• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

30172 Courses in Liverpool delivered Online

The C&G Fast Track Course - C&G 2365 Level 2 and 3 Diploma in Electrical Installations

5.0(9)

By Optima Electrical Training

https://www.optima-ect.com/fast-track-course

The C&G Fast Track Course - C&G 2365 Level 2 and 3 Diploma in Electrical Installations
Delivered Online On Demand
£6,495 to £7,395

ICA Professional Postgraduate Diploma in Governance, Risk & Compliance

By International Compliance Association

ICA Professional Postgraduate Diploma in Governance, Risk & Compliance This leadership programme has been designed to sharpen the strategic skills of senior managers and those aspiring to hold the highest compliance positions within an organisation. This expert qualification offers: Specialist knowledge - the highest level in the field Strategic thinking - helps your leadership ambitions Innovation - explores new ideas, best practice, and future developments from a global perspective Fellowship of ICA - become automatically eligible for the highest grade of membership Networking - grow with other like-minded, senior professionals. Join hundreds of senior compliance professionals from over 50 countries who unlocked their leadership potential and improved their career growth opportunities with this qualification. This course is awarded in association with Alliance Manchester Business School, the University of Manchester. How and where can you study The course takes 9-12 months to complete. It is a blend of online self-study, research, attendance at masterclasses and interaction with other like-minded, senior practitioners. Attendance at eight virtual masterclasses Seven virtual classrooms Oral assessment. Delivered online This course is delivered online with materials delivered for you to study in your own time and at your own pace. There will be eight 3-hour virtual masterclasses over four weekends and seven live virtual classrooms spread over the duration of the course. Certification Practitioners who successfully complete the programme will be certificated as follows: ICA Certified Professional designation awarded by the ICA Professional Postgraduate Diploma in Governance, Risk and Compliance awarded by ICA in association with University of Manchester Business School Fellowship of the ICA (upon application) Designation, ICA Professional Postgraduate Diploma in Governance, Risk and Compliance: PG Dip (G.R.C.) Fellowship of ICA:FICA [E.g. Angela Watts PG Dip (G.R.C.), Certified Professional; FICA] National Occupational Standards of Competence Your performance on the programme will be measured, against the National Occupational Standards of Competence (2011 version) produced originally by the Financial Services Skills Council (FSSC) and the ICA and revised recently by the Financial Skills Partnership. The Standards are statements of competence which articulate the requirements for effective performance in the workplace. Competence is defined as a combination of skills as well as knowledge and understanding. The syllabus covers a variety of key issues relevant at a senior level and is designed to provide an insight into risks and potential hurdles faced by your organisation. The syllabus is delivered by an exclusive series of high profile masterclasses covering relevant topics. Building and leading a world class compliance team Strategic risk management for leaders Behavioural compliance: the role of psychology in culture and ethical behaviour Keeping up with emerging regulatory developments Governance, risk and compliance in the digital world Applying governance, conduct and outcomes for the benefit of the organisation Leading change in governance, risk and compliance Financial crime risk in the digital age.

ICA Professional Postgraduate Diploma in Governance, Risk & Compliance
Delivered Online On Demand12 months
£8,000

