• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

82 Policy courses in Leeds

Public Policy Analysis

5.0(10)

By GBA Corporate

OVERVIEW -------------------------------------------------------------------------------- The significance and goals of public policy * Using game theory to analyze public policy. * Understand the importance of public policy in society. * Understand the significance of theoretical and empirical models in understanding public policy. * Goals of public policy * Recognizing market failures. * Distinguishing between public and private goods.

Public Policy Analysis
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1718 to £3626

All organizations have policies and procedures that guide how decisions are made and how the work is done in that organization. Professionally written policies and procedures increase organizational accountability and transparency and are fundamental to quality/standards assurance and quality improvement.

Policy & Procedure Writing
Delivered in-person, on-request, onlineDelivered Online & In-Person in Loughborough
£668

Advanced Junos Service Provider Routing

5.0(3)

By Systems & Network Training

ADVANCED JUNOS SP ROUTING COURSE DESCRIPTION This is designed to provide students with detailed coverage of OSPF, IS-IS, BGP, and routing policy. Students will gain experience in configuring, monitoring, and troubleshooting the Junos operating system and in monitoring device and protocol operations. This course uses Juniper Networks vMX Series Routers for the hands-on component, but the lab environment does not preclude the course from being applicable to other Juniper hardware platforms running the Junos OS. WHAT WILL YOU LEARN * Describe and configure OSPF area types and operations. * Configure and monitor IS-IS. * Describe basic BGP operation. * Explain the causes for route instability. * Describe how to troubleshoot routing policy. * Explain the default behaviour of damping on links. ADVANCED JUNOS SP ROUTING COURSE DETAILS * Who will benefit: Network staff working with Junos at layer 3. * Prerequisites: Junos Intermediate Routing * Duration 5 days ADVANCED JUNOS SP ROUTING COURSE CONTENTS * OSPF OSPFv2 Review Link-State Advertisements Protocol Operations OSPF Authentication Lab: OSPF Multi-Area Networks Chapter 3: OSPF Areas Review of OSPF Areas Stub Area Operation and Configuration NSSA Operation and Configuration Route Summarization Lab: OSPF Route Summarization * OSPF Case Studies and Solutions Virtual Links OSPF Multiarea Adjacencies External Reachability Lab: Advanced OSPF Options and Routing Policy * Troubleshooting OSPF Troubleshooting OSPF Lab: OSPF Troubleshooting * IS-IS Overview of IS-IS IS-IS PDUs Neighbors and Adjacencies Configuring and Monitoring IS-IS Lab: IS-IS Configuration and Monitoring * Advanced IS-IS Operations and Configuration Options IS-IS Operations IS-IS Configuration Options IS-IS Routing Policy Lab: Advanced IS-IS Configuration Options and Routing Policy * Multilevel IS-IS Networks Level 1 and Level 2 Operations Multilevel Configuration Lab: Configuring a Multilevel IS-IS Network * Troubleshooting IS-IS Troubleshooting IS-IS Lab: IS-IS Troubleshooting * BGP Review of BGP BGP Operations BGP Path Selection Options Configuration Options Lab: BGP and BGP Attributes * BGP Attributes and Policy - Part1 BGP Policy Next Hop Origin and MED AS Path Lab: BGP Attributes - Next Hop, Origin, MED, and AS Path * Attributes and Policy - Part2 Local Preference Communities Lab: BGP Attributes - Local Preference and Communities * Route Reflection and Confederations Route Reflection Operation Configuration and Routing Knowledge BGP Confederations Lab: Scaling BGP * BGP Route Damping Route Flap and Damping Overview Route Damping Parameters Configuring and Monitoring Route Damping Lab: BGP Route Damping * Troubleshooting BGP Troubleshooting BGP Lab: BGP Troubleshooting * Troubleshooting Policy Troubleshooting Policy Lab: Policy Troubleshooting

Advanced Junos Service Provider Routing
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Advanced Junos Security

5.0(3)

