainer Employee Relations Advisor Certificates CPD Accredited e-Certificate Digital certificate - Included CPD Accredited Hard Copy Certificate Hard copy certificate - Included You will get the hard copy certificates for Free! The delivery charge of the hard copy certificate inside the UK is £3.99 each. QLS Endorsed Certificate Hard copy certificate - Included
Combatting Fear of Public Speaking- one day interactive course This is a one-day interactive course where you will learn techniques for fast improvements, as well as methods for building lasting confidence. What participants of this course say: "Unbelievably useful course, with a lot of materials, practice, feedback. It should be included in every scholar/ university program intro. Many thanks!" University Lecturer, Sheffield. "This course was an eyeopener - it was like going to a personal training session in the gym paralysed and starting moving and developing muscles during the session." CEO, City of London company. Not-for-profit 100% of AIR income, beyond operational expense, is used towards education and research - making it possible we offer our training at exceptional value. Tutoring This course is directed by Fatos Selita, a multidisciplinary trained communication expert. Booking Information Group bookings To book this 'Public Speaking and Presenting' course for a group, please email us air@gold.ac.uk. The price for group bookings starts from £1,925, covering a maximum of 8 people. VAT-Free except when provided in Clients' Offices: as a University, we are able to offer our courses at minimum prices, and free of VAT - to make knowledge available to as wide audience as possible. Refund policy: For this training course, where the number of participants is capped at 8, we offer you the following flexibility: If you cannot attend on the date booked, we will be happy to move your booking to a new date or provide you with a refund of our fee - if you notify us more than 7 days ahead of the start date. If you need to cancel the course within 7 days ahead of the start date - we will be happy to offer you one change to a future date. 10% discount when a participant enrols for more than one of our courses at the same time. 20% discount for UK students. 20% for members of the Society for Personality and Social Psychology (SPSP) (spsp.org). 25% discount for Members of the UK Law and Society Association (UKLSA) (uklsa.co.uk). Goldsmiths students, staff, or alumni, please email us for current discounts. Sponsored places: We are currently offering a number of sponsored places on all AIR Courses for those in extremely difficult financial circumstances. Please email us for details: air(@gold.ac.uk). Bespoke training Public Speaking for Diplomacy Interview Skills Public Speaking for Academics / Researchers Public Speaking for Business Professionals (Bankers, Lawyers, Media Professionals) Find out more about all of the AIR courses available to you. Enquiries For all enquiries, and to be regularly updated on upcoming AIR courses, please email: air (@gold.ac.uk). For anything urgent, or if emailing is not a good option for you, you can also call us via WhatsApp or phone on +44 (0)7908 566 949.
Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou
This course will help you to gain a better knowledge of the policy which underpins end of life care. It will help you to learn about the delivery of great end of life care and improve your communication skills to strengthen working relationships during this period. You will also feel you have a better understanding on how to support the friends and family of the person that you are caring for.
The Fleet Management Course is a wonderful learning opportunity for anyone who has a passion for this topic and is interested in enjoying a long career in the relevant industry. It's also for anyone who is already working in this field and looking to brush up their knowledge and boost their career with a recognised certification. This Fleet Management Course consists of several modules that take around 5 hours to complete. The course is accompanied by instructional videos, helpful illustrations, how-to instructions and advice. The course is offered online at a very affordable price. That gives you the ability to study at your own pace in the comfort of your home. You can access the modules from anywhere and from any device. Why choose this course Earn a free e-certificate upon successful completion. Accessible, informative modules taught by expert instructors Study in your own time, at your own pace, through your computer tablet or mobile device Benefit from instant feedback through mock exams and multiple-choice assessments Get 24/7 help or advice from our email and live chat teams Full Tutor Support on Weekdays Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Mock exams Multiple-choice assessment Certification Upon successful completion of the course, you will be able to obtain your course completion PDF Certificate at £9.99. Print copy by post is also available at an additional cost of £15.99 and the same for PDF and printed transcripts. Course Content Module 01: Introduction to Fleet Management Module 01: Introduction to Fleet Management 00:21:00 Module 02: Fleet Legislation and Policy Module 02: Fleet Legislation and Policy 00:21:00 Module 03: Fleet Procurement, Vehicle Selection and Analysis Module 03: Fleet Procurement, Vehicle Selection and Analysis 00:31:00 Module 04: Fleet Maintenance and Repairs Module 04: Fleet Maintenance and Repairs 00:18:00 Module 05: Fleet Telematics and Technology Module 05: Fleet Telematics and Technology 00:22:00 Module 06: Cost Determination and Control Module 06: Cost Determination and Control 00:23:00 Module 07: Fuel Management Module 07: Fuel Management 00:20:00 Module 08: Dynamic Vehicle Routing Module 08: Dynamic Vehicle Routing 00:20:00 Module 09: Insurance and Risk Management Module 09: Insurance and Risk Management 00:18:00 Module 10: Fleet Planning, Control, and Problem-Solving Module 10: Fleet Planning, Control, and Problem-Solving 00:30:00 Module 11: Fleet Safety Programme Module 11: Fleet Safety Programme 00:16:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.
