• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

41537 Courses

CITB SITE SUPERVISORS SAFETY TRAINING SCHEME

5.0(7)

By Safehouse Health And Safety Consultants Ltd

The CITB SSSTS course is an accredited Site Supervisors Safety Training Scheme for the construction site supervisor, these are generally referred to as SSSTS training courses. The supervisors safety training scheme is now a requirement set out by the major contractors group for all supervisors who will be working on their sites. Construction skills and health and safety need to go hand in hand and made a priority to encourage improved work skills and reduced accidents and injuries. On the 2 day SSSTS training course the main focus will be on: THE IMPORTANCE OF RISK ASSESSMENTS IN THE CONSTRUCTION INDUSTRY THERE IS A FOCUS ON HOW TO IMPLEMENT CONTROL MEASURES ON SITE AND HOW TO USE COMMUNICATION TO ENSURE THE SITE REMAINS SAFE FOR EVERYONE MONITORING THE CONTROL MEASURES AND WORK ACTIVITIES ENSURING THAT THE WORK IS CARRIED OUT CORRECTLY AND SAFELY Delegates attending CITB SSSTS courses and who successfully complete will receive a SSSTS certificate to show that they are able to help supervise in the construction industry and have understanding when it comes to health and safety in the work place. During the course the main topics of the syllabus are: THE HEALTH AND SAFETY ACTS, REGULATIONS APPROVED CODES OF PRACTICE AND GUIDANCE NOTES THE HEALTH AND SAFETY LEGAL SYSTEM CAUSES, TYPES AND THE NUMBERS OF CONSTRUCTION ACCIDENTS RISK ASSESSMENTS IN ALL MANNER OF CONSTRUCTION CIRCUMSTANCES The concise SSSTS courses will provide you with the skills to: IDENTIFY PROBLEM AREAS FOUND IN THE CONSTRUCTION INDUSTRY UNDERSTAND AND APPRECIATE PROACTIVE AND REACTIVE MONITORING PERFORM RISK ASSESSMENTS AND RECOGNISE THE IMPORTANCE OF METHOD STATEMENTS HAVE AN UNDERSTANDING OF THE WAY THE HEALTH AND SAFETY LAWS ARE STRUCTURED LEARN SKILLS NEEDED TO PERFORM ON SITE INDUCTIONS, METHOD BRIEFS AND TOOLBOX TALKS CITB SSSTS Courses at a Glance The SSSTS training course is designed for first line mangers looking to continue or take on a supervisory role within the construction industry. The course takes place over two days and will teach health and safety skills needed to maintain a safe site. A thirty minute multiple choice examination will follow the training. Upon successful completion of the SSSTS training the candidate will be awarded with the CITB Site Supervisory Safety Training Certificate. Further Development Successful candidates can go on to complete the 5 day site managers safety training scheme SMSTS course designed for site managers and supervisors.

CITB SITE SUPERVISORS SAFETY TRAINING SCHEME
Delivered In-Person in Barnsley
£275

FORS Safe Driving - Periodic 7 Hour CPC Course -Birmingham

By Total Compliance

#SafeUrbanDriving #Birmingham #driver #driver_safety #driver_training #fors #nottingham #sud

FORS Safe Driving - Periodic 7 Hour CPC Course -Birmingham
Delivered In-Person in Birmingham + more
£122.75

PEG Feeding Training

4.9(1007)

By Caring For Care

This course cover the below - the usual duration is approx 6 hour which includes a simulated competency. About this event This course cover the below - the usual duration is approx 6 hour which includes a simulated competency. The course is delivered by our registered nurse trainers who are experts in enteral feeding. We will provide workbooks, competency paperwork as well as all the assciated enteral feeding tubes and machines for practical demonstration with. The purpose of PEG feeding Conditions which may require a PEG Indications and contra indications of PEG The procedures for feeding and administering medications via PEG Recognising, dealing with and reporting complications The care and maintenance of enteral feeding tubes Procedures for effective mouth care Documentation and record keeping Practical session

PEG Feeding Training
Delivered In-Person in Stoke On Trent
£170

Kids' Archery @ Merryoaks Community Hall 4pm Mondays (Autumn Term)

By Kids Archery Durham

Does your child long to be Robin Hood, Merida, Katniss or Hawkeye? Now's their chance! At Kids' Archery Durham, children can learn all about the art of archery in a safe and fun way. They can work towards badges and certificates, develop the confidence that comes from learning a new skill, be active, make friends and most importantly - have fun!

