• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

17652 AI courses

Financial Crime Prevention Course

3.5(2)

By Elearncollege

Description Financial Crime Prevention Diploma A comprehensive online course designed to equip learners with essential knowledge and insights into the dynamic world of financial crime, its implications, and measures to counteract it. This course aims to ensure that professionals and individuals alike are well-versed in understanding the nuances of the financial crime ecosystem and how to stay ahead of the perpetrators. The course covers a broad spectrum of topics starting with the landscape of financial crime. Learners will gain a thorough understanding of the current financial crime landscape, understanding the factors that drive these activities and how they impact our economy and society. Next, the course delves into the legal framework for financial crime prevention. This segment provides an overview of the legal parameters set for controlling and preventing financial crime. The importance of this framework cannot be overstated, as it lays the foundation for how businesses and professionals navigate the complex realm of financial crime. To further understand the checks and balances in place, the Financial Crime Prevention Diploma elaborates on the role of regulatory bodies in financial crime control. These institutions play a pivotal role in setting standards, enforcing compliance, and ensuring that financial systems remain robust against threats. One cannot discuss financial crime without understanding the role of financial institutions in its prevention. This segment of the course elaborates on the duties, responsibilities, and mechanisms financial institutions employ to detect, report, and prevent fraudulent activities. With the rise of technology, cybercrimes are at an all-time high. Therefore, the course provides a deep insight into technological solutions to financial crime. From sophisticated software to advanced AI-driven systems, learners will understand how technology aids in battling financial crime. Among the various forms of financial crime, money laundering remains one of the most sophisticated and widespread. The Financial Crime Prevention Diploma comprehensively tackles money laundering and its countermeasures, giving learners the tools to identify and combat such activities. Similarly, terrorism financing poses a significant threat to global security. This course provides an exhaustive understanding of its mechanisms and the countermeasures set in place to deter such activities. Equally important, tax evasion is addressed in detail, highlighting its consequences and the countermeasures businesses and professionals can employ. Cybercrime is another domain that the course delves into with precision. As digital platforms become integral to our daily lives, understanding cybercrimes and their countermeasures is paramount to ensuring the safety and security of our financial systems. Lastly, the course discusses the future of financial crime prevention. Given the ever-evolving nature of financial crimes, understanding its future trajectory is crucial for staying ahead and being prepared. In conclusion, the Financial Crime Prevention Diploma is a meticulously designed online course that ensures a holistic understanding of financial crime and its prevention. Whether you're a professional in the finance sector or an individual seeking to broaden your knowledge, this course is an invaluable asset in navigating the complex world of financial crime prevention. What you will learn 1:The Landscape of Financial Crime 2:The Legal Framework for Financial Crime Prevention 3:Regulatory Bodies and Financial Crime Control 4:The Role of Financial Institutions in Preventing Financial Crime 5:Technological Solutions to Financial Crime 6:Money Laundering and Counter Measures 7:Financing of Terrorism and Counter Measures 8:Tax Evasion and Counter Measures 9:Cybercrime and Counter Measures 10:The Future of Financial Crime Prevention Course Outcomes After completing the course, you will receive a diploma certificate and an academic transcript from Elearn college. Assessment Each unit concludes with a multiple-choice examination. This exercise will help you recall the major aspects covered in the unit and help you ensure that you have not missed anything important in the unit. The results are readily available, which will help you see your mistakes and look at the topic once again. If the result is satisfactory, it is a green light for you to proceed to the next chapter. Accreditation Elearn College is a registered Ed-tech company under the UK Register of Learning( Ref No:10062668). After completing a course, you will be able to download the certificate and the transcript of the course from the website. For the learners who require a hard copy of the certificate and transcript, we will post it for them for an additional charge.

Financial Crime Prevention Course
Delivered Online On Demand9 days
£99

Your guide to AI Chatbots

4.4(5)

By The Security Company (International) Limited

Information on the risks and practical advice to address them TSC's eBooks, whitepapers, and reports cover some of the most important risks in information and cyber security — risks that constantly challenge information and cyber security professionals who work tirelessly to reduce them across their organisations and home users alike.

