Duration 5 Days 30 CPD hours This course is intended for The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to: Early-career IT professionals, IT managers, career changers, and career advancers Students and recent graduates Overview After completing this course, you will understand: Key concepts in cybersecurity, including information security and network security Information security threats, vulnerabilities, and attacks The different types of malware Identification, authentication, and authorization Network security controls Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management) Application security design and testing techniques Fundamentals of virtualization, cloud computing, and cloud security Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures Cryptography and public-key infrastructure Data security controls, data backup and retention methods, and data loss prevention techniques Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic The incident handling and response process Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation Concepts in business continuity and disaster recovery Risk management concepts, phases, and frameworks EC-Council?s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs. Course Outline Information Security Threats and Vulnerabilities Information Security Attacks Network Security Fundamentals Identification, Authentication, and Authorization Network Security Controls: Administrative Controls Network Security Controls: Physical Controls Network Security Controls: Technical Controls Network Security Assessment Techniques and Tools Application Security Virtualization and Cloud Computing Wireless Network Security Mobile Device Security Internet of Things (IoT) and Operational Technology (OT) Security Cryptography Data Security Network Troubleshooting Network Traffic Monitoring Network Log Monitoring and Analysis Incident Response Computer Forensics Business Continuity and Disaster Recovery Risk Management
Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices
Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
ICA International Diploma in Governance, Risk and Compliance New technologies are changing the role of a compliance professional. Fintech and Regtech are now embedded in compliance lexicon, but what do the terms mean, and what are the practical impacts, both positive and negative, that we need to understand and manage? The ICA International Diploma in Governance, Risk and Compliance helps you to answer these questions and apply the answers directly within your organisation. Gain a broad understanding of the regulatory environment as well as the specialist skills and knowledge to be able to identify and manage key regulatory risks today and in the future. Get to grips with the nuances of the regulatory environment and the impact to your organisation. Understand why promoting a positive compliance culture is not just good for compliance but good for business. Explore how to maximise the benefits of emerging technologies. Develop your inter-personal skills so you can be the best Compliance Manager. Learn from the experiences of compliance professionals from other firms and sectors and share ideas. This governance, risk and compliance course is awarded in association with Alliance Manchester Business School, the University of Manchester. Benefits of studying with ICA: Flexible learning solutions that are suited to you Our learner-centric approach means that you will gain relevant practical and academic skills and knowledge that can be used in your current role Improve your career options by undertaking a globally recognised qualification that hiring managers look for as part of their hiring criteria Many students have stated that they have received a promotion and/or pay rise as a direct result of gaining their qualification The qualifications ensure that you are enabled to develop strategies to help manage and prevent risk within your firm, thus making you an invaluable asset within the current climate Completion of this training course will provide participants with the following professional qualification: ICA Diploma in Governance, Risk and Compliance. In addition, participants will be entitled to use the following designation 'Dip (Comp).' These qualifications are awarded in association with Alliance Manchester Business School, the University of Manchester. What will you learn? Understanding governance, risk and regulatory compliance Why we need to understand the regulated environment Why are governance and culture essential for effective regulatory compliance risk management? The role of the compliance department and the compliance professional Risk management as the key to effective compliance Case Studies
ICA International Diploma in Managing Sanctions Risk Sanctions are a crucial instrument in the international battle against financial crime proliferation, terrorism and human rights abuses. It's a complex area and those who manage the risk need the right combination of knowledge, capabilities and behaviours to do so effectively. Technical skills - develop a deeper understanding of sanctions architecture, screening and the control framework; enrich your professional skillset Critical thinking - enhance your judgment-making and problem-solving skills Collaboration and communication - ensure a joined-up approach in your management of sanctions cases Flexibility and adaptability - be prepared to respond to fast-changing regimes and rules Leadership - be empowered to make effective decisions quickly and manage resources appropriately This course is awarded in association with Alliance Manchester Business School, the University of Manchester. Through this Level 6- Advanced qualification you will learn: Global sanctions architecture - Sanctions in context How sanctions regimes are implemented Evolving scope of sanctions - A changing tool Sector-based sanctions Identifying higher risk jurisdictions and activities Transparency, control, and ownership Licensing and permissible payments Management of global exposure to unilateral and regional sanctions Developing the control framework Sanctions screening Incident management and holding of sanctioned funds Sanctions lifting and roll back
ICA International Diploma in Anti Money Laundering -Flagship qualification This ICA Diploma in Anti Money Laundering training course is an in-depth, graduate level programme which will provide Participants with a professional qualification in anti-money laundering upon completion and helps individuals develop best practice initiatives and prepares them to face present and future challenges, reducing risk. This qualification is increasingly important for professionals as money laundering prevention remains high on the agenda for financial services professionals. This Diploma will help Participants find an integrated approach to fighting the risk is needed and knowledgeable. There are many benefits of studying with ICA: Flexible learning solutions that are suited to you Our learner-centric approach means that you will gain relevant practical and academic skills and knowledge that can be used in your current role Improve your career options by undertaking a globally recognised qualification that hiring managers look for as part of their hiring criteria Many students have stated that they have received a promotion and/or pay rise as a direct result of gaining their qualification The qualifications ensure that you are enabled to develop strategies to help manage and prevent risk within your firm, thus making you an invaluable asset within the current climate Course format 9-month course assessed by 3 written assignments (3,000 - 3,500 words) A mixture of guided online study and participation in live sessions: 2 x virtual classrooms* 1 x immersive learning scenario (putting you at the centre of a story) 3 x tutorials (a chance to discuss elements of the course in more depth) 3 x assessment preparation sessions Videos covering the latest industry developments and case studies Access to the ICA members' portal containing additional reading and resources Proactive support throughout the course to help you stay on track Students of this course will achieve the following outcomes: Increased potential for career progression Extensive knowledge and highly developed AML skills Enhanced workplace performance Professional membership of the ICA Ability to reduce reputational and financial risk for the organisation On successful completion of this ICA Diploma in Anti Money Laundering training course students will be awarded an ICA Diploma in Anti Money Laundering and will be able to use the designation 'Dip.(AML)'. This course is awarded in association with Alliance Manchester Business School, the University of Manchester. The ICA Diploma in Anti Money Laundering training course instructs students in the following areas: Anti money laundering (AML) and countering the financing of terrorism CFT in context Terrorist financing proliferation financing and sanctions Designing a comprehensive AML/CTF risk-based approach for a financial services business Risk-based customer due diligence (CDD), customer risk profiling and monitoring Governance and leadership Suspicious activity reports/ suspicious transaction reports and dealing with the authorities
