• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2013 Courses in Liverpool delivered Live Online

Advance Graphic Designing

5.0(10)

By GBA Corporate

Overview Graphic design is a crucial tool that makes sure that you communicate with your people in an efficient manner. Graphic designers are trained professionals who understand the technique to persuade, engage, and entertain audiences using various elements. This course covers all the modules with the objective to understand the key points of Graphic Designing. The course is framed in a way to cover the entire major and minor subjects in co-relation to art and design. It will highlight a wide range of working methods, practices and techniques. At the end of the course, you will learn various technical skills that will encourage you to investigate new approaches, combine existing techniques and also explore old techniques to generate innovative outputs. 

Advance Graphic Designing
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

EC-Council Certified Cybersecurity Technician (C|CT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to: Early-career IT professionals, IT managers, career changers, and career advancers Students and recent graduates Overview After completing this course, you will understand: Key concepts in cybersecurity, including information security and network security Information security threats, vulnerabilities, and attacks The different types of malware Identification, authentication, and authorization Network security controls Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management) Application security design and testing techniques Fundamentals of virtualization, cloud computing, and cloud security Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures Cryptography and public-key infrastructure Data security controls, data backup and retention methods, and data loss prevention techniques Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic The incident handling and response process Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation Concepts in business continuity and disaster recovery Risk management concepts, phases, and frameworks EC-Council?s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs. Course Outline Information Security Threats and Vulnerabilities Information Security Attacks Network Security Fundamentals Identification, Authentication, and Authorization Network Security Controls: Administrative Controls Network Security Controls: Physical Controls Network Security Controls: Technical Controls Network Security Assessment Techniques and Tools Application Security Virtualization and Cloud Computing Wireless Network Security Mobile Device Security Internet of Things (IoT) and Operational Technology (OT) Security Cryptography Data Security Network Troubleshooting Network Traffic Monitoring Network Log Monitoring and Analysis Incident Response Computer Forensics Business Continuity and Disaster Recovery Risk Management

EC-Council Certified Cybersecurity Technician (C|CT)
Delivered OnlineFlexible Dates
£3,495

HoardingUK Choice and Control in Hoarding Behaviour

5.0(6)

By HoardingUK

Hoarding training designed to be an educational, interactive and empowering day that works to positively impact attendees active client work.

HoardingUK Choice and Control in Hoarding Behaviour
Delivered Online + more
FREE to £95

BUSINESS GRAMMAR & USAGE

5.0(4)

By Improving Communications Uk

KNOW THE RULES! POOR GRAMMAR SHOWS A LACK OF ATTENTION TO DETAIL AND ULTIMATELY CAN SLOW DOWN COMMUNICATIONS AS WELL AS PRODUCTIVITY. Business people who know grammar judge others based on their correct (or incorrect) usage. Be the professional who is able to be clear and correct in writing. Business Grammar & Usage: ENGLISH BOOT CAMP is the answer for today’s business competitive environment. Interactive instruction and collaboration with your fellow attendees means that you will master the skills and apply your new knowledge to the classroom exercises and activities. When you return to work, you’ll have new confidence about what is right and wrong, when it comes to writing. Attendees Will Be Able To: Know the Parts of Speech and their correct uses; Understand Sentence Structure, including applying rules for Subject-Verb and Pronoun-Antecedent Agreement; Be able to create Plurals and Possessives accurately and with certainty; Review and use the rules of Spelling, Mechanics (Capitalization, Abbreviation, Number Use), and Punctuation; Create original email / documents to employ newly-learned class material.   Online Format—Business Grammar and Usage is a 4-hour interactive virtual class for up to ten people. Register for this class and you will be sent ONLINE login instructions prior to the class date. It was great to have the opportunity to learn some new techniques and to gain more awareness of how I present myself. The most immediately applicable uses have been in reducing my “ums” and “ahs” and in trying to come to my point in a more succinct way. I’ve been cultivating this awareness in one-on-one settings; meetings and individual conversations. Christina Vargas

BUSINESS GRAMMAR & USAGE
Delivered Online
£316

Advance Skills in Sales and Marketing

5.0(10)

By GBA Corporate

Overview Any business life is completely dependent on Sales and Marketing. It delivers a significant business benefit. Providing effective training in Sales and Marketing helps boost sales, increase profit, create a brand image and also improve customer satisfaction. This course has been designed to gain essential skills in Marketing and Sales, learn new sales techniques and how to reach the right audience at the right time. If there is a shortage of skills or resources within the business, you might want to provide this specially designed-training to help develop those skills.  This course will help review overall sales strategies and how marketing can contribute in order to achieve a desired positive outcome. It will set measurable objectives and standards within the team and will boost the confidence in their performance and achieve the objectives.  This course will discover various sales and marketing techniques and will provide the participants with more tools and techniques to increase individual and team sales. It will highlight all of the major components required to build good connections, know the consumer and their needs and gain commitment to a sale.

