• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

45109 Courses

Talent Management and Succession Planning

By FD Capital

Talent Management and Succession Planning,” the podcast where we explore the critical aspects of attracting and retaining top finance talen Talent management is the lifeblood of any organisation, and finance departments are no exception. In a competitive business landscape, attracting and retaining top finance talent can make a significant difference. Highly skilled and motivated professionals drive innovation, improve financial performance, and contribute to strategic decision-making. By investing in talent management, CFOs ensure their organisations have the right people in the right roles, which is vital for sustainable growth and success. Talent management also enables CFOs to build a culture of continuous learning and development. By nurturing the skills and capabilities of finance professionals, we create an environment that fosters innovation and adaptability. This is crucial in today’s rapidly changing business landscape, where finance teams need to keep pace with evolving technologies, regulations, and industry trends. Talent management provides a foundation for building a resilient and agile finance function. Succession planning is an integral part of talent management. How do CFOs approach succession planning, particularly in finance leadership roles? Succession planning is a proactive approach to ensure a smooth transition of leadership roles. CFOs need to identify high-potential individuals within their finance teams and provide them with opportunities for growth and development. This includes mentorship, training programs, and exposure to cross-functional experiences. By preparing a pipeline of future finance leaders, CFOs can mitigate the risks associated with unexpected departures or retirements, ensuring continuity and stability in finance leadership. Additionally, succession planning should encompass diversity and inclusion. CFOs recognize the importance of building diverse finance teams that reflect the broader talent pool. By providing equal opportunities for underrepresented groups and promoting inclusivity, we foster a culture of belonging and tap into a wider range of perspectives and ideas. Diverse teams drive innovation and improve decision-making, contributing to the overall success of the organisation. How do CFOs create a talent development culture within their finance teams, and what initiatives can be implemented to foster continuous growth? CFOs can create a talent development culture by prioritizing learning and development initiatives. This includes offering ongoing training programs, supporting professional certifications, and providing access to resources that enhance technical and soft skills. CFOs should encourage finance professionals to take ownership of their own development and provide opportunities for them to stretch their capabilities. This may involve cross-functional projects, exposure to different areas of the business, or participation in industry conferences and networking events. Additionally, mentorship and coaching programs play a crucial role in talent development. CFOs can pair experienced finance leaders with up-and-coming talent, fostering knowledge transfer, and providing guidance and support. Encouraging regular feedback and performance discussions helps finance professionals understand their strengths and areas for improvement, enabling targeted development plans. By creating a culture that values continuous learning and growth, CFOs empower their finance teams to reach their full potential. https://www.fdcapital.co.uk/podcast/talent-management-and-succession-planning/ Tags Online Events Things To Do Online Online Classes Online Business Classes #leadership #development #successionplanning #employees #talentmanagement

Talent Management and Succession Planning
Delivered OnlineFlexible Dates
FREE

Catheter Care

By Prima Cura Training

This course discusses the care of indwelling male, female, and supra-pubic catheters in order to minimise the risks associated with indwelling catheters