Your guide to AI Chatbots
Delivered Online On Demand20 minutes
FREE

Presentation Skills 1 Day Workshop in Carlisle

5.0(1)

By Mangates

Presentation Skills 1 Day Workshop in Carlisle

Presentation Skills 1 Day Workshop in Carlisle
Delivered In-Person + more
£595 to £795

Presentation Skills 1 Day Workshop in Middlesbrough

5.0(1)

By Mangates

Presentation Skills 1 Day Workshop in Middlesbrough

Presentation Skills 1 Day Workshop in Middlesbrough
Delivered In-Person + more
£595 to £795

Presentation Skills 1 Day Workshop in Exeter

5.0(1)

By Mangates

Presentation Skills 1 Day Workshop in Exeter

Presentation Skills 1 Day Workshop in Exeter
Delivered In-Person + more
£595 to £795

AZ-305T00 Designing Microsoft Azure Infrastructure Solutions

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Successful students have experience and knowledge in IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platforms, and governance. Students also have experience designing and architecting solutions. Before attending this course, students must have previous experience deploying or administering Azure resources and strong conceptual knowledge of: Azure compute technologies such as VMs, containers and serverless solutions Azure virtual networking to include load balancers Azure Storage technologies (unstructured and databases) General application design concepts such as messaging and high availability This course teaches Azure Solution Architects how to design infrastructure solutions. Course topics cover governance, compute, application architecture, storage, data integration, authentication, networks, business continuity, and migrations. The course combines lecture with case studies to demonstrate basic architect design principles. Prerequisites Before attending this course, students must have previous experience deploying or administering Azure resources and conceptual knowledge of: Azure Active Directory Azure compute technologies such as VMs, containers and serverless solutions Azure virtual networking to include load balancers Azure Storage technologies (unstructured and databases) General application design concepts such as messaging and high availability AZ-104T00 - Microsoft Azure Administrator 1 - Design governance Design for governance Design for management groups Design for subscriptions Design for resource groups Design for resource tags Design for Azure Policy Design for role-based access control (RBAC) Design for Azure landing zones 2 - Design an Azure compute solution Choose an Azure compute service Design for Azure Virtual Machines solutions Design for Azure Batch solutions Design for Azure App Service solutions Design for Azure Container Instances solutions Design for Azure Kubernetes Service solutions Design for Azure Functions solutions Design for Azure Logic Apps solutions 3 - Design a data storage solution for non-relational data Design for data storage Design for Azure storage accounts Design for data redundancy Design for Azure Blob Storage Design for Azure Files Design for Azure managed disks Design for storage security 4 - Design a data storage solution for relational data Design for Azure SQL Database Design for Azure SQL Managed Instance Design for SQL Server on Azure Virtual Machines Recommend a solution for database scalability Recommend a solution for database availability Design security for data at rest, data in motion, and data in use Design for Azure SQL Edge Design for Azure Cosmos DB and Table Storage 5 - Design data integration Design a data integration solution with Azure Data Factory Design a data integration solution with Azure Data Lake Design a data integration and analytic solution with Azure Databricks Design a data integration and analytic solution with Azure Synapse Analytics Design strategies for hot, warm, and cold data paths Design an Azure Stream Analytics solution for data analysis 6 - Design an application architecture Describe message and event scenarios Design a messaging solution Design an Azure Event Hubs messaging solution Design an event-driven solution Design a caching solution Design API integration Design an automated app deployment solution Design an app configuration management solution 7 - Design authentication and authorization solutions Design for identity and access management (IAM) Design for Microsoft Entra ID Design for Microsoft Entra business-to-business (B2B) Design for Azure Active Directory B2C (business-to-customer) Design for conditional access Design for identity protection Design for access reviews Design service principals for applications Design managed identities Design for Azure Key Vault 8 - Design a solution to log and monitor Azure resources Design for Azure Monitor data sources Design for Azure Monitor Logs (Log Analytics) workspaces Design for Azure Workbooks and Azure insights Design for Azure Data Explorer 9 - Design network solutions Recommend a network architecture solution based on workload requirements Design patterns for Azure network connectivity services Design outbound connectivity and routing Design for on-premises connectivity to Azure Virtual Network Choose an application delivery service Design for application delivery services Design for application protection services 10 - Design a solution for backup and disaster recovery Design for backup and recovery Design for Azure Backup Design for Azure blob backup and recovery Design for Azure files backup and recovery Design for Azure virtual machine backup and recovery Design for Azure SQL backup and recovery Design for Azure Site Recovery 11 - Design migrations Evaluate migration with the Cloud Adoption Framework Describe the Azure migration framework Assess your on-premises workloads Select a migration tool Migrate your structured data in databases Select an online storage migration tool for unstructured data Migrate offline data 12 - Introduction to the Microsoft Azure Well-Architected Framework Azure Well-Architected Framework pillars Cost optimization Operational excellence Performance efficiency Reliability Security 13 - Microsoft Azure Well-Architected Framework - Cost Optimization Develop cost-management discipline Design with a cost-efficiency mindset Design for usage optimization Design for rate optimization Monitor and optimize over time 14 - Microsoft Azure Well-Architected Framework - Operational excellence Embrace DevOps culture Establish development standards Evolve operations with observability Deploy with confidence Automate for efficiency Adopt safe deployment practices 15 - Microsoft Azure Well-Architected Framework - Performance efficiency Negotiate realistic performance targets Design to meet capacity requirements Achieve and sustain performance Improve efficiency through optimization 16 - Microsoft Azure Well-Architected Framework - Reliability Design for business requirements Design for resilience Design for recovery Design for operations Keep it simple 17 - Microsoft Azure Well-Architected Framework - Security Plan your security readiness Design to protect confidentiality Design to protect integrity Design to protect availability Sustain and evolve your security posture 18 - Getting started with the Microsoft Cloud Adoption Framework for Azure Customer narrative Common blockers 19 - Prepare for successful cloud adoption with a well-defined strategy Customer narrative Capture strategic motivation Define objectives and key results Evaluate financial considerations Understand technical considerations Create a business case 20 - Prepare for cloud adoption with a data-driven plan Customer narrative 21 - Choose the best Azure landing zone to support your requirements for cloud operations Customer narrative Common operating models Design areas for Azure landing zones Design principles for Azure landing zones Journey to the target architecture Choose an Azure landing zone option Deploy the Azure landing zone accelerator Enhance your landing zone 22 - Migrate to Azure through repeatable processes and common tools Customer narrative Migration process Migration tools Common tech platforms 23 - Address tangible risks with the Govern methodology of the Cloud Adoption Framework for Azure Customer narrative Govern methodology Corporate policies Governance disciplines Deploy a cloud governance foundation The Cost Management discipline 24 - Ensure stable operations and optimization across all supported workloads deployed to the cloud Establish business commitments Deploy an operations baseline Protect and recover Enhance an operations baseline Manage platform and workload specialization 25 - Innovate applications by using Azure cloud technologies Follow the innovation lifecycle Azure technologies for the build process Infuse your applications with AI Azure technologies for measuring business impact Azure technologies for the learn process 26 - Prepare for cloud security by using the Microsoft Cloud Adoption Framework for Azure Customer narrative Methodology Security roles and responsibilities Simplify compliance and security Simplify security implementation Security tools and policies Additional course details: Nexus Humans AZ-305T00: Designing Microsoft Azure Infrastructure Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-305T00: Designing Microsoft Azure Infrastructure Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-305T00 Designing Microsoft Azure Infrastructure Solutions
Delivered OnlineFlexible Dates
£2,380