By Systems & Network Training

ADVANCED JUNOS SECURITY TRAINING COURSE DESCRIPTION This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. WHAT WILL YOU LEARN * Demonstrate the understanding of integrated user firewall. * Implement next generation Layer 2 security features. * Implement virtual routing instances in a security setting. * Utilize Junos tools for troubleshooting Junos security implementations. * Implement IPS policy. ADVANCED JUNOS SECURITY TRAINING COURSE DETAILS * Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. * Prerequisites: Intro to the Junos Operating System * Duration 5 days ADVANCED JUNOS SECURITY TRAINING COURSE CONTENTS * Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security * Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing * AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures * AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure * Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director * Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware * Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo * Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM * Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy * SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN * Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall * Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques * Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Supporting Windows 10

5.0(3)

By Systems & Network Training

SUPPORTING WINDOWS 10 COURSE DESCRIPTION This course is designed to provide students with the knowledge and skills required to support and troubleshoot Windows 10 PCs and devices in a Windows Server domain environment. These skills include understanding of Windows 10 features, how they can be used in an Active Directory environment and how to troubleshoot them. WHAT WILL YOU LEARN * Troubleshoot startup issues and operating system services on a Windows 10 PC. * Troubleshoot issues related to network connectivity. * Troubleshoot client configuration failures and GPO application issues. * Troubleshoot issues related to application installation and operation. * Recover a PC running Windows 10. SUPPORTING WINDOWS 10 COURSE DETAILS * Who will benefit: Anyone supporting users running Windows 10 personal computers within a medium to large enterprise. * Prerequisites: None. * Duration 5 days SUPPORTING WINDOWS 10 COURSE CONTENTS * Implementing a Troubleshooting Methodology Overview of Windows 10, Introduction to the EDST Job Role, Overview of the Troubleshooting Steps & Tools. Hands on Implementing a Troubleshooting Methodology. Hands on Using Troubleshooting Tools for Windows 10. * Troubleshooting Startup Issues Overview of the Windows 10 Startup Recovery Environment, Troubleshooting Startup Settings & Operating System Services Issues, Recovering BitLocker-Protected Drives. Hands on Troubleshooting Startup Issues. Hands on Recovering BitLocker-Encrypted Drives, Creating a New BitLocker Password. * Troubleshooting Hardware and Device Drivers Troubleshooting Device Driver Failures & Physical Failures, Overview of Hardware Troubleshooting, Monitoring Reliability, Configuring the Registry. Hands on Troubleshooting Device Driver Issues, Resolving Hardware Issues, Adding a Missing Device Driver to a Driver Store, Reverting a Problematic Device Driver. Hands on Troubleshooting Hardware Issues, Diagnosing Memory, Troubleshooting and Repairing Failed Disk Redundancy Synchronizing Settings, Accessing Data on a Foreign Volume. * Troubleshooting Remote Computers Using Remote Desktop and Remote Assistance, Remoting with Windows PowerShell Hands on Troubleshooting Remote Computer by using Remote Desktop and Remote Assistance. Hands on Troubleshooting Remote Computer by using Windows PowerShell. * Resolving Network Connectivity Issues Determining Network Settings, Troubleshooting Network Connectivity Issues, Troubleshooting Name Resolution. Hands on Resolving Network Connectivity Issues. Hands onResolving Name Resolution Issues. * Troubleshooting Group Policy Overview of Group Policy Application, Resolving Client Configuration Failures and GPO Application Issues. Hands on Troubleshooting Group Policy Application Issues. Hands on Resolving Group Policy Issues. Hands on Installing and Sharing a Printer. * Troubleshooting User Settings Troubleshooting Sign In Issues, Troubleshooting the Application of User Settings. Hands on Troubleshooting Sign in Problems. Hands on Troubleshooting the Application of User Settings, Resolving Folder Redirection Problem, Resolving Roaming User Profile Problem. * Troubleshooting Remote Connectivity Troubleshooting VPN Connectivity Issues & DirectAccess. Hands on Troubleshooting VPN Connectivity Lab : Configuring and Troubleshooting DirectAccess Configuring and Verifying, DirectAccess Client-Side Settings, Troubleshooting DirectAccess. Troubleshooting Resource Access Within a Domain & File Permissions Issues, Recovering Files Encrypted by EFS, Troubleshooting Printer Access Issues. Lab : Troubleshooting File Access Issues Lab : Troubleshooting Access to Encrypted Files. Hands on Troubleshooting Printer Access Issues * Troubleshooting Resource Access for Non Domain Member Clients Configuring and Troubleshooting Device Registration, Configuring and Troubleshooting Work Folders, Configuring and Troubleshooting OneDrive Access. Hands on Troubleshooting Resource Access for Clients that are not Domain Members. Troubleshooting Device Registration, Work Folders and OneDrive for Business. * Troubleshooting Applications Troubleshooting Desktop App Installation Issues, Desktop Apps, Managing Windows Store Apps, Troubleshooting Access to Company Web Applications. Hands on Troubleshooting Desktop Apps, AppLocker Policy Application & Application Compatibility issue. Hands on Troubleshooting Access to Company Web Applications, Internet Explorer Issue & Microsoft Edge. * Maintaining Windows 10 Managing & Troubleshooting Windows Activation, Troubleshooting Performance, Applying Applications. Hands on Monitoring and Troubleshooting Performance. * Recovering Data and Operating System File Recovery in Windows 10, Recovering an OS. Hands on Recovering Data, Recovering Data from Azure Backup, Recovering Deleted File by Using File History. Hands on Provisioning Computer to Comply with Company Standards, Provision Computer to Comply with Company Standards.

