• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

59263 Courses

Cacao O'Clock - Wed 4th Dec - Free online event

5.0(3)

By Stephanie Edwards

#CacaoCircle #CeremonialCacao #ReikiHealing #MindfulnessJourney #InnerFlow #CacaoRitual #SpiritualConnection #HeartOpening #CacaoCommunity

Cacao O'Clock - Wed 4th Dec - Free online event
Delivered Online
FREE

INTERNATIONAL MARKETING- AI & SOCIAL MEDIA

By Export Unlocked Limited

This module aims to develop knowledge from research activities to gain an understanding of international trade using Marketing , Social Media and how AI plays a role in International Marketing

INTERNATIONAL MARKETING- AI & SOCIAL MEDIA
Delivered in Oldham or Online + more
£395

SCA Roasting Foundation

5.0(21)

By Etude Coffee

The Roasting Foundation course gives the learner an understanding of the roasting process, including the physical changes that take place during the process and how to control sensory aspects of the coffee by roasting light or dark. Learners will also gain an understanding of the basic structure of the roasting machine, general maintenance, and fire prevention. Practical learning objectives and activities prepare the learner to follow instructions, given by the trainer, for three different roasts and record relevant data and observations per roast using a suitable roast log. A written exam tests theoretical knowledge based on Foundation course learning objectives.

SCA Roasting Foundation
Delivered In-Person in Bungay
£299

Gastrostomy: PEG

4.8(50)

By EF Training & Consultancy Ltd

Gastrostomy tube care Gastrostomy tube management Gastrostomy tube training Enteral feeding care Gastrostomy tube complications Gastrostomy site care Gastrostomy tube insertion Gastrostomy tube feeding techniques Gastrostomy tube nursing Gastrostomy care for healthcare professionals Gastrostomy tube education CPD accredited course Nursing revalidation hours Practical gastrostomy care training Hands-on gastrostomy tube practice Patient education in gastrostomy care Ethical considerations in gastrostomy tube care Cultural sensitivity in gastrostomy care Gastrostomy tube complications prevention High-quality gastrostomy care certification PEG

Gastrostomy: PEG
Delivered In-Person in London
£85

Power BI: Dashboard in a Day

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The Power BI in a Day course is designed for beginners and intermediate users of Power BI. Overview #NAME? Students will discover the full capabilities of Power BI in a one-day, hands-on workshop. Please Note: This workshop is primarily self-directed and students will work at their own pace while having access to an instructor for questions. 1 - Accessing & Preparing data Data Set Power BI Desktop Power BI Desktop ? Accessing Data Power BI Desktop ? Data Preparation 2 - Data Modeling and Exploration Power BI Desktop ? Data Modeling and Exploration Power BI Desktop ? Data Exploration Continued References 3 - Data Visualization Power BI Desktop Power BI Desktop ? Data Visualization References 4 - Publishing & Accessing Reports Power BI Desktop ? Creating Mobile View Power BI Service Power BI Service ? Publishing Report Power BI Mobile ? Accessing Report on Mobile Device Power BI Service ? Collaboration and Distribution References 5 - Dashboard and Collaboration Power BI Service Building Dashboard References Additional course details: Nexus Humans Power BI: Dashboard in a Day training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Power BI: Dashboard in a Day course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Power BI: Dashboard in a Day
Delivered Online
£595

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered Online
£3,495

Help give your clients the illusion of longer thicker brows! Suitable for: Must have Minimun of a brow wax certifcate TIME: 10am - 4pm Models: Minimum of 3 live models What's covered: Introduction to brows Health & safety & hygiene Skin analysis Hair growth & anatomy Check list Brow mapping Brow shapes to suit the eyeshape Contraindications Pre/post treatment advice Equipment and products Consultation Application Trouble shooting And so much more! Extra's: Follow up call to find out how your getting on and any questions you may have Small classes (4 maximum) Basic business start up support Social media tips Ongoing support

