Duration 3 Days 18 CPD hours This course is intended for This course is intended for solutions architects, solution-design engineers, developers seeking an understanding of AWS architecting and individuals seeking the AWS Solutions Architect-Associate certification. Overview Identify AWS architecting basic practices. Explore using the AWS management tools: The AWS Console, Command Line Interface (CLI), and CloudFormation in a lab environment. Examine the enforcement of accounts security using policies. Identify the elements that build an elastic, secure, virtual network that includes private and public subnets. Practice building an AWS core networking infrastructure. Determine strategies for a layered security approach to Virtual Private Cloud (VPC) subnets. Identify strategies to select the appropriate compute resources based on business use-cases. Practice building a VPC and adding an Elastic Cloud Compute (EC2) instance in a lab environment. Practice installing an Amazon Relational Database Service (RDS) instance and an Application Load Balancer (ALB) in the VPC you created. Compare and contrast AWS storage products and services, based on business scenarios. Compare and contrast the different types of AWS database services based on business needs. Practice building a highly available, auto-scaling database layer in a lab. Explore the business value of AWS monitoring solutions. Identify the role of monitoring, event driven load balancing, and auto scaling responses, based on usage and needs. Identify and discuss AWS automation tools that will help you build, maintain and evolve your infrastructure. Discuss network peering, VPC endpoints, gateway and routing solutions based on use-cases. Discuss hybrid networking configurations to extend and secure your infrastructure. Discuss the benefits of microservices as an effective decoupling strategy to power highly available applications at scale. Explore AWS container services for the rapid implementation of an infrastructure-agnostic, portable application environment. Identify the business and security benefits of AWS serverless services based on business examples. Practice building a serverless infrastructure in a lab environment. Discuss the ways in which AWS edge services address latency and security. Practice building a CloudFront deployment with an S3 backend in a lab environment. Explore AWS backup, recovery solutions, and best practices to ensure resiliency and business continuity. Build a highly available and secure cloud architecture based on a business problem, in a project-based facilitator-guided lab. Architecting on AWS is for solutions architects, solution-design engineers, and developers seeking an understanding of AWS architecting. In this course, you will learn to identify services and features to build resilient, secure and highly available IT solutions on the AWS Cloud. Architectural solutions differ depending on industry, types of applications, and business size. AWS Authorized Instructors emphasize best practices using the AWS Well-Architected Framework, and guide you through the process of designing optimal IT solutions, based on real-life scenarios. The modules focus on account security, networking, compute, storage, databases, monitoring, automation, containers, serverless architecture, edge services, and backup and recovery. At the end of the course, you will practice building a solution and apply what you have learned with confidence. Prerequisites AWS Cloud Practitioner Essentials classroom or digital training, or Working knowledge of distributed systems Familiarity with general networking concepts Familiarity with IP addressing Working knowledge of multi-tier architectures Familiarity with cloud computing concepts 0 - Introductions & Course Map review Welcome and course outcomes 1 - Architecting Fundamentals Review AWS Services and Infrastructure Infrastructure Models AWS API Tools Securing your infrastructure The Well-Architected Framework Hands-on lab: Explore Using the AWS API Tools to Deploy an EC2 Instance 2 - Account Security Security Principals Identity and Resource-Based Policies Account Federation Introduction to Managing Multiple Accounts 3 - Networking, Part 1 IP Addressing Amazon Virtual Private Cloud (VPC), Patterns and Quotas Routing Internet Access Network Access Control Lists (NACLs) Security Groups 4 - Compute Amazon Elastic Cloud Compute (EC2) EC2 Instances and Instance Selection High Performance Computing on AWS Lambda and EC2, When to Use Which Hands-On Lab: Build Your Amazon VPC Infrastructure 5 - Storage Amazon S3, Security, Versioning and Storage Classes Shared File Systems Data Migration Tools 6 - Database Services AWS Database Solutions Amazon Relational Database Services (RDS) DynamoDB, Features and Use Cases Redshift, Features, Use Cases and Comparison with RDS Caching and Migrating Data Hands-on Lab: Create a Database Layer