Quick JavaScript Crash Course - Modern and Advanced JavaScript

By Packt

In this course, we will explore some features introduced recently in the language and a few important things that should be kept in mind while programming JavaScript. Learn some important JavaScript concepts and hacks to eliminate your fear of coding and improve your JavaScript coding skills. This course expects a fair understanding of JavaScript to start with.

Quick JavaScript Crash Course - Modern and Advanced JavaScript
Delivered Online On Demand3 hours 33 minutes
£41.99

Java for Beginners: Your Easy Guide to Java Programming

By Packt

If you want to learn Java and are an absolute beginner looking for a great course with zero experience in the programming arena, then this is the perfect Java course for you. The course is structured keeping in mind individuals with no experience and it starts from scratch with no prerequisites required.

Java for Beginners: Your Easy Guide to Java Programming
Delivered Online On Demand6 hours 36 minutes
£41.99

ISO 42001 Artificial Intelligence Lead Auditor Course

5.0(1)

By Cognicert Limited

The “ISO 42001:2023 Lead Auditor Course” integrates the principles of ISO 42001:2023, the International Standard for Artificial Intelligence Management, with the methodologies outlined in ISO 19011:2018, the Guidelines for Auditing Management Systems. The course equips participants with the skills and knowledge required to lead Artificial Intelligence audits effectively, ensuring compliance with ISO 42001:2023, and applies the principles of ISO 17011:2017 for conformity assessment bodies.

