Supervising First Aid for Mental Health FAA Level 3 Award in supervising First Aid for Mental Health (RQF). Award in Leading First Aid for Mental Health at SCQF Level 6. This course builds on the Level 2/5 Award in First Aid for Mental Health and covers a wider range of mental health conditions. Goes into detail on the range of therapy and professional support that a person may be given by professional bodies during treatment for a mental health condition.
Duration 5 Days 30 CPD hours This course is intended for Entry- to mid-level network engineers Network administrators Network support technicians Help desk technicians Overview After taking this training, you should be able to: Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers Compare and contrast the various hardware and software switching mechanisms and operation while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM) along with process switching, fast switching, and Cisco Express Forwarding concepts Troubleshoot Layer 2 connectivity using VLANs and trunking Implement redundant switched networks using Spanning Tree Protocol Troubleshoot link aggregation using Etherchannel Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP) Implement and optimize Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types and areas, summarization, and route filtering for IPv4 and IPv6 Implement External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking Implement network redundancy using protocols such as Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP) Implement internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT) Describe the virtualization technology of servers, switches, and the various network devices and components Implement overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP) Describe the components and concepts of wireless networking, including Radio Frequency (RF) and antenna characteristics, and define the specific wireless standards Describe the various wireless deployment models available, including autonomous Access Point (AP) deployments and cloud-based designs within the centralized Cisco Wireless LAN Controller (WLC) architecture Describe wireless roaming and location services The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.3 training gives you the knowledge and skills needed to install, configure, operate, and troubleshoot an enterprise network and introduces you to overlay network design by using SD-Access and SD-WAN solutions. You?ll also learn to understand and implement security principles and automation and programmability within an enterprise network. Course Outline Examining Cisco Enterprise Network Architecture Exploring Cisco Switching Paths Implementing Campus LAN Connectivity Building Redundant Switched Topology Implementing Layer 2 Port Aggregation Understanding EIGRP Implementing OSPF Optimizing OSPF Exploring EBGP Implementing Network Redundancy Implementing NAT Introducing Virtualization Protocols and Techniques Understanding Virtual Private Networks and Interfaces Understanding Wireless Principles Examining Wireless Deployment Options Understanding Wireless Roaming and Location Services Examining Wireless AP Operation Implementing Wireless Client Authentication Troubleshooting Wireless Client Connectivity Implementing Network Services Using Network Analysis Tools Implementing Infrastructure Security Implementing Secure Access Control Discovering the Basics of Python Programming Discovering Network Programmability Protocols Implementing Layer 2 Port Aggregation Discovering Multicast Protocols Understanding QoS Exploring Enterprise Network Security Architecture Exploring Automation and Assurance Using Cisco DNA Center Examining the Cisco SD-Access Solution Understanding the Working Principles of the Cisco SD-WAN Solution
Duration 2 Days 12 CPD hours Overview Understand why Blockchain is needed and where Explore the major components of BlockchainLearn about Hyperledger Fabric and the structure of the Hyperledger ArchitectureLean the features of the Fabric model including chaincode, SDKs, Ledger, Security and Membership ServicesPerform comprehensive labs on writing chaincodeExplore the architecture of Hyperledger FabricUnderstand and perform in depth labs on Bootstrapping the NetworkPerform comprehensive labs to integrate/develop an application with Hyperledger Fabric running a smart contractBuild applications on Hyperledger FabricCourse Outline: This training course has been created to walk you through Chaincode Development, Testing, and Deployment for a Hyperledger Fabric Network catering specifically toward Golang written Chaincode (Fabric?s original Chaincode Language). Additionally as an Application Developer you will learn how to write, and prepare Client Applications using the most mature Standard Development Kit in Hyperledger Fabric, NodeJS. Blockchain Basics (Overview)Hyperledger Fabric Development EnvironmentKnowing the Difference: ComposerChaincode Use CasesChaincode BasicsGolang Shim DevelopmentDatabases for the DeveloperChaincode Dev. Deployment and InteractionsClients & SDK Development: Fabric-NetworkClients & SDK Development: Fabric-Client InteractionsLogging and Monitoring