Brow Lamination
Delivered In-Person in Bungay
£199

SHRM-CP/SHRM-SCP Certification Preparation

By Nexus Human

Duration 5 Days 30 CPD hours Earning your SHRM Certified Professional (SHRM-CP) or SHRM Senior Certified Professional (SHRM-SCP) credential makes you a recognized expert and leader in the HR field and a valuable asset to your organization, keeping you and your organization more competitive in today's economy. This professional distinction sets you apart from your colleagues, proving your high level of knowledge and skills. Students will be able to identify areas of strength and build on them. They will also see where they will need further concentrated study in preparation for their exam. 1 - INTRODUCTION The SHRM Body of Competency and Knowledge? (BoCK) The SHRM-CP and SHRM-SCP Certifications The SHRM Learning System© for SHRM-CP/SHRM-SCP 2 - HR COMPETENCIES Behavioral Competencies 3 - DOMAIN 1: PEOPLE Functional Area #1: HR Strategic Planning Functional Area #2: Talent Acquisition Functional Area #3: Employee Engagement and Retention Functional Area #4: Learning and Development Functional Area #5: Total Rewards 4 - DOMAIN 2: ORGANIZATION Functional Area #6: Structure of the HR Function Functional Area #7: Organizational Effectiveness and Development Functional Area #8: Workforce Management Functional Area #9: Employee and Labor Relations Functional Area #10: Technology Management 5 - DOMAIN 3: WORKPLACE Functional Area #11: HR in the Global Context Functional Area #12: Diversity and Inclusion Functional Area #13: Risk Management Functional Area #14: Corporate Social Responsibly Functional Area #15: U.S. Employment Law and Regulations 6 - FINAL EXAM/REVIEW/DISCUSSION Additional course details: Nexus Humans SHRM-CP/SHRM-SCP Certification Preparation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SHRM-CP/SHRM-SCP Certification Preparation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SHRM-CP/SHRM-SCP Certification Preparation
Delivered Online
£3,475

Macrame festive wreath and decoration workshop

5.0(5)

By The Arienas Collective

Beginner-friendly macrame Christmas wreath making class in Edinburgh

Macrame festive wreath and decoration workshop
Delivered In-Person
£45

9th December Amanda Preston #Agent121. Looking for: ADULT FICTION

5.0(1)

By I Am In Print

LOOKING FOR: ADULT FICTION, NON-FICTION Amanda Preston has been a literary agent for over 20 years and co-founded LBA in 2005. She won the RNA Literary Agent of the Year award in 2018.  She represents commercial and reading group fiction, as well as a range of narrative non-fiction and memoir. She loves working with authors, championing them every step of the way, and works with them and their publishing teams to build them into brand names and award winning and bestselling authors in the UK and internationally. Whether commercial or reading-group, she loves innovative and well-written stories that hook her in from the start and whose voice stays with her. She is looking for novels that demand to be talked about and shared, whatever their genre, and that she is still thinking about days after finishing.  She is on the hunt for a high-concept thriller which is character and plot driven, but also has a discussable issue at its heart i.e Elizabeth is Missing by Emma Healey and Girl A by Abigail Dean. She love thrillers where the location is as integral to the plot as the crime i.e The Dry by Jane Harper and The Sanatorium by Sarah Pearse, and would love a good locked-room thriller but is only looking for fresh and unique ideas in this area.  She is also on the hunt for a glorious book club love story that is doing something a bit different and special i.e Lessons in Chemistry by Bonnie Garmus or anything by Taylor Jenkins Reid or Liane Moriarty! Or smart, contemporary, observant romcoms with a very strong emphasis on diverse / own voices.  Finally, she would love a historical that vividly brings that period to life as well as having a stunning plot i.e, The Familiars by Stacey Halls and The Doll Factory by Elizabeth MacNeal. Amanda would like you to submit a covering letter, 1 page synopsis and the opening three chapters (max 5,000 words). (In addition to the paid sessions, Amanda is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Friday 29 November 2024

9th December Amanda Preston #Agent121. Looking for: ADULT FICTION
Delivered Online + more
£72