Catheter Care
Delivered In-PersonFlexible Dates
Price on Enquiry

Symantec ProxySG 6.6 Basic Administration (BCCPA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The ProxySG 6.6 Basic Administration course is intended for students who wish to master the fundamentals of the ProxySG. It is designed for students who have not taken any previous training courses about the ProxySG. Overview Describe the major Secure Web Gateway functions of the ProxySG.License and configure a ProxySG.Deploy a ProxySG in either explicit or transparent mode.Use the Visual Policy Manager to write policies to manage web filtering, authentication, and SSL traffic management.Use ProxySG access logs to generate reports. The ProxySG 6.6 Basic Administration course is an introduction to deployment options and management of the individual key features offered using the ProxySG 6.6 solution. Introduction to the Symantec ProxySG Secure Web Gateway Describe the functions of a proxy server Differentiate proxy servers from firewalls Describe the key features and benefits of the ProxySG List the various ProxySG models Access online Symantec community resources ProxySG Security Deployment Options Describe the three network deployment methods Describe the three possible roles of the ProxySG ProxySG Management Console Describe the relationship between the Management Console and the ProxySG CLI Describe the primary function of the major areas of the Management Console Use the Management Console to access on-box help and Symantec product documentation Traffic Interception Using Proxy Services Understand the functions of proxy services, listeners, and proxy types Describe the three most common proxy services Explain how the intercept and bypass settings affect what happens to network traffic passing through the ProxySG Explain the function of common global proxy service settings Hypertext Transfer Protocol Understand how a connection is initiated over the transport layer Identify the components of an HTTP URL Explain the two types of HTTP messages: request and response Identify common response codes Introduction to the Visual Policy Manager Describe the relationship among the VPM, CPL, and the Management Console Describe the default processing order for policy layers and rules Describe triggers and actions that can be used in writing policy Identify the types of objects that the VPM supports Describe some of the best practices to be followed when using the VPM to create policy Filtering Web Content Describe the main concepts of web filtering Describe the primary category databases Describe the category types available to policy Describe how WebFilter and WebPulse work together Using Threat Intelligence to Defend the Network Understand Intelligence Services as provided by the Global Intelligence Network Understand Geolocation and Threat Risk Levels and how they can be used in policy Ensuring Safe Downloads Describe how malware can be transmitted via HTTP Explain the methods, advantages, and disadvantages of file type detection Describe some of the considerations in deciding what content to block as possible malware sources Notifying User of Internet Usage Policies Explain the function and various components of built-in and custom exception pages Describe the function of Notify User objects Identify the types of pages that can be sent to users by using Notify User objects Describe splash pages and coaching pages using Notify User objects in the VPM Access Logging on the ProxySG Describe, at a high level, how the ProxySG performs access logging Describe the components of a ProxySG access log facility Identify default log facilities and log formats Describe common use cases for periodic and continuous uploading of access logs

Symantec ProxySG 6.6 Basic Administration (BCCPA)
Delivered OnlineFlexible Dates
Price on Enquiry

AJER - Advanced Junos Enterprise Routing

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Overview After successfully completing this course, you should be able to: Describe the various OSPF link-state advertisement (LSA) types. Explain the flooding of LSAs in an OSPF network. Describe the shortest-path-first (SPF) algorithm. Describe OSPF link metrics. Describe the various OSPF authentication methods. Explain the differences between OSPFv2 and OSPFv3. Describe OSPF area types and operations. Configure various OSPF area types. Summarize and restrict routes. Configure OSPF multi-area adjacencies. Configure OSPF virtual links. Explain OSPF external reachability. List useful commands that are used to troubleshoot and verify OSPF. Isolate different OSPF issues. Describe BGP operations. Configure various BGP options. Explain the route selection process for BGP. Describe how to alter the route selection process. Explain the use of routing policies in BGP. Explain how BGP routes are processed. Describe the various BGP attributes and their use. Manipulate common BGP attributes. Review common BGP troubleshooting procedures. List common BGP troubleshooting commands. Identify issues with BGP peering. Explain reasons to use BGP in the Enterprise. Explain how ISP policies can influence external connectivity. Describe three common routing policies for external connectivity in the enterprise. Identify common commands for troubleshooting routing policy. Describe basic multicast terminology. Describe the multicast address space. Describe how RPF is used in a multicast network. Describe the basic functionality of IGMP. Describe the multicast service models and modes. Describe PIM-SM operation and configuration when using the ASM model. Describe PIM-SM operation and configuration when using the SSM model. Verify and troubleshoot multicast. Identify environments that may require a modified CoS implementation. Describe the various CoS components and their respective functions. Explain the CoS processing along with CoS defaults on SRX Series devices. Describe situations in which some CoS features are used in the enterprise. Describe the use of the Real-Time Performance Monitoring tool. Verify and troubleshoot CoS. Describe a traditional Campus network design. Understand the need for a new architectural design. Describe the five key concepts of the Evolved Core. Describe the benefits of a Layer 3-based Campus Networks. Describe Layer 2 tunneling. Explain VXLAN functionality. Describe VXLAN gateways. Describe EVPN features. Describe EVPN operations. This five-day course is designed to provide students with the tools required for implementing, monitoring, and troubleshooting Layer 3 components in an enterprise network. Chapter 1: Course Introduction Course Introduction Chapter 2: OSPF OSPFv2 Review Link-State Advertisements Protocol Operations OSPF Authentication OSPFv3 Lab 1: Configuring and Monitoring OSPF Chapter 3: OSPF Areas Review of OSPF Areas Stub Area Operation Stub Area Configuration NSSA Operation NSSA Configuration Route Summarization Lab 2: Configuring and Monitoring OSPF Areas and Route Summarization Chapter 4: Advanced OSPF Options OSPF Multi-Area Adjacencies Virtual Links External Reachability Lab 3: Configuring and Monitoring Routing Policy and Advanced OSPF Options Chapter 5: Troubleshooting Troubleshooting LSDB Consistency Issues Case Study: Adjacency Issues Lab: Troubleshooting OSPF Chapter 6: BGP Review of BGP BGP Configuration Options BGP Operations BGP Path Selection and Options Lab: Implementing BGP Chapter 7: BGP Attributes and Policy Policy and BGP BGP Attributes Details and Manipulation of Common BGP Path Attributes Lab: BGP Attributes Chapter 8: Troubleshooting BGP BGP Troubleshooting BGP Case Study Lab: Troubleshooting BGP Chapter 9: Enterprise Routing Policies Enterprise BGP Core Network Design Enterprise External Network Deployment Lab: Implementing Enterprise Routing Policies Chapter 10: Troubleshooting Policies Routing Policy Structure Using RegEx Routing Policy Troubleshooting Case Study Lab: Troubleshooting Routing Policies Chapter 11: Introduction to Multicast Overview of Multicast Multicast Addressing RPF IGMP Lab: PIM-SM Chapter 12: Multicast Routing Protocols and SSM Overview of Multicast Routing Protocols PIM-SM Using the ASM Model PIM-SM Using the SSM Model Lab: Implementing PIM-SM Lab: Implementing SSM Chapter 13: Troubleshooting Multicast Multicast Troubleshooting Multicast Case Study Lab: Troubleshooting Multicast Chapter 14: Class of Service CoS Components Review and Case Study CoS Processing and CoS Defaults on the SRX Series Device Policing Virtual Channels Monitoring with Resource Performance Monitoring Lab 9: Implementing CoS Features in the Enterprise Chapter 15: Troubleshooting Class of Service CoS Troubleshooting CoS Case Study Lab: Troubleshooting Class of Service Chapter 16: Enterprise Architectures Traditional Enterprise Networks A New Architecture Key Concepts of the Evolved Core IP Fabric Campus Design Chapter 17: VXLAN Layer 2 Connectivity over a Layer 3 Network VXLAN Overview VXLAN Gateways Chapter 18: EVPN-VXLAN Overview of EVPN EVPN Operations EVPN and VXLAN Chapter 19: Configuring EVPN-VXLAN Configuring EVPN-VXLAN Spine Only network Add IP Fabric leaf nodes to a Spine Only design Configuring a new IP Fabric EVPN-VXLAN network Chapter 20: Migrating to an IP Fabric EVPN Routes Useful EVPN Commands Appendix A: BGP Route Reflection Route Reflection Operation Configuration and Routing Knowledge Lab: BGP Route Reflection (Optional) Appendix B: Troubleshooting IS-IS IS-IS Troubleshooting Lab: Troubleshooting IS-IS and Mixed Environments Additional course details: Nexus Humans AJER - Advanced Junos Enterprise Routing training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AJER - Advanced Junos Enterprise Routing course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AJER - Advanced Junos Enterprise Routing
Delivered OnlineFlexible Dates
Price on Enquiry

BA04 - Eliciting and Writing Effective Requirements

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for beginner to intermediate business and requirements analysts who are looking to improve their elicitation and requirements writing and documentation skills. This course is also a great fit for technical writers, product and software testers, project managers, product owners who work closely with business analysts or who perform some for of business analysis themselves. Overview Understand the role of the business analyst and core competencies for performing successfully Discuss the criticality of business analysis and requirements for successful project outcomes Understand the main professional associations and standards supporting business analysts in the industry Discuss the common problems with requirements and explore approaches to address these issues Obtain a clear understanding of the various requirements types and the significance for eliciting each type Demonstrate your ability to identify stakeholders Explore various methods for understanding and analyzing stakeholders Discuss and apply good planning practices to requirements elicitation efforts Obtain knowledge and understanding of over 15 current and commonly applied elicitation techniques Understand how to progress from elicitation to analysis to documentation Write well-formed and validated requirements Gain understanding of the best practices for writing quality requirements Learn the technical writing techniques that apply directly to writing requirements documents Discuss writing pitfalls, risks that impact requirements, and how to address them Learn best practices for communicating and collaborating with stakeholders, sharing the results of elicitation and the resulting documentation Learn approaches for validating requirements Understand the difference between validating requirements and validating the solution With elicitation serving as a major component of the requirements process, it is imperative that business analysts maintain high competency levels in elicitation practices and technique use to help organizations overcome the requirements related challenges faced on projects. Regardless whether you are a practitioner just starting off your career in business analysis or whether you have been performing the role for some years, this course will provide insight into the latest thoughts on elicitation and writing effective requirements and present a number of current techniques that are being applied on projects across industries today. Review of Foundational Concepts Definition of a business analysis Definition of business analyst BA role vs. PM role Business analysis competencies Benefits of business analysis Purpose for having a BA standard IIBA?s BABOK© Guide and PMI?s Practice Guide in Business Analysis Business analysis core concepts Discussion: Project challenges Understanding Requirements Common problems with requirements Understand the problem first Define the business need Situation statements and moving to requirements Understanding requirement types Business requirements Stakeholder/User Requirements Solution Requirements Functional Requirements Non-Functional Requirements Assumptions and Constraints Discussions: Requirement problems, business needs, and identifying non-functional requirements Discovering Stakeholders Definition of a stakeholder Stakeholder types Identifying stakeholders Performing stakeholder analysis Stakeholders and requirements Tips for identifying stakeholders Grouping stakeholders Creating a RACI model Tips for analyzing stakeholders Documenting results of stakeholder analysis Workshop: Discovering stakeholders Preparing for Requirements Elicitation Planning for elicitation Benefits of elicitation planning What do you plan? The elicitation plan Setting objectives for elicitation Determining the scope for elicitation Establishing pre-work Determining the outputs for the session The iterative nature of elicitation Elicitation roles Elicitation planning techniques Discussions: Who to involve in elicitation, planning impacts, and unplanned elicitation Workshop: Planning for elicitation Conduct Requirements Elicitation Elicitation skillset Types of elicitation techniques Using active listening in elicitation Techniques for performing elicitation Benchmarking/Market Analysis Brainstorming Business Rules Analysis Collaborative Games Concept Modeling Data Mining Data Modeling Document Analysis Focus Groups Interface Analysis Interviews Observation Process Modeling Prototyping Survey or Questionnaire Workshops Write Effective Requirements Elicitation and Analysis Requirements related issues Implications of bad requirements Elicitation and documentation Writing skillset Documenting requirements Modeling requirements Defining the project life cycle Impact of project life cycle on documentation Requirements specifications Characteristics of good requirements Guidelines for writing textual requirements Structuring a requirement Writing pitfalls Traceability Requirements attributes Risks associated to requirements Discussions: Project Life Cycle and Correcting Poorly Written Requirements Workshops: Documenting Requirements and Identify Characteristics of Good Requirements Confirm and Communicate Elicitation Requirements Business analysis communication Requirements communication Communication skills The 7 Cs Timing of communication Planning communication Importance of Collaboration Planning collaboration Documenting communication/collaboration needs Confirming elicitation results Verify requirements Characteristics of good requirements (revisited) Requirements checklist Requirements validation Signing off on requirements Discussions: Responsibility for Communication, Eliciting Communication Needs, Validation Signoff Workshops: Communicating Requirements and Obtaining Signoff Evaluate the Solution Business analyst role in solution evaluation Why solutions under perform What we are looking for in solution evaluation When does solution evaluation occur Performing solution evaluation Planning solution evaluation Metrics that might exist Evaluating long term performance Qualitative vs. quantitative measures Tools & techniques used in solution evaluation Comparing expected to actuals When solution evaluation discovers a variance Tools/techniques for analyzing variances Proposing a recommendation Communicating results of solution evaluation Discussion: Addressing Variance Wrap up and Next Steps Useful books and links on writing effective requirements BABOK© Guide Business Analysis for Practitioners: A Practice Guide Additional course details: Nexus Humans BA04 - Eliciting and Writing Effective Requirements training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA04 - Eliciting and Writing Effective Requirements course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA04 - Eliciting and Writing Effective Requirements
Delivered OnlineFlexible Dates
Price on Enquiry

CHILD PROTECTION AWARENESS ONE DAY COURSE

By Child Protection Training Uk

Formally Safeguarding Children Level 1: One Day Course 10am - 3.30pm Working Together to Safeguard Children 2018 & Keeping Children Safe in Education (2022) Updated This Course can also be run within your organisation for your staff group at a reduced cost contact us for a quote or if you have any other questions about this course talk to an adviser now online.