The aim of the course is to ensure that safety requirements are appreciated by managers. To enable them to review their own safety systems. It give’s the ability to introduce new controls and possibly implement changes as appropriate to ensure safety in the workplace. Who Should Attend? The course is designed for managers and supervisors in any sector, who are required to manage health and safety risk and resources within their organisation. It is also beneficial for anybody wishing to get into the Health and Safety profession or Management. The IOSH qualification is an impressive qualification to add to a CV. Course Duration: 3 days. Learning Objectives: On successful completion of the course, delegates should be able to: Explain ‘managing safely’. Explain the component parts of a recognised safety management system such as HSG65. Identify the data and techniques required to produce an adequate record of an incident. To demonstrate the procedure for an accident investigation, recognising the human factors involved. Describe statutory requirements for reporting and procedures for checking non-reporting. Describe methods of basic trend analysis for reactive monitoring data. Define ‘hazard’ and ‘risk’, and describe the legal requirements for risk assessment. Demonstrate a practical understanding of risk assessment technique and the data required for records. Describe workplace precaution hierarchies. Prepare and use active monitoring checklists. To implement schedules for active monitoring, recording results and analysing records. Outline the main provisions of the Health and Safety at Work etc Act and the Management of Health and Safety at Work Regulations. Outline relevant health and safety legislation, codes of practice, guidance notes and information sources such as the HSE. Syllabus: 1. Module 1 – Introduction and Overview. 2. Module 2 – Risk Assessment. 3. Module 3 – Risk Control. 4. Module 4 – Health and Safety Legislation. 5. Module 5 – Common Hazards. 6. Module 6 – Investigating Accidents and Incidents. 7. Module 7 – Measuring Performance. What do IOSH Managing Safely Courses involve? The course has seven comprehensive modules. These modules cover risk assessment and control, Health and Safety Legislation, common hazards, accident and incident investigation. Also covered is performance measurement. Effectively covering all aspects of safety management in the workplace. To obtain the IOSH Managing Safely certificate, attendees will need to complete a four day course. The course is delivered using high quality animated graphics. This includes sophisticated, fun presentations to make the content of the course more memorable. With training tools including board games, DVDs and quizzes displaying clear scenarios and essential practical content. We have worked hard to ensure that taking an IOSH Managing Safely course is as enjoyable as possible. Attendees will officially attain their IOSH Managing Safely certificate upon successful completion of both the written and practical assessments of the course. Certification: An IOSH Managing Safely certificate is awarded to all those who attend the course successfully completing both written and practical assessments. Candidates will also receive an excellent workbook from IOSH, with all the tools to help them once they are back in the workplace. Understanding of the course material is evaluated by means of a 45-minute written assessment paper consisting of 20 multi-format questions. There is also a practical assessment. MHA Training was established in 2008 based at our training centre in Warrington, Cheshire. We provide an array of services On-Site also for clients around the North West in areas such as Manchester, Liverpool, Widnes, St Helens, Runcorn, Wigan, Preston and Leeds. Over the years we have expanded and have instructors available for all of our courses Nationwide. IOSH Managing Safely Refresher Course: Recently IOSH have introduced a one day refresher course. This enables candidates having previously sat a course within 3 years to keep their qualification current and upto date in just a one day course. For more information please see the factsheet below.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for intermediate to advanced Business Analysts who are looking to improve their skills for eliciting, analyzing, documenting, validating, and communicating requirements. Overview Obtain a thorough understanding of the core responsibilities of the business analyst Understand the main professional associations and standards supporting business analysts in the industry Discuss and explore the components of each of the domains/knowledge areas that comprise the work of business analysis Recognize the importance of properly defining the business need prior to engaging in requirements activities Formulate a strong understanding of the concepts that comprise strategy analysis Obtain experience with identifying and analyzing stakeholders Decipher between project and product scope and successfully use models to communicate scope Thoroughly understand and identify the various requirements categories and be able to recognize requirements of various types Explore business rules analysis Understand the benefits of process modeling and the common modeling language of BPMN Discuss process models and how the techniques can capture details about the as-is/to-be environment Learn how to properly prepare and conduct interviews Explore the components of use cases Learn what it means to package requirements Obtain hands-on experience with a number of business analysis techniques and gain hands-on experience eliciting, defining, and writing requirements. This course provides students a clear understanding of all the facets of the business analysis role, including a thorough walkthrough of the various domain/knowledge areas that comprise the business analysis profession. Students are provided an opportunity to try their hand at several business analysis techniques to assist with improving their skills in stakeholder identification, scope definition, and analyzing, documenting, and modeling requirements. Introduction to Business Analysis What is business analysis Benefits and challenges of business analysis Project success factors A Closer Look at the Business Analyst Role Definition of a business analyst Responsibilities of a business analyst Importance of communication/collaboration BA role vs. PM role Project roles involved in requirements IIBA/PMI and the goals of a professional association Purpose for having a BA standard IIBA?s BABOK© Guide and PMI?s Practice Guide in Business Analysis Business analysis beyond project work Business analysis core concepts Business analysis perspectives IIBA and PMI certifications for business analysts Workshop: Choose Your Project Supporting the Project Portfolio (Enterprise Analysis) Define Strategy Analysis When to perform Strategy Analysis Components of Strategy Analysis Defining the business need Envisioning the Product and Project Defining business requirements The importance of stakeholders Stakeholder identification Tips for analyzing stakeholders Techniques for managing stakeholder lists Discussion: Who is involved in strategy analysis? Workshops: Define the Business Need, Write Business Requirements, and Identify Stakeholders Understanding and Defining Solution Scope Defining solution scope Techniques for defining solution scope Applying the brainstorming technique Project scope vs. Product scope Finding solution boundaries The Context Diagram Actors and key information Workshop: Draw a Context Diagram Understanding Requirements What is a requirement? Requirement types Business, Stakeholder, Solution, and Transition requirements Assumptions and constraints Business rules Taxonomy of business rules Decision tables How to write simple calculations Requirements vs. business rules Document requirements Workshop ? Document Requirements Elicitation and Process Modeling Why do we model processes? What is Business Process Management? Using a modeling notation ?As Is? vs. ?To Be? modeling Why use BPMN? Basic BPM notation Business Process Modeling ? A case study Business Process Realignment ?As Is? vs. ?To Be? activity diagrams Workshop: Create a Business Process Model Planning & Eliciting Requirements Interviewing ? what and why? Preparing for an effective interview Types of questions to ask Sequencing questions Active listening techniques Planning for elicitation Conducting the interview Establishing rapport Active Listening Feedback techniques Types of elicitation techniques Workshops: Planning for Elicitation and Conducting an Elicitation Session Use Case & User Story Analysis What is an Actor? Types of Actors How to ?find? Use Cases? Diagramming Use Cases Tips on naming Use Cases Explaining scenarios The use case template Components of a use case Scenario examples Best practices for writing Use Cases Scenarios and flows Alternate and exception flows Exercises: Drawing a Use Case Diagram, Writing the Main Success Scenario, and Writing Alternate and Exception Scenarios Analyzing & Documenting Requirements Requirements and Use Cases Non-Functional requirements User Interface Requirements UI Data Table Reporting requirements Data requirements Data accessibility requirements Characteristics of good requirements The business requirements document (BRD) BRD vs. Functional Requirements Specification Preparing the requirements package Requirements traceability Workshops: Develop a User Interface, Analyzing Requirements, and Tracing requirements Additional Resources Useful books and links on writing effective requirements
Duration 5 Days 30 CPD hours This course is intended for This course is for administrators and users who are responsible for planning, administrating and configuring an IBM FileNet P8 Platform system Overview Introduction to IBM FileNet P8 Platform - IBM FileNet P8 Platform features - IBM FileNet P8 Platform integration options - IBM FileNet P8 Platform components - IBM FileNet P8 Platform solutions Architecture and domain structures - IBM FileNet P8 Platform Architecture - Explore the core IBM FileNet P8 Platform applications - Locate P8 domain structures - Use IBM Content Navigator Manage logging - View and archive system logs - Configure trace logging Configure auditing - Create audit definitions - Prune audit entries Manage storage areas - Create a file storage area - Create a storage policy - Create an advanced storage area Build an object store - Create JDBC data sources for an object store - Create an object store - Add the repository to an IBM Content Navigator desktop Create property templates and classes - Create a choice list - Create property templates - Create document and folder classes Modify classes and properties - Change the property template name - Modify a choice list - Work with metadata dependencies Use events to trigger actions - Create a subscription with an event action - Update the event action with new code module Configure security for IBM FileNet P8 assets - Configure initial object store security - Use the Security Script wizard - Configure default instance security - Configure security inheritance - Implement designer group access - Configure role-based access Use bulk operations - Use bulk actions to modify security for multiple documents - Use bulk operations to cancel checkout of documents Configure content-based retrieval searches - Register IBM Content Search Services - Configure index partitioning - Configure content-based indexes - Create content-based searches Work with sweeps - Configure a bulk move content job - Create a disposal policy - Create a content migration policy Move IBM FileNet P8 Platform applications between environments - Configure a destination environment - Create a source environment - Export the FileNet P8 application assets - Convert and analyze the FileNet P8 assets - Import the application assets - Run a change