Course curriculum

  • 01
    Welcome to the course!
    Show Content
    • Welcome!
    • How to complete this training
  • 02
    Chapter 1: History of vulnerability
    Show Content
    • History
    • The FCA and vulnerability
    • Protocols - Download
  • 03
    Chapter 2: Defining vulnerability
    Show Content
    • Identifying vulnerable customers - what does vulnerable mean?
    • Defining Vulnerability - Key Points
    • Drivers of vulnerability
    • Next
    • Four Drivers Quiz
    • Drivers of vulnerability - download
    • Spectrum Quiz
  • 04
    Chapter 3: Why is Fair Treatment of Vulnerable Customers Important?
    Show Content
    • Why fair treatment is important
    • Video explanation
    • Regulatory Reasons
  • 05
    Chapter 4: Identifying vulnerable customers
    Show Content
    • How to identify vulnerable customers
    • 'CARE' protocol for identifying vulnerable customers
    • Identifying vulnerable customers - Test your learning
  • 06
    Chapter 5: Recording vulnerability
    Show Content
    • Recording Vulnerability
    • Recording Vulnerability Quiz
    • Consent - Golden Rule
  • 07
    Chapter 6: Soft Skills
    Show Content
    • Aims of the conversation
    • Why is 'how' we say things important?
    • Guiding the conversation
    • Guiding the conversation
  • 08
    Chapter 7 - Solutions and offering support
    Show Content
    • Cause v Effect
    • Support options
    • Support solutions
    • Signposting - list of external support providers
  • 09
    Chapter 8: Designing products and services
    Show Content
    • Design
    • Data Capture
  • 10
    Next steps
    Show Content
    • Final Exam
    • Final Exam
    • Congratulations, you have completed your training