in Your Amazon VPC Infrastructure 7 - Monitoring and Scaling Monitoring: CloudWatch, CloudTrail, and VPC Flow Logs Invoking Events 8 - Automation CloudFormation AWS Systems Manager 9 - Containers Microservices Monitoring Microservices with X-Ray Containers 10 - Networking Part 2 VPC Peering & Endpoints Transit Gateway Hybrid Networking Route 53 11 - Serverless Architecture Amazon API Gateway Amazon SQS, Amazon SNS Amazon Kinesis Data Streams & Kinesis Firehose Step Functions Hands-on Lab: Build a Serverless Architecture 12 - Edge Services Edge Fundamentals Amazon CloudFront AWS Global Accelerator AWS Web Application Firewall (WAF), DDoS and Firewall Manager AWS Outposts Hands-On Lab: Configure an Amazon CloudFront Distribution with an Amazon S3 Origin 13 - Backup and Recovery Planning for Disaster Recovery AWS Backup Recovery Strategie Additional course details: Nexus Humans Architecting on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Based on our extensive work and experience with leaders, both in the private and public sectors, this ILM Level 5 Coaching and Mentoring programme has been designed to develop the capability of leaders to positively impact the performance of individuals and teams. We are experts at unlocking peak performance. Coaching and mentoring improves relationships, performance and engagement. This programme has been created to sharpen a leader's skills - enabling them to balance control, commitment and empowerment through productive conversations with individuals and teams. Scroll down to find out more about this ILM Level 5 qualification, or use the buttons below to jump straight to the scheduled course dates and prices. All of our ILM Programmes are provided in partnership with The BCF Group, which is the ILM Approved Centre we deliver under. Course Syllabus The syllabus of the ILM Level 5 Qualification in Business Coaching and Mentoring is comprised of six modules, covering the following: Module OneIntroduction 1.1) Explore the myths 1.2) What is coaching and mentoring? 1.3) What is business coaching? 1.4) Thoughts and perceptions 1.5) 7 competencies of a coach 1.6) Definitions - Mentoring / Consulting / Coaching / Therapy / Counseling Module TwoModels and Practice 2.1) The Wheel of Life 2.2) Johari's Window 2.3) KASH - Knowledge, Attitude, Skills, Habits of an effective coach 2.4) STAR / GROW model 2.5) Effective use of Paradigm cards 2.6) Practice and feedback Module ThreeBuilding the Relationship 3.1) Self-management 3.2) How motivation works 3.3) Personality & behavioural traits 3.4) Rapport and trust Module FourCommunication and Practice 4.1) Non-verbal communication 4.2) Effective communication 4.3) Questioning through 2nd/3rd/4th level questioning 4.4) Building a bank of coaching questions 4.5) Practice and feedback Module FiveStructure 5.1) Introduction 5.2) The coaching cycle 5.3) How to give feedback 5.4) The COMET model 5.5) Executive coaching 5.6) Psychometrics 5.7) Closing the coaching session Module SixWell-Formed Outcomes 6.1) Challenge and focus steps 6.2) Coaching goals 6.3) Establishing the gap analysis 6.4) Using diagnostic tools 6.5) SMART objectives 6.6) Designing & planning focus steps 6.7) Gaining commitment 6.8) Practice and feedback Who is it for? Business coaching is the skill to have in today's rapidly changing business climate. People and team development through business coaching is fast, efficient and cost effective, and will get you measurable results. The ILM Level 5 Qualifications in Business Coaching and Mentoring are highly accessible and have been designed for all tiers of director, management and supervisory level, or indeed anyone involved in people development. With a business-relevant, tried-and-tested approach, we encourage participants to bring live business issues and case histories with them on the course. Accreditation Upon completion of this programme all attendees will receive the 'ILM Endorsed Programme in Business Coaching & Mentoring' certificate. Participants will also be eligible to receive ILM letters after their name; either AMInstLM (Affiliate/Associate Member Institute Leadership & Management) or MInstLM (Member Institute Leadership & Management). As with all ILM Accredited Programmes, participants will need to complete the post-programme activity in order to achieve their full 'ILM Level 5 Certificate in Coaching and Mentoring in Management' certificate. These elements have been designed in order to show to the Institute of Leadership and Management (ILM) that you are able to put the skills and techniques learned on the programme into practice. Full support and guidance is provided for completing these final elements. Required Activities Pre-Course We ask you to come prepared with issues which you are currently experiencing that you would be happy to discuss and be coached on. We also send out a short document containing questions and exercises