impact analysis in command line Introduction to IBM FileNet P8 content services containers - IBM FileNet P8 content services containers - Benefits of containers - Considerations when choosing containers Organize content across the enterprise - Plan for Multitenancy - Isolate content in an IBM FileNet P8 platform system This course teaches you the configuration and administration of an IBM FileNet P8 Platform 5.5.x system. It introduces you to the key concepts of IBM FileNet P8 Platform architecture and organizing the content across the enterprise. You will learn how to build content repositories, configure metadata, create storage areas, manage security, logging, and auditing, run bulk processing, use the sweep framework, extend the functionality with Events and Subscription, migrate and deploy FileNet P8 assets between environments, and configure content-based retrieval searches Introduction to IBM FileNet P8 Platform IBM FileNet P8 Platform features IBM FileNet P8 Platform integration options IBM FileNet P8 Platform components IBM FileNet P8 Platform solutions Architecture and domain structures IBM FileNet P8 Platform Architecture Explore the core IBM FileNet P8 Platform applications Locate P8 domain structures Use IBM Content Navigator Manage logging View and archive system logs Configure trace logging Configure auditing Create audit definitions Prune audit entries Manage storage areas Create a file storage area Create a storage policy Create an advanced storage area Build an object store Create JDBC data sources for an object store Create an object store Add the repository to an IBM Content Navigator desktop Create property templates and classes Create a choice list Create property templates Create document and folder classes Modify classes and properties Change the property template name Modify a choice list Work with metadata dependencies Use events to trigger actions Create a subscription with an event action Update the event action with new code module Configure security for IBM FileNet P8 assets Use the Security Script wizard Configure default instance security Configure security inheritance Implement designer group access Configure rolebased access +O35Use bulk operations Use bulk actions to modify security for multiple documents Use bulk operations to cancel checkout of documents Configure content-based retrieval searches Register IBM Content Search Services Configure index partitioning Configure contentbased indexes Create contentbased searches Work with sweeps Configure a bulk move content job Create a disposal policy Create a content migration policy Move IBM FileNet P8 Platform applications between environments Configure a destination environment Create a source environment Export the FileNet P8 application assets Convert and analyze the FileNet P8 assets Import the application assets Run a change impact analysis in command line Introduction to IBM FileNet P8 content services container IBM FileNet P8 content services containers Benefits of containers Considerations when choosing container Organize content across the enterprise Plan for Multitenancy Isolate content in an IBM FileNet P8 platform system
(6-8yrs) Jazz and modern is perfect for the kids who just can't stop moving when One Direction and Beyonce come on the telly! Using a range of music from the latest pop songs to great musical theatre songs (old and new!) JazzPops offers a range of dance throughout the term with a dash of some musical games. We also sneak in some dance technique from the ISTD Modern Theatre Syllabus. But don't tell the children that, they are having too much fun! TRIAL BOOKINGS: Of course you are welcome to watch the trial class but following the trial, WhizzDancers are expected to be independent in the room. TERM BOOKINGS: You are welcome to watch the first class but following this your WhizzDancer will be expected to go in the class independently. You will be expected to provide full uniform. Details will be sent following. We have lots of opportunities ahead for your WhizzDancer including exams and shows. We look forward to meeting them in the studio :) Upstairs Dance Studio Please bring: - Comfortable clothes to move in (no zips or demin) - No ballet shoes required for the trial Please contact info@whizzdance.com for more information on how to book your free trial.
Duration 5 Days 30 CPD hours This course is intended for Implmentation Consultants, Business Users, IT Governance Experts, Compliance Managers Overview Discuss the purpose and business use of Process ControlDescribe key features and related harmonization topicsDescribe risk-based internal controlsConfigure Process Control customizing settings and those shared across GRCCreate and manage master dataDiscuss security and authorization requirementsImplement the Process Control solutionUse risk-managed financial compliance practicesPlan and process surveys and testsSet up and maintain Continuous MonitoringIntegrate and use Process Control with Policy ManagementDiscuss operational complianceAggregate deficienciesUse the harmonized reporting frameworkDescribe the use of custom-defined fields and document search This course offers hands-on configuration and implementation of SAP Process Control 10.1, as well as important concepts you will need to know in order to prepare for implementation and ongoing prevention of process risk. Enterprise Goverance, Riskl, and Compliance (eGRC) Risk-Based Approach to Managing Compliance Initiatives Integrated GRC Approach Governance Governance Overview Governance Using Process Control 10.1 Daily Business Use Harmonization Overview Harmonization Concepts Work Centers Setting Up an Entry Page Technical Landscape Configuration Requirements Customizing Central Tasks Shared Master Data and Reports Workflow Authorization Updates Process Control-Specific Customizing Create & Manage Master Data Master Data Overview Setting Up an Organization Hierarchy Setting Up the Account Group Hierarchy Setting Up the Central Process Hierarchy Setting Up the Indirect Entity-Level Control Hierarchy Harmonized Risk Model Uploading Master Data with MDUG Content Lifecycle Management Master Data Change Request Workflow Surveys and Manual Tests Survey and Test Overview Planner Overview Assessment Survey Manual Test Manual Test ? Offline Forms and Data Sheets Disclosure Survey Issue Remediation Risk-Managed Financial Compliance Risk-Based Financial Compliance Materiality Analysis Risk Assessment Control Risk Rating Test Strategy Risk Coverage Analysis Integration with SAP Audit Management Ad Hoc Issues Ad Hoc Issues Integration with SAP Fraud Management Policy Management Policy Management ? Overview Configuring Policy Management Policy Lifecycle Management Continuous Monitoring Continuous Monitoring ? Overview Continuous Monitoring ? Preconfiguration Creating a Data Source Creating a Business Rule Assigning Business Rules to a Control Scheduling a Continuous Monitoring Job Monitoring a Continuous Monitoring Job SAP Queries SAP BW Query Setting Up a Configurable Rule Subscenario Create a Programmed Rule ABAP Reports Process Integration Subscenario SoD Integration Web Service for Continuous Monitoring Event-Based Monitoring SAP HANA Views New CCM Content Upload Capabilities Operational Compliance Overview Operational Compliance Overview and Key Trends CAPA Operational Compliance-Specific Focus in CCM Closing Activies in an ICS Management Cycle Sign-Off Aggregation of Deficiencies Reporting Reports Overview Report Framework Harmonization Dashboard Overview Security & Authorization Security and Authorization ? Overview Authorization Configuration and Setup Implementation Scope and Approach Implementation Scope and Approach Establishing a Compliance Framework Configuring a Multi-Compliance Framework (MCF) Other Process Control Features Custom-Defined Fields Document Search
This course presents the role of the care worker using demonstrations of good and bad practices. It includes information on Core Values, Code of Conduct, and Continual Professional Development. This subject forms Standard 1 of the Care Certificate.
Duration 1 Days 6 CPD hours This course is intended for Individuals planning to deploy applications and create application environments on Google Cloud. Developers, systems operations professionals, and solution architects getting started with Google Cloud. Executives and business decision makers evaluating the potential of Google Cloud to address their business needs. Overview Identify the purpose and value of Google Cloud products and services. Interact with Google Cloud services. Describe ways in which customers have used Google Cloud. Choose among and use application deployment environments on Google Cloud: App Engine, Google Kubernetes Engine, and Compute Engine. Choose among and use Google Cloud storage options: Cloud Storage, Cloud SQL, Cloud Bigtable, and Firestore. Make basic use of BigQuery, Google's managed data warehouse for analytics. This course uses lectures, demos, and hands-on labs to give you an overview of Google Cloud products and services so that you can learn the value of Google Cloud and how to incorporate cloud-based solutions into your business strategies. Introducing Google Cloud Platform Explain the advantages of Google Cloud Platform. Define the components of Google's network infrastructure, including: Points of presence, data centers, regions, and zones. Understand the difference between Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS). Getting Started with Google Cloud Platform Identify the purpose of projects on Google Cloud Platform. Understand the purpose of and use cases for Identity and Access Management. List the methods of interacting with Google Cloud Platform. Lab: Getting Started with Google Cloud Platform. Google Compute Engine and Networking Identify the purpose of and use cases for Google Compute Engine. Understand the basics of networking in Google Cloud Platform. Lab: Deploying Applications Using Google Compute Engine. Google Cloud Platform Storage Options Understand the purpose of and use cases for: Google Cloud Storage, Google Cloud SQL, and Google Cloud Bigtable. Learn how to choose between the various storage options on Google Cloud Platform. Lab: Integrating Applications with Google Cloud Storage. Google Container Engine Define the concept of a container and identify uses for containers. Identify the purpose of and use cases for Google Container Engine and Kubernetes. Introduction to Hybrid and Multi-Cloud computing (Anthos). Lab: Deploying Applications Using Google Container Engine. Google App Engine and Google Cloud Datastore Understand the purpose of and use cases for Google App Engine and Google Cloud Datastore. Contrast the App Engine Standard environment with the App Engine Flexible environment. Understand the purpose of and use cases for Google Cloud Endpoints. Lab: Deploying Applications Using App Engine and Cloud Datastore. Deployment and Monitoring Understand the purpose of template-based creation and management of resources. Understand the purpose of integrated monitoring, alerting, and debugging. Lab: Getting Started with Stackdriver and Deployment Manager. Big Data and Machine Learning Understand the purpose of and use cases for the products and services in the Google Cloud big data and machine learning platforms. Lab: Getting Started with BigQuery. Summary and Review Summary and Review. What's Next?.