Course curriculum

  • 01
    Welcome to the course!
    Show Content
    • Welcome!
    • How to complete this training
  • 02
    Chapter 1: Introducing Sarah
    Show Content
    • Introducing Sarah
  • 03
    Chapter 2: Defining vulnerability
    Show Content
    • Identifying vulnerable customers - what does vulnerable mean?
    • Defining Vulnerability - Key Points
    • What's next?
    • Four Drivers Quiz
    • Spectrum Quiz
    • Drivers of vulnerability
  • 04
    Chapter 3: Why is Fair Treatment of Vulnerable Customers Important?
    Show Content
    • Why fair treatment is important
    • Why fair treatment is important
    • Regulatory Reasons
  • 05
    Chapter 4: Identifying vulnerable customers
    Show Content
    • How to identify vulnerable customers
    • 'CARE' protocol for identifying vulnerable customers
    • Identifying vulnerable customers - Test your learning
  • 06
    Chapter 5: Recording vulnerability
    Show Content
    • Recording Vulnerability - Explicit Consent and TEXAS
    • Recording Vulnerability - TEAS and recording in practice
    • Recording Vulnerability Quiz
    • Consent - Golden Rule
  • 07
    Chapter 6: Soft Skills
    Show Content
    • Why is 'how' we say things important?
    • Guiding the conversation
  • 08
    Chapter 7 - Solutions and offering support
    Show Content
    • Cause v Effect
    • Support Options
    • Support solutions
    • Support and Solutions for Sarah
    • Signposting - list of external support providers
  • 09
    Chapter 8: Designing products and services
    Show Content
    • Designing Products and Services
  • 10
    Next steps
    Show Content
    • Final Exam
    • Final Exam
    • Congratulations, you have completed your training