• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

351 Security courses in Ipswich

Safe Recruitment for Employers & Managers

By Prima Cura Training

Safer recruitment is designed to help those who are responsible for employing anyone who works with vulnerable groups, to identify and deter or reject individuals who are deemed to be at risk of abusing. It is crucial that all employers have a recruitment policy in place that takes into account safer recruitment best practices and considerations. This course covers key topics including: advertising, application forms, selecting candidates for interview based on the information they have presented, and post-interview checks - including DBS checks - before making an offer of employment. Recruitment of staff is now a complex process and there are many issues that need to be considered to ensure safe and successful recruitment, to reduce in turn the risk of harm, abuse and neglect of adults and children.

Safe Recruitment for Employers & Managers
Delivered In-PersonFlexible Dates
Price on Enquiry

Online Options

Show all 4519

Digital, Text & Voice Communicators Course

By Hi-Tech Training

The Hi-Tech Training Digital Text & Voice Communicator Course is designed to provide participants with the skills required to connect Digital, Text & Voice Communicators to an Alarm Control Panel for transmission of Digital status signals via the telephone line, GSM Network or IP network to a central monitoring station. The Digital Communicator Course’s practical application and our highly experienced trainers ensure that this course is second to none. The course is technical and practical in nature and is suitable for participants who have successfully completed the Hi-Tech Training Intruder Alarm Installation Course or equivalent.

Digital, Text & Voice Communicators Course
Delivered Online
£85 to £685

Data Protection & Cyber Security Course: Remaining Compliant Against Today's Risks

By DG Legal

The professional working world has changed more rapidly than could have been envisaged at the time of the introduction of GDPR and the Data Protection Act 2018. With more people working from home post-Covid and the ever increasing risk of cyber-attacks, this short course is aimed at taking stock of current practice and risk, as well as considering ICO enforcement action and the implications of hybrid working. It is also a great recap on the rules as they stand and what you need to know to comply. The course will cover: UK GDPR - A timely reminder of the rules ICO enforcement action and what we can learn Data Protection Impact Assessments - when and how to do them Hybrid working and UK GDPR Managing cyber attacks from a UK GDPR perspective Target Audience The online course is suitable for staff of all levels, from support staff to senior partners. Resources Course notes will be provided to all delegates which may be useful for ongoing reference or cascade training. Please note a recording of the course will not be made available. Speaker Matthew Howgate, Consultant, DG Legal Matt is a non-practising solicitor who has considerable experience in regulatory issues and advising on complex issues of compliance and ethics. He is also an expert in data protection, UK GDPR and on the civil legal aid scheme. Matthew is a lead trainer on and co-developed the LAPG Certificate in Practice Management (a training programme for legal managers and law firm owners) as well as regularly providing training on legal aid Supervision, costs maximisation, data protection and security and on general SRA compliance.

Data Protection & Cyber Security Course: Remaining Compliant Against Today's Risks
Delivered Online + more
£101.25 to £135

Maryland Security Officer Initial & Renewal Course

By MDSPOSA & USTASC TRAINING PORTAL

This course meets and exceeds the Maryland requirement for the security officer course of 12 hours. The course is taught over 2 days, 6 hours per day. In this course, you will learn the required curriculum for security officers prescribed by the Maryland Police and Corrections Training Commission.

Maryland Security Officer Initial & Renewal Course
Delivered Online + more
$250

Security+

5.0(3)

By Systems & Network Training

Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in Internationally or OnlineFlexible Dates
£2,797

Certified Wireless Security Professional

5.0(3)

By Systems & Network Training

CWSP training course description A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming. What will you learn Demonstrate the threats to WiFi networks. Secure WiFi networks. Configure: WPA2 RADIUS 802.1x EAP Pass the CWSP exam. CWSP training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: Certified Wireless Network Associate. Duration 5 days CWSP training course contents WLAN Security overview Standards, security basics, AAA, 802.11 security history. Hands on WLAN connectivity. Legacy 802.11 security Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking. Hands on Analysing 802.11 frame exchanges, viewing hidden SSIDs. Encryption Basics, AES, TKIP, CCMP, WPA, WPA2. Hands on Decrypting 802.11 data frames. 802.11 layer 2 authentication 802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST. Hands on Analysing 802.1X/EAP frames. 802.11 layer 2 dynamic key generation Robust Security Network. Hands on Authentication and key management. SOHO 802.11 security WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS). Hands on PSK mapping. WLAN security infrastructure DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC. Hands on 802.1X/EAP configuration. RADIUS configuration. 802.11 Fast secure roaming History, RSNA, OKC, Fast BSS transition, 802.11k. Hands on Roaming. Wireless security risks Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots. Hands on Backtrack. WiFi security auditing Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools. WiFi security monitoring Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w. Hands on Laptop spectrum analysers. VPNs, remote access, guest access Role of VPNs in 802.11, remote access, hotspots, captive portal. Wireless security policies General policy, functional policy, recommendations.

Certified Wireless Security Professional
Delivered in Internationally or OnlineFlexible Dates
£3,697

CompTIA Security+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Lesson 1: Summarize Fundamental Security Concepts Security Concepts Security Controls Lesson 2: Compare Threat Types Threat Actors Attack Surfaces Social Engineering Lesson 3: Explain Cryptographic Solutions Cryptographic Algorithms Public Key Infrastructure Cryptographic Solutions Lesson 4: Implement Identity and Access Management Authentication Authorization Identity Management Lesson 5: Secure Enterprise Network Architecture Enterprise Network Architecture Network Security Appliances Secure Communications Lesson 6: Secure Cloud Network Architecture Cloud Infrastructure Embedded Systems and Zero Trust Architecture Lesson 7: Explain Resiliency and Site Security Concepts Asset Management Redundancy Strategies Physical Security Lesson 8: Explain Vulnerability Management Device and OS Vulnerabilities Application and Cloud Vulnerabilities Vulnerability Identification Methods Vulnerability Analysis and Remediation Lesson 9: Evaluate Network Security Capabilities Network Security Baselines Network Security Capability Enhancement Lesson 10: Assess Endpoint Security Capabilities Implement Endpoint Security Mobile Device Hardening Lesson 11: Enhance Application Security Capabilities Application Protocol Security Baselines Cloud and Web Application Security Concepts Lesson 12: Explain Incident Response and Monitoring Concepts Incident Response Digital Forensics Data Sources Alerting and Monitoring Tools Lesson 13: Analyze Indicators of Malicious Activity Malware Attack Indicators Physical and Network Attack Indicators Application Attack Indicators Lesson 14: Summarize Security Governance Concepts Policies, Standards, and Procedures Change Management Automation and Orchestration Lesson 15: Explain Risk Management Processes Risk Management Processes and Concepts Vendor Management Concepts Audits and Assessments Lesson 16: Summarize Data Protection and Compliance Concepts Data Classification and Compliance Personnel Policies Additional course details: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered OnlineFlexible Dates
£2,475

Advanced Junos Security

5.0(3)

By Systems & Network Training

Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in Internationally or OnlineFlexible Dates
£4,997

Cyber security for engineers

5.0(3)

By Systems & Network Training

Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.

Cyber security for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Access Control Course

By Hi-Tech Training

An effective Access Control System can form an integral part of an effective security system. At Hi-Tech Training our course is designed to give participants a practical knowledge of the operation and installation of Access Control Systems. Our experience has taught us that in order to gain the required skills an installer needs to learn through as much practical training as possible. This course involves 50% “Hands-On” training which involves building, setting up, testing and troubleshooting faults using core elements of modern Access Control Systems. At the end of the course, an interested and hardworking participant will have a good solid foundation of knowledge of what access control is all about.

Access Control Course
Delivered Online
£85 to £685

Certificate of Cloud Security Knowledge (CCSK)

5.0(12)

By Nemstar Ltd

Enhance cloud security expertise with specialized training, bridge skill gaps for job growth, and excel in cloud controls and best practices. This course is delivered online by Sean Hanna, three time EC-Council global trainer of the year award winner.

Certificate of Cloud Security Knowledge (CCSK)
Delivered OnlineFlexible Dates
£1,914

Educators matching "Security"

Show all 14
Shearwater Sailing School

shearwater sailing school

5.0(8)