The Family Support Work and Safeguarding Course is a wonderful learning opportunity for anyone who has a passion for this topic and is interested in enjoying a long career in the relevant industry. It's also for anyone who is already working in this field and looking to brush up their knowledge and boost their career with a recognised certification. This Family Support Work and Safeguarding Course consists of several modules that take around 4 hours to complete. The course is accompanied by instructional videos, helpful illustrations, how-to instructions and advice. The course is offered online at a very affordable price. That gives you the ability to study at your own pace in the comfort of your home. You can access the modules from anywhere and from any device. Please note: This course only gives you the theoretical knowledge that you need to excel in this field. This Family Support Work and Safeguarding doesn't entitle you to practise as a professional in this specific field. Why Choose this Course? Earn a digital Certificate upon successful completion. Accessible, informative modules taught by expert instructors Study in your own time, at your own pace, through your computer tablet or mobile device Benefit from instant feedback through mock exams and multiple-choice assessments Get 24/7 help or advice from our email and live chat teams Full tutor support on weekdays Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Mock exams Multiple-choice assessment Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Course Content Module 1: Introduction To Family Support Work Introduction to Family Support Work 00:21:00 Module 2: Legislation, Policy, and Guidance Legislation, Policy, and Guidance 00:48:00 Module 3: Solving Family Issues: part-1 Solving Family Issues - Part 1 00:46:00 Module 4: Solving Family Issues: part-2 Solving Family Issues - part 2 00:41:00 Module 5: Safeguarding - assessing need and providing help: Part-1 Safeguarding - Assessing need and providing help (Part 1) 00:32:00 Module 6: Safeguarding - assessing need and providing help: Part-2 Safeguarding - Assessing Need and Providing Help (Part 2) 00:34:00 Module 7: Building relationships Building Relationships 00:33:00 Mock Exam Mock Exam-Family Support Worker 00:20:00 Final Exam Final Exam-Family Support Worker 00:20:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.
The medication and record keeping course is a full day, instructor led course in a fully equipped training room. We use a mixture of training methods such as scenarios, activities, group discussion, games and the use of equipment / technology to cover the different learning styles of the individual. Learners will develop their knowledge, skills and understanding around the administering of medication and the importance of record keeping. Some of the key Learning Outcomes we cover are; Understanding of the legislation surrounding medication Understanding of role and responsibilities Understanding of medication policy and procedures Understanding of boundaries when assisting with medication Explain how and why medication errors occur Explain how to eliminate or reduce risks to individuals safety Aware of who and where to report concerns Understand the importance of thorough documentation Care providers are regulated by the Care Quality Commission (CQC) and as a result must meet the Health and Social Care Act 2014 (Regulation 18 Staffing). Evidence of training and understanding is provided to support providers in their evidence of compliance. Instructions Attendees to arrive on time at 9.30am and will leave around 16.30pm It is important that learners are fit and well to participate in group activities. Directions Complete Care West Yorkshire Ltd. Somerset House, Sandal Castle Centre Asdale Road Wakefield WF2 7JE All training is carried out at our office (Somerset House, map is attached). Please note that we do not provide lunch so you will have to bring your own. Please do not park in the office car park as not all spaces belong to us. There is available parking in Asda and Aldi next door, or the public car park at eth side of Square Pizza Amenities Toilets