Duration 5 Days 30 CPD hours This course is intended for Although there are no mandatory prerequisites, the course is particularly suited for the following audiences: Cybersecurity engineer Cybersecurity investigator Incident manager Incident responder Network engineer SOC analysts currently functioning at entry level with 2+ years of experience Overview After taking this course, you should be able to: Describe the types of service coverage within a SOC and operational responsibilities associated with each. Compare security operations considerations of cloud platforms. Describe the general methodologies of SOC platforms development, management, and automation. Explain asset segmentation, segregation, network segmentation, micro-segmentation, and approaches to each, as part of asset controls and protections. Describe Zero Trust and associated approaches, as part of asset controls and protections. Perform incident investigations using Security Information and Event Management (SIEM) and/or security orchestration and automation (SOAR) in the SOC. Use different types of core security technology platforms for security monitoring, investigation, and response. Describe the DevOps and SecDevOps processes. Explain the common data formats, for example, JavaScript Object Notation (JSON), HTML, XML, CommaSeparated Values (CSV). Describe API authentication mechanisms. Analyze the approach and strategies of threat detection, during monitoring, investigation, and response. Determine known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs). Interpret the sequence of events during an attack based on analysis of traffic patterns. Describe the different security tools and their limitations for network analysis (for example, packet capture tools, traffic analysis tools, network log analysis tools). Analyze anomalous user and entity behavior (UEBA). Perform proactive threat hunting following best practices. The Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course guides you through cybersecurity fundamentals and prepares you for the role of Information Security Analyst on a Security Operations Center team. You?ll learn to automate for security using cloud platforms and how to apply your knowledge to real-world scenarios Course Outline Understanding Risk Management and SOC Operations Understanding Analytical Processes and Playbooks Investigating Packet Captures, Logs, and Traffic Analysis Investigating Endpoint and Appliance Logs Understanding Cloud Service Model Security Responsibilities Understanding Enterprise Environment Assets Threat Tuning Threat Researching and Threat Intelligence Practices Understanding APIs Understanding SOC Development and Deployment Models Performing Security Analytics and Reports in a SOC Malware Forensics Basics Threat Hunting Basics Additional course details: Nexus Humans Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Network security engineers Network security architects ISE administrators Senior Security Operations Center (SOC) personnel responsible for Incidence Response Cisco integrators and partners Overview After taking this course, you should be able to: Describe the Cisco Identity Services Engine (ISE) Explain Cisco ISE deployment Describe Cisco ISE policy enforcement components Describe Cisco ISE policy configuration Troubleshoot Cisco ISE policy and third-party Network Access Device (NAD) support Configure guest access Configure hotspots and guest portals Describe the Cisco ISE profiler services Describe profiling best practices and reporting Configure a Cisco ISE BYOD solution Configure endpoint compliance Configure client posture services Configure Cisco ISE device administration Describe Cisco ISE TrustSec configurations The Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 course teaches you to deploy and use Cisco© Identity Services Engine (ISE) v3.x, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and apply Cisco ISE capabilities to support use cases for Zero Trust security posture. These use cases include tasks such as policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and Terminal Access Controller Access Control Server (TACACS+) device administration. Through hands-on practice via lab exercises, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency. This course helps you prepare to take the Implementing and Configuring Cisco Identity Services Engine (300-715 SISE) exam, which leads to CCNP© Security and the Cisco Certified Specialist - Security Identity Management Implementation certifications. This course also earns you 40 Continuing Education (CE) credits toward recertification Course Outline Introducing Cisco ISE Architecture Introducing Cisco ISE Deployment Introducing Cisco ISE Policy Enforcement Components Introducing Cisco ISE Policy Configuration Troubleshooting Cisco ISE Policy and Third-Party NAD Support Introducing Web Authentication and Guest Services Configuring Hotspots and Guest Portals Introducing the Cisco ISE Profiler Introducing Profiling Best Practices and Reporting Configuring Cisco ISE BYOD Introducing Cisco ISE Endpoint Compliance Services Configuring Client Posture Services and Compliance Working With Network Access Devices Exploring Cisco TrustSec Additional course details: Nexus Humans Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for Cybersecurity Essentials provides foundational knowledge in cybersecurity and is recommended for all non-technical professionals who wish to develop an understanding of cyber safety. Overview After completing this course, students will be able to: Identify and reduce human errors that put organizations at risk for a cyber-attacks. Define Ransomware, Phishing, and Data Breaches to understand the differences. Identify the motives of hackers. Assess how data breaches occur. Develop a plan on how to protect accounts and privacy. Create a strong and secure password. Work in a secure manner while using remote Wi-Fi access. Safely use Virtual Private Networks (VPN). Identify vulnerabilities in home networks to keep them secure. Identity different social engineering techniques e.g. phishing, vishing. Detect social engineering attempts and prevent potential breaches. Prevent hackers from accessing a Mobile phone. Cybersecurity Essentials was developed using unparalleled learning methodology that prepares cadets for the Israeli Cyber and Intelligence Unit. It is designed to tackle human error by helping develop an advanced understanding and skills to protect individuals and organizations against the most common cyber threats. INTRODUCTION TO CYBERSECURITY Introduction to the world of cybersecurity; basic terminology, and why cybersecurity is so important. Review of famous cyber-attacks. ACCOUNTS & CREDENTIALS SECURITY One of the most common elements linking cyber-attacks is compromised or weak credentials. Learn different ways hackers can acquire passwords, and what to do when accounts have been compromised. How to prevent such attacks including best protection methods and password management and introduction to tools for testing and creating strong passwords. REMOTE SECURITY: WI-FI & VPN Evaluate main risks that arise when using public and non-protected Wi-Fi networks. Differentiate between private and public Wi-Fi networks, define what a VPN is and how to use it, and how to browse safely in remote environments. SOCIAL ENGINEERING How hackers take advantage of ?human-based vulnerabilities?. Define social engineering and the different types of attacks that can leverage social engineering, such as phishing or vishing. Learn how to detect social engineering attempts and prevent future breaches. MOBILE SECURITY Minimize the risk of an attack on mobile device and understand basic security principles for mobile applications. Learn how to protect photos, browsing history, text messages, and confidential business information such as emails, documents, access permission and more. Additional course details: Nexus Humans Cybersecurity Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cybersecurity Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for network and software engineers who are interested in learning about automation and programmability and hold the following job roles: Consulting systems engineer IoT Designer Network administrator Network engineer Network manager Sales engineer Systems engineer Technical solutions architect Overview After taking this course, you should be able to: Explain the fundamentals of Cisco IoT and list common devices involved List the common protocols, standards, and data flows of IoT Explain the Cisco IoT, common needs, and the corresponding solutions Explain how programmability can be used to automate and make operations, deployment, and support of Cisco IoT more effective Describe common Cisco IoT applications and how they apply to Cisco IoT use cases Explain the functions and use cases for Cisco security applications and Cisco IoT This course prepares you to develop Internet of Things (IoT) applications for Cisco© IoT edge compute and network architecture. Through a combination of lessons and hands-on experience, you will learn to implement and deploy Cisco IOx applications using Cisco Field Network Director and Cisco Kinetic. This course covers designing, deploying, and troubleshooting edge applications, and understanding the use of management tools, so you can control your industrial network and connected devices at scale. This course will prepare you for the certification exam 300-915 Developing Solutions Using Cisco IoT and Edge Platforms (DEVIOT), a concentration in the CCNP DevNet track. Course Outlines DEFINING CISCO IOT IOT NETWORKING AND OTHER DEVICES EXAMINING IOT PROTOCOLS EXAMINING IOT STANDARDS RECOGNIZING CISCO IOT NEEDS AND SOLUTIONS USING PROGRAMMABILITY WITH CISCO IOT DESCRIBING CISCO IOT APPLICATIONS: CISCO IOX DESCRIBING CISCO IOT APPLICATIONS: CISCO KINETIC AND CISCO FIELD NETWORK DIRECTOR DEFINING CISCO SECURITY APPLICATIONS Lab outline Use an MQTT Consumer to Subscribe to Sensor Data Use Cisco IOx Applications to Receive and Process Sensor Data Troubleshoot a Sensor Connection Use and Interpret Freeboard Data Use and Interpret Grafana Data Use and Interpret Kibana Data Cisco IOx Familiarity Lab Develop and Deploy a Cisco IOx Application Troubleshoot Cisco IOx Navigate Cisco Field Network Director Explore Cisco Field Network Director API Additional course details: Nexus Humans Cisco Developing Solutions Using Cisco IoT and Edge Platforms v1.0 (DEVIOT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Developing Solutions Using Cisco IoT and Edge Platforms v1.0 (DEVIOT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for Java developers who want to learn more about the specifications that comprise the world of Java Enterprise Edition (Java EE), Proficiency in developing Java SE applications, with 2+ years of experience required, Proficiency in using an IDE such as Red Hat Developer Studio or Eclipse, Experience with Maven is recommended but not required. Overview Red Hat Application Development I: Programming in Java EE Virtual Training exposes experienced Java Standard Edition (Java SE) developers to the world of Java Enterprise Edition (Java EE). As an experienced Java Standard Edition (Java SE) developer, this course introduces you to the world of Java Enterprise Edition (Java EE). You will learn about the various specifications that make up Java EE. Through hands-on labs, you will transform a simple Java SE command line application into a multi-tiered enterprise application using various Java EE specifications, including Enterprise Java Beans, Java Persistence API, Java Messaging Service, JAX-RS for REST services, Contexts and Dependency Injection (CDI), and JAAS for securing the application. This course is based on Red Hat© Enterprise Application Platform 7.0. 1 - TRANSITION TO MULTI-TIERED APPLICATIONS Describe Java EE features and distinguish between Java EE and Java SE applications. 2 - PACKAGE AND DEPLOY APPLICATIONS TO AN APPLICATION SERVER Describe the architecture of a Java EE application server, package an application, and deploy the application to an EAP server. 3 - CREATE ENTERPRISE JAVA BEANS Develop Enterprise Java Beans, including message-driven beans. 4 - MANAGE PERSISTENCE Create persistence entities with validations. 5 - MANAGE ENTITY RELATIONSHIPS Define and manage JPA entity relationships. 6 - CREATE REST SERVICES Create REST APIs using the JAX-RS specification. 7 - IMPLEMENT CONTEXTS AND DEPENDENCY INJECTION Describe typical use cases for using CDI and successfully implement it in an application. 8 - SECURE JAVA EE APPLICATIONS Use JAAS to secure a Java EE application. 9 - SECURE JAVA EE APPLICATIONS Use JAAS to secure a Java EE application. 10 - COMPREHENSIVE REVIEW OF RED HAT JBOSS DEVELOPMENT I: JAVA EE Demonstrate proficiency of the knowledge and skills obtained during the course. Additional course details: Nexus Humans Red Hat Application Development I: Programming in Java EE (AD183) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Application Development I: Programming in Java EE (AD183) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Network designers Sales engineers Wireless network engineers Overview Objectives After taking this course, you should be able to: Implement network settings to provide a secure wireless network infrastructure Implement a secure wireless client and troubleshoot wireless client connectivity issues Implement and troubleshoot QoS in wireless networks Implement and troubleshoot advanced capabilities in wireless network services The Implementing Cisco Enterprise Wireless Networks (ENWLSI) v1.1 course gives you the knowledge and skills needed to create a secure wireless network infrastructure and troubleshoot any related issues. You?ll learn how to implement and fortify a wireless network infrastructure using Cisco Identity Service Engine (ISE), Cisco Prime Infrastructure (PI), and Cisco Connect Mobile Experience to monitor and troubleshoot network issues.This course provides hands-on labs to reinforce concepts including deploying Cisco Prime Infrastructure Release 3.5, Cisco Catalyst© 9800 Wireless Controller Release, Cisco IOS XE Gibraltar 16.10, Cisco Digital Network Architecture (Cisco DNA) Center Release 1.2.8, Cisco Connected Mobile Experiences (CMX) Release 10.5, Cisco Mobility Services Engine (MSE) Release 8.0 features, and Cisco ISE Release 2.4.This course also helps you prepare to take the 300-430 Implementing Cisco Enterprise Wireless Networks (ENWLSI) exam, which is part of the new CCNP© Enterprise certification and the Cisco Certified Specialist - Enterprise Wireless Implementation certification. Course Outline Securing and Troubleshooting the Wireless Network Infrastructure Implementing and Troubleshooting Secure Client Connectivity Implementing and Troubleshooting Quality of Service (QoS) in Wireless Networks Implementing and Troubleshooting Advanced