Course Content
Lessons
Status
2
Course Outline
-
Disclaimer
-
Content
-
Aims & Outcomes
-
You & Your Virtual Therapy Room
-
9 Steps To Keeping Your Computer Safe
-
Experience As A Client
-
Therapy Environment
-
Adapting the therapeutic relationship
-
Expect The Unexpected - Boundaries & Ground Rules
-
Safeguarding Your Clients
-
Safeguarding Vulnerable Adults Inside & Outside Of The UK
-
Professional Ethics
-
Technical Ethical Guidelines
-
Professional Competence
- Disclaimer
- Content
- Aims & Outcomes
- You & Your Virtual Therapy Room
- 9 Steps To Keeping Your Computer Safe
- Experience As A Client
- Therapy Environment
- Adapting the therapeutic relationship
- Expect The Unexpected - Boundaries & Ground Rules
- Safeguarding Your Clients
- Safeguarding Vulnerable Adults Inside & Outside Of The UK
- Professional Ethics
- Technical Ethical Guidelines
- Professional Competence
6
Part 4 - Cyber Security For Practitioners
-
Contents Of The Course
-
Cyber Security
-
Encryption
-
Viruses & Spyware
-
Passwords
-
9 Steps To Keeping Your Computer Safe On The Internet
-
Teaching Methods
-
Skype vs webRTC (Real Time Communication)
-
Encryption
-
Spyware
-
Passwords
-
Programs, Data Bugs & Geek
-
Stop Attackers
-
Firewalls
-
Email Security
-
Web Page Security
-
Skype vs webRTC
-
Tokbox vs Skype
- Contents Of The Course
- Cyber Security
- Encryption
- Viruses & Spyware
- Passwords
- 9 Steps To Keeping Your Computer Safe On The Internet
- Teaching Methods
- Skype vs webRTC (Real Time Communication)
- Encryption
- Spyware
- Passwords
- Programs, Data Bugs & Geek
- Stop Attackers
- Firewalls
- Email Security
- Web Page Security
- Skype vs webRTC
- Tokbox vs Skype