Advance Skills in Sales and Marketing
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Unlocking Our-Selves 2025: "Away With the Fairies"

By Therapy Harley Street

Personal development groups for practitioners with Bárbara Godoy A playground for therapists to expand our perception to metaphor, as a way to connect directly with the experience of the other, guided by folklore and fairytales. "Supportive, thought-provoking, emancipating, grounding" Tuesday Evenings Group 6 pm to 7.15 pm  (UK Time) Friday Lunchtime Group 12.30 pm to 1.45 pm (UK time) Spring Term Phase One - 2025 22 and 29 April 6, 13, 20 and 27 May 3, 10, 17 and 24 June Autumn Term Phase Two - 2025 23 and 30 September 7, 14, 21 and 28 October 4, 11, 18 and 25 November Winter Term Phase Three - 2026 20 and 27 January 3, 10, 17 and 24 February 3, 10, 17 and 24 March Winter Term Phase One - 2025 24 and 31 January 7, 14, 21, 28 February 7, 14, 21 and 28 March Spring Term Phase Two - 2025 25 April 2, 9, 16, 23 and 30 May 6, 13, 20 and 27 June Autumn Term Phase Three - 2025 26 September 3, 10, 17, 24 and 31 October 7, 14, 21 and 28 November Venue: Online (Zoom) Fee: £350 per term or £900 the whole year Bárbara Godoy M.A., Adv. Dip. Exi. Psy. Existential Psychotherapist Group Leader, Counsellour, Lecturer and Supervisor, MBACP & UKCP accredited, SEA Professional Member, Director of Therapy Harley StreetBárbara’s academic contributions in London since 2008 include lecturing and researching on the theory and practice of Phenomenological Existential Therapy on Doctorate, MA and professional courses at the School of Psychotherapy and Counselling Psychology, Regent’s University and the New School of Psychotherapy and Counselling directed by Emmy van Deurzen. Bárbara has facilitated and designed therapeutic Group Work since 1997. She brought her earliest workshop: “Experiences” to large groups in The Netherlands, Italy, France, UK and Argentina. These awareness-intensive processes are a legacy of the human potential movement (HPM) of the 1960s, with techniques such as AUM Meditation Marathons, Psychodrama, Bioenergetics and Primal Feelings work. Organized by:

Unlocking Our-Selves 2025: "Away With the Fairies"
Delivered Online + more
£350 to £900

Business Analysis Process Model

5.0(10)

By GBA Corporate

Overview Objective Understanding the Importance of Business Analysis Model Determining various techniques of Process Modelling Understanding the scope of modelling Efficiently mapping the business landscape Analysing the enterprise structure How to avoid project failures. Learning efficient skills of being a successful business analyst. Understand and document various techniques for the organization delivers value. Successful project conversion Building team, changing the organization and overcoming resistance. Creating an effective Business Case.

Business Analysis Process Model
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Supply Chain and Logistics Management

5.0(10)

By GBA Corporate

Overview Supply Management plays a very important role in order to maintain business harmony, maintaining good relationships, and information, having a smooth flow within the business process and delivering good customer service. The course will highlight some modern techniques of Project Management to implement in the supply management process. As research shows Project Management and Supply Management are very similar thus, we will learn the tools and techniques used to initiate, execute, execute and manage and control the project.

Supply Chain and Logistics Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Creating Video For Business (Interactive Workshop)

4.9(8)

By Clockwork Eye Video

Learn to craft top-notch videos for your business using your mobile phone in this interactive workshop. Enhance marketing, visibility, and attract more clients through video. All-in-one workshop for diving into the world of business videos. #VideoCreation #BusinessBoost

Creating Video For Business (Interactive Workshop)
Delivered Online + more
£250

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered OnlineFlexible Dates
£3,495
1...56789...202