Wireless Network Services Lab Outline Lab Familiarization (Base Learning Lab) Configure Secure Management Access for Cisco Wireless LAN Controllers (WLCs) and Access Points (APs) Add Network Devices and External Resources to Cisco Prime Infrastructure Customize Cisco Prime Infrastructure for Network Monitoring Capture a Successful AP Authentication Implement Authentication, Authorization, and Accounting (AAA) Services for Central Mode WLANs Implement AAA Services for FlexConnect Mode Wireless LANs (WLANs) Configure Guest Services in the Wireless Network Configure Bring Your Own Device (BYOD) in the Wireless Network Capture Successful Client Authentications Configure QoS in the Wireless Network for Voice and Video Services Configure Cisco Application Visibility and Control (AVC) in the Wireless Network Configure multicast DNS (mDNS) in the Wireless Network Capture Successful QoS Traffic Marking in the Wireless Network Configure, Detect, and Locate Services on the Cisco CMX Additional course details: Nexus Humans Cisco Implementing Cisco Enterprise Wireless Networks v1.1 (ENWLSI) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Enterprise Wireless Networks v1.1 (ENWLSI) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who need to deploy and manage Endpoint Security within their security environment. Overview Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices. Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management. Identify and describe key elements of the SmartEndpoint Management console. Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console. Explain how to create and assign security policies for Endpoint clients using Endpoint Security. Understand deployment methods and server considerations for Endpoint Security Management installation. Identify the different ways to install and configure Endpoint clients. Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources. Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server. Describe additional server configurations that are available to help manage Endpoint clients. Recognize the different types of data security protections available to deploy on end user machines. Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers. Understand how to secure removable media devices. Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues. Recognize the types of threats that target Endpoint computers. Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment. Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources. Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events. Understand how to troubleshoot and debug issues. The goal of this course is to provide a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment. Course Topics Introduction to Endpoint Security Endpoint Security Management Deploying Endpoint Security Additional Endpoint Server Configurations Data Security Protection Advanced Threat Prevention Reporting and Troubleshooting LAB EXERCISES Installing the Endpoint Security Management Solution Deploying Endpoint Client Packages Deploying Endpoint Policy Servers Configuring High Availability for Endpoint Security Modifying Client Installations Working with Deployment Rules Working with SandBlast Agent Additional course details: Nexus Humans CCES Check Point Certified Endpoint Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCES Check Point Certified Endpoint Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Enhance your knowledge in coal power plant life cycle management and flexible operations with EnergyEdge. Learn about decommissioning, preservation, repurposing, and recommissioning.
Professional Diploma in Child Psychology Recognising how children think and perceive their environment is the key to working with them in the best possible way. Understanding child psychology is therefore crucial for professionals working in related fields, both now and in the future. Enhance your understanding of child psychology with the Professional Diploma in Child Psychology if you intend to work with children or are currently employed with them. It is going to make you a better parent and assist you do your duties with greater expertise. You will study the foundations of child psychology in this training programme. The course will explain the variables that can affect a child's growth. You will also learn how children develop in terms of their cognitive, emotional, social, and language abilities. The workshop will also illustrate the effects of loss and separation on kids. Your preparation for a career in the relevant fields will be aided by this course. A certificate will further enhance your resume. Enrol today! Course Highlights Professional Diploma in Child Psychology is an award winning and the best selling course that has been given the CPD Certification & IAO accreditation. It is the most suitable course anyone looking to work in this or relevant sector. It is considered one of the perfect courses in the UK that can help students/learners to get familiar with the topic and gain necessary skills to perform well in this field. We have packed Professional Diploma in Child Psychology into several modules for teaching you everything you need to become successful in this profession. To provide you ease of access, this course is designed for both part-time and full-time students. You can become accredited in just 20/30 hours and it is also possible to study at your own pace. We have experienced tutors who will help you throughout the comprehensive syllabus of this course and answer all your queries through email. For further clarification, you will be able to recognize your qualification by checking the validity from our dedicated website. Why You Should Choose Professional Diploma in Child Psychology Lifetime access to the course No hidden fees or exam charges CPD Accredited certification on successful completion Full Tutor support on weekdays (Monday - Friday) Efficient exam system, assessment and instant results Download Printable PDF certificate immediately after completion Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. Improve your chance of gaining professional skills and better earning potential. Who is this Course for? Professional Diploma in Child Psychology is CPD certified and IAO accredited. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic backgrounds. Requirements Our Professional Diploma in Child Psychology is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path You will be ready to enter the relevant job market after completing this course. You will be able to gain necessary knowledge and skills required to succeed in this sector. All our Diplomas' are CPD and IAO accredited so you will be able to stand out in the crowd by adding our qualifications to your CV and Resume. Professional Diploma in Child Psychology - Updated Version Module 01: Introduction to Child Psychology 00:00:00 Module 02: Understanding Child Development 00:51:00 Module 03: Factors That Influence Development 00:23:00 Module 04: Social and Emotional Development 00:29:00 Module 05: Cognitive Development 00:25:00 Module 06: Understanding Moral Development 00:35:00 Module 07: Language Development 00:35:00 Module 08: Personality and Intellectual Development in Children 00:33:00 Module 09: Attachment and Relationship Building in Childhood 00:29:00 Module 10: Impacts of Separation and Loss of Attachment 00:39:00 Module 11: Problems of Infancy 00:32:00 Module 12: Problems in Childhood and Adolescence 00:41:00 Professional Diploma in Child Psychology - Old Version Child Psychology What is Child Psychology? 00:15:00 Defining Children and Childhood 00:15:00 Child Development Theories 01:00:00 Genetics 00:15:00 Cognitive Development 00:30:00 Physical Development 00:15:00 Social and Emotional Development 00:15:00 Attachment 00:15:00 Language Development & Communication 00:30:00 Brain Development & Emotional Intelligence 00:15:00 Self Esteem & Confidence 00:15:00 Gender Roles and Gender Differences 00:30:00 Learning Disability 01:00:00 Behavioral Disorders 00:30:00 High Intelligence & School Psychology 00:15:00 Phases of Grief 00:30:00 Nutrition and Child Development 00:30:00 Developing into Adulthood 00:30:00 Child Empowerment The Basics On Nurturing Your Child 00:30:00 Build Your Child's Self Esteem 01:00:00 Catch The Good And Not Always The Bad 01:00:00 Demonstrate The Love Is Unconditional 01:00:00 Make Rules And Be Consistent 01:00:00 Make Special Time For Your Child 00:30:00 Always Set An Example 01:00:00 Don't Dominate A Conversation 00:30:00 Learn To Be A Good Communicator 01:00:00 An Unnourished Child has A Long Road Ahead 00:30:00 Asperger's in Children For a parent who suspects their child may have Asperger's syndrome, what are the common symptoms to look out for? 00:30:00 My 6 year old boy becomes very angry a lot of the time, what can I do to help him deal with his frustrations better? 00:30:00 Why do Asperger's children behave in an obsessive manner? 00:30:00 I'm worried about how my child will cope as he reaches his adolescence. What advice can you give? 00:30:00 I don't want my child to be on medication for the rest of his life. Are there any non-drug treatments available? 01:00:00 My 7 year old daughter has been diagnosed with Asperger's and it's a constant struggle to get her to pay attention or even look at me! She seems in a world of her own sometimes. Any suggestions? 00:30:00 Is it always necessary for an Asperger's child to go to a specialist school? 01:00:00 My son doesn't make friends easily because of his Asperger's. I'm worried he'll be bullied when he starts school. What should I do? 01:00:00 It can be exhausting coping with my 9 year old. I often feel like a failure because I struggle to cope sometimes. Is that normal? 00:30:00 Reference Book Developmental Psychology 00:00:00 Mock Exam Mock Exam- Professional Diploma in Child Psychology 00:30:00 Final Exam Final Exam- Professional Diploma in Child Psychology 00:30:00