which will help our coaches understand you better and work with you in order to receive the best training. Post-Course To achieve this ILM qualification, participants will have to complete the following post-course activities: 3 x work-based assignments need to be completed within 1 year from attendance and registration. Embedded in the assignments, the Certificate will require delegates to complete 18 hours of coaching or mentoring activity with 2-3 people. The Diploma will require delegates to complete 54 hours of coaching or mentoring with 4-9 people. Tutor guided learning will take on the format of book and video reviews with ongoing tutor guidance and support via phone, Skype or face-to-face. Optional: Self-initiated 2 x 45 min executive coaching sessions per delegate to offer a coaching best practice view. Course Material Each participant will be issued with a workbook to assist them both during and after the course, which will contain information, guidance and forms to assist with the coaching sessions. Participants will also complete a Paradigm psychometric report and receive a year's membership with the Institute of Leadership & Management (ILM). In-House & Classroom Courses Available Online We have developed an alternative to traditional face-to-face training that continues to provide a full learning experience, and allows delegates to learn effectively whilst self-isolating from home. This is how it looks: Delegates booked on Classroom and In-House courses will continue to have access to their trainer online throughout the days that the course is booked to run. Prior to a delegate's course start date, they will be enrolled on our e-learning platform (in partnership with BCF Group) for the course they are booked on to. They will also be given contact information for their trainer, and details of how to access the online workshops. Delegates will not require any special IT equipment. A desktop computer, laptop, tablet, or a mobile phone with internet and audio capability is all that is required. Delegates taking ILM Qualifications will then proceed to the book review, video review and work based assignments with 12 months tutor support as appropriate, and in line with our previous arrangements. We hope you agree that this blended learning experience represents the safest way to continue supporting our clients and delegates during the Coronavirus disruption. Scheduled Courses Classroom Course - Nottingham (NG12 4DG) Classroom training courses enable you to benefit from having the tutor and other delegates right there in the room with you. Face-to-face training sessions are one of the best ways to learn, as it is easy to ask questions and have group discussions. In addition to the 2 days in the classroom, delegates will need to undertake self-directed learning and 3 work-based assignments. As a guide, this is estimated to take 3 hours per week for 12 months. Diploma: £2,195 + vat | Certificate: £1,895 + vat 03-04 October 2023 22-23 February 2024 Classroom Course - Reading (RG41 5QS) Classroom training courses enable you to benefit from having the tutor and other delegates right there in the room with you. Face-to-face training sessions are one of the best ways to learn, as it is easy to ask questions and have group discussions. In addition to the 2 days in the classroom, delegates will need to undertake self-directed learning and 3 work-based assignments. As a guide, this is estimated to take 3 hours per week for 12 months. Diploma: £2,195 + vat | Certificate: £1,895 + vat 14-15 September 2023 14-15 December 2023 14-15 March 2024 Zoom™ Course Attending a course via Zoom videoconferencing gives you all of the benefits of classroom training without the need to leave your home or office. You still benefit from a real tutor facilitating the programme, and the content is exactly the same. The only difference is that we split the course into four half-day sessions to make it easier on your eyes! Diploma: £1,795 + vat | Certificate: £1,495 + vat September 2023 - 25th Sep (morning), 25th Sep (afternoon), 26th Sep (morning), 26th Sep (afternoon) November 2023 - 6th Nov (morning), 6th Nov (afternoon), 7th Nov (morning), 7th Nov (afternoon) January 2024 - 11th Jan (morning), 11th Jan (afternoon), 12th Jan (morning), 12th Jan (afternoon) March 2024 - 11th Mar (morning), 11th Mar (afternoon), 12th Mar (morning), 12th Mar (afternoon) May 2024 - 14th May (morning), 14th May (afternoon), 15th May (morning), 15th May (afternoon) July 2024 - 9th Jul (morning), 9th Jul (afternoon), 10th Jul (morning), 10th Jul (afternoon Dickson Training Ltd Founded in 1985 in Yorkshire, we have built an impressive and loyal client base. Our partnerships are built by consistently delivering outstanding development solutions and working in close collaboration with our clients, resulting in us becoming a leading UK and international training provider.
Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course are persons who are new to reporting with Microsoft© SQL Server© Report Builder and SSRS, persons who are transitioning from another reporting software application, and persons who are existing Report Builder and SSRS report authors. Overview Navigate the Report Builder Environment. - Create table reports. - Format reports. - Create basic and complex expressions. - Group report data. - Create matrix reports. - Sort and filter data. - Summarize data with charts. - Print and export reports. In this course, students will continue their learning on the foundations of report writing with Microsoft© SQL Server© Report Builder and SSRS. Prerequisites ?Familiarity with Windows. ?Creating and navigating folders. ?Opening programs. ?Manipulating windows. ?Copying and pasting objects. ?Formatting text. ?Saving files. 1 - Exploring the Report Builder Environment Introducing the Report Builder Environment Working with Existing Reports Lab 1: Exploring the Report Builder Application 2 - Adding Data to Table Reports Create Report Data Sources Create Report Datasets Work with the Tablix Data Region Create a Table Report Lab 1: Creating Table Reports 3 - Formatting Data and Creating Expressions in Reports Formatting Reports Sorting and Filtering Report Data Adding Data to a Dataset Creating Simple Expressions Creating Complex Expressions Lab 1: Formatting Reports 4 - Grouping Report Data Group Data in Reports Group Data Using an Expression Creating Subgroups and Group Aggregates Lab 1: Creating Reports with Groups and Aggregates 5 - Matrix Reports Creating and Modifying Matrix Data Regions Creating and Modifying Column Groups Lab 1: Creating Matrix Reports 6 - Charts Create and Modify Chart Wizard Reports Add Charts to Existing Reports Modify Charts in Reports Lab 1: Creating Charts and Chart Reports 7 - Printing and Exporting Reports Print Features and Print Options Export Reports Lab 1: Printing and Exporting Reports
Duration 1 Days 6 CPD hours This course is intended for People in different roles and at various stages in their careers can benefit from this fundamentals course. This includes IT professionals, business stakeholders and others who want to be exposed to the customer engagement capabilities of Dynamics 365, students, recent graduates, and people changing careers who want to leverage Dynamics 365 to move to the next level. Overview Describe the customer engagement apps and what they have in common Describe the standard marketing processes and how Dynamics 365 Marketing addresses them Describe Dynamics 365 Marketing features and capabilities Describe additional marketing apps Describe the standard sales processes and how Dynamics 365 Sales addresses them Describe Dynamics 365 Sales capabilities Describe additional sales apps such as Sales Insights and Sales Navigator Describe the standard customer service processes and how Dynamics 365 Customer Serviceaddresses them Describe Dynamics Customer Service capabilities Describe additional sales apps such as Sales Insights and Sales Navigator Describe the standard field service business processes and how Dynamics 365 Field Service addresses Describe how to generate Work Orders Describe the scheduling capabilities of Dynamics 365 Field Service Describe the inventory management capabilities of Dynamics 365 Field Service Describe the asset management capabilities of Dynamics 365 Field Service Describe project-based customer engagement processes addressed by Dynamics 365 Project Operations Describe the sales capabilities of Dynamics 365 Project Operations Describe the project management capabilities of Dynamics 365 Project Operations Describe the resource utilization capabilities of Dynamics 365 Project Operations This course will provide you with a broad introduction to the customer engagement capabilities of Dynamics 365. You will become familiar with the concept of customer engagement, as well as each of the customer engagement apps, including Dynamics 365 Marketing, Dynamics 365 Sales, Dynamics 365 Customer Service, Dynamics 365 Field Service, and the customer relationship management (CRM) capabilities of Dynamics 365 Project Operations. This course will include lecture as well as hands-on labs. Learn the Fundamentals of Dynamics 365 Marketing Get introduced to the Dynamics 365 customer engagement apps Examine Dynamics 365 Marketing Describe Dynamics 365 Marketing capabilities Review Additional Marketing Apps Learn the Fundamentals of Dynamics 365 Sales Explore Dynamics 365 Sales Manage the sales lifecycle with Dynamics 365 Sales Review additional sales apps Learn the Fundamentals of Dynamics 365 Customer Service Examine Dynamics 365 Customer Service Describe Dynamics Customer Service capabilities Review additional customer service apps Learn the Fundamentals of Dynamics 365 Field Service Examine Dynamics Field Service Generate Work Orders in Dynamics 365 Field Service Describe