• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

41421 Courses

Driver CPC - 1 Day Periodic 7 Hour Course - Public & Company Image / Health and Safety

By Total Compliance

Course Description: Enhance your company’s reputation and commitment to health and safety with our Public & Company Image / Health and Safety Awareness Training. This essential course is designed to help organisations and employees understand the impact of their actions on public perception, and equip them with health and safety knowledge that supports a safe, professional, and positive work environment. Course Format: Online

Driver CPC - 1 Day Periodic 7 Hour Course - Public & Company Image / Health and Safety
Delivered Online + more
£69.95

Applying Professional Scrum

By Fractal Training

Agile techniques and management frameworks are changing the way organisations operate. Evolving to realise that organisations are no longer static and structured entities is the key to unlocking new ways to achieve better results. Agile can be utilised at an organisation, team, and project level. Transforming to an Agile way of working requires knowledge, commitment, and frameworks to lead change. The Applying Professional Scrum training teaches key implementation techniques and Scrum frameworks. Course Description Applying Professional Scrum Training ONLINE Getting results with the Scrum framework Scrum is the most used Agile framework for complex product development and project management. It is a proven system, in use for over 25 years by companies large and small. Scrum training introduces an iterative and incremental approach to product or project development – aiming to reduce complexity and achieve results faster. A Scrum team works simultaneously rather than sequentially, with more flexibility. Scrum teams learn to work better together, delivering more value for project stakeholders. Applying professional scrum training The Applying professional Scrum (APS) course introduces the Scrum framework and demonstrates its power over traditional approaches to project or product development. It is an interactive course that aims to familiarise participants with its iterative and 'Sprint' based methodology. The Scrum framework is commonly used in software development but is relevant in any industry or to any complex project. Course contents and key objectives The course will teach participants how to apply Professional Scrum and the Scrum framework. It is appropriate for anyone, whether or not they have previous exposure to Scrum. Contents of the two-day course include: Understanding more about Agile development and the value that an Agile mindset can bring. Explain how Scrum differs from traditional work models and the advantages this offers. Explain the details of the Scrum methodology and its practical application. Understand how to apply Scrum to projects and teamwork. This includes the concepts of the Scrum team, Sprints, Sprint reviews, and the Daily Scrum. Course attendees will work in Scrum teams to simulate a Scrum project. This will involve a series of 'sprints' to solve complex problems and demonstrate the Scrum approach's power. Such Sprints are key to the Scrum framework. They bring in the iterative way of working, giving teams the chance to review success and quickly adapt to meet business requirements. As part of this practical approach, participants will learn to recognize and understand common missteps and misunderstandings when using Scrum. Expected Outcomes from Applying professional scrum training Applying professional scrum training will teach attendees what Scrum is, the value it can deliver, and how to implement it. The practical and example-based nature of the course will help develop a thorough understanding of the Scrum framework. Experience is the key to implementing it in practice. As such, the course is designed to mimic this and teach the problems to look out for and their solution. Participants will emerge as proficient Scrum practitioners – ready to transform the development of their projects. Who Should Attend This Course? Scrum is beneficial for any company, or individual, with complex projects or products. This course provides an introduction and solid grounding in Scrum, enabling participants to work effectively within the Scrum team and to go on to further training if desired. It is ideal for anyone: Working in or joining a team that uses Scrum. Considering the use of Scrum or investigating its benefits. Working alongside or managing Scrum teams – even if not using the methodology directly. Your Professional Scrum Trainer Meet Jay, founder of Fractal Systems and a dedicated Professional Scrum Trainer. With over 20 years of experience in team and leadership roles, Jay is well-versed in delivering continuous value. His unique teaching approach involves zero PowerPoint and instead relies on engaging, experience-based sessions using techniques from Liberating Structures and Neuro Linguistic Programming. Jay's expertise lies in business transformations, offering training, mentoring, coaching, and consulting to foster success through collaborative efforts. Rapid learning and practical application are the hallmarks of his approach. Jay & the entire Fractal team are invested in your learning journey and are here to support you from start to end, including offering additional valuable support: Free practice assessments for certification success Free resource bundle to master Scrum Free exam revision sheets Free access to an exam simulator Free exam coaching sessions for first-time success Free 1:1 coaching to excel at work Our Clients Our Testimonials

