The Nursing Assistant Instructor Train-the-Trainer Program is designed to equip healthcare professionals with the knowledge, skills, and competencies needed to effectively teach and train nursing assistant students. This comprehensive program focuses on adult learning principles, curriculum development, lesson planning, teaching strategies, and student performance evaluation. Participants will also gain expertise in supervising clinical practice and ensuring compliance with state and federal regulations governing nursing assistant education.
Learner must have valid Wisconsin RN license and two years work experience (one year in long-term, home health, or rehabilitation care). This course will meet the state requirement for nurses who wish to become nursing assistant instructors.
Examines risk and the standard procedures for security, data security, cryptography, and Public Key Infrastructure and processes for mitigation. Building upon security concepts, tools, and procedures for preventing, mitigating and responding to security incidents. Course topics align with the CompTIA Security+ certification.
Prepares learners to perform basic nursing skills under the supervision of a nurse for job entry as a nursing assistant or a home health aide (HHA) in health care agencies. Face-to-face and hybrid classroom, campus lab and clinical instruction are offered at various nursing homes and hospitals throughout the district. Students need to submit an application and complete background check.
This clinical experience integrates all knowledge learned in the previous courses in transitioning to the role of the graduate nurse. The course promotes relatively independent clinical decisions, delegation, and works collaboratively with others to achieve client and organizational outcomes. Continued professional development is fostered.
This course covers nursing management and professional issues related to the role of the registered nurse. Emphasis is placed on preparing for practice as a registered nurse.
This advanced clinical course requires the student to integrate concepts from all previous courses in the management of groups of clients facing complex health alterations. Students will have the opportunity to further develop critical thinking skills using the nursing process in making clinical decisions. Continuity of care through interdisciplinary collaboration is emphasized.
Introduces the learner to security concepts, tools, and procedures for preventing,mitigating and responding to security incidents. In Security+1, students will examine network security, threats and vulnerabilities, and examine tools for securing systems and troubleshooting problems. Common security issues and mobile security risks will be discussed. Course topics align with the CompTIA Security+ certification.
Complex Health Alterations I prepares the learner to provide and evaluate care for patients across the lifespan with alterations in cardiovascular, respiratory, endocrine, and hematologic systems as well as patients with fluid/electrolyte and acid-base imbalance, and alterations in comfort.
Examines both the practical and conceptual skills that build the foundation for understanding Cryptography technologies including: use of Cryptography technology, symmetric and asymmetric cryptography, hashing, and digital signatures. Learner will gain familiarity with the Cryptography technologies as related to Authentication, Integrity, Confidentiality and Non-Repudiation.
Examines both the practical and conceptual skills that build the foundation for understanding Firewall technologies including: most common firewall types, use of host-based software firewall technology and network hardware firewall technology. Learner will gain familiarity with firewall technologies as related to software and hardware layered approach as well as firewall rules, understanding network protocols related to firewall technology, and vendor/firewall selection.
Examines the monitoring and logging concepts for the security of IT systems and networks. Learners examine security log management challenges, components, guidelines, and operations. Learners examine security audit policy and critical log review concepts.
Examine a thorough grounding in information security policies used to design structure in the workplace. Develop policy that explains the will of the organization’s management in controlling the behavior of its employees with regard to the appropriate and secure use of its information and information resources. Policy is designed to create a productive and effective work environment, free from unnecessary distractions and inappropriate actions.
Examines both the practical and conceptual skills that build the foundation for understanding cyber security investigation and analysis including; vulnerability exploits, malware analysis; and hardening of systems to protect against exploitation. Learners will investigate a compromised system and learn to analysis systems to find malicious indicators. By the end of this course, the learner will be able to detect the key areas where an exploitation may reside and use various Windows built-in tools as well as 3rd party tools to detect malicious activity.
Introduces learners to the proper execution of Business Continuity Planning and Disaster Recovery. It is the payoff for cost-effective buying of spare machines and servers, performing backups and bringing them off-site, assigning responsibility, performing drills, educating employees and being vigilant. Upon completion of this material, the learner will be able to: list the elements of Business Continuity (BC), identify who should be included in the BC team, describe the methodology used to construct the Business Continuity Policy and Plan.
This course focuses on the development of advanced clinical skills across the lifespan. Content includes advanced intravenous skills, blood product administration, chest tube systems, basic electrocardiogram interpretation and nasogastric/feeding tube insertion.
This clinical experience applies nursing concepts and therapeutic nursing interventions to groups of patients across the lifespan. It also provides an introduction to leadership, management, and team building.
This clinical experience applies nursing concepts and therapeutic interventions to patients across the lifespan. It also provides an introduction to concepts of teaching and learning. Extending care to include the family is emphasized.
This course focuses on topics related to health promotion for individuals and families throughout the lifespan. We will cover nursing care of the developing family, which includes reproductive issues, pregnancy, labor and delivery, post-partum, the newborn, and the child. Recognizing the spectrum of healthy families we will discern patterns associated with adaptive and maladaptive behaviors applying mental health principles. An emphasis is placed on teaching and supporting healthy lifestyles choices for individuals of all ages. Nutrition, exercise, stress management, empowerment, and risk reduction practices are highlighted. Study of the family will cover dynamics, functions, discipline styles, and stages of development.
This course elaborates upon the basic concepts of health and illness as presented in Nursing Fundamentals. It applies theories of nursing in the care of patients through the lifespan, utilizing problem solving and critical thinking. This course will provide an opportunity to study conditions affecting different body systems and apply evidence-based nursing interventions. It will also introduce concepts of leadership and management.
Complex Health Alterations II prepares the learner to provide and evaluate care for patients across the lifespan with alterations in the immune, neuro-sensory, musculoskeletal, gastrointestinal, hepatobiliary, renal/urinary, reproductive systems and shock, burns and trauma. The learner will also focus on management of care for patients with high-risk perinatal conditions and high-risk newborns.
This course will cover topics related to the delivery of community and mental health care. Specific health needs of individuals, families, and groups will be addressed across the lifespan. Attention will be given to diverse and at-risk populations. Mental health concepts will concentrate on adaptive/maladaptive behaviors and specific mental health disorders. Community resources will be examined in relation to specific types of support offered to racial, ethnic, economically diverse individuals and groups.
This intermediate level clinical course develops the RN role when working with clients with complex health care needs. A focus of the course is developing skills needed for managing multiple clients across the lifespan and priorities. Using the nursing process, students will gain experience in adapting nursing practice to meet the needs of clients with diverse needs and backgrounds.
Examines the architectures of security, securing mobile and web applications, cloud and virtualization issues, and account and access control processes. Course topics align with the CompTIA Security+ certification. Further introduces security concepts, tools, and procedures for preventing, mitigating and responding to security incidents.
Explore how attackers infiltrate a system to gather information and data. This course will explore how Python and Python scripts can be used to detect these attacks, and gain knowledge on how to write and use Python scripts to secure systems against cyberattacks.
Examines both the practical and conceptual skills that build the foundation for understanding Intrusion Detection System technologies. the What, Why and Who of IDS is explored, including the features of an IDS verses an IPS. The importance of IDS, IDS technologies, and Packet Capture and Protocols are covered. Learners will analyze and capture network traffic through the use of sniffer tools and programs. Learners capture, view, and analyze network traffic in an attempt to monitor and secure the network. By the end of this course, the learner will have analyzed, applied, and evaluated IDS terminology, technologies, and protocols to secure Network traffic.
Examines both the practical and conceptual skills that build the foundation for understanding Virtual Private Networks technologies including: history of VPNs, use of VPN technology, types and different platforms of VPNs; VPN configuration and security. Learner will gain familiarity with the protocols used in a virtual private network; and will configure a site to branch VPN. By the end of this course, the learner will have analyzed, applied, and evaluated various VPN technologies and the protocols to secure a Virtual Private Network.
Explore Secure Design using both standard networked devices and hardware that are designed specifically for security. Learner applies a layered security approach, which can significantly improve security. If only one defense mechanism is in place, an attacker has to circumvent only a single defense. A network with layered security makes it more difficult for an attacker because the attacker must have the tools, knowledge, and skills to break through the various layers. A layered approach also can be useful in resisting a variety of types of attacks.
Examines cyber security incidents and response. Learners examine how to react toan incident by exploring its impact and using forensics to investigate the incident.Learners explore proper communication and incident response procedures. Learnersanalyze common cyber incident symptoms.