the scheduling capabilities of Dynamics 365 Field Service Examine the inventory management capabilities of Dynamics 365 Field Service Review the asset management capabilities of Dynamics 365 Field Service Learn the Fundamentals of Dynamics 365 Project Operations (CRM) Examine Dynamics 365 Project Operations Describe the sales capabilities of Dynamics 365 Project Operations Plan projects with Dynamics 365 Project Operations Review the resource utilization capabilities of Dynamics 365 Project Operations Additional course details: Nexus Humans MB-910T00 Microsoft Dynamics 365 Fundamentals (CRM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MB-910T00 Microsoft Dynamics 365 Fundamentals (CRM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
LOOKING FOR: ADULT FICTION, NON-FICTION Amanda Preston has been a literary agent for over 20 years and co-founded LBA in 2005. She won the RNA Literary Agent of the Year award in 2018. She represents commercial and reading group fiction, as well as a range of narrative non-fiction and memoir. She loves working with authors, championing them every step of the way, and works with them and their publishing teams to build them into brand names and award winning and bestselling authors in the UK and internationally. Whether commercial or reading-group, she loves innovative and well-written stories that hook her in from the start and whose voice stays with her. She is looking for novels that demand to be talked about and shared, whatever their genre, and that she is still thinking about days after finishing. She is on the hunt for a high-concept thriller which is character and plot driven, but also has a discussable issue at its heart i.e Elizabeth is Missing by Emma Healey and Girl A by Abigail Dean. She love thrillers where the location is as integral to the plot as the crime i.e The Dry by Jane Harper and The Sanatorium by Sarah Pearse, and would love a good locked-room thriller but is only looking for fresh and unique ideas in this area. She is also on the hunt for a glorious book club love story that is doing something a bit different and special i.e Lessons in Chemistry by Bonnie Garmus or anything by Taylor Jenkins Reid or Liane Moriarty! Or smart, contemporary, observant romcoms with a very strong emphasis on diverse / own voices. Finally, she would love a historical that vividly brings that period to life as well as having a stunning plot i.e, The Familiars by Stacey Halls and The Doll Factory by Elizabeth MacNeal. Amanda would like you to submit a covering letter, 1 page synopsis and the opening three chapters (max 5,000 words). (In addition to the paid sessions, Amanda is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Friday 29 November 2024
This session will provide a clear update for governors as to the latest developments in terms of risk, updates on statutory guidance and KCSIE requirements from the governance perspective, and an overview of what the safeguarding team should be working on.
FAA Level 3 Award In Principles Of Safeguarding And Protecting Children, Young People Or Vulnerable Adults (RQF) Face to Face Classroom: One day course Virtual Classroom: 3 session of 2 ½ hours For those who work with children, young people and vulnerable adults Promotes awareness of safeguarding, enabling learners to identify problems and show where to report these to Course Contents: Safeguarding and protecting children, young people or vulnerable adults How to respond to evidence or concerns that a child, young person or vulnerable adult has been abused Safeguarding legislation and guidance Indicators of abuse or neglect Making judgements Communicating worries and concerns Roles and responsibilities Sharing information Allegations and complaints Reporting allegations and complaints Benefits of this Course: In 2018/2019, 415,050 concerns of abuse were raised In 2018/2019, there were nearly 400,000 children in need 52,300 children were subject to a child protection plan 63% of adult safeguarding concerns are for people over 65 1 in every 42 adults aged 85+ have required safeguarding enquires... Child abuse often goes unreported and unrecorded - till it is picked up on by someone who then does something about it. This Level 3 Safeguarding course gives people the skills and knowledge to make a real difference to a person's life! Accredited, Ofqual regulated qualification Our Safeguarding and Protecting Children, Young People or Vulnerable Adults training course is a nationally recognised, Ofqual regulated qualifications accredited by First Aid Awards Ltd. This means that you can be rest assured that your Principles of Safeguarding and Protecting Children, Young People or Vulnerable Adults Certificate provides information for best practice to make a real difference to protect the health and wellbeing of our most vulnerable. The Ofqual Register number for this course is 601/8471/1
Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices