FOUR DAY ATTENDENCE AND TRAINING GUIDELINE: DAY ONE AND TWO - INTRODUCTION TO DERMAL FILLERS Day one Arrive and coffees (10.00) Registration, introduction and expectations (10.00-10.15) Structure of the training (10.15-10.30) Break (10.30-11.00) Lectures and interactive workshops / simulation (11.00 - 1230pm) Health and safety in the workplace Sharps injury and disposal The consultation process and prescriptions LUNCH (1300-1730) with a coffee break Basic life support Anaphylaxis - recognition and management Emergency kits - what it should contain and how to buy one Your doctors on call - how to contact our on call doctors for emergency advice How to use Hyalase safely - when to use it / recognise mechanism of action, how prescription in an emergency works and how to give the hyalase Practical and to include demonstration of Hyalase injection Our added benefits services for safety and convenience Day two Arrive and coffees (10.00) introduction and expectations (10.00-10.30) Structure of the training (10.30-11.00) Formal written examination covering key areas of THEORY for Dermal Filler injections: Anatomy, Physiology, Products and Complications. This will highlight early on if any important areas need to be covered in more detail for the students (11.00 - 1200) - Break for lunch - Practical session commences - (12.30 - 1800) - and in total on average we have scope for one model per 30 minutes on both of the Dermal filler days, so that’s a potential for 10 in total for a class size of maximum 4, which will give good hands on experience, as the way we train is to allow several people the opportunity to be involved with each patient - e.g. splitting into the phases of treatment, which allows the trainees to understand the concept of the treatment process. That would be - consultation, consent, marking up, readying equipment, performing the injection, providing advice and aftercare. DAY THREE AND FOUR BOTOX FOUNDATION COURSE Day three Arrive and coffees (10.00) introduction and expectations (10.00 – 10.30) Structure of the training (10.30 – 11.00) Formal written examination covering key areas of THEORY for Botox Application: Anatomy, Physiology, Products and Complications. This will highlight early on if any important areas need to be covered in more detail for the students (11.00 - 1200) - Break for lunch - Practical session commences - (12.30 - 1800) - and in total on average we have one model per 30 minutes on both the botox and days, so that’s a potential of 10 in total for a class size of 4, which will give good hands on experience, as the way we train is to allow several people the opportunity to be involved with each patient - e.g. splitting into the phases of treatment, which allows the trainees to understand the concept of the treatment process. That would be - consultation, consent, marking up, readying equipment, performing the injection, providing advice and aftercare. Day four Observed Treatment Process Examination The participants will be tested on the following key facets of safe practical care: Consultation process - rapport and understanding what the client wants Safe consent Marking and photographs Technical skill of injection Atercare provision and safety netting (eg if this happens do this / call me) 1 model will be provided for Botulinum (3 area) treatment and 1 - 2 clients for filler to ensure that each of the key anatomical areas covered are observed. Morning = Botulinum (0900 - 1230) Afternoon = Botulinum and Option Dermal fillers (1330 - 1630) Conclusion Candidates given session and refreshments and discussion regarding Case Studies and further support. (1700 - 1800)
Restorative Interventions in Schools A “Restorative Solution” is a non-adversarial approach to conflict resolution where the person who has done something wrong in a given situation becomes accountable to those s/he has harmed. This person is then given the opportunity to “make up” for their inappropriate behaviour through agreement and reparation. An intervention can involve a formal conference, or it can be a simple conversation on a corridor or playground. Restorative Interventions work with all ages of young people, and the techniques can be used in parental meetings, can prevent exclusions and challenge poor behaviour. Our feedback tells us that when problems between young people are addressed in this way, those problems rarely reoccur. Course Category Behaviour and Relationships Teaching and Learning Description Restorative Interventions in Schools A “Restorative Solution” is a non-adversarial approach to conflict resolution where the person who has done something wrong in a given situation becomes accountable to those s/he has harmed. This person is then given the opportunity to “make up” for their inappropriate behaviour through agreement and reparation. An intervention can involve a formal conference, or it can be a simple conversation on a corridor or playground. Restorative Interventions work with all ages of young people, and the techniques can be used in parental meetings, can prevent exclusions and challenge poor behaviour. Our feedback tells us that when problems between young people are addressed in this way, those problems rarely reoccur. Also Available on line– self paced learning… give it a try! Testimonials ‘Interesting. A different approach. Another ‘weapon’ in the armoury. Will try to use.’ ‘Made me think how I can approach confrontations differently. Useful, reminded me where my focus should be and that things will be difficult at times, but that’s no excuse to stay in the comfort zone!’ ‘Excellent day. Lots of ideas to take away and use on a daily basis. Thanks.’ ‘Nice to do some work on behaviour without sanctions and restraints in mind’ Learning Objectives To introduce participants to Restorative Interventions To develop understanding of value and role in developing inclusive practice of Restorative Interventions To develop and practise Restorative Intervention skills processes Opportunity to reflect on professional practice Mutual support established with other ‘front line’ practitioners Who Is It For ? Multi Agency Teams Social workers CAMHS teams Year Managers Primary and secondary staff Early Years and School based Practitioners Heads and Deputies SENCOs Advanced Skills Teachers Primary and secondary teachers Local Authority Support Services Course Content This can be introduced in one day or as a workshop but is better offered over a series of sessions. The course answers the questions: What should we do if rewards and punishments do not work? Can we find an alternative process to recommending permanent exclusion or special unit or school placement? Struggling with a child for whom praise and sanctions seem ineffective? Want to develop a more restorative school or team? I need a process which works with relationships not just behaviour. What will work for our relationships policy? This day’s training will enable participants to facilitate Short Restorative Conferences, and will suggest ways of working with young people and others that will help to repair broken relationships, and challenge some difficult behaviour. Including all those affected by an incident in its resolution is a powerful way of producing significant improvements in behaviour. We will cover: What are restorative solutions? Background and detailed teaching of processes Inclusion values underpinning this work Processes modelled and opportunities to try process out Practical setting up of restorative conferences Stories and outcomes
12 week Barber Course. NVQ level 2. PABD Diploma. Plus the TB Ultra Diploma. Giving you much more time to practice will increase your confidence and your skills. Practice makes perfect. We’ve listened to feedback and now students can stay with us longer! We’ve added more Afro hair as a special component of this course plus you get more 1 to 1 training during the final 2 weeks of the course to really push yourself. You’ll be able to get more out of our tutors vast knowledge, perfect new techniques and ideas.
Develop your technical report writing and presentation skills with EnergyEdge's course designed for oil & gas professionals. Sign up now!
Develop your technical report writing and presentation skills with EnergyEdge's course designed for oil & gas professionals. Sign up now!
About this Training Course This is a 2 full-day course that is aimed at providing professionals in the Oil & Gas business with a comprehensive set of core negotiating skills. Negotiations take place in many situations e.g. between peers, manager and subordinate, company and trade unions, company and government. The skills learnt on this course will be useful in all of these situations. However, this course puts a focus on the skills needed in commercial negotiations. A particular emphasis is placed on the relationship and negotiations typically carried out between client and contractor, vendor or the provider of services. A mixture of theory, examples and practical exercises are used so that the participants understand the principles and get an opportunity to try them out. The case studies used are real cases encountered in the Oil & Gas industry. Training Objectives Many technical experts find it difficult to move out of their expertise areas and deal with commercial matters. Negotiating to optimise business value is a step further from their comfort zones. All too often negotiations are then left to finance personnel. They bring many strengths to the table but an understanding of engineering trade-offs is not one of them. By the end of this course, the participants will add to their technical know-how a core competence in negotiation skills. They will thus become formidable negotiating opponents. Target Audience The course is intended for middle-managers and technical and other staff who are responsible for contracts, but with limited previous exposure to negotiations, and who will need these skills in the near future. Course Level Intermediate Trainer Your expert course leader is a consultant, manager and engineer with more than 30 years' experience in a broad range of positions. He spent 15 years with the Shell group and during this time, gained extensive negotiating experience with contractors, vendors, service agents, trade unions and purchasers of equipment and products. Over the last 15 years, he has worked with a broad range of multinational businesses across the globe in a wide range of negotiation related roles including: Developing negotiating capability and skillsets Advising on negotiation strategies Establishing Alliances, Joint Ventures and Partnerships, & Remediating Alliances, Joint Ventures and Partnerships He has many years of teaching experience to technical staff - both in a corporate setting, and in an academic setting - for Melbourne University in Melbourne, Australia. Several thousand people from around the world have benefited from his courses. He brings an engineer's practical perspective, and can readily empathize with technical staff making forays into the commercial world of negotiations. He is joint author (with Professor Danny Samson) of Patterns of Excellence ISBN 0273638769, published by Financial Times Management. This has been adopted by a number of blue chip companies as the core text for management development. Corporate Experience: 15 years with Shell in a broad range of international & domestic technical and managerial and change management roles. Consulting Experience: 5 Years with McKinsey Consulting Group 4 Years with Melbourne Business Schoo POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.
MEF Carrier Ethernet training course description The course progresses from a overview of the Carrier Ethernet service and how it works onto looking at the concepts in depth. Service attributes and management follow with the course finishing with studies of practical Carrier Ethernet. What will you learn Discuss and understand key Carrier Ethernet Concepts. Understand tasks related to designing, deploying and maintaining a Carrier Ethernet network. Offer effective solutions to implementing a Carrier Ethernet enterprise network given available customer resources and requirements. Carry out informed discussions using industry Carrier Ethernet 'vocabulary. Pass the MEF CECP 2.0 professional accreditation exam. MEF Carrier Ethernet training course details Who will benefit: Anyone working with Carrier Ethernet Prerequisites: The course attendees need to be conversant with data networks, as well as Ethernet and IP technologies. Duration 5 days MEF Carrier Ethernet training course contents Section One: Introduction to Carrier Ethernet Introduction to Carrier Ethernet: What is Carrier Ethernet? Evolution, advantages, The MEF, MEF specifications; UNI, EVC, OVC, EPL/EVPL, EP-LAN/ EVP-LAN, EP-Tree/EVP-Tree, etc, overview. How Carrier Ethernet Works: Service Frame Handling. Carrier Ethernet at Customer Premises, metro and core. Carrier Ethernet Workings, UNI attributes, Service Attributes (EVC and EVC per UNI attributes), Bandwidth Profiles, service multiplexing, L2 protocol processing; Carrier Ethernet equipment, CPE, aggregation and homing nodes, core equipment; management systems. The Setting Up of a Carrier Ethernet Service: Step 1: Choose service type, EPL/EVPL, EP-LAN/EVP-LAN, EPTree/EVP-Tree, EVLine...; Step 2: CPE tasks, UNI-C tasks (UNI attributes, service attributes (EVC and EVC per UNI) and bandwidth profiles), UNI-N tasks (L2 protocol handling). Step 3: Non-CPE tasks, Access, metro and core connections set up. Section Two: Carrier Ethernet Concepts in depth Carrier Ethernet Definitions in Depth: UNI, UNI I & II, UNI-N and UNI-C, etc.; NNI/ENNI; EVC; OVC, OVC type (P2P, M2M, Rooted MP), OVC end point (root, leaf, trunk), OVC end point map, OVC end point bundling; Service types in detail, EPL/EVPL, EP-LAN/EVP-LAN, EP-Tree/EVP-Tree, EVLine, Access EPL, Access EVPL . Carrier Ethernet Service Frame Handling: Unicast, multicast and broadcast frame delivery, Tagged, untagged and priority; Tagging, C and S-Tags, 802.3, 802.1d, 802.1q, 802.1ad, 802.1ah evolution, VLAN ID translation/preservation. CoS preservation. Other Key Carrier Ethernet Concepts: MTU, MTU at UNI, MTU at ENNI; Physical Layer Attributes, FE, GbE and 10GbE, Service Multiplexing and Bundling Concept and detail, rules and implications; Hairpin Switching Managing Bandwidth in a Carrier Ethernet Network: Token Bucket Algorithm, EIR, CIR, CBS, EBS, Coupling Flag; Frame Colors, recoloring, Color Awareness attribute, Color Forwarding; Bandwidth Profiles, rules and concepts. MEF CoS identifiers, DEI bit (in S-Tag), PCP bit (in C-Tag or S-Tag), or DSCP (in IP header), Multiflow bandwidth concepts; CoS Label/Color Identification. Section Three: Carrier Ethernet Service Attributes Overview: Carrier Ethernet 2.0; Blueprint C Service Attributes: Per UNI, Physical interfaces, Frame format, Ingress/egress Bandwidth Profiles, CEVLAN ID/EVC Map, UNI protection. EVC per UNI, Ingress/egress Bandwidth Profiles, etc.; Per EVC, CEVLAN ID Preservation, CoS ID Preservation, Relationship between SLA and SLP, Class of Service, etc. OVC, ENNI, OVC End Point per UNI and OVC End Point per ENNI, Ingress/egress bandwidth profiles, etc. Section Four: Managing Carrier Ethernet Networks Overview: MEF Service Lifecycle.Carrier Ethernet maintenance: Port, Link & NE failure, Service Protection Technologies, Fault Identification and Recovery, LAG, Active/Standby EVC, Single EVC with transport protection, G.8031, G.8032, MPLS FRR. SOAMs: Connectivity fault management, connectivity Monitoring, Loopback, Linktrace; Performance Management, Frame Delay, Inter Frame Delay Variation, Availability, Frame Loss Ratio, Resiliency, HLI, DMM, DMR, SLM, SLR; Key Concepts, Single vs dual ended, ordered UNI pair calculations. LOAMs: Link discovery, link monitoring, etc. Terminology and Concepts: MEG levels, MIPs. Section Five: Practical Carrier Ethernet Carrier Ethernet Transport Technologies:Layer 1: SDH. Layer 2: Bridging, provider bridging, PBB, PBBTE. Layer 2.5: MPLS VPWS, MPLS VPLS, MPLS-TP. Carrier Ethernet Access Technologies: fiber, SDH, active fiber, PON, GPON, 10G PON, OTN, WDM; copper, PDH, G-SDSL, 10Pass-TS, HFC; packet radio. Optimising mobile backhaul with Carrier Ethernet Key challenges solutions: Market pressure, LTE evolution, elements and architecture (RAN BS, NC, GWIF.), synchronization, bandwidth management. Circuit Emulation over Ethernet: Purpose, needs and applications. Synchronization: Phased, ToD, External Reference source, SynchE ,NTP, IEEE-1588 v2/ PTP, ACR; MEF Service Definitions for emulated circuits. Applying what you know: Practical examples and scenarios, Carrier Ethernet solutions; Practice Scenarios, Given a scenario, determine appropriate Ethernet services
Data centre infrastructure course description This course provides a foundation in data centre infrastructure technologies. It begins with a tour of virtualisation and the impact of this on the network before moving on to the spine and leaf design, how it works and how to scale. Layer 2 technologies enabling this architecture are studied in terms of the impact on the data centre. The course then progresses onto how Layer 3 technologies such as BGP, EVPN and VXLAN are used in data centre networks. The course then studies interconnecting data centres finishing with a section on automation and orchestration of both underlay and overlay networks. What will you learn Explain the spine and leaf architecture Recognise the impact of virtualisation, containers and orchestration on the network Describe how the following technologies are used in data centres: Multi port aggregation Overlay networks MBGP, VRFs, EVPN VXLAN COOP Data centre infrastructure course details Who will benefit: Staff involved with Data centres. Prerequisites: Network fundamentals for engineers Duration 2 days Data centre infrastructure course contents What is Ethernet? Data centres versus enterprise networks. Servers, Blades, Racks, Clusters, Storage, Virtual Machines, Hosts, guests, containers, orchestration. Virtual switches. Distributed switches. Live migrations (e.g. vMotion). IP addressing and VM traffic. Data centre network architecture Spine leaf design. North south traffic, East West traffic, Scaling: Ports, bandwidth. N+1 redundancy, ratio East West optimisation, oversubscription. 2 tier versus 3 tier Leaf/Spine. Pods. Underlay, Overlay L2 technologies STP vs link aggregation vs multi link aggregation. LACP, LLDP, CDP. Scalability. VLANs and VLAN pruning. L2 design recommendations. Disabling STP on edge ports. L3 technologies Underlay, Overlay, VXLAN, VTEP, VXLAN overlay forwarding, EVPN, IS-IS, COOP, MP BGP, VRFs, EBGP, IBGP, AS numbers, route reflectors. Anycast gateways. MTU considerations-for data and control planes. BUM traffic. Data centre interconnects Pods, fabrics, multi pods, multi fabric, multi site. VXLAN with BGP/EVPN Data center interconnect. Cloud integration, Inter Site Networks. Automation Automation and orchestration, Zero touch provisioning, Devops, Netops, telemetry automated configuration for underlay and overlay, SDN.
Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces