• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

14915 Courses

Change Management Foundation: In-House Training

By IIL Europe Ltd

Change Management Foundation: In-House Training: In-House Training This course provides practical knowledge on Change Management techniques and the Foundation certification. You will examine various Change Management techniques and explore which could be effectively implemented in your organization. The structured approach helps you understand how you deal with change as an individual, as a member of a team or organization, and as a leader. The program design explores the impact that change has on these four major areas: Change and the Individual Change and the Organization Communications and Stakeholder Engagement Change Management Practice This course also prepares you for the APMG Change Management Foundation exam. Given that a primary course goal is to achieve the Foundation Certification, the course text will be provided in advance of the workshop so the participant may begin studying. In addition, daily homework assignments and practice exams will be provided. The Foundation-level exam is taken at the end of the third day of the Traditional Classroom course. Virtual Classroom participants must make separate arrangements to schedule their exam following course completion (See 'Important Note for Virtual Course Participants'). What You Will Learn You'll learn how to: Explain how individuals learn and why many may resist change Illustrate how to build an effective change team Describe the stakeholder engagement process and relate this to appropriate communication Differentiate various approaches to plan, implement, and sustain organizational change Demonstrate how to assess change impact and readiness, and deal with resistance Improve your ability to pass the APMG Change Management Foundation Certification exam Getting Started Introductions Course structure Course goals and objectives Change and the Individual How people learn Personality and change - introduction to MBTI Models of individual change - the Change Curve and Bridges' Transition Motivating individuals during change Change and the Organization Understanding organizational metaphors Organizational culture and change 3 models of change - Lewin, Kotter, and Senge Key roles in change Stakeholder Engagement Identifying and analyzing stakeholders Personas and empathy maps Influencing strategies Communication Feedback and communication approaches Communicating change - planning, factors, and barriers Communication biases and channels Change Impact Identifying and assessing change impact Stakeholder impact assessment Change severity assessment Change Readiness Building change agent networks and the change team How to make the organization ready for change Creating a change management plan Dealing with resistance to change APMG Change Management Foundation Exam Preparation Review of and practice with APMG sample questions and test papers APMG Change Management Foundation Exam Traditional Classroom: Paper-based exams will be taken on the last day of class Virtual Classroom: The exam is scheduled by the Participant and taken subsequent to the course

Change Management Foundation: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

Caring for People with Psychosis and Schizophrenia (non-RQF)

By Guardian Angels Training

Gain comprehensive understanding of caring for individuals with psychosis and schizophrenia. Enhance knowledge and skills to provide effective care and support. Designed for caregivers, family members, support workers, and healthcare professionals.

Caring for People with Psychosis and Schizophrenia (non-RQF)
Delivered In-Person in InternationallyFlexible Dates
£1,175