Duration 5 Days 30 CPD hours Earning your SHRM Certified Professional (SHRM-CP) or SHRM Senior Certified Professional (SHRM-SCP) credential makes you a recognized expert and leader in the HR field and a valuable asset to your organization, keeping you and your organization more competitive in today's economy. This professional distinction sets you apart from your colleagues, proving your high level of knowledge and skills. Students will be able to identify areas of strength and build on them. They will also see where they will need further concentrated study in preparation for their exam. 1 - INTRODUCTION The SHRM Body of Competency and Knowledge? (BoCK) The SHRM-CP and SHRM-SCP Certifications The SHRM Learning System© for SHRM-CP/SHRM-SCP 2 - HR COMPETENCIES Behavioral Competencies 3 - DOMAIN 1: PEOPLE Functional Area #1: HR Strategic Planning Functional Area #2: Talent Acquisition Functional Area #3: Employee Engagement and Retention Functional Area #4: Learning and Development Functional Area #5: Total Rewards 4 - DOMAIN 2: ORGANIZATION Functional Area #6: Structure of the HR Function Functional Area #7: Organizational Effectiveness and Development Functional Area #8: Workforce Management Functional Area #9: Employee and Labor Relations Functional Area #10: Technology Management 5 - DOMAIN 3: WORKPLACE Functional Area #11: HR in the Global Context Functional Area #12: Diversity and Inclusion Functional Area #13: Risk Management Functional Area #14: Corporate Social Responsibly Functional Area #15: U.S. Employment Law and Regulations 6 - FINAL EXAM/REVIEW/DISCUSSION Additional course details: Nexus Humans SHRM-CP/SHRM-SCP Certification Preparation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SHRM-CP/SHRM-SCP Certification Preparation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
EXPERT – MASTERCLASS 8 CPD POINTS 1 DAY INTENSIVE COURSE ONLINE or IN-CLINIC NOTE! After booking we will contact you for scheduling the exact course date! Courses dates are subject to change due to mentors availability. We will inform you via email if a date becomes available! DERMAGRAFT AND ENRICHED NANO-MICROFAT TRANSFER FOR FACE, NECK & HANDS – VOLUMIZATION & REJUVINATION WHAT IS MICROFAT AND NANOFAT GRAFTING FOR FACE AND NECK LIFT? Microfat and enriched nanofat graft transfer (also known as autologous fat transfer or lipoinjection), to the face and the neck is a minimally invasive, short-lasting procedure with rapid recovery, and can be done under local anaesthesia. Following completion of the procedure, the patient can return to the normal daily life activities. But firstly, we need to clearly explain what the terms microfat and nanofat grafts mean…. Microfat is defined a small-diameter fat particle and is used to improve the appearance of wrinkles, grooves and the lack of volume and sagginess of the skin of the face and neck, in response to the aging process. Similarly, nanofat, is referred to as the smallest diameter fat particle. The main advantage of the nanofat is that it contains cells that have the ability to differentiate in any type of body cell. Stem cells – as they are called- play a very important role in the process of rejuvenation, as they can differentiate into cells called fibroblasts which in turn produce collagen thus making the skin firmer and more youthful in appearance. The Course can be divided into two stages: 1. In the first stage, fat cells will be obtained from one or more parts of the body and are then purified and injected into the face and the neck. The doctor will identify an area in your body where the fat will be obtained from. This area is usually the flanks, but fat can also be obtained from other areas such as the abdomen, and the outer and inner thighs. You will be given enough local anaesthesia to numb the area where the fat will be harvested from. Then, a small-diameter cannula called microcannula connected to a special vacuum syringe will be gently introduced under the skin to obtain the fat. During this process, you should not feel any pain, the local anaesthetic will have made you numb. After the fat is harvested, it will contain a mixture of fat cells, blood, water, and local anaesthetic. Therefore, this fat will not be pure. This mixture of fat, blood, water and local anaesthetic will then become filtered into a special filtering and processing device whereby all the blood, water and local anaesthetic are being washed out, so that pure fat remains. This fat is then further processed by passing it through special filters whereby it becomes a smaller-sized fat particle known as microfat and nanofat graft. You need to be medically qualified as a doctor, dentist, nurse, pharmacist or paramedic with full governing body registration and have completed a Foundation Filler Course and to have administered a number of cases. Additional information ATTENDANCE ONLINE (theory), IN-CLINIC (Practice) COURSE LEVEL EXPERT | Masterclass Course
Course Introduction Covers B12 deficiency, pernicious anaemia, diagnosis, treatment and management. It also covers signs and symptoms. This course does cover how to set up your own service. Please note: this course is for health care professionals or those working in Primary Care. It is not open to Beauticians unless you are a registered healthcare professional. If in doubt- please email annie at training@anniebarr.com or phone +44 7500048222 About this event Course Introduction This course concentrates on B12 deficiency, symptoms, treatments and management. The course covers B12 deficiency, pernicious anaemia, diagnosis, treatment and management. It also covers signs and symptoms of pernicious anaemia. This course is interactive and we include case studies and discuss issues regarding diagnostic testing. We review inclusion and exclusion criteria and identification of appropriate clients. Delegates will get the opportunity to review practice with hands on practical demonstrations of how to give injections correctly. We will cover administration techniques, where to give the injections and record keeping / documentation. We will discuss role and responsibilities and contraindications and precautions. The delegates will leave this course with an example of an individual protocol of Patient Specific Direction (PSD) and a competence based framework document to be used in practice. This course is very interactive. AIMS AND OBJECTIVES Understand the need for accountability and responsibility in relation to role development Demonstrate an understanding of safe practice Describe the signs and symptoms of pernicious anaemia Describe pernicious anaemia and its impact on patients Fully understand the principles, and practice B12 deficiency and B12 injections Understand the importance of safety issues related to giving injections Understand the law relating to role and function of the HCA and prescribing. Describe why patients require B12 injectionsBe able to correctly identify anatomical sites for injectionsDemonstrate correct administration techniquesDemonstrate how to correctly dispose of wasteDemonstrate correct infection control procedures and use of PPEDescribe when patients require referral and understand the importance of referral using correct clinical pathwaysDemonstrate an understanding of anaphylaxis and emergency proceduresUnderstand the need for correct prescribing proceduresBe able to document consultations following your organisations procedures COURSE CONTENTS Role and responsibilities Accountability guidelines and requirements Pernicious anaemia Blood- function B12 Deficiency Risk factors/groups Causes of B12 deficiency Diagnosis and reference ranges, testing Protocols and guidelines Factors affecting B12 diagnosis and treatment Factors affecting absorption B12 injections and common side effects Could it be B12 Deficiency Supplements Side effects and management including ADR’s Contraindications and Precautions Correct Administration and techniques including practical session Injection sites Legal Issues including consent Prescribing and Patient Specific Directions What to record Storage Disposal of injections/waste Infection control Needle stick injuries Competence and supervised practice Policies and procedures Facts and Figures Setting up and running a clinic Insurance/indemnity Research/evidence base and resources Please note Anaphylaxis is not covered on this course, however we do run a separate Anaphylaxis 1hr training course, which takes place at the end of this B12 webinar. If you wish to do the 1 hr Anaphylaxis also, you should book onto BOTH courses. WHO SHOULD ATTEND? HCAs Nurses Doctors Pharmacists Anyone interested in Vitamin B12 deficiency and pernicious anaemia and those working with clients with B12 deficiency AB Health Group awards CPD points / certificate of attendance for each course. If you would prefer an accredited certificate by our accrediting body Aim Qualifications we can organise this. The charge for the certificate including postage is £30.
Recognizing the brilliance of someone psychological disturbance normalizes their experience and opens the door to transformative change. We aim to explore the lived experiences on irregular perceptions of reality with an open mind. Each Saturday includes: a live dialogue between Prof. Ernesto Spinelli and an International Existential Therapist; a moment to share your thoughts and feelings with the teachers; and a final integration facilitated by Bárbara Godoy. This series of ten dialogues set out to explore the multifaceted dimentions and complexities associated with Existential Therapies. It attempts to engage with various interpretations of insanity through the lens of patients often painful, confounding, and deeply unsettling life experiences. Invention- between Prof. Ernesto Spinelli and Dr. Betty Cannon “When I first saw the topic of this year’s dialogues, I asked myself whether I had anything to contribute. After all, I told myself, I do not usually work with psychoses or other so-called ‘extreme’ or’ irregular’ states of consciousness. This started me thinking about a series of demonstration videos that I have been making with students and supervisees over the last couple of years as part of a book project. Do those videos display ‘extreme states’? To my surprise, the answer is yes. They are filled with experiences that might be described as hallucinations (positive and negative), dissociative states, paranoia, delusions, manic and depressive states, crippling anxiety, schizoid withdrawal, depersonalization and derealization, and body dysmorphic phenomena. Not to mention the so-called normal neurotic trances that Freud called transference, countertransference and defenses, psychedelically induced extreme states, and those nightly hallucinations, our dreams. So why did I not remember at least some of these states as being ‘extreme’? Perhaps the answer lies in my perspective on therapy, which is largely existential-phenomenological. I think that the following quote, from a letter that Sartre wrote to R.D. Laing, captures the essence of this perspective: “Like you, I believe that one cannot understand psychological disturbances from the outside, on the basis of a positivistic determinism or reconstruct them with a combination of concepts that remain outside the experience as lived and experienced. I also believe that one cannot study, let alone cure, a neurosis without a fundamental respect for the person of the patient, without a constant effort to grasp the basic situation and relive it, without an attempt to rediscover the response of the person to that situation and––like you, I think––I regard mental illness as the ‘way out’ that the free organism, in its total unity, invents in order to be able to live through an intolerable situation.”* When a client and I together are able to appreciate the true brilliance of this invention, my experience is that it not only normalizes the client’s experience, it also opens the doorway to change. It allows us to invent something new.” Dr. Betty Cannon. Betty Cannon, PhD, is a licensed psychologist who has taught and practiced in Boulder, Colorado, for over 40 years. She is Professor Emerita of the Colorado School of Mines and president and founder of the Boulder Psychotherapy Institute, which has trained mental health professionals in Applied Existential Psychotherapy since 1989. In addition to existential philosophy, especially the philosophy of Sartre, AEP has roots in Gestalt therapy, classical and contemporary psychoanalysis, humanistic psychology (especially the person-centered therapy of Carl Rogers), and body-oriented psychotherapy. Betty is a member of the editorial boards of the Journal for the Society of Existential Analysis and Sartre Studies International. She is the author of Sartre and Psychoanalysis and numerous articles and chapters on existential therapy. Her mentor was Hazel E. Barnes, who translated Sartre into English and who was the world’s foremost Sartre scholar until her death in 2008. Betty is her literary executor, and her book on Sartre is dedicated to Hazel. Prof. Ernesto Spinelli was Chair of the Society for Existential Analysis between 1993 and 1999 and is a Life Member of the Society. His writings, lectures and seminars focus on the application of existential phenomenology to the arenas of therapy, supervision, psychology, and executive coaching. He is a Fellow of the British Psychological Society (BPS) as well as an APECS accredited executive coach and coaching supervisor. In 2000, he was the Recipient of BPS Division of Counselling Psychology Award for Outstanding Contribution to the Profession. And in 2019, Ernesto received the BPS Award for Distinguished Contribution to Practice. His most recent book, Practising Existential Therapy: The Relational World 2nd edition (Sage, 2015) has been widely praised as a major contribution to the advancement of existential theory and practice. Living up to the existential dictum that life is absurd, Ernesto is also the author of an on-going series of Private Eye novels. Date and Time: Saturday 25 October from 2 pm to 3 pm – (UK time) Individual Dialogue Fee: £70 Venue: Online Zoom FULL PROGRAMME 2025: 25 January “Knots” with Prof. Ernesto Spinelli and Bárbara Godoy 22 February “Healing” with Dr. Michael Guy Thompson and Prof. Ernesto Spinelli 22 March “Difference” with Prof. Tod DuBose and Prof. Ernesto Spinelli 12 April “Polarisation” with Prof. Kirk Schneider and Prof. Ernesto Spinelli 3 May “Character” with Prof. Robert Romanyshyn and Prof. Ernesto Spinelli 21 June “Opening” with Dr. Yaqui Martinez and Prof. Ernesto Spinelli 19 July “Meaning” with Dr. Jan Resnick and Prof. Ernesto Spinelli 25 October “Invention” with Dr. Betty Cannon and Prof. Ernesto Spinelli 15 November “Hallucination” with Prof. Simon du Plock and Prof. Ernesto Spinelli 13 December “Hysteria” with Bárbara Godoy and Prof. Ernesto Spinelli Read the full programme here > Course Organised by: