• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

7 Triage courses delivered Live Online

Recognising the Unwell Patient for GP Receptionists and HCAs

By M&K Update Ltd

Aimed for GP reception staff and HCAs, who work face to face booking patients in or HCAs doing the initial triage/observations. Receptionists and HCAs working in the urgent care setting or walk in centres may also find this beneficial as they also book patients in and monitor the waiting room.

Recognising the Unwell Patient for GP Receptionists and HCAs
Delivered in-person, on-request, onlineDelivered Online & In-Person in UK Wide
Price on Enquiry

Telephone Signposting and Triage for Receptionists and HCAs

By M&K Update Ltd

This course will equip non-registrants to allocate patients safely into face to face or telephone appointments, with an appropriate practitioner or service. The course will also equip non-registered staff to question for, recognise and allocate patients with urgent health needs.

Telephone Signposting and Triage for Receptionists and HCAs
Delivered in-person, on-request, onlineDelivered Online & In-Person in UK Wide
Price on Enquiry

VMware Carbon Black Cloud Endpoint Standard

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for System administrators and security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of VMware Carbon Black Cloud Endpoint Standard Identify the architecture and data flows for Carbon Black Cloud Endpoint Standard communication Perform searches across endpoint data to discover suspicious behavior Manage the Carbon Black Cloud Endpoint Standard rules based on organizational requirements Configure rules to address common threats Evaluate the impact of rules on endpoints Process and respond to alerts Describe the different response capabilities available from VMware Carbon Black CloudTM This course teaches you how to use the VMware Carbon Black Cloud Endpoint? Standard product and leverage the capabilities to configure and maintain the system according to your organization?s security posture and policies. This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs. COURSE INTRODUCTION * Introductions and course logistics * Course objectives DATA FLOWS AND COMMUNICATION * Hardware and software requirements * Architecture * Data flows SEARCHING DATA * Creating searches * Analyzing events * Search operators * Advanced queries POLICY COMPONENTS * Rules * Local scanner * Sensor capabilities PREVENTION CAPABILITIES USING RULES * Rule types * Rule creation * Reputation priority * Configuring rules * Evaluating rule impact PROCESSING ALERTS * Alert triage * Alert actions RESPONSE CAPABILITIES * Using quarantine * Using live response * Hash banning

VMware Carbon Black Cloud Endpoint Standard
Delivered on-request, onlineDelivered Online
Price on Enquiry

Palo Alto Networks : Cortex XSOAR 6.8: Automation and Orchestration (EDU-380)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security-operations (SecOps), or security, orchestration, automation, and response (SOAR) engineers, managed security service providers (MSSPs), service delivery partners, system integrators, and professional services engineers Overview This training is designed to enable a SOC, CERT, CSIRT, or SOAR engineer to start working with Cortex XSOAR integrations, playbooks, incident-page layouts, and other system features to facilitate resource orchestration, process automation, case management, and analyst workflow.The course includes coverage of a complete playbook-development process for automating a typical analyst workflow to address phishing incidents. This end-to-end view of the development process provides a framework for more focused discussions of individual topics that are covered in the course. The Cortex? XSOAR 6.2: Automation and Orchestration (EDU-380) course is four days of instructor-led training that will help you: Configure integrations, create tasks, and develop playbooks.Build incident layouts that enable analysts to triage and investigate incidents efficientlyIdentify how to categorize event information and map that information to display fields.Develop automations, manage content, indicator data, and artifact stores, schedule jobs, organize users and user roles, oversee case management, and foster collaboration COURSE OUTLINE * 1 - Core functionality and Feature Sets * 2 - Enabling and Configuring Integrations * 3 - Playbook Development * 4 - Classification and Mapping * 5 - Layout Builder * 6 - Solution Architecture - Docker * 8 - Automation Development & Debugging * 9 - Content Management * 10 - Indicators * 11 - Jobs and Job Scheduling * 12 - Users and Role Management * 13 - Integration Development ADDITIONAL COURSE DETAILS: Nexus Humans Palo Alto Networks : Cortex XSOAR 6.8: Automation and Orchestration (EDU-380) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks : Cortex XSOAR 6.8: Automation and Orchestration (EDU-380) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Palo Alto Networks : Cortex XSOAR 6.8: Automation and Orchestration (EDU-380)
Delivered on-request, onlineDelivered Online
Price on Enquiry

AWS Cloud Financial Management for Builders

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for: Solutions architects Developers Cost-optimization leads System administrators Overview In this course, you will learn to: Explain the cost of core AWS services Determine and predict costs associated with current and future cloud workloads Use strategies and best practices to reduce AWS costs Use AWS tools to manage, monitor, alert, and optimize your AWS spend Apply strategies to monitor service costs and usage Implement governance standards, including resource tagging, account structure, provisioning,permissions, and access This course is for individuals who seek an understanding of how to manage, optimize, and predict costs as you run workloads on AWS. You learn how to implement architectural best practices, explore cost optimization strategies, and design patterns to help you architect cost-efficient solutions on AWS. MODULE 0: COUSE OVERVIEW * Course introduction MODULE 1: INTRODUCTION TO CLOUD FINANCIAL MANAGEMENT * Introduction to Cloud Financial Management * Four pillars of Cloud Financial Management MODULE 2: RESOURCE TAGGING * Tagging resources Hands-On Lab: Cost optimization: Control Resource Consumption Using Tagging and AWS Config MODULE 3: PRICING AND COST * Fundamentals of pricing AWS Free Tier Volume discounts Savings plans and Reserved Instances Demonstration: AWS Pricing Calculator MODULE 4: AWS BILLING, REPORTING, AND MONITORING * Understanding AWS invoices Reporting and planning AWS Cost Explorer AWS Budgets Demonstration: AWS Billing Console Demonstration: AWS Cost Explorer Demonstration: Trusted Advisor Hands-On Lab: Cost optimization: Deploy Ephemeral Environments Using Amazon EC2 Auto Scaling MODULE 5: ARCHITECTING FOR COST: COMPUTE * Evolution of compute efficiency Amazon EC2 right-sizing Purchasing options Architect for Amazon EC2 Spot Instance Impact of software licensing Demonstration: Compute Optimizer Demonstration: Spot Instance Advisor Hands-On Lab: Cost optimization: Right Size Amazon EC2 Instances Using Amazon CloudWatch Metrics MODULE 6: ARCHITECTING FOR COST: NETWORKING * Data transfer costs Understand data costs for different services How to triage network costs Hands-On Lab: Cost optimization: Reduce Data Transfer Costs Using Amazon CloudFront and Endpoints MODULE 7: ARCHITECTING FOR COST: STORAGE * Amazon EBS cost, pricing, and best practices Amazon S3 cost, pricing, and best practices Amazon EFS cost, pricing, and best practices Hands-On Lab: Cost optimization: Reduce Storage Costs Using Amazon S3 Lifecycle Management MODULE 8: ARCHITECTING FOR COST: DATABASES * Amazon RDS cost, pricing, and best practices Amazon Aurora cost, pricing, and best practices Amazon DynamoDB cost, pricing, and best practices Amazon ElastiCache cost, pricing, and best practices Amazon Redshift cost, pricing, and best practices MODULE 9: COST GOVERNANCE * Setting up AWS Organizations AWS Systems Manager Hands-On Lab: Cost optimization: Reduce Compute Costs Using AWS Instance Scheduler MODULE 10: COURSE SUMMARY * Course review

AWS Cloud Financial Management for Builders
Delivered on-request, onlineDelivered Online
Price on Enquiry

Palo Alto Networks: Cortex XSOAR 6.8: Automation and Orchestration(EDU-380)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Security-operations (SecOps), or security, orchestration, automation, and response (SOAR) engineers, managed security service providers (MSSPs), service delivery partners, system integrators, and professional services engineers Overview This training is designed to enable a SOC, CERT, CSIRT, or SOAR engineer to start working with Cortex XSOAR integrations, playbooks, incident-page layouts, and other system features to facilitate resource orchestration, process automation, case management, and analyst workflow. The course includes coverage of a complete playbook-development process for automating a typical analyst workflow to address phishing incidents. This end-to-end view of the development process provides a framework for more focused discussions of individual topics that are covered in the course. The Cortex? XSOAR 6.8: Automation and Orchestration (EDU-380) course is four days of instructor-led training that will help you: Configure integrations, create tasks, and develop playbooks Build incident layouts that enable analysts to triage and investigate incidents efficiently Identify how to categorize event information and map that information to display fields Develop automations, manage content, indicator data, and artifact stores, schedule jobs, organize users and user roles, oversee case management, and foster collaboration This class is powered by Cloud Harmonics. COURSE OUTLINE * Module 1 - Core Functionality and Feature Sets * Module 2 - Enabling and Configuring Integrations * Module 3 - Playbook Development * Module 4 - Classification and Mapping * Module 5 - Layout Builder * Module 6 - Solution Architecture * Module 7 - Docker * Module 8 - Automation Development and Debugging * Module 9 - The Marketplace and Content Management * Module 10 - Indicators and Threat Intelligence Management * Module 11 - Jobs and Job Scheduling * Module 12 - Users and Role-Based Access Controls (RBAC) * Module 13 - Integration Development ADDITIONAL COURSE DETAILS: Nexus Humans Palo Alto Networks: Cortex XSOAR 6.8: Automation and Orchestration(EDU-380) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks: Cortex XSOAR 6.8: Automation and Orchestration(EDU-380) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Palo Alto Networks: Cortex XSOAR 6.8: Automation and Orchestration(EDU-380)
Delivered on-request, onlineDelivered Online
Price on Enquiry

C)CSA: Cybersecurity Analyst Mile 2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security Professionals Incident Handling Professionals Anyone in a Security Operations Center Forensics Experts Cybersecurity Analysts Overview Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time. Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today's needs. When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today's exploits. This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam. Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time.Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today?s needs.When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today?s exploits.This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam. BLUE TEAM?PRINCIPLES * Network Architecture?and how it lays the groundwork * Defensive Network * Security Data Locations?and how they tie together * Security?Operations?Center * The People, Processes, and Technology * Triage and Analysis * Digital Forensics * Incident Handling * Vulnerability Management * Automation, Improvement, and Tuning DIGITAL?FORENSICS * Investigative Theory and?Processes * Digital Acquisition * Evidence Protocols * Evidence Presentation * Computer Forensics?Laboratory * Protocols * Processing Techniques * Specialized?Artifacts * Advanced Forensics for Today?s?Exploitations MALWARE ANALYSIS * Creating the Safe Environment * Static Analysis * Dynamic Analysis * Behavior Based Analysis * What is different about?Ransomware? * Manual Code Reversing TRAFFIC ANALYSIS * Manual Analysis Principles * Automated?Analysis Principles * Signatures?compared to?Behaviors * Application Protocols Analysis Principles * Networking Forensics ASSESSING THE CURRENT STATE OF DEFENSE WITH THE?ORGANIZATION * Network Architecture and Monitoring * Endpoint Architecture and Monitoring * Automation, Improvement, and continuous?monitoring LEVERAGING SIEM FOR ADVANCED ANALYTICS * Architectural Benefits * Profiling and?Baselining * Advanced Analytics DEFEATING THE RED TEAM WITH PURPLE TEAM TACTICS * Penetration Testing?with full knowledge * Reconnaissance * Scanning * Enumeration * Exploitation * Lateral Movement ADDITIONAL COURSE DETAILS: Nexus Humans C)CSA: Cybersecurity Analyst Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)CSA: Cybersecurity Analyst Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)CSA: Cybersecurity Analyst Mile 2
Delivered on-request, onlineDelivered Online
Price on Enquiry

Educators matching "Triage"

Show all 11
West Essex Mind (t/a Mind in West Essex)

west essex mind (t/a mind in west essex)

4.2(7)

Mind in West Essex supports people affected by mental ill health, predominantly across West Essex to make positive changes in their lives and to improve their emotional resilience. We also aim to normalise the conversation around mental health and in doing so reduce the stigma that can be a barrier to people accessing the support that could help them to improve their quality of life. We provide a range of services in order to help us deliver on these aims, these include: counselling as part of the NHS psychological therapies service; a private counselling service; Mental Health First Aid (MHFA) training; emotional resilience training; peer support; befriending to reduce isolation; bereavement work and community support. In addition to the above client facing services we also run a Mental Health Referral Triage service on behalf of West Essex CCG. This service processes all GP mental health referrals across West Essex and passes them on to the relevant provider. We have an active presence on social media platforms as part of our efforts to normalise mental health and engage with the public in a way that is accessible to a wide range of people. We are an independent, local, registered charity (Charity number 1091154) with a board of trustees drawn from the communities that we serve. We also affiliate to the national charity Mind; this means that we are part of a network of 140 other local Mind charities. The services we provide are delivered by a team of 34 staff and 60 volunteers. We’re Mind in West Essex, your expert mental health partner. Our network across England and Wales provide services that are practical and rooted in the reality of people’s lives.