Supporting Windows 10
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Windows certificates for engineers

5.0(3)

By Systems & Network Training

WINDOWS CERTIFICATES TRAINING COURSE DESCRIPTION A hands-on training course concentrating solely on PKI using Windows certificates. WHAT WILL YOU LEARN * Explain how PKI works. * Install windows certificates. * Configure windows certificates. * Troubleshoot windows certificates. WINDOWS CERTIFICATES TRAINING COURSE DETAILS * Who will benefit: Technical security staff. * Prerequisites: Windows server. * Duration 3 days WINDOWS CERTIFICATES TRAINING COURSE CONTENTS * PKI Symmetric encryption, asymmetric encryption, authentication, digital signing, hashing, certificates, Certification Authorities, Root CA, Intermediate CA, policy CA, Issuing CA, Certificate Revocation Lists. Hands on Inspecting a certificate. * Policies and PKI Security policy, certification policy. * CA hierarchy Impact of CAs on Active Directory, CA architecture, number of tiers, issuing CA organisation, CA configuration files. CA security. Hands on CA installation PKI health tool, monitoring. * Certificate revocation When to revoke, OCSP. Hands on Revoking certificates. * Certificate validation Discovery, validation, checks, revocation checking, certificate chains, certification publication. Hands on Event viewer. * Certificate templates Version 1, version 1, default, modifying templates. Hands on Template management. * Roles Criteria roles, CA administrator, Certificate manager, Backup operator, Auditor. Other PKI management roles. * Disaster recovery Backups, recovery. Hands on certutil. * Issuing certificates The certificate enrolment process, enrolment methods, manual enrolment, automatic enrolment. * Trust between organisations Creating Trust, CTLs, common root CA, cross certification, bridge CA. * Web servers and certificates SSL encryption, certificate authentication. Hands on Web servers. * VPN Hands on Certificate deployment for VPN. * WiFi Hands on 802.1X

Windows certificates for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3497

Introduction to the Junos Operating System

5.0(3)

By Systems & Network Training

JUNOS OPERATING SYSTEM TRAINING COURSE DESCRIPTION This course provides students with the foundational knowledge required to work with the Junos OS and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. Delegates will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 15.1X49. WHAT WILL YOU LEARN * Describe the design architecture of the Junos OS. * Navigate within the Junos CLI and perform tasks within the CLI operational and configuration modes. * Configure and monitor network interfaces. * Navigate within the Junos J-Web interface. * Identify where you might use firewall filters. * Explain basic routing operations and concepts. * Identify key factors in Juniper Networks' security. JUNOS OPERATING SYSTEM TRAINING COURSE DETAILS * Who will benefit: This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. * Prerequisites: TCP/IP foundation for engineers * Duration 3 days JUNOS OPERATING SYSTEM TRAINING COURSE CONTENTS * Junos Operating System Fundamentals The Junos OS Traffic Processing Overview of Junos Devices * User Interface Options-The Junos CLI User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode * User Interface Options-The J-Web Interface The J-Web GUI Configuration Lab 1: User Interface Options * Initial Configuration Factory-Default Configuration Initial Configuration Interface Configuration Lab 2: Initial System Configuration * Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP Lab 3: Secondary System Configuration * Operational Monitoring and Maintenance Monitoring Platform and Interface Operation Network Utilities Maintaining the Junos OS Password Recovery System Clean-Up Lab 4: Operational Monitoring and Maintenance * Interface Configuration Examples Review of the Interface Configuration Hierarchy Interface Configuration Examples Using Configuration Groups * Routing Fundamentals Routing Concepts: Overview of Routing Routing Concepts: The Routing Table Routing Concepts: Routing Instances Static Routing Dynamic Routing Lab 5: Routing Fundamentals * Routing Policy Routing Policy Overview Case Study: Routing Policy Lab 6: Routing Policy * Firewall Filters Firewall Filters Overview Case Study: Firewall Filters Unicast Reverse-Path-Forwarding Checks Lab 7: Firewall Filters * Class of Service CoS Overview Traffic Classification Traffic Queueing Traffic Scheduling Case Study: CoS Lab 8: Class of Service * JTAC Procedures Opening a Support Case Customer Support Tools Transferring Files to JTAC * Juniper Security Concepts Security Challenges Juniper's Security Focus * Appendix A: IPv6 Fundamentals IPv6 Addressing Protocols and Services Configuration

Introduction to the Junos Operating System
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2367

How to tell stories that heal

By Human Givens College

Stories and metaphor are a powerful way to stimulate hope and by-pass resistance – they can also enhance problem solving and creativity, beneficially impact the mind/body system and much more… -------------------------------------------------------------------------------- * Accredited CPD Certificate : 6 hours * Length 1 day (9.30am - 4.00pm) -------------------------------------------------------------------------------- > Wonderful – inspiring, informative and empowering communication skills > masterclass > > JENI NELSON, PSYCHOTHERAPIST / HYPNOTHERAPIST WHY TAKE THIS COURSE Stories can be incredibly powerful therapeutic tools. They help bypass rigid views about life, enhancing the listener’s flexibility of thought. And by suspending ordinary constraints, they help people reclaim optimism whilst fueling their imaginations with the energy necessary to attain goals. In the physically ill, they can also stimulate the immune system and speed recovery. All successful psychotherapy and counselling involves storytelling and the use of pertinent metaphors, both of which tap into the natural way our brains work. We can’t know what goes on in another person’s mind but, if you perceive the ‘pattern’ of a story and understand that it could be useful to them at a specific point in their life, that is reason enough to tell it. Their unconscious, creative imagination will seek and find the ‘meaning’ relevant to their situation. No explanation, no direct statement of a story’s meaning can substitute for the way it acts on the hearer’s mind. Join us to discover more and learn how to source and tell such therapeutic tales yourself… > Gareth was fantastic, brought a wealth of knowledge and enthusiasm as well as > stories to the course... > > PROJECT MANAGER > Wonderful practical skills - I was entranced the whole day... > > PSYCHIATRIST WHAT WILL YOU LEARN * How and why our brains work through ‘pattern-matching’ * How to use this profoundly useful tool for getting through to people stuck in the black-and-white thinking of emotional distress * A powerful way to stimulate optimism, hope and independence in distressed people * Increased ability to source and tell therapeutic stories yourself * Ways to enhance your own problem solving capacity, as well as being better able to help others with theirs * A new way to motivate and engage people * Insights into the mind/body communication system and how useful this tool can be for promoting healing and recovery * A great way to build rapport and bypass resistance * How to choose the appropriate stories and metaphors for different people, and when to use them * Practical ways in which therapists, teachers, GPs, managers, policy planners etc can apply this knowledge to their work * The ability to enhance flexibility of thought, creativity and confidence in your clients * How stories and metaphor can also help us diagnose where problems lie * A new love and deeper understanding of the value, resonances and resources within stories * Greater confidence in dealing with a wide range of people – and a solid understanding of, and practise in, the therapeutic precision of metaphor and more… > So informative and relevant to my everyday work.. > > SCHOOL COUNSELLOR    Pat Williams, creator of this course, talks you through its benefits -------------------------------------------------------------------------------- COURSE PROGRAMME The ‘How to tell stories that heal’ course starts at 9.30am and runs until 4.00pm. * From 8.30am * Registration (Tea and coffee served until 9.25am) * 9.30am How and why stories help people * 11.00am Discussion over tea/coffee * 11.30am How to find the right story for each situation * 1.00pm Lunch (included) * 1.45pm How to use stories as therapy * 2.45pm Discussion over tea/coffee * 3.00pm How to tell stories well: the three simple rules * 4.00pm Day ends -------------------------------------------------------------------------------- https://directory.cpdstandards.com/providers/human-givens-college/ This course has been independently accredited by the internationally recognised CPD Standards Office for 6 hours of CPD training. On completion of this training you’ll receive CPD certificates from the College and the CPD Standards Office.

