Explore cutting-edge power system training with EnergyEdge. Learn about integrating solar, storage, and DERs for efficient energy management. Enroll now!
What is Person Centred Planning? How is it different to any other kind of meeting or planning? On this day all will become clear… Give your team the opportunity to pause and reflect on what matters most to them about the work they do. The act of listening to each other creates relationship and strengthens trust and inclusion within the team – in creating a shared vision, groups of people build a sense of commitment together. They develop images of ‘the future we want to create together’, along with the values that will be important in getting there and the goals they want to see achieved along the way. Unfortunately, many people still think ’vision’ is the top leader’s job. In schools, the ‘vision task’ usually falls to the Headteacher and/or the governors or it comes in a glossy document from the local authority or the DfES. But visions based on authority are not sustainable. Making inclusive action plans using full participation and graphic facilitation Drawing on the planning tools MAPS and PATH (Pearpoint, Forest and O’Brien 1997) and other facilitation sources we use both process and graphic facilitation to enable the group to build their picture of what they would love to see happening within their organisation/community in the future and we encourage this to be a positive naming, not just a list of the things they want to avoid. Jack Pearpoint, Marsha Forest and John O’Brien developed these innovative approaches in North America and they are being used successfully in many parts of the UK. The planning can focus on an individual, group or organisation and provides a powerful problem solving opportunity, which is flexible and robust enough for many occasions. Tell the story, find the dream, touch the nightmare, and explore who you are, what are the gifts and strengths of the person or group, what are the needs of those present and what is the action plan for the future? Learning objectives Participants understand Person Centred Planning and its values and applications Participants have skills and confidence to facilitate PATH/MAP processes Participants learn graphic as well as process facilitation skills Strengthens practitioners inclusive practice Provides additional tools for those involved in inclusive work in schools and the community Further develop problem solving and planning skills Course Content The course answers the questions: Need to find new ways to bring Pathway Planning alive? Bored with annual reviews, transition plans and review meetings? Want to find a way of making meetings and planning feel more real and engaging? Need an approach, which engages a young person respectfully together with his or her family and friends? Want the ultimate visual record of the process of a meeting, which will help everyone, keep track? Want to problem solve and plan for the future of a small or large group, service or organisation up to the size of an LA? Inclusive Solutions offer an introductory day to person centred planning or a 3 – 10 session course which is practical as well as values based. Participants will receive direct individualised coaching and training. We will cover: The person being at the centre Family members and friends being full partners Planning reflecting the person’s capacities, what is important to the person and specifying the support they require to make a full contribution to their community Planning building a shared commitment to action that will uphold the person’s rights Planning leading to continual listening, learning and action and helping the person get what they want out of life. Essential Lifestyle Planning, PATH MAPS Personal Futures Planning.
Join us for a transcendent afternoon of movement, medicine and connection. Join us for a transcendent afternoon of movement, medicine and connection at Never For Ever. Leave the outside world behind and join us for an ecstatic dance journey, merging powerful beats, heart-opening cacao, and grounding Rapé with soulful intention. This alcohol and drug-free event is a space to move freely, express yourself fully, and enjoy being part of our amazing community. Event Flow: Doors open at 11.30am No entry after 12.15pm to maintain the integrity of the space. We'll begin with warm-up music from 11.30 - 12.15pm to help you settle in. Rapé will be served between 11.30 and 12.15pm—please book this when you book your ticket if you would like to receive Rapé. At 12.15pm, we’ll share a ceremonial cacao together, a sacred plant medicine to open your heart and energise your body, preparing you for the dance. The dance begins at 12.30pm. Holly, our phenomenal resident DJ, will guide you through an eclectic mix of deep, tribal, and uplifting beats. Known for her ability to craft sets that resonate deeply with the body, mind, and soul, Holly will take you on a journey where every track invites you to move more freely and feel more alive. The cool down will be from 2 - 2.30pm. Venue: Never For Ever is known for its chic, warehouse-style interior and vibrant atmosphere. It has an incredible line-up of non-alcoholic cocktails making it the perfect setting for our dance. After the dance, you're welcome to stay, relax, and grab a bite to eat and connect with the community - the food is AMAZING. The entrance to the dance is the door on the far left of the building. As you enter, come down the stairs immediately in front of you and follow the corridor round to the space. Etiquette: To create a safe and sacred space for everyone: No talking on the dance floor - let your body do the communicating. This is a sober event. Help us keep the space light and clear. Respect boundaries - honour your own space and the space of others. Barefoot or socks only on the dancefloor. No phones - stay present and enjoy the dance. Listen to your body - move in a way that feels natural and right for you. Refund Policy: You can cancel your booking automatically through Cademy with 7 days’ notice. After this point NO REFUNDS will be issued. Price: Price is on a sliding scale. Please pay what you can afford. @numinity.collective Join our Whatsapp Group for new event updates.
Course Information Designed to develop personal proficiency in audit planning, execution and reporting, this course is meticulously crafted to refine essential audit skill sets. Through immersive scenarios focused on on-site audit conduct (with an alternative Remote Auditing Course available), participants will engage deeply in the audit process. Extending Expertise: Applicable across all audit types, this course builds upon and enriches the foundational concepts taught in RQA's suite of research quality assurance courses. From 'Research Quality Assurance for Good Laboratory Practice' to 'Good Clinical Practice Auditing – Principles and Practice' and 'Good Manufacturing Practice for Investigational Medicinal Products,' this programme extends the scope of learning. Relevance and Value: Relevant to any area of regulated research and development, this course shines particularly in contexts mandating a quality system for audit. Participants with prior audit experience will gain maximum value from this course. Key Benefits: Enrich your skill set to: Navigate audit processes encompassing planning, execution, reporting, and follow-up Embrace a personalised approach fostering positive audit outcomes Analyse evidence and present cohesive audit findings Recognise the pivotal role of audits in driving continual improvement. Interactive Learning: Structured to foster dynamic engagement, this course encourages delegates to: Engage in discussions, idea development, and problem-solving Exchange invaluable information and experiences. Hands-On Experience: A highlight of this course is the series of practical workshops, where delegates work in small syndicate groups, applying the acquired skills from lectures into real-world scenarios. Tutors Tutors will be comprised of (click the photos for biographies): Andrew Waddell Founder Director, Tower Mains Ltd Rosemary Ichaba Senior QA Associate, Tower Mains Ltd Cate Ovington Director, The Knowlogy Group Ltd Jean McWilliam Associate Director, Alexion View pop up Programme Please note timings may be subject to alteration. Day 1 08:45 Registration 09:00 Welcome and Course Objectives 09:10 What is 'Audit'? Delegates explore the range of audits which they have experienced, define the purpose of each audit type and establish which of those audits are performed to meet regulatory requirements. 09:30 Audits and their Purpose The concepts of quality assurance, quality control, quality management and audit are discussed. 10:30 Break 10:45 Audit Planning The requirements for an effective audit programme and individual audit plans. 11:30 Workshop 1 - Getting the Audit Started Planning for the audit. 12:25 Workshop 1 - Feedback 12:45 Lunch 13:30 Workshop 2 - Getting the Audit Started Arranging the opening meeting. 13:50 Workshop 2 - Feedback Audit initiation. Review and discussion of the role of the opening meeting. 14:25 Auditing Techniques (1) - Data and Documentation Techniques for the conduct of data and report audits are investigated. 14:55 Break 15:10 Workshop 3 - Data and Documentation Audit Conducting an audit of a data package and supporting documentation. 17:15 Close of Day Day 2 09:00 Auditing Techniques (2) - The People Questioning techniques which get the required information from the auditee. 09:45 Live Audit Role Play Auditor and auditee behaviours are explored and strategies developed for successful audit interactions. 10:15 Break 10:35 Audit Closing Meeting An exploration of audit closing meetings. 11:00 Workshop 4 - Audit Observations and Preparing for the Closing Meeting Reviewing and categorising your observations and getting ready to present your case. 11:45 Workshop 4 - Feedback 12:30 Audit Reports The content and distribution of an effective audit report are investigated and the importance of effective written communication is discussed. 13:00 Lunch 13:45 Workshop 5 - Audit Reports and Follow-up Mechanisms for promoting effective corrective and preventive action. Critical review of an audit report example. 14:30 Workshop 5 - Feedback 14:55 Corrective and Preventive Action and Follow-up The auditor's role in monitoring responses to audit and the corrective and preventive actions promised is explored. 15:20 Panel Session An opportunity to get answers to outstanding questions. 15:30 Close of Course Extra Information Course material Course material will be available in PDF format for delegates attending this course. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course. The material will be emailed in advance of the course and RQA will not be providing any printed copies of the course notes during the training itself. Delegates wishing to have a hard copy of the notes should print these in advance to bring with them. Alternatively delegates are welcome to bring along their own portable devices to view the material during the training sessions. CPD Points 14 Points Development Level Develop
Microsoft Lync training course description This course teaches IT staff how to plan, design, deploy, configure, and administer a Microsoft Lync Server solution. The course emphasizes Lync Server Enterprise Unified Communications features focussing particularly on coexisting with and migrating from legacy communication services. The labs in this course create a solution that includes IM and Presence, Conferencing, and Persistent Chat. This course helps prepare for Exam 70-336. What will you learn Describe the Lync Server architecture. Install and deploy Lync Server. Use Lync Server management interfaces. Deploy and manage clients. Manage and administer dial-in conferencing. Design audio and video for web conferencing. Plan for instant message and presence Federation. Deploy and configure persistent chat in Lync. Configure archiving and monitoring services. Troubleshoot Lync Server. Describe the required daily, weekly, and monthly maintenance tasks. Use SIP commands and analyze SIP logs. Configure high availability features in Lync. Design load balancing in Lync Server. Backup and restore Lync Server data. Microsoft Lync training course details Who will benefit: Technical staff working with Microsoft Lync. Prerequisites: Supporting Windows 2008 or 2012. Duration 5 days Microsoft Lync training course contents Microsoft Lync Server architecture Lync Server architecture, Lync core capabilities, Lync design process, assessing infrastructure requirements and updating the design, planning for all Microsoft solutions framework phases. Designing a Lync Server topology Infrastructure requirements for Lync Server, using the planning tool, using topology builder, server infrastructure, documentation. Hands on Environment preparation and Lync Server pools. Users and rights in Microsoft Lync Server Managing Lync Server, role based access control. Hands on Using the management shell, configuring role-based access control. Client/device deployment and management Deploy and manage clients, prepare for device deployment, IP phones. Hands on Clients. Conferencing in Lync Server Introduction to conferencing in Lync Server, designing for audio\video and web conferencing, dial-in conferencing in Lync Server, managing and administering conferencing. Hands on Conferencing in Microsoft Lync. Designing and deploying external access Conferencing and external capabilities of Lync Server, planning for IM and presence federation, designing edge services. Hands on Deploying Edge Server and Configuring Remote Access, Validating the Edge Server. Deploying Lync Server persistent chat Overview of persistent chat architecture in Lync Server, designing persistent chat, deploying and persistent chat. Hands on persistent chat server. Monitoring and archiving The archiving service, the monitoring service, configuring archiving and monitoring. Hands on Archiving and monitoring in Lync Server. Administration and maintenance of Lync Lync Server troubleshooting tools, Lync Server operational tasks, Lync Server troubleshooting techniques. Hands on Lync administration tools, centralized logging service, analysing Lync Server logs and traces. High Availability in Lync Server High availability in Lync Server, configuring high availability in Lync Server, planning for load balancing, designing load balancing. Hands on Configuring database mirroring, experiencing a scheduled SQL Server outage, experiencing an unscheduled SQL Server outage. Disaster recovery in Lync Server Disaster recovery in Lync Server, tools for backing up and restoring Lync Server, critical Lync Server data to back up and restore, critical data to export and import, designing branch site resiliency. Hands on Configure pool pairing, experiencing a pool failure or outage. Planning a migration to Lync Server Coexistence and migration, migration steps, planning for clients and devices. Designing a client migration and device migration strategy. Hands on Creating a migration plan, documenting the migration phases.
Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.
Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.