Ipswich

As we are a small school, we can be very flexible with the full range of RYA courses we offer. From RYA Start Yachting to RYA Yachtmaster Offshore, and more. Not sure what course to take, or require something not listed below, we can help. Sailing.jpg RYA Competent Crew This is a 5 day practical course where you can achieve your first major sailing certificate. The RYA Competent Crew course is aimed at beginners to the world of sailing, with little or no experience, who want to become active crew members rather than just passengers. After the course, you will be able to steer a yacht, handle sails, keep a lookout, row a dinghy and assist in the day-to-day routines of sailing a yacht as well as rope handling and general duties. No age limit. 5 Day Sailing Course - £695 RYA Instructor/Student Ratio max 1:5. We normally sail with 1:4 Check Dates And Availability IMG_2589_cropped.JPG RYA Day Skipper The RYA Day Skipper practical course is aimed at aspiring skippers who have some yachting experience and basic navigation. You’ll learn to skipper short passages, enter and exit ports , emergency skills such as Man Overboard training and how to sail up to and tie up to a mooring buoy. To take this course, you must have completed at least 5 days, 100 miles and 4 night hours on board a sailing yacht, and must be 16 or older. 5 Day Sailing Course - £695 RYA Instructor/Student Ratio max 1:5. We normally sail with 1:4 Check Dates And Availability IMG_3247.JPG RYA Coastal Skipper Or Yachtmaster Offshore Prep The RYA Coastal Skipper practical course is aimed at yachtsmen and women with considerable knowledge of sailing and navigation who are wanting to undertake coastal passages by day and night. After this course, you will have the confidence to skipper a yacht on a coastal passage by day or night. Or if completing the Yachtmaster Offshore prep you will arrange with the school to book a RYA Examiner to take the 8/10 hour practical exam soon afterwards. To take this course(Coastal) you will have completed at least 15 days, 300 miles, 8 night hours and 2 days as skipper on board a sailing yacht, and must be 17 for Coastal and 18 for Yachtmaster Offshore for which you will need 2500 miles and three skippered passages over 60 miles plus 50 night hours. 5 Day Sailing Course - £695 RYA Instructor/Student Ratio max 1:5. We normally sail with 1:4 Check Dates And Availability 29FE2516-6577-497D-8408-48B6C4F6E63B.jpeg RYA VHF/DSC RADIO COURSE A radio is an important piece of safety equipment on board and it is vital to understand the correct procedures for using it and communicating with other boats and ground based stations. This course is a requirement for anyone who owns a fixed or handheld marine VHF radio. The Short Range Certificate (SRC) is the minimum qualification required by law to control the operation of VHF and VHF Digital Selective Calling (DSC) equipment on any British flagged vessel voluntarily fitted with a radio. Materials supplied. VHF book and exam paper. Age 16 to complete the exam but no age limit to complete the course. 1 Day Course - £120 + £60 fee Instructor/Student Ratio max 1:8 Check Dates And Availability CD6D9CE2-D2DD-4FB3-BB66-AB441E5D4595.jpeg First Aid The 1 day First Aid course covers all the usual first aid subjects, all from a boating perspective. Additionally, this course covers: drowning protocol, cold, shock and hypothermia, seasickness, dehydration and helicopter rescue. It is aimed at anyone who goes afloat, whether on inland waters, rivers, estuaries or on cross channel passages. In a medical emergency, a little first aid knowledge and immediate action can save lives, especially in remote locations. Materials supplied. First aid handbook 1 Day Course - £120 Instructor/Student Ratio max 1:8 Check Dates And Availability 4631236162.jpg London, France, Belgium & Holland Cruises We offer two fantastic mile building cruises. - 6 day cruise into London - 7 day cruise to France, Belgium and/or Holland. These are not only excellent for those who need to build up miles for their Yachtmaster certificates, but also a great way to get your Day Skipper or Coastal Skipper qualification. 7/10 Day Cruise Check Dates And Availability Sailing.jpg Start Yachting 2 Day course The Start Yachting course is a fantastic introduction to sailing for complete beginners. The 2 day Start Yachting course covers all the basics and essential skills needed to go on too, and complete the Competent Crew course in a reduced time of 3 days instead of the usual 5. Although not a requirement for the Competent Crew course, it does offer a great opportunity to get on the water and see what it's like before making the leap to a full 5 day course. You won't see this course listed in our course schedule, but it is offered during the first 2 days of any 5 day course. Get in touch for more details. Get In Touch To Find Out More 17522596_606534616220837_3554248376439535476_n.jpg Day Skipper Theory This course equips you with enough knowledge to navigate around familiar waters by day. A basic knowledge of lights is also included to introduce you to night cruising. Topics include: essentials of coastal navigation and pilotage chart work electronic charts position fixing plotting a course to steer weather forecasting & tides and much more… This course is taught over 40 hours plus two exam papers. Materials supplied. DS Theory pack, almanac, exam papers and certificate. 40 Hour Course Instructor/Student Ratio max 1:10 Check Dates And Availability IMG_0794.jpg Coastal Skipper/ Yachtmaster Offshore Theory This course is aimed at sailors who have completed the Day Skipper course and wish to take their sailing skills to the next level by focusing on advanced navigation and meteorology. Topics include: course shaping and plotting use of almanacs and admiralty publications plotting weather systems collision regulations and much more… The course is taught over 40 hours plus three exam papers. Materials supplied. YM theory pack, almanac, exam papers and certificate. 40 Hour Course Instructor/Student Ratio max 1:10 Check Dates And Availability Next Course Winter 2023 RYA Diesel Course This one-day beginners’ course will help you prevent and solve diesel engine failures. The course covers: Principles of diesel engine operation Systems and parts of the engine Fault finding Rectification of common problems Bleeding the fuel system Changing the impeller Routine maintenance Winter lay up procedures This course teaches you how your engine works, how to keep it healthy by using basic checks and maintenance procedures, and how to get it started again in the event of a breakdown. diesel-engine.png Find Out When In addition to the above RYA Courses, we also offer a range of flexible solutions to meet your needs. Family sails, lasting a day or a whole week with an instructor as skipper. Two day brush up sails. Two day ICC Training Course and Exam. Own Boat Tuition where an RYA Instructor assists you on your own boat. Please don’t hesitate to get in touch if you have any questions. Get In Touch Today 4634409373.jpg Hi Mark and Tom, Just wanted to say how much we enjoyed our introduction to sailing course last week - you were amazingly calm the entire time - even when that boat was heading towards us and we were packing the sail away as Cecily steered! We are all really looking forward to our holiday even more now and will send you a photo of us all - in Shearwater t-shirts of course! Hope you are surviving in this wet weather! We are v bored and would rather be sailing! Jude (Start Yachting) Subscribe Keep up today with all of our courses and specials by signing up to our regular newsletter. First Name Last Name Email Address SIGN UP We respect your privacy.

Eithne Leming Associates

eithne leming associates

Woodbridge

Eithne Leming has worked as a Teacher, Head Teacher, Education Consultant, Trainer and Writer. She has worked within mainstream education, special schools, and professional associations and for the Department of Education in a career that spans over 30 years. She is a member of the European register of NROLE (those Nationally Recognised as Outstanding Leaders in Education). OFSTED describe her as “A very effective and inspirational Leader who provides clear vision and direction.” She has project managed Additional Language Services, established a Parent Partnership Service in Suffolk that provided school improvement and parent support services as well as setting up PRU and Behavioural Support services. She has worked internationally as well as nationally and regularly speaks at Education Conferences. In addition for the last 10 years Eithne has written for magazines and publications such as the Heads Legal Guide, The Secondary Heads Association, Home-School Practice issues. During her years as a Head Teacher at First Base (a Pupil Referral Unit and Behaviour Support Service for 111 schools in Suffolk) she attracted national recognition for her innovative work with the main client group of 3 – 8 year olds and also for cross age tutoring of Key Stage 3 and 4 students (13 – 16 year olds) at risk of exclusion and disaffection. In recent years Eithne has gained experience in the National Strategies working in interim Regional Adviser roles for Early Years and also for School Improvement, providing advice and guidance to Local Authorities in Northamptonshire and more recently in Hounslow. Eithne's consultancy work in recent years has involved: training for teachers and headteachers in developing effective school improvement, schools and working in these areas at a more strategic level with Local Authorities. Eithne also provides parent and child coaching services and mentoring and coaching for headteachers and aspiring headteachers.

Mangates

mangates

5.0(1)

London

WHO WE ARE? “Mangates” is one of the Leading Competency developers, Mangates has developed a proven foundation for building specialized training programs. No matter which Mangates training division you are working with, you can expect the same high-quality training experience and expertise that makes Mangates stand out above the competition. All of our instructors are recognized experts in their fields with hands-on experience on the topics they teach. We combine proven adult educational training methods with leading-edge industry expertise to provide you an exceptional training experience. Every instructor must meet rigorous standards with the proven background in their given field of expertise. It is the difference that our customers covet and participant appreciates at the completion of the course. WHAT WE DO? We deliver training solutions to Corporate, Government Agencies, Public sectors, Multinational organizations and Private Individuals. Our Primary focus is to train in a wide range of areas from IT Technical, Personal Development, Human Resources and Management Courses to Project, Program and IT Service Management. We have most experienced trainers in the Industry. Our Trainers are highly skilled in their subject areas and are uniquely positioned to provide participants with deep industry experience. They are motivated to transfer knowledge through practical support post and pre-training to provide participants with additional support outside the classroom.