ISO 27701 Internal Auditor

By Training Centre

  Being ISO 27701 Certified proves your Information Privacy Systems Audit experience, skills and knowledge, and demonstrates you are capable in the assessment of vulnerabilities, Compliance with GDPR and institutional controls within the enterprise.   Gain an in-depth understanding of GDPR solutions and how they map to compliance requirements Learn how to perform and lead Privacy Information Management System (PIMS) certification audits to ISO 19011 standards Enhance your existing or learn with new skills in the field of Data Protection Candidates deliver Assurance services to organisations by advising on conformance with PIMS requirements Become a Technical expert on the preparation required for ISO 27701 Certification Understand a Privacy Information Management System (PIMS) and its processes based on ISO/IEC 27701 Identify the relationship between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks Acquire the competences of the auditor's role in planning, leading, and following up on a management system audit in accordance with ISO 19011. Learn how to interpret the requirements of ISO/IEC 27701 in the context of a PIMS audit About This Course   ISO 27701 Internal Auditor Certification;    Confirms your knowledge and experience Quantifies and markets your expertise Demonstrates that you have gained and maintained the level of knowledge required to meet the dynamic challenges of a modern enterprise Is globally recognized as the mark of excellence for the Information Privacy Audit professional Increases your value to your organization Gives you a competitive advantage over peers when seeking a new role Is administered by the International Examination & Certification Board (IECB), based in Estonia, and fully aligned to the ISO/IEC 17024:2012 standard (Conformity assessment - General requirements for bodies operating certification of persons)   Certified Individuals:    Are highly qualified, experienced professionals in the field of Data Protection Systems Audit Provide the enterprise with a Certification route for Information Privacy Assurance that is recognized by multinational clients, lending credibility to the enterprise Are excellent indicators of proficiency in control requirements creation and monitoring Demonstrate competence in five domains, including standards and practices; organization and management; processes; integrity, confidentiality and availability; and software development, acquisition and maintenance Demonstrate a commitment to providing the enterprise with trust in and value from your Privacy Compliance Framework Maintain ongoing professional development for successful on -the -job performance   The below job practice is organized by domains. Each domain is covered in the course.   Domain 1-The Process of Auditing Information Privacy Systems and Solutions   Provide audit services in accordance with ISO 19011 audit standards to assist the organization in protecting and controlling information privacy systems.    Domain 2 - Governance and Management of Information Privacy Technology   Provide assurance that the necessary leadership and organizational structures and processes are in place to achieve objectives and to support the organization's strategy.    Domain 3-Information Systems Acquisition, Development and Implementation   Provide assurance that the practices for the acquisition, development, testing and implementation of information systems meet the organization's strategies and objectives.    Domain 4-Information Systems Operations, Maintenance and Service Management Provide assurance that the processes for information systems operations, maintenance and service management meet the organization's strategies and objectives.   Domain 5-Protection of Personally Identifiable Information (PII) Assets   Provide assurance that the organization's policies, standards, procedures and controls ensure the confidentiality, integrity and availability of PII.   Prerequisites   A thorough understanding of current Data Protection legislation, Information Security & Risk Management knowledge as well as ISO 19011 Auditing Standards is required to successfully pass the examination. What's Included?   Teas, Coffees, refreshments and a full Lunch* Course Slides Study Guide Exam Fees * For Classroom based Courses only Accreditation   Who Should Attend?   Auditors seeking to perform and lead Privacy Information Management System (PIMS) certification audits Managers or consultants seeking to master a PIMS audit process Individuals responsible for maintaining conformance with PIMS requirements Technical experts seeking to prepare for a PIMS audit Expert advisors in the protection of Personally Identifiable Information (PII)   Assessment     Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 12 question, essay type exam on Day 3 of the course. The overall passing score is 70%, to be achieved within the 150 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success. Our Guarantee   We are an approved IECB Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras. The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE.   *FREE training offered for retakes - come back within a year and train for free. Provided by   This course is Accredited by NACS and Administered by the IECB

ISO 27701 Internal Auditor
Delivered OnlineFlexible Dates
£1,250

HR: Communication and Conflict Dealing at Work at QLS Level 2 & 3

By Imperial Academy

Level 2 & 3 Endorsed Training | QLS Hard Copy Certificates Included | Plus 5 CPD Courses | Lifetime Access

HR: Communication and Conflict Dealing at Work at QLS Level 2 & 3
Delivered Online On Demand
£300

5G demystified

5.0(3)