How to tell stories that heal
Delivered In-Person in Leeds + 1 more locations6 hours 30 minutes, Jul 18th, 08:30 + 1 more
£198

Microsoft Active Directory

5.0(3)

By Systems & Network Training

MICROSOFT ACTIVE DIRECTORY COURSE DESCRIPTION A thorough understanding of this system is essential for anyone managing enterprise MS networks. Essential theory is complimented with a high level of hands on practice allowing delegates to observe the idiosyncrasies of Active Directory and Group Policy at first hand. Delegates learn the fundamental theory of AD and progress onto building a multi-domain network in the classroom. The course includes troubleshooting methods, and essential maintenance procedures. This course is designed to teach you the skills needed for day to day management of these technologies. WHAT WILL YOU LEARN * Install AD on multiple PCs. * Use the tools to create and manage objects. * Create appropriate group policies to restrict selected user's desktops and network access. * Install DNS to support Active Directory without loosing Internet Connectivity. * Maintain and troubleshoot AD problems * Backup Active Directory. MICROSOFT ACTIVE DIRECTORY COURSE DETAILS * Who will benefit: Technical staff working with AD based networks. * Prerequisites: Supporting Windows server. * Duration 3 days MICROSOFT ACTIVE DIRECTORY COURSE CONTENTS * Introduction to Active Directory Network authentication methods, Active Directory defined, AD naming conventions, network management with AD, AD structures: Domains, Organisational Units, Forests & Trees, Sites, The Global Catalogue. Windows 2003 new features, installing AD. Hands on Installing an AD network. * Windows overview Management methods Server management tools, installing the additional tools, Terminal Server: Administration mode, Administrator accounts in AD, Local Security Policy. Hands on Install the management tools, Management using Terminal Services. * Creating & Managing Objects (a quick look) AD management tools, AD users and computers, Creating & managing OUs, User Accounts and groups, controlling access to AD objects, moving objects, Publishing resources, locating objects in AD, delegating authority. Hands on Creating a control OU structure and delegating authority. * Introduction to Group Policies What are Group Policies? Where Group Policy data is stored, security, Group Policy flow. Hands on Implementing Group Policies * Working with Group Policies Local security templates, administrative templates, scripts, folder redirection, software deployment. Hands on Scripts, redirecting the start menu, creating a secure, robust desktop environment. * Implementing DNS DNS basics, troubleshooting, implementing DNS zones. Hands on Building a unified DNS solution. * Maintaining and managing the AD database AD support tools, database internal structure, replication, replication tools, Single Operations Masters, tools for maintenance, maintenance techniques, Backing up AD, Directory Services restore mode, NTDSUtil, Authoritative & non-authoritative restoration, rebuilding. Hands on NTDSUtil.

Microsoft Active Directory
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1877

Securing Microsoft systems

5.0(3)

By Systems & Network Training

MICROSOFT SECURITY TRAINING COURSE DESCRIPTION A hands on training course focusing on security in the Microsoft environment. The course progresses from patch management onto the use of Microsoft security tools. Then server, desktop and network security are studied in the Microsoft environment. WHAT WILL YOU LEARN * Use Microsoft security tools. * Secure Microsoft servers. * Secure Microsoft desktops. * Secure Microsoft networks. MICROSOFT SECURITY TRAINING COURSE DETAILS * Who will benefit: Technical server support staff. Technical desktop support staff. Technical network staff. Technical security staff. * Prerequisites: Supporting Windows server 2016 Networking Microsoft systems. * Duration 3 days MICROSOFT SECURITY TRAINING COURSE CONTENTS * Introduction Security threats, Microsoft defaults, admin accounts, security patches, patch management, patch tools. Hands on: Studying Microsoft defaults, applying security patches. * Microsoft security tools Microsoft updates, WSUS, Inventory tool, baseline security analyser, URLscan, EventCombMT, Cipher security tool, Port reporter, PortQry. Tools hackers use. Hands on: Using Microsoft security tools. * Server security Checklists, core server security, AD, Member server security, Domain controller security, Specific roles. Hands on Hardening Microsoft servers, security templates. * Active Directory Admin authority in AD, group policy, trust and authentication. * Desktop security Checklists, core client security, anti virus software, anti spyware software, firewalls, securing clients with AD, securing clients with group policy, software restriction policies. Hands on Securing Microsoft desktops. * Network security Checklist, IP security, VPNs, PKI, certificate authorities, RAS, RRAS, IAS. Hands on: VPN configuration, IAS configuration. * Monitoring Auditing, authorisation and logons, tracking, system monitoring, detecting attacks. Hands on: Monitoring Microsoft systems. * Summary Microsoft security response centre, security advisories.

Securing Microsoft systems
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3497
123...9

Educators matching "Policy"

Show all 6
Halo Business Safety & Security Consultants

halo business safety & security consultants

Harrogate

Health & Safety is a vital cornerstone within any successful business today, a positive health & safety culture presents economical, commercial and operational benefits. With the continuous increase in prosecutions for a breach of regulations and the subsequent claims for injuries, the need for businesses to ensure health & safety compliance has never been greater. Halo Business, Safety & Security Consultants are based in Harrogate North Yorkshire. We pride ourselves on having the ability to deliver a personally tailored and cost effective health & safety solution for your business, using fully trained and qualified consultants. We are able to deliver a wide range of health & safety related service provisions, including health & safety training, risk assessments, including fire risk assessments, health & safety consultancy, safety audits, accident investigation and document or policy creation. All our services are supported with direct person to person telephone support. The benefits of a positive health & safety culture, reach far beyond the basic principles of legislation compliance. There are significant economic benefits such as, reduced insurance premiums and reduced risk of litigation against your organisation. Further to this, there are significant commercial benefits, such as an enhanced professional image to customers and suppliers alike with the possibility of attaining accreditations and awards for a safe working environment. Operational benefits are also significant, lost operational hours following accidents are minimised, employee morale is increased, as such productivity is increased and the risk of prosecution of directors and managers, thus removing them from the business, is reduced. The approach adopted by Halo Business, Safety & Security Consultants, is to provide a comprehensive customer focused service, where assessments, audits and or policies are completed, training is delivered and continued support, guidance and advice is available. A partnership approach is adopted with clients, with our consultants working with your own appointed representatives to achieve your required outcomes.

IVE Studio

ive studio

Leeds

We are IVE (formerly CapeUK) was established as an incorporated company in April 1997 and registered as a charity in April 1999. Inspired by radical new models of creative education, the company was originally set up as a research and development organisation. CapeUK looked to drill down into the creative process and explore how it might be used to drive improvements in teaching and learning. We became influential in relation to policy development and established a national and international reach in relation to championing creativity and professional learning. We also acted as advisors to Government on the importance of creativity and how it might be developed as a transferable skill. By 2014 we realised there was an opportunity to diversify our work and utilise the learning that 17 years of research and development had provided us. It was clear there was significant appetite beyond the education and cultural sectors for programmes that were aimed at developing the creative capacity and competencies of the workforce, and particularly in leadership. We have therefore spent the last 5 years designing and delivering training that aims to teach creativity as a transferable skill and how to create the right environment for creativity to flourish within the workplace, driving innovation, in a consistent and structured way. We also draw out the leadership and team behaviours that are needed to support this. IVE today Rosi Lister, CEO, explains: Rosi Lister CEO We are IVE “In 2016 we began delivering creative leadership training in sectors that are highly regulated and where staff are not traditionally encouraged or empowered to think outside the box, but where there is a growing need for this skill set. “Then, in 2017, our umbrella identity became We Are IVE Ltd, establishing InnovatIVE as our trading company which gifts all profits to our charitable programme. This programme seeks to inspire young, diverse & talented people from some of our most disadvantaged communities through a range of opportunities designed to develop their own creative potential as future leaders.” We believe that the workplace of the future depends on having individuals that are creative, that are able to adapt, that are resilient and have the range of skills and aptitudes employers are looking for. That’s why, when we deliver our training on an earned income basis, the profit goes back into supporting our charitable programmes for disadvantaged young people. It is therefore a ‘pay it forward’ scheme where all our customers and beneficiaries win.