Kids' Archery @ Merryoaks Community Hall 4pm Mondays (Autumn Term)
Delivered In-Person in Durham + more
£4.50 to £26

Kids' Archery @ Merryoaks Community Hall 4.45pm Mondays Winter 24/25

By Kids Archery Durham

Does your child long to be Robin Hood, Merida, Katniss or Hawkeye? Now's their chance! At Kids' Archery Durham, children can learn all about the art of archery in a safe and fun way. They can work towards badges and certificates, develop the confidence that comes from learning a new skill, be active, make friends and most importantly - have fun!

Kids' Archery @ Merryoaks Community Hall 4.45pm Mondays Winter 24/25
Delivered In-Person in Durham + more
£4.50 to £26

Occupational Health Immunisation Update - Webinar

4.9(21)

By AB Health Group

Tailored to Occupational Health Nurses needs. Updating and any new immunisation advice. Discussion on Contraindications, side effects, vaccine ingredients, research etc. Very interactive discussions.

Occupational Health Immunisation Update - Webinar
Delivered Online + more
£210

ALS Recertification (One Day Course) - Moorfields Eye Hospital

5.0(3)

By Hunter Clinical Training

e-ALS ALS recertification

ALS Recertification (One Day Course) - Moorfields Eye Hospital
Delivered In-Person in London
£410

ITIL© 4 High Velocity IT (HVIT)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Delegates attending this course must have successfully achieved the ITIL 4 Foundation Qualification; your certificate must be presented as documentary evidence to gain admission to this course. Ideally candidates should have at least two years professional experience working in IT Service Management. The ITIL 4 HVIT Qualification would most likely suit the following delegates: Individuals continuing of their journey in service management ITSM managers and aspiring ITSM managers IT managers and practitioners involved in digital services or working in digital transformation projects, working within or towards high velocity environments Existing ITIL qualification holders wishing to develop their knowledge The above list is a suggestion only. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs. Overview This course has been created to help IT service management practitioners working in organizations that are becoming more digitally enabled. The practitioners are familiar with traditional IT service management concepts, and now want to be able to discuss ?digital? with more confidence, to develop practical competences, and to be valued contributors in the digital domain. They want to improve how they and their co-workers: Help get customers? jobs done ? helping customers become who they seek to become Keep raising the bar ? taking things to a significantly higher level Trust and are trusted ? as professional knowledge workers in a healthy workplace Accept ambiguity and uncertainty - not scared of not knowing an answer Commit to continual learning ? all as part of their daily work The scope of the course is the primary activities in the digital value chain. In other words, what the practitioner does and which resources they use across the lifecycle of digital products, in order to: Make the right digital investments Realize and deliver digital products and services quickly Provide digital products and services that are highly resilient to disruption Ensure that the service consumer realizes value from the digital products and services Assure conformance of activities with governance, risk and compliance requirements. Understand and know how to use the key principles and methods of Organizational Change Management to direction, planning and improvement Understand and know how to use the key principles and methods of measurement and reporting in directing, planning and improvement Understand and know how to direct, plan and improve value streams and practices ITIL 4 is a framework for quality IT service management (ITSM) through proven best practice, providing practical and flexible guidance to support your organization on its journey to digital transformation while empowering your IT teams to continue to play a crucial role in the wider business strategy. This course highlights the ways in which digital organizations and digital operating models function in high-velocity environments, including the use of working practices such as Agile and Lean, and technical practices and technologies such as Cloud, Automation, and Automatic Testing. This class includes an exam voucher. Prerequisites ITIL© 4 Foundation 1 - THE NATURE OF HIGH-VELOCITY IN A DIGITAL WORLD Overview of the key ITIL 4 high-velocity terminology Understand when the transformation to high velocity IT is desirable and feasible Understand the five objectives associated with digital products ? to achieve: Valuable investments ? strategically innovative and effective application of IT Fast development - quick realization and delivery of IT services and IT-related products Resilient operations - highly resilient IT services and IT-related products Co-created value - effective interaction between service provider and consumer Assured conformance - to governance, risk and compliance (GRC) requirements. 2 - ITIL OPERATING MODEL ? DIGITAL PRODUCT LIFECYCLE Understand how high velocity IT relates to: The four dimensions of service management The ITIL service value system The service value chain The digital product lifecycle 3 - FUNDAMENTAL CONCEPTS FOR DELIVERING HVIT Understand the following concepts: Ethics Safety culture Toyota Kata Lean / Agile / Resilient / Continuous Service-dominant logic Design thinking Complexity thinking Use the principles, models and concepts to contribute to: Help get customers? jobs done Trust and be trusted Commit to performance Deal with uncertainty Improve by being inquisitive 4 - ACHIEVING VALUE WITH DIGITAL PRODUCTS Know how the service provider ensures valuable investments are achieved. Know how to use the following practices to contribute to achieving valuable investments: Portfolio management Relationship management Know how the service provider ensures fast deployment is achieved Know how to use the following practices to contribute to achieving fast deployment: Architecture management Business analysis Deployment management Service validation and testing Software development and management Know how the service provider ensures resilient operations are achieved Know how to use the following practices to contribute to achieving resilient operations: Availability management Capacity and performance management Monitoring and event management Problem management Service continuity management Infrastructure and platform management Know how the service provider ensures co-created value is achieved Know how to use the following practices to contribute to achieving co-created value with the service consumer: Relationship management Service design Service desk Know how the service provider ensures assured conformance is achieved Know how to use the following practices to contribute to achieving assured conformance: Information security management Risk management

ITIL© 4 High Velocity IT (HVIT)
Delivered Online
£2,385

SC-300T00 Microsoft Identity and Access Administrator

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization?s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance. Prerequisites SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals AZ-104T00 - Microsoft Azure Administrator 1 - Explore identity in Microsoft Entra ID Explain the identity landscape Explore zero trust with identity Discuss identity as a control plane Explore why we have identity Define identity administration Contrast decentralized identity with central identity systems Discuss identity management solutions Explain Microsoft Entra Business to Business Compare Microsoft identity providers Define identity licensing Explore authentication Discuss authorization Explain auditing in identity 2 - Implement initial configuration of Microsoft Entra ID Configure company brand Configure and manage Microsoft Entra roles Configure delegation by using administrative units Analyze Microsoft Entra role permissions Configure and manage custom domains Configure tenant-wide setting 3 - Create, configure, and manage identities Create, configure, and manage users Create, configure, and manage groups Configure and manage device registration Manage licenses Create custom security attributes Explore automatic user creation 4 - Implement and manage external identities Describe guest access and Business to Business accounts Manage external collaboration Invite external users - individually and in bulk Demo - manage guest users in Microsoft Entra ID Manage external user accounts in Microsoft Entra ID Manage external users in Microsoft 365 workloads Implement and manage Microsoft Entra Verified ID Configure identity providers Implement cross-tenant access controls 5 - Implement and manage hybrid identity Plan, design, and implement Microsoft Entra Connect Implement manage password hash synchronization (PHS) Implement manage pass-through authentication (PTA) Demo - Manage pass-through authentication and seamless single sign-on (SSO) Implement and manage federation Trouble-shoot synchronization errors Implement Microsoft Entra Connect Health Manage Microsoft Entra Health 6 - Secure Microsoft Entra users with multifactor authentication What is Microsoft Entra multifactor authentication? Plan your multifactor authentication deployment Configure multi-factor authentication methods 7 - Manage user authentication Administer FIDO2 and passwordless authentication methods Explore Authenticator app and OATH tokens Implement an authentication solution based on Windows Hello for Business Deploy and manage password protection Configure smart lockout thresholds Implement Kerberos and certificate-based authentication in Microsoft Entra ID Configure Microsoft Entra user authentication for virtual machines 8 - Plan, implement, and administer Conditional Access Plan security defaults Plan Conditional Access policies Implement Conditional Access policy controls and assignments Test and troubleshoot Conditional Access policies Implement application controls Implement session management Implement continuous access evaluation 9 - Manage Microsoft Entra Identity Protection Review identity protection basics Implement and manage user risk policy Monitor, investigate, and remediate elevated risky users Implement security for workload identities Explore Microsoft Defender for Identity 10 - Implement access management for Azure resources Assign Azure roles Configure custom Azure roles Create and configure managed identities Access Azure resources with managed identities Analyze Azure role permissions Configure Azure Key Vault RBAC policies Retrieve objects from Azure Key Vault Explore Microsoft Entra Permissions Management 11 - Plan and design the integration of enterprise apps for SSO Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report Configure connectors to apps Design and implement app management roles Configure preintegrated gallery SaaS apps Implement and manage policies for OAuth apps 12 - Implement and monitor the integration of enterprise apps for SSO Implement token customizations Implement and configure consent settings Integrate on-premises apps with Microsoft Entra application proxy Integrate custom SaaS apps for single sign-on Implement application-based user provisioning Monitor and audit access to Microsoft Entra integrated enterprise applications Create and manage application collections 13 - Implement app registration Plan your line of business application registration strategy Implement application registration Register an application Configure permission for an application Grant tenant-wide admin consent to applications Implement application authorization Manage and monitor application by using app governance 14 - Plan and implement entitlement management Define access packages Configure entitlement management Configure and manage connected organizations Review per-user entitlements 15 - Plan, implement, and manage access review Plan for access reviews Create access reviews for groups and apps Create and configure access review programs Monitor access review findings Automate access review management tasks Configure recurring access reviews 16 - Plan and implement privileged access Define a privileged access strategy for administrative users Configure Privileged Identity Management for Azure resources Plan and configure Privileged Access Groups Analyze Privileged Identity Management audit history and reports Create and manage emergency access accounts 17 - Monitor and maintain Microsoft Entra ID Analyze and investigate sign-in logs to troubleshoot access issues Review and monitor Microsoft Entra audit logs Export logs to third-party security information and event management system Analyze Microsoft Entra workbooks and reporting Monitor security posture with Identity Secure Score

SC-300T00 Microsoft Identity and Access Administrator
Delivered Online
£2,380

Level 3 Safeguarding

5.0(50)

By Pochat Training

FAA Level 3 Award In Principles Of Safeguarding And Protecting Children, Young People Or Vulnerable Adults (RQF) Face to Face Classroom: One day course Virtual Classroom: 3 session of 2 ½ hours For those who work with children, young people and vulnerable adults Promotes awareness of safeguarding, enabling learners to identify problems and show where to report these to Course Contents: Safeguarding and protecting children, young people or vulnerable adults How to respond to evidence or concerns that a child, young person or vulnerable adult has been abused Safeguarding legislation and guidance Indicators of abuse or neglect Making judgements Communicating worries and concerns Roles and responsibilities Sharing information Allegations and complaints Reporting allegations and complaints Benefits of this Course: In 2018/2019, 415,050 concerns of abuse were raised In 2018/2019, there were nearly 400,000 children in need 52,300 children were subject to a child protection plan 63% of adult safeguarding concerns are for people over 65 1 in every 42 adults aged 85+ have required safeguarding enquires... Child abuse often goes unreported and unrecorded - till it is picked up on by someone who then does something about it. This Level 3 Safeguarding course gives people the skills and knowledge to make a real difference to a person's life! Accredited, Ofqual regulated qualification Our Safeguarding and Protecting Children, Young People or Vulnerable Adults training course is a nationally recognised, Ofqual regulated qualifications accredited by First Aid Awards Ltd. This means that you can be rest assured that your Principles of Safeguarding and Protecting Children, Young People or Vulnerable Adults Certificate provides information for best practice to make a real difference to protect the health and wellbeing of our most vulnerable. The Ofqual Register number for this course is 601/8471/1

Level 3 Safeguarding
Delivered in Chesterfield or Online + more
£105