By Systems & Network Training

5G training course description This course is designed to give the delegate an understanding of the technologies and interworking requirements of the next generation of cellular communications. It is not a definitive set of descriptions but a possibility of the final deployment. During the course we will investigate the 10 pillars for 5G, which will include various Radio Access Technologies that are required to interwork smoothly. Hence we will look at the 4G Pro features and other RATs. What will you learn List the ten pillars of 5G deployment. Explain the 5G Internet and Software Distributed Networks (SDN). Explain carrier aggregation, the mobile cloud and RAT virtualisation. Explain an overall picture of 5G architecture. 5G training course details Who will benefit: Anyone who is looking to work with next generation networks. Prerequisites: Mobile communications demystified Duration 3 days 5G training course contents Drivers for 5G 5G Road Map, 10 Pillars of 5G, evolving RATs, small cell, o SON, MTCm, mm-wave, backhaul, EE, new spectrum, spectrum sharing, RAN virtualisation. 4G LTE advanced features *MIMO, Downlink & uplink MIMO R8, MIMO technology in LTE advanced, Downlink 8-layer SU-MIMO, Downlink MU-MIMO, Uplink MU-MIMO, Uplink transmit diversity, Coordinated multi-point operation (CoMP), Independent eNB & remote base station configurations, Downlink CoMP, * Uplink Multi-Cell Reception. ICIC & eICIC ICIC, Homogeneous to heterogeneous network, eICIC, Macro-pico scenario, Macro-femto scenario, Time orthogonal frequencies. Almost Blank Subframe (ABS). Carrier aggregation Component carriers (CC), * CC aggregation, Intra-band contiguous solutions, Intra-band non-contiguous solutions, Inter-band non-contiguous solutions, CA bandwidth classes, Aggregated transmission bandwidth configurations (ATBC), Possible carrier aggregation configurations (Rel 9, 10 & 12). Enhanced Interference Mitigation & Traffic Adaptation (eIMTA) TDD UL-DL reconfiguration for traffic adaptation, Reconfiguration mechanisms, Interference mitigation schemes, Dynamic & flexible resource allocation. 5G architectures 5G in Europe, horizon 2020 framework, 5G infrastructure PPP, METIS project, innovation centre, 5G in North America, research, company R & D, 5G specifications. The 5G internet Cloud services, IoT & context awareness, network reconfiguration & virtualization support, hypervisors, SDN, the controller, service-oriented API, OpenFlow switches, SDN operation, SDN control for traffic flow redirection, OpenFlow controllers, how SDN works, application, control and infrastructure layers, a programmable network, how SDN & NFV tie together, SDN's downside, SDN orchestration, Mobility, architectures for distributed mobility management, MEDIEVAL & MEDIVO projects, a clean slate approach, mobility first architecture, network virtualization (VNet), INM, NetInf, ForMux, MEEM, GP & AM, QoS support, network resource provisioning, IntServ, RSVP, DiffServ, CoS, aggregated resource provisioning, SICAP, MARA, Emerging approach for resource over-provisioning, example use case architecture for the 5G internet, integrating SDN/NFV for efficient resource control, control information repository, service admission control policies, network resource provisioning, control enforcement functions, network configurations, network operations. Small cells for 5G Average spectral efficiency evolution, What are small cells? WiFi & Femto cells as candidate small-cell technologies, Capacity limits & achievable gains with densifications, gains with multi-antenna techniques, gains with small cells, Mobile data demand, approach & methodology, subscriber density projections, traffic demand projections, global mobile data traffic increase modelling, country level backhaul traffic projections, 2020 average spectrum requirement, Small cell challenges, backhaul, spectrum, automation. Cooperation for next generation wireless networks Cooperative diversity & relaying strategies, Cooperative ARQ & MAC protocols, NCCARQ & PRCSMA packet exchange, Physical layer impact on MAC protocol, NCCARQ overview, PHY layer impact, Performance evaluation, simulation scenario and results. Mobile clouds; technology & services for future communications platforms Mobile cloud, software, hardware and networking resources, Mobile cloud enablers, mobile user domain, wireless technologies, WWAN WLAN and WPAN range, Bluetooth, IEEE.802.15.4, software stacks, infrared, near field communications (NFC), store & forward vs compute & forward, random/linear network coding. Security for 5G communications Potential 5G architectures, Security issues & challenges in 5G, user equipment, mobile malware attacks, 5G mobile botnets, attacks on 4G networks, C-RNTI & packet sequence numbers based UE location tracking, false buffer status reports attacks, message insertion attacks, HeNB attacks, physical attacks, attacks on mobile operator's network, user data & identity attacks, DDoS attacks, amplification, HSS saturation, external IP networks.

5G demystified
Delivered in Internationally or OnlineFlexible Dates
£2,367

Facilitating Effective Meetings: In-House Training

By IIL Europe Ltd

Facilitating Effective Meetings: In-House Training Billions of dollars and exorbitant amounts of time are wasted annually across the globe because of organizations' meeting practices. This contributes to serious performance problems for both organizations and employees, and it has a serious impact on culture and morale. But despite the costs and consequences, every-day people in any role have the ability to change that. They can reduce cost, improve productivity, and enhance their workplace cultures by improving their meeting facilitation skills. And that is because facilitation skills start in the planning stage, not in the live meeting stage. In this course, participants will learn that their responsibility as a facilitator is to be a steward of time, money, relationships, and performance. To do that, they will learn to estimate costs of meetings and practice a variety of strategic thinking and analysis tasks to effectively plan results-aligned meetings. They will also apply several techniques and strategies to proactively prevent and deal with conflict in meetings, as well as give objective, constructive feedback to others in order to create behavior change during meetings. Participants must bring laptops with them and have internet access during the course (both virtual classroom and traditional classroom). The laptops are needed for specific activities. Also note that this course pairs well with IIL's Conflict Resolution Skills and Decision Making and Problem Solving courses, which go much deeper into related skills and tools that support effective meeting facilitation. What you will Learn At the end of this program, you will be able to: Estimate the financial and time costs of attendance for real-world meetings Use a performance formula to define the purpose of meetings Describe the responsibilities and qualities of an effective facilitator Analyze situations to determine when a meeting is necessary Articulate performance-driven meeting goals and results Align meeting goals and results Strategize to invite, involve, and exclude appropriate attendees Explain research-based best practices for meeting decisions and agenda development Create an effective agenda for a results-driven meeting Apply proactive tools and strategies for relationship-building dealing with meeting conflict Give constructive behavioral feedback using the Situation-Behavior-Impact® technique The Business Case for Effective Facilitation Embracing the research on meetings Estimating the real costs of meetings Determining a meeting's performance value Clarifying the meeting facilitator's role Facilitating the Meeting Plan Determining if a meeting is necessary Aligning meeting goals with meeting types Identifying the right attendees Creating a strategically effective agenda Facilitating the Live Meeting Building relationships from the start Dealing with conflict proactively Giving feedback on unproductive behavior

Facilitating Effective Meetings: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£495

SSSTS, Site Supervisor Safety Training Scheme

By BAB Business Group

The Site Supervisor Safety Training Scheme (SSSTS) is a comprehensive training program designed to equip site supervisors with the essential knowledge and skills to ensure the safety and well-being of workers on construction sites. This course combines theoretical insights with practical applications, enabling participants to effectively manage site safety, identify potential hazards, and promote a culture of safety excellence. Key Course Objectives: Risk Management: Gain a deep understanding of risk assessment methodologies and strategies to identify, assess, and mitigate potential hazards on construction sites. Learn how to implement controls and create safe work environments that adhere to legal regulations and industry best practices. Legal Compliance: Familiarize yourself with the latest health and safety regulations, codes of practice, and legislative requirements relevant to the construction industry. Explore the responsibilities of a site supervisor in maintaining compliance and preventing accidents. Effective Communication: Develop strong communication skills to effectively convey safety information, instructions, and expectations to site workers and contractors. Enhance your ability to lead safety briefings, toolbox talks, and emergency procedures. Accident Prevention: Acquire the tools to proactively prevent accidents through proper planning, effective supervision, and timely intervention. Learn incident investigation techniques to understand root causes and implement corrective actions. Leadership and Motivation: Cultivate leadership qualities to inspire a safety-first mindset among your team. Understand how to motivate and engage workers in adhering to safety protocols and participating in safety initiatives. Site-specific Considerations: Explore safety challenges and considerations specific to different types of construction sites, such as residential, commercial, and industrial projects. Adapt your safety strategies to suit the unique characteristics of each site. Course Format: The SSSTS course is delivered through a dynamic blend of lectures, interactive discussions, case studies, and practical exercises. Participants will engage in group activities, role-playing scenarios, and real-world simulations to apply theoretical concepts to real-life situations. Course materials include comprehensive handouts, reference guides, and access to relevant safety regulations. Who Should Attend: This course is ideal for individuals currently working or aspiring to work as site supervisors, foremen, or team leaders within the construction industry. It is also beneficial for those responsible for managing safety on construction sites, ensuring compliance, and fostering a culture of safety excellence. Course Outcomes: By the end of the SSSTS course, participants will be empowered to effectively lead site safety efforts, reduce risks, and contribute to the overall success of construction projects. Graduates will receive a widely recognized certification that validates their competence in site safety management and leadership. Invest in your career and the safety of your team by enrolling in the Site Supervisor Safety Training Scheme (SSSTS) course today. Gain the expertise needed to create safer construction environments and make a positive impact on the industry.

SSSTS, Site Supervisor Safety Training Scheme
Delivered In-PersonFlexible Dates
£295

Managing Allegations against members of staff and volunteers, including Low-Level Concerns

By Brightcore Consultancy

This must-attend masterclass will provide a comprehensive understanding of all the key developments in the latest statutory and non-statutory guidance documents from a DSLs perspective, and how they relate to safeguarding provision in schools and colleges.

Managing Allegations against members of staff and volunteers, including Low-Level Concerns
Delivered Online + more
£80

Facilitating Effective Meetings (In-Person)

By IIL Europe Ltd

Facilitating Effective Meetings (In-Person) Billions of dollars and exorbitant amounts of time are wasted annually across the globe because of organizations' meeting practices. This contributes to serious performance problems for both organizations and employees, and it has a serious impact on culture and morale. But despite the costs and consequences, every-day people in any role have the ability to change that. They can reduce cost, improve productivity, and enhance their workplace cultures by improving their meeting facilitation skills. And that is because facilitation skills start in the planning stage, not in the live meeting stage. In this course, participants will learn that their responsibility as a facilitator is to be a steward of time, money, relationships, and performance. To do that, they will learn to estimate costs of meetings and practice a variety of strategic thinking and analysis tasks to effectively plan results-aligned meetings. They will also apply several techniques and strategies to proactively prevent and deal with conflict in meetings, as well as give objective, constructive feedback to others in order to create behavior change during meetings. Participants must bring laptops with them and have internet access during the course (both virtual classroom and traditional classroom). The laptops are needed for specific activities. Also note that this course pairs well with IIL's Conflict Resolution Skills and Decision Making and Problem Solving courses, which go much deeper into related skills and tools that support effective meeting facilitation. What you will Learn At the end of this program, you will be able to: Estimate the financial and time costs of attendance for real-world meetings Use a performance formula to define the purpose of meetings Describe the responsibilities and qualities of an effective facilitator Analyze situations to determine when a meeting is necessary Articulate performance-driven meeting goals and results Align meeting goals and results Strategize to invite, involve, and exclude appropriate attendees Explain research-based best practices for meeting decisions and agenda development Create an effective agenda for a results-driven meeting Apply proactive tools and strategies for relationship-building dealing with meeting conflict Give constructive behavioral feedback using the Situation-Behavior-Impact® technique Getting Started The Business Case for Effective Facilitation Embracing the research on meetings Estimating the real costs of meetings Determining a meeting's performance value Clarifying the meeting facilitator's role Facilitating the Meeting Plan Determining if a meeting is necessary Aligning meeting goals with meeting types Identifying the right attendees Creating a strategically effective agenda Facilitating the Live Meeting Building relationships from the start Dealing with conflict proactively Giving feedback on unproductive behavior Summary and Next Steps

Facilitating Effective Meetings (In-Person)
Delivered In-Person in LondonFlexible Dates
£495

Security Engineering on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for security engineers, security architects, and information security professionals. Overview Identify security benefits and responsibilities of using the AWS Cloud Build secure application infrastructures Protect applications and data from common security threats Perform and automate security checks Configure authentication and permissions for applications and resources Monitor AWS resources and respond to incidents Capture and process logs Create and configure automated and repeatable deployments with tools such as AMIs and AWS CloudFormation This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents. Prerequisites We recommend that attendees of this course have: Working knowledge of IT security practices and infrastructure concepts Familiarity with cloud computing concepts Completed AWS Security Essentials and Architecting on AWS courses 1 - Security on AWS Security in the AWS cloud AWS Shared Responsibility Model Incident response overview DevOps with Security Engineering 2 - Identifying Entry Points on AWS Identify the different ways to access the AWS platform Understanding IAM policies IAM Permissions Boundary IAM Access Analyzer Multi-factor authentication AWS CloudTrail 3 - Security Considerations: Web Application Environments Threats in a three-tier architecture Common threats: user access Common threats: data access AWS Trusted Advisor 4 - Application Security Amazon Machine Images Amazon Inspector AWS Systems Manager 5 - Data Security Data protection strategies Encryption on AWS Protecting data at rest with Amazon S3, Amazon RDS, Amazon DynamoDB Protecting archived data with Amazon S3 Glacier Amazon S3 Access Analyzer Amazon S3 Access Points 6 - Securing Network Communications Amazon VPC security considerations Amazon VPC Traffic Mirroring Responding to compromised instances Elastic Load Balancing AWS Certificate Manager 7 - Monitoring and Collecting Logs on AWS Amazon CloudWatch and CloudWatch Logs AWS Config Amazon Macie Amazon VPC Flow Logs Amazon S3 Server Access Logs ELB Access Logs 8 - Processing Logs on AWS Amazon Kinesis Amazon Athena 9 - Security Considerations: Hybrid Environments AWS Site-to-Site and Client VPN connections AWS Direct Connect AWS Transit Gateway 10 - Out-Of-Region Protection Amazon Route 53 AWS WAF Amazon CloudFront AWS Shield AWS Firewall Manager DDoS mitigation on AWS 11 - Security Considerations: Serverless Environments Amazon Cognito Amazon API Gateway AWS Lambda 12 - Threat Detection and Investigation Amazon GuardDuty AWS Security Hub Amazon Detective 13 - Secrets Management on AWS AWS KMS AWS CloudHSM AWS Secrets Manager 14 - Automation and Security by Design AWS CloudFormation AWS Service Catalog 15 - Account Management and Provisioning on AWS AWS Organizations AWS Control Tower AWS SSO AWS Directory Service

Security Engineering on AWS
Delivered OnlineFlexible Dates
£2,025