Overview of Diary Management Join our Diary Management course and discover your hidden skills, setting you on a path to success in this area. Get ready to improve your skills and achieve your biggest goals. The Diary Management course has everything you need to get a great start in this sector. Improving and moving forward is key to getting ahead personally. The Diary Management course is designed to teach you the important stuff quickly and well, helping you to get off to a great start in the field. So, what are you looking for? Enrol now! This Diary Management Course will help you to learn: Learn strategies to boost your workplace efficiency. Hone your skills to help you advance your career. Acquire a comprehensive understanding of various topics and tips. Learn in-demand skills that are in high demand among UK employers This course covers the topic you must know to stand against the tough competition. The future is truly yours to seize with this Diary Management. Enrol today and complete the course to achieve a certificate that can change your career forever. Details Perks of Learning with IOMH One-To-One Support from a Dedicated Tutor Throughout Your Course. Study Online - Whenever and Wherever You Want. Instant Digital/ PDF Certificate. 100% Money Back Guarantee. 12 Months Access. Process of Evaluation After studying the course, an MCQ exam or assignment will test your skills and knowledge. You have to get a score of 60% to pass the test and get your certificate. Certificate of Achievement Certificate of Completion - Digital / PDF Certificate After completing the Diary Management course, you can order your CPD Accredited Digital / PDF Certificate for £5.99.  Certificate of Completion - Hard copy Certificate You can get the CPD Accredited Hard Copy Certificate for £12.99. Shipping Charges: Inside the UK: £3.99 International: £10.99 Who Is This Course for? This Diary Management is suitable for anyone aspiring to start a career in relevant field; even if you are new to this and have no prior knowledge, this course is going to be very easy for you to understand.  On the other hand, if you are already working in this sector, this course will be a great source of knowledge for you to improve your existing skills and take them to the next level.  This course has been developed with maximum flexibility and accessibility, making it ideal for people who don't have the time to devote to traditional education. Requirements You don't need any educational qualification or experience to enrol in the Diary Management course. Do note: you must be at least 16 years old to enrol. Any internet-connected device, such as a computer, tablet, or smartphone, can access this online course. Career Path The certification and skills you get from this Diary Management Course can help you advance your career and gain expertise in several fields, allowing you to apply for high-paying jobs in related sectors. Course Curriculum Module 01: Introduction To Diary Management Introduction to Diary Management 00:35:00 Module 02: Taking And Organising Notes Taking and Organising Notes 00:25:00 Module 03: Scheduling And Time Optimisation Scheduling and Time Optimisation 00:15:00 Module 04: Keeping Track Of Tasks Keeping Track of Tasks 00:20:00 Module 05: Note-Taking Programs Note-Taking Programs 00:30:00 Module 06: Diary Management Programs Essential Diary Management Tools 00:20:00 Module 07: Diary Management Tricks And Optimisation Diary Management Tricks and Optimisation 00:20:00

Diary Management
Delivered Online On Demand2 hours 45 minutes
£11.99

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered OnlineFlexible Dates
£3,495

Online Postgraduate Diploma Business of Motorsport

5.0(1)

By National Motorsport Academy

For the Postgraduate Diploma (PG Dip.) you will study the four modules (60 credits) from the Postgraduate Certificate (PG Cert.) plus an additional three modules (60 credits) from the MA Business of Motorsport Master’s Degree. N.B. The Postgraduate Diploma (PG Dip.) does not include the Executive Project (Dissertation) the final module of the MA.

Online Postgraduate Diploma Business of Motorsport
Delivered OnlineFlexible Dates
£3,950 to £5,925

Business Agility Foundations (ICP-BAF) Training & Certification Program | 2 days - 8 hrs/day | 9 am - 5 pm UK Time

By ValueX2

https://www.valuex2.com/icagile-business-agility-foundations-certification-training/ https://www.linkedin.com/company/80563537/

Business Agility Foundations (ICP-BAF) Training & Certification Program | 2 days - 8 hrs/day | 9 am - 5 pm UK Time
Delivered OnlineFlexible Dates
£550

Business Agility Foundations (ICP-BAF) Training & Certification Program | 3 days - 5 hrs/day | 9 am - 2 pm UK Time

By ValueX2

https://www.valuex2.com/icagile-business-agility-foundations-certification-training/ https://www.linkedin.com/company/80563537/

Business Agility Foundations (ICP-BAF) Training & Certification Program | 3 days - 5 hrs/day | 9 am - 2 pm UK Time
Delivered OnlineFlexible Dates
£550

Knitting - Intermediate - Learn at Home in Your Own Time

4.3(7)

By Rachel Ellen

Take your knitting skills to new heights with our Intermediate On-Demand Knitting Course, perfect for those ready to expand their craft while nurturing their wellbeing. Led by an experienced tutor who brings a wealth of knowledge and creativity to each lesson, this course offers detailed, step-by-step video tutorials on advanced techniques, intricate patterns, and more challenging projects. Ideal for knitters who have mastered the basics, you'll learn to create more complex and beautiful pieces, all while enjoying the calming and meditative benefits of knitting. Enhance your skills, boost your creativity, and experience the therapeutic joy of knitting with this comprehensive and inspiring course.

Knitting - Intermediate - Learn at Home in Your Own Time
Delivered Online On Demand12 hours
£212

AET Level 3 PTLLS with Phonics and Phonology Teaching Certificate

By Kingston Open College

Premium Bundle of all Time | Ofqual Regulation + ATHE Awards + CPD Accreditation | Assessment & Tutor Support Included

AET Level 3 PTLLS with Phonics and Phonology Teaching Certificate
Delivered Online On Demand4 days
£669

Education & Training with SENCO - Ofqual Regulated

By Kingston Open College

Premium Bundle of all Time | Ofqual Regulation + ATHE Awards + QLS Endorsement | Assessment & Tutor Support Included

Education & Training with SENCO - Ofqual Regulated
Delivered Online On Demand4 days
£669