CHILD PROTECTION AWARENESS ONE DAY COURSE
Delivered In-Person in London or UK WideFlexible Dates
Price on Enquiry

Linux Professional Institute Certification (LPIC) 101

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrator Network administrator Technician DevOps Overview The Linux Professional Institute(LPI) is the go to certification body for vendor independent Linux certifications. This course covers fundamental Linuxskills such as file management and manipulation, text processing, command line use, package management,filesystems, hardware, and many more. Students will feel confident taking the LPI LPIC-1 101 exam with in classroomassessments and practice exams. This course prepares students to take the 101 exam of the LPI level 1 certification. Work on the Command Line LPI Objectives Covered Role of Command Shell Shells Gathering System Info Identifying the Shell Changing the Shell Shell Prompts Bash: Bourne-Again Shell Navigating the Filesystem Help from Commands and Documentation Getting Help Within the Graphical Desktop Getting Help with man & info Bash: Command Line History Bash: Command Editing Bash: Command Completion Shell and Environment Variables Key Environment Variables LAB TASKS Use Streams, Pipes, and Redirects LPI Objectives Covered File Redirection Piping Commands Together Filename Matching File Globbing and Wildcard Patterns Brace Expansion General Quoting Rules Nesting Commands Gotchas: Maximum Command Length LAB TASKS Manage File Permissions and Ownership LPI Objectives Covered Filesystem Hierarchy Standard Displaying Directory Contents Filesystem Structures Determining Disk Usage With df and du File Ownership Default Group Ownership File and Directory Permissions File Creation Permissions with umask Changing File Permissions SUID and SGID on files SGID and Sticky Bit on Directories User Private Group Scheme LAB TASKS Create, Delete, Find, and Display Files LPI Objectives Covered Directory Manipulation File Manipulation Deleting and Creating Files Physical Unix File Structure Filesystem Links File Extensions and Content Which and Type Where is Searching the Filesystem Alternate Search Method Manually Installed Shared Libraries LAB TASKS Work with Archives and Compression LPI Objectives Covered Archives with tar Archives with cpio The gzip Compression Utility The bzip2 Compression Utility The XZ Compression Utility The PKZIP Archiving/Compression format LAB TASKS Process Text Streams Using Filters LPI Objectives Covered Producing File Statistics The Streaming Editor Replacing Text Characters Text Sorting Duplicate Removal Utility Extracting Columns of Text Displaying Files Prepare Text for Display Previewing Files Displaying Binary Files Combining Files and Merging Text LAB TASKS Search Text Files Using Regular Expressions LPI Objectives Covered Searching Inside Files Regular Expression Overview Regular Expressions RE Character Classes Regex Quantifiers RE Parenthesis LAB TASKS Perform Basic File Editing Operations Using VI LPI Objectives Covered Text Editing vi and Vim Learning Vim Basic vi Intermediate vi LAB TASKS Create, Monitor, and Kill Processes LPI Objectives Covered What is a Process? Process Lifecycle Process States Viewing Processes Signals Tools to Send Signals Managing Processes Tuning Process Scheduling Job Control Overview Job Control Commands Nohup and Disown Uptime & w Persistent Shell Sessions with Screen Using screen Advanced Screen LAB TASKS Use RPM, YUM, and Debian Package Management LPI Objectives Covered Managing Software RPM Architecture Working With RPMs Querying and Verifying with RPM Installing Debian Packages Querying and Verifying with dpkg The alien Package Conversion Tool Managing Software Dependencies Using the Yum command yum downloader Configuring Yum The deselect & APT Frontends to dpkg Aptitude Configuring APT LAB TASKS Work with Partitions, Filesystem, and Disk Quotas LPI Objectives Covered Partition Considerations Logical Volume Management Filesystem Planning Partitioning Disks with fdisk & gdisk Resizing a GPT Partition with gdisk Partitioning Disks with parted Non-Interactive Disk Partitioning with sfdisk Filesystem Creation Filesystem Support Unix/Linux Filesystem Features Swap Selecting a Filesystem Filesystem Maintenance Mounting Filesystems Mounting Filesystems Managing an XFS Filesystem NFS SMB Filesystem Table (/etc/fstab) Configuring Disk Quotas Setting Quotas Viewing and Monitoring Quotas LAB TASKS Linux Boot Process LPI Objectives Covered Booting Linux on PCs GRUB 2 GRUB 2 Configuration GRUB Legacy Configuration Boot Parameters Uinit Linux Runlevels Aliases Systemd local-fs.target and sysinit.target Runlevel Implementation System Boot Method Overview Systemd System and Service Manager Modifying systemd services Systemd Targets Using systemd Shutdown and Reboot System Messaging Commands Controlling System Messaging LAB TASKS Determine and Configure Hardware Settings LPI Objectives Covered Managing Linux Device Files Hardware Discovery Tools Configuring New Hardware with hwinfo PC Architecture and Bus DMA & IRQ USB Devices USB Architecture Configuring Kernel Components and Modules Kernel Modules Handling Module Dependencies Configuring the Kernel via /proc/ LAB TASKS Linux Fundamentals Unix and its Design Principles FSF and GNU GPL ƒ?? General Public License The Linux Kernel Components of a Distribution Red Hat Linux Products SUSE Linux Products Debian Ubuntu Logging In got root? Switching User Contexts Gathering Login Session Info LAB TASKS Additional course details: Nexus Humans Linux Professional Institute Certification (LPIC) 101 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Linux Professional Institute Certification (LPIC) 101 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Linux Professional Institute Certification (LPIC) 101
Delivered OnlineFlexible Dates
Price on Enquiry

COMING SOON: RYA Yachtmaster Ocean Online Course

5.0(5)

By Ardent Training

This course teaches you astro navigation, ocean passages, worlwide meteorology, and the practical skills required to use a Sextant for Ocean Navigation.

COMING SOON: RYA Yachtmaster Ocean Online Course
Delivered Online On Demand
FREE

Power BI Advanced DAX Course, 2 Days

4.6(12)

By PCWorkshops

This excellent Power BI covers the Query Editor and Dax Calculations in detail Online Instructor-led Classroom sessions available on request Practical, Hands-on, Interactive

Power BI Advanced DAX Course, 2 Days
Delivered Online & In-PersonFlexible Dates
FREE

Introduction to health and safety - best-practice (In-House)

By The In House Training Company

Health and safety awareness training is mandatory for staff at all levels of an organisation. This is the ideal course to satisfy that requirement - a stimulating 'entry-level' programme explaining how health and safety should be managed in any working environment. The course outlines the basics of health and safety law and how organisations and individuals can become liable for health and safety offences. Roles and responsibilities for health and safety are discussed by reference to the key legislation and the expert trainer will explore with the delegates how these responsibilities are managed in practice in different types of organisation. The principles of risk assessment will be considered and their practical implementation discussed in relation to the management of the various hazards that are likely to be present in a typical workplace. This course will give staff: An understanding of health and safety law, liability and enforcement An explanation of the principles of health and safety management in the workplace and an understanding of who should be responsible for different aspects of health and safety A practical explanation of risk assessment and what constitutes a suitable and sufficient assessment A broad knowledge of the typical hazards in a workplace and how these should be managed 1 Overview of health and safety law Statute and civil law Liability and enforcement Statutory duties Contract law 2 Legislative framework The workplace - extent of responsibility / shared responsibility Relevant legislation 3 Management of Health and Safety Health and Safety at Work etc Act 1974 Management of Health and Safety at Work Regulations 1999 Workplace (Health, Safety and Welfare) Regulations 1992 Accident Reporting (RIDDOR) Consultation with Employees and Safety Committees 4 Risk management within your organisation Business risk management Health and safety risk management The principles of risk assessment Transferring the risk to contractors and third parties 5 Risk assessment exercise - 'Challenge Anneka' 6 Managing the hazards in the workplace Work equipment Lifting equipment Display screens Manual handling Fire Chemicals (COSHH) Personal protective equipment (PPE) 7 Practical exercise - Workplace inspection 8 Questions, discussion and review

Introduction to health and safety - best-practice (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry