• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

298 History courses in Ewell delivered Live Online

COBIT 2019 Foundation

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The COBIT 2019 Foundation course would suit candidates working in the following IT professions or areas: IT Auditors IT Managers IT Quality professionals IT Leadership IT Developers Process practitioners Managers in IT service providing firms The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs. Overview This COBIT 2019 Foundation course is designed as an introduction to COBIT 2019 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions and increased productivity. The syllabus areas that this course is designed to cover are: New framework introduction Key concepts and terminology Governance and Framework Principles Governance system and components Governance and management objectives Performance management Designing a tailored governance system COBIT 2019 builds on and integrates more than 25 years of development in this field, not only incorporating new insights from science, but also operationalizing these insights as practice. The heart of the COBIT framework updates COBIT principles while laying out the structure of the overall framework including: New concepts are introduced and terminology is explained?the COBIT Core Model and its 40 governance and management objectives provide the platform for establishing your governance program. The performance management system is updated and allows the flexibility to use maturity measurements as well as capability measurements. Introductions to design factors and focus areas offer additional practical guidance on flexible adoption of COBIT 2019, whether for specific projects or full implementation. From its foundation in the IT audit community, COBIT has developed into a broader and more comprehensive information and technology (I&T) governance and management framework and continues to establish itself as a generally accepted framework for I&T governance. 1 - COBIT 5 OVERVIEW AND INTRODUCTION Course Administration Course Objectives Exam Overview Certification Scheme History of COBIT COBIT 2019 Improvements Major differences with 2019 Misconceptions about COBIT COBIT and Other Standards 2 - KEY CONCEPTS AND TERMINOLOGY Introduction to Enterprise Governance of Information and Technology Benefits of Information and Technology Governance COBIT Information and Technology Governance Framework Distinction of Governance and Management Three Principles of a Governance Framework Six Principles for a Governance System 3 - GOVERNANCE SYSTEMS AND COMPONENTS Introduction to the Components of a Governance System Processes and Capability Levels Organizational Structures and Defined Roles Information Flows and Items People, Skills and Competencies Principles, Policies and Frameworks Culture, Ethics and Behavior Services, Infrastructure and Applications 4 - GOVERNANCE MANAGEMENT OBJECTIVES Governance and Management Objectives Publication Governance and Management Objectives Governance and Management Objectives Core Model Evaluate, Direct and Monitor Align, Plan and Organize Build, Acquire and Implement Deliver, Service and Support Monitor, Evaluate and Assess 5 - GOALS CASCADE Governance and Management Objective Relationships Governance and Management Objective Descriptions High-Level Information Example Introduction to the Goals Cascade Enterprise Goals Alignment Goals Mapping Tables ? Appendix A 6 - PERFORMANCE MANAGEMENT Introduction to Performance Management COBIT Performance Management Principles COBIT Performance Management (CPM) Overview Process Capability Levels Rating Process Activities Focus Area Maturity Levels Performance Management of Organizational Structures Performance Management of Information Items Performance Management of Culture and Behavior 7 - DESIGNING A TAILORED GOVERNANCE SYSTEM The Need for Tailoring Design Factors Enterprise Strategy Enterprise Goals Risk Profile I&T Related Issues Threat Landscape Compliance Requirements Role of IT Sourcing Model for IT IT Implementation Methods Technology Adoption Strategy Enterprise Size Focus Areas Designing a Tailored Governance System Management Objective Priority and Target Capability Levels Component Variations Specific Focus Areas Stages and Steps in the Design Process 8 - IMPLEMENTING ENTERPRISE GOVERNANCE OF IT The Business Case The COBIT Implementation Guide Purpose COBIT Implementation Approach Phase 1 ? What are the Drivers Phase 2 ? Where are we Now Phase 3 ? Where do we Want to be Phase 4 ? What Needs to be Done Phase 5 ? How do we get There Phase 6 ? Did we get There Phase 7 How do we Weep the Momentum Going? EGIT Implementation Program Challenges

COBIT 2019 Foundation
Delivered OnlineFlexible Dates
£1,330

Legionella Responsible Person Course Online

By Airborne Environmental Consultants Ltd

Legionella Responsible Person Online is suitable for any persons wanting to gain an understanding of Legionella and how to prevent or control the risk of exposure to Legionella bacteria.

Legionella Responsible Person Course Online
Delivered in Manchester + 1 more or OnlineFlexible Dates
£150

Curating the Experience: Psychology of Art and Exhibitions

By AIR Courses, London

A course on Curating and the Psychology of Perception - which are very closely interlinked. Curating and the Psychology of Perception are very closely interlinked. Yet, psychologists and curators are rarely brought together to examine them together. This course has previously ran as part of the rich portfolio of (AIR interdisciplinary courses)[https://www.gold.ac.uk/short-courses/air]. It now runs as part AIR Courses at TechnoTruth. Taught by leading experts This course is taught by two leading experts. The course combines lectures on the history of the most important exhibitions of modern art with psychology of perception to address several important questions. Read more on the course page. Group bookings and Enquiries To book this course for a group, please email us at: info(@TechnoTruth.co.uk). Refunds: We will be happy to refund the fee, minus the Eventbrite fee, which is not refundable. For cancellations latter than 24 hours ahead of the start of the training, a proportion of the fee (£95) is non-refundable.