ISO 42001 Artificial Intelligence Lead Auditor Course
Delivered Online & In-PersonFlexible Dates
£1,200

VMware vSphere: What's New [V8]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for System architects, system administrators, IT managers, VMware partners, and individuals responsible for implementing and managing vSphere architectures who want to deploy vSphere 8.0 into their existing vSphere environment. Overview By the end of the course, you should be able to meet the following objectives: Recognize the importance of key features and enhancements in vSphere 8.0 Describe vCenter Server, VMware ESXi, storage, virtual machine, and security enhancements in vSphere 8.0 Describe the purpose of vSphere Distributed Services Engine Update an ESXi host equipped with a Data Processing Unit (DPU) using vSphere Lifecycle Manager Identify devices supported for system storage on ESXi 8.0 Recognize enhancements to VM hardware compatibility settings VMware vSphere Memory Monitoring and Remediation and the improvements to vSphere DRS Recognize the new Virtual Non-Uniform Memory Access (vNUMA) topology settings of a VM in vSphere Client Use vSphere Lifecycle Manager and Auto Deploy to manage the configuration specifications for the hosts in a cluster Recognize the vSphere Lifecycle Manager and Auto Deploy enhancements in vSphere 8.0 Recognize the cloud benefits that VMware vSphere+ brings to on-premises workloads Recognize technology that is discontinued or deprecated in vSphere 8.0 In this two-day course, you explore the new features and enhancements following VMware vCenter Server 8.0 and VMware ESXi 8.0. Real-world use-case scenarios, hands-on lab exercises, and lectures teach you the skills that you need to effectively implement and configure VMware vSphere 8.0. Course Introduction Introductions and course logistics Course objectives Artificial Intelligence and Machine Learning Describe how device groups support AI and ML in vSphere 8 Describe how device virtualization extensions support AI and ML in vSphere 8 vSphere Distributed Services Engine Describe the benefits of Distributed Services Engine Explain how Distributed Services Engine works Recognize use cases for Distributed Services Engine Install ESXi on a host equipped with a DPU View DPU information in vSphere Client Add an ESXi host equipped with a DPU to a cluster Update an ESXi host equipped with a DPU using vSphere Lifecycle Manager Create a vSphere Distributed Switch for network offloads Add a host with a DPU to the vSphere Distributed Switch Configure a VM to use Uniform Passthrough Mode vSphere and vCenter Management Review the improvements to the communication between vCenter and ESXi hosts Review the enhancements to the vCenter recovery process ESXi Enhancements Describe the function of the central configuration store in ESXi Explain how ConfigStore affects your interaction with ESXi configuration files Recognize the supported system storage partition configuration on ESXi 8.0 Identify devices supported for system storage on ESXi 8.0 Configure an RDMA host local device on ESXi vSphere Storage Describe the vSAN Express Storage Architecture Recognize the benefits of using vSAN Express Storage Architecture Describe the benefits of using NVMe Recognize the support for NVMe devices in vSphere Guest OS and Workloads Review the enhancements of the latest virtual hardware versions Describe the features introduced with virtual hardware version 20 Create a snapshot of a VM with an NVDIMM device Resource Management View energy and carbon emission metrics in vRealize Operations Manager Describe the VMware vSphere Memory Monitoring and Remediation (vMMR) functionality Describe how vMMR enhances the performance of vSphere DRS Security and Compliance Describe how to handle vTPM secrets when cloning a VM Manage OVF templates for VMs that are configured with vTPM Deploy an OVF template with vTPM Describe the enhancements to trusted binary enforcement in ESXi Describe ESXi 8 enhanced security features vSphere Lifecycle Manager Describe the enhancements to life cycle management of standalone ESXi hosts Manage the configuration profiles of ESXi hosts in a cluster with vSphere Lifecycle Manager Use Auto Deploy to boot a host with the desired image and configuration specifications Upgrade multiple ESXi hosts in a cluster in parallel Stage an ESXi host image prior to remediation Auto Deploy Manage custom host certificates using Auto Deploy vSphere with Tanzu Describe the features of the Tanzu Kubernetes Grid 2.0 offering Announcing vSphere+ Describe the functionality and benefits of vSphere+

VMware vSphere: What's New [V8]
Delivered OnlineFlexible Dates
Price on Enquiry