Applying Professional Scrum
Delivered OnlineFlexible Dates
£950

Level 3 Safeguarding

5.0(50)

By Pochat Training

FAA Level 3 Award In Principles Of Safeguarding And Protecting Children, Young People Or Vulnerable Adults (RQF) Face to Face Classroom: One day course Virtual Classroom: 3 session of 2 ½ hours For those who work with children, young people and vulnerable adults Promotes awareness of safeguarding, enabling learners to identify problems and show where to report these to Course Contents: Safeguarding and protecting children, young people or vulnerable adults How to respond to evidence or concerns that a child, young person or vulnerable adult has been abused Safeguarding legislation and guidance Indicators of abuse or neglect Making judgements Communicating worries and concerns Roles and responsibilities Sharing information Allegations and complaints Reporting allegations and complaints Benefits of this Course: In 2018/2019, 415,050 concerns of abuse were raised In 2018/2019, there were nearly 400,000 children in need 52,300 children were subject to a child protection plan 63% of adult safeguarding concerns are for people over 65 1 in every 42 adults aged 85+ have required safeguarding enquires... Child abuse often goes unreported and unrecorded - till it is picked up on by someone who then does something about it. This Level 3 Safeguarding course gives people the skills and knowledge to make a real difference to a person's life! Accredited, Ofqual regulated qualification Our Safeguarding and Protecting Children, Young People or Vulnerable Adults training course is a nationally recognised, Ofqual regulated qualifications accredited by First Aid Awards Ltd. This means that you can be rest assured that your Principles of Safeguarding and Protecting Children, Young People or Vulnerable Adults Certificate provides information for best practice to make a real difference to protect the health and wellbeing of our most vulnerable. The Ofqual Register number for this course is 601/8471/1

Level 3 Safeguarding
Delivered in Chesterfield or Online + more
£105

BRCGS Professional 3-Day Fast Track (3 Days)

5.0(36)

By Ask Sonia Limited

Official BRCGS Professional 3-Day Fast Track program. Delivered online (Zoom) by a live BRCGS Approved Training Partner. Exam and Certificate fee included in the price.

BRCGS Professional 3-Day Fast Track (3 Days)
Delivered Online + more
£735

55128 Writing Reports with Report Builder and SSRS Level 2

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course are persons who are new to reporting with Microsoft© SQL Server© Report Builder and SSRS, persons who are transitioning from another reporting software application, and persons who are existing Report Builder and SSRS report authors. The secondary audience for this course are persons who are using Report Designer (SSRS). Course participants may be business analysts, programmer analysts, data analysts, database administrators, or IT professionals and may or may not have experience with Microsoft© SQL Server© Report Builder and SSRS, programming (Visual Basic), and/or Transact-Structured Query Language (T-SQL) experience. Overview After completing this course, students will be able to: Create parameter reports. Create list reports. Format reports with complex expressions. Add images and subreports. Add drilldown and drillthrough functionality. Add sparklines, data bars, and indicators. In this course, students will continue their learning on the foundations of report writing with Microsoft© SQL Server© Report Builder and SSRS. The focus will be on report creation by connecting to a database and manipulating the data. 1 - Parameter Reports Parameterized Reporting Create Report Parameters Modify Report Parameters Provide Default Parameter Values Provide Available Values for Parameters Lab: Creating Parameterized Reports 2 - List Data Regions Introducing the List Data Region Create Reports Using List Data Regions Modify Reports Which Use List Data Regions Lab: Creating List Reports 3 - Enhancing Reports with Complex Expressions Formatting Reports Top N Reports Running Values Lab: Enhancing Reports with Complex Expressions 4 - Enhance Reports with Images and Subreports Add Images to Reports Retrieve Images from a Database Introducing SSRS (SQL Server Reporting Services) Report Server Add Subreports to Reports Lab: Working With Images and Subreports 5 - Drilldown and Drillthrough Reports Add and Configure Drilldown Reporting Add and Configure Drillthrough Reporting Lab: Add Drilldown and Drillthrough Functionality to Reports 6 - Sparklines, Data Bars, and Indicators Sparklines Data Bars Indicators Lab: Adding Sparklines, Data Bars, and Indicators to Reports Additional course details: Nexus Humans 55128 Writing Reports with Report Builder and SSRS Level 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55128 Writing Reports with Report Builder and SSRS Level 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55128 Writing Reports with Report Builder and SSRS Level 2
Delivered Online
£1,190

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered Online
£3,495

B12 and Pernicious Anaemia Training - Webinar

4.9(21)

By AB Health Group

Course Introduction Covers B12 deficiency, pernicious anaemia, diagnosis, treatment and management. It also covers signs and symptoms. Please note: this course is for health care professionals or those working in Primary Care. It is not open to Beauticians unless you are a registered healthcare professional. If in doubt- please email annie at training@anniebarr.com or phone +44 7500048222 About this event Course Introduction This course concentrates on B12 deficiency, symptoms, treatments and management. The course covers B12 deficiency, pernicious anaemia, diagnosis, treatment and management. It also covers signs and symptoms of pernicious anaemia. This course is interactive and we include case studies and discuss issues regarding diagnostic testing.  We review inclusion and exclusion criteria and identification of appropriate clients. Delegates will get the opportunity to review practice with hands on practical demonstrations of how to give injections correctly. We will cover administration techniques, where to give the injections and record keeping / documentation. We will discuss role and responsibilities and contraindications and precautions. The delegates will leave this course with an example of an individual protocol of Patient Specific Direction (PSD) and a competence based framework document to be used in practice. This course is very interactive. AIMS AND OBJECTIVES Understand the need for accountability and responsibility in relation to role development Demonstrate an understanding of safe practice Describe the signs and symptoms of pernicious anaemia Describe pernicious anaemia and its impact on patients Fully understand the principles, and practice B12 deficiency and B12 injections Understand the importance of safety issues related to giving injections Understand the law relating to role and function of the HCA and prescribing. Describe why patients require B12 injectionsBe able to correctly identify anatomical sites for injectionsDemonstrate correct administration techniquesDemonstrate how to correctly dispose of wasteDemonstrate correct infection control procedures and use of PPEDescribe when patients require referral and understand the importance of referral using correct clinical pathwaysDemonstrate an understanding of anaphylaxis and emergency proceduresUnderstand the need for correct prescribing proceduresBe able to document consultations following your organisations procedures     COURSE CONTENTS Role and responsibilities Accountability guidelines and requirements Pernicious anaemia Blood- function B12 Deficiency Risk factors/groups Causes of B12 deficiency Diagnosis and reference ranges, testing Protocols and guidelines Factors affecting B12 diagnosis and treatment Factors affecting absorption B12 injections and common side effects Could it be B12 Deficiency Supplements Side effects and management including ADR’s Contraindications and Precautions Correct Administration and techniques including practical session Injection sites Legal Issues including consent Prescribing and Patient Specific Directions What to record Storage Disposal of injections/waste Infection control Needle stick injuries Competence and supervised practice Policies and procedures Facts and Figures Setting up and running a clinic Insurance/indemnity Research/evidence base and resources Please note Anaphylaxis is not covered on this course, however we do run a separate Anaphylaxis 1hr training course, which takes place at the end of this B12 webinar. If you wish to do the 1 hr Anaphylaxis also, you should book onto BOTH courses. WHO SHOULD ATTEND? HCAs Nurses Doctors Pharmacists Anyone interested in Vitamin B12 deficiency and pernicious anaemia and those working with clients with B12 deficiency AB Health Group awards CPD points / certificate of attendance for each course. If you would prefer an accredited certificate by our accrediting body Aim Qualifications we can organise this. The charge for the certificate including postage is £30.

B12 and Pernicious Anaemia Training - Webinar
Delivered Online
£299

QA Level 3 Award In Education And Training (RQF)

5.0(50)

By Pochat Training

What past delegates said: "I started looking for a course in education and training when I was offered a chance to help deliver some health & safety training in my local area - I was incredibly lucky to have found Ottilia Pochat Training. Ottilia has a wealth of experience in teaching, and she managed to share those skills and techniques with us in a way that was both incredibly informative and fun! I can’t recommend Ottilia Pochat Training highly enough - why wouldn’t you want to learn how to teach from the best?" This course is fully tutor-led and teaches you how to become a good, quality trainer Virtual Classroom, this course is run over 8 weeks: 16 sessions of 2½ hour duration, from 10:00 -12:30 and 13:30 - 16:00 The virtually run course starting on Friday 7 July will be held over 8 consecutive Fridays Face to Face: Five-day course Run by a Dutch teacher who spent 4 years learning to teach and has international teaching experience in working with all age groups Course Contents Roles and responsibilities in education and training Ways to maintain a safe and supportive learning environment Relationships between teachers and other professionals Boundaries between the teaching role and other professionals Points of referral to meet the individual needs of learners Inclusive teaching, including:Ways to create an inclusive teaching and learning environmentCreating an inclusive teaching and learning planJustifying own selection of teaching and learning approaches, resources and assessment methods in relation to individual learner needsUsing teaching and learning approaches to meet learner needsEvaluating the delivery of inclusive teaching and learning including areas for improvementDelivering inclusive teaching and learning to meet individual needs Communicating with learners in a way that meets their needs Understanding assessment in education and training, including:Different methods of assessment and how they can be adapted to meet individual learner needsHow to involve learners and others in the assessment processThe role and use of constructive feedbackRecord keeping of assessments Benefits of this course: This Ofqual regulated course will allow you to work in adult education Or even, run online training sessions With this course, you'll also be able to run professional workshops Accredited, Ofqual regulated qualification Our QA Level 3 Award in Education and Training (RQF) Course is a nationally recognised, Ofqual regulated qualification accredited by Qualsafe Awards. This means that you can rest assured that your level 3 Award in Education and Training fulfils the legal requirements to kick-start your own career in Education and Training. The Ofqual Register number for this course is 603/2770/4

QA Level 3 Award In Education And Training (RQF)
Delivered in Chesterfield or Online + more
£575

GIC (Two Day Course) - NLS Place - University Hospital Lewisham

5.0(3)

By Hunter Clinical Training

You are only eligible to attend this course if you have been given Instructor Potential (IP'd) on the relevant provider course. You will not be eligible to attend this course without this.  **PLEASE ONLY APPLY FOR THE CORRECT ALLOCATION YOU HAVE BEEN GIVEN INSTRUCTOR POTENTIAL FOR!** The Generic Instructor Course trains future Instructors in the principles of adult learning. These skills can then be used to teach fellow healthcare professionals at a number of our courses, including ALS, EPALS and NLS. This course is a joint collaboration between Resuscitation Council UK and the Advanced Life Support Group (ALSG). Around 900 Instructors are trained on this course every year. This course consists of a day of e-learning followed by two days of face-to-face attendance, which will take place in a Resuscitation Council UK Course Centre.  Across the two day face-to-face sessions, Candidates will attend a lecture before taking part in practical sessions that cover the teaching modalities required to teach the provider courses. These include approaches to teaching skills acquisition, facilitating simulation, undertaking assessments and providing feedback to candidates. After successful completion of the GIC, Candidates must teach on two provider courses as an Instructor Candidate (IC) within two years of the GIC in order to complete their training and receive their qualification.

GIC (Two Day Course) - NLS Place - University Hospital Lewisham
Delivered In-Person in London + more
£670

PROFESSIONAL TRAINING: MODULE 5 – INTRODUCTION TO PATTERN DRAFTING AND ACCESSORY MAKING – PART 1

5.0(52)

By The London Leather Workshop

This course is not suitable for total beginners. To attend this course, you must already have some experience with industrial machines and be able to operate and set up a walking foot independently, or have attended our MODULE 3 – INDUSTRIAL MACHINE TRAINING. Summary of topics covered in the class: – Principles of pattern making for bags – Analysis of the main bag constructions – Pattern making and development for three-dimensional shapes By the end of the tuition, you will have: – Learnt how to develop patterns for simple three-dimensional shapes featuring gussets – Applied the concept of seam, folding, and trimming allowances when drafting patterns – Created finished patterns of various constructions for you to keep – Worked with a variety of tools for pattern making All materials are included, there are no additional costs. Find all modules here: https://the-london-leather-workshop.cademy.co.uk/

PROFESSIONAL TRAINING: MODULE 5 – INTRODUCTION TO PATTERN DRAFTING AND ACCESSORY MAKING – PART 1
Delivered In-Person in London + more
£225 to £264