Curating the Experience: Psychology of Art and Exhibitions
Delivered OnlineFlexible Dates
£195

Scrum Master Exam Prep: Virtual In-House Training

By IIL Europe Ltd

Scrum Master Exam Prep: Virtual In-House Training This workshop prepares you for the Scrum.org Professional Scrum Master (PSM)™ I certification. A voucher for the exam and the access information you will need to take the exam will be provided to you via email after you have completed the course. NOTE: If you have participated in any of IIL's other Scrum workshops, you can bypass this program and focus on reading/studying the Scrum Guide and taking practice exams from Scrum.org. A Scrum Master helps project teams properly use the Scrum framework, increasing the likelihood of the project's overall success. Scrum Masters understand Scrum values, practices, and applications and provide a level of knowledge and expertise above and beyond that of typical project managers. Scrum Masters act as 'servant leaders', helping the rest of the Scrum Team work together and learn the Scrum framework. Scrum Masters also protect the team from both internal and external distractions. The Professional Scrum Master™ I (PSM I) certificate is a Scrum.org credential that enables successful candidates to demonstrate a fundamental level of Scrum mastery. PSM I credential holders will grasp Scrum as described in The Scrum Guide™1 and recognize how those concepts can be applied. They will also share a consistent terminology and approach to Scrum with other certified professionals. Scrum.org does not require that you take their own sponsored or any preparatory training. However, training can facilitate your preparation for this credential. And this course is based on IIL's Scrum Master Workshop, which is aligned with The Scrum Guide™ and was built based on PSM I credentialed expertise. It will provide you with the information you need to pass the exam and IIL will make the arrangements for your online exam. You will be provided with an exam code and instructions, so that you can take the exam at your convenience, any time you are ready after the course. Passwords have no expiration date, but they are valid for one attempt only. What you will Learn You'll learn how to: Successfully prepare for the Scrum.org PSM I exam Comprehend the Agile Manifesto and mindset Explain the fundamental principles of Scrum, including events, artifacts, and roles Guide the Scrum team in their responsibilities Define Ready and Done Write requirements in the form of user stories Estimate using planning poker and prioritize using MoSCoW Facilitate the team through the 5 Sprint events Fulfill the role of Scrum Master in a Scrum project Create Information Radiators to enable transparency Define the structure of the retrospective Getting Started Introductions Workshop orientation Exam prep preview Foundation Concepts Agile History, Values, and Mindset Introduction to Scrum Scrum events Scrum artifacts Scrum Roles and Responsibilities Product Owner responsibilities Scrum Master responsibilities The Team responsibilities Cross-functional teams Building effective teams The Product Backlog and User Stories The Product Backlog User Stories Definition of Done Backlog grooming Estimating User Stories Story points, planning poker Prioritizing User Stories The Sprint Team capacity and velocity The Sprint Planning Meeting The Sprint Backlog The Sprint Learning to self-manage, self-organize, self-improve Sprint Review and Retrospective Project Progress and Completion The Daily Scrum The Task Board and The Burndown Chart Information Radiators Closing a Scrum Project Summary and Next Steps Review of course goals, objectives, and content Exam prep next steps

Scrum Master Exam Prep: Virtual In-House Training
Delivered OnlineFlexible Dates
£850

A dynamic and interactive one-day or two-half-day live virtual workshop for women leaders in business, government and non-profit organizations.

Women in Management & Leadership
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£534

Sexual Health in Primary Care

By BBO Training

Course Description:This one-day course on Sexual Health in Primary Care is tailored for Nurses, Nurse Associates, Pharmacists, and Allied Health Professionals working within General Practice. The day is structured to bolster healthcare professionals' confidence in providing comprehensive sexual health advice, screening, and effective signposting.Learning Outcomes:Participants will:1. Recognize Common Sexually Transmitted Infections (STIs) in Primary Care: - Develop the ability to identify prevalent STIs based on symptoms and effective history-taking techniques in a Primary Care setting.2. Summarise Incubation, Testing, and Treatment for STIs: - Consolidate knowledge on incubation periods, testing methodologies, and treatment approaches for frequently encountered STIs, facilitating efficient patient management.3. Comprehend Preventive Strategies, Including Barriers and Vaccinations: - Grasp preventive measures encompassing the use of barrier methods and the significance of vaccinations, contributing to comprehensive sexual health counseling for patients.4. Gain Insight into Common Vaginal Infections in Primary Care: - Acquire an overview of frequently encountered vaginal infections in the Primary Care context, enhancing diagnostic skills and enabling appropriate intervention.5. Explore LGBTQ+ Considerations in Primary Care: - Examine issues pertinent to LGBTQ+ individuals in the Primary Care landscape, promoting a culturally sensitive and inclusive approach to sexual health care.6. Develop Confidence in Referral to CaSH Services: - Foster a sense of assurance in determining occasions when referral to specialized sexual health (CaSH) services is warranted, ensuring seamless patient access to specialised care when needed.

Sexual Health in Primary Care
Delivered OnlineFlexible Dates
£156

English Through School Subjects

By Scotland Study Centre (SSC)

This course uses a non-traditional approach that improves all 4 Language Skills using materials from the students' own school courses. The training also focuses on examination techniques.

English Through School Subjects
Delivered OnlineFlexible Dates
£180

Future Life Progression Practitioner Training

5.0(49)

By Radiant Angel Energy

Future Life Progression Practitioner Training equips you with the skills to effortlessly build rapport, guiding your clients on journeys of evolution, growth and fulfillment of their true potential.

Future Life Progression Practitioner Training
Delivered OnlineJoin Waitlist
£495

Our Two-day In-depth Sleep Workshop (6 months to 6 years)

By Millpond Childrens Sleep Clinic

This comprehensive two-day sleep workshop provides healthcare professionals with an understanding of a wide range of common childhood sleep difficulties and sleep disorders . We explore up-to-date evidence and science based strategies to enable participants to support families struggling with their with pre-school children and for children with SEND. Throughout the two days we use real-life case studies enabling delegates to assess and plan gentle and responsive interventions for a range of child sleep problems and sleep disorders. We have developed the workshop content and delivery to be highly engaging, interactive and relevant to all community staff working with families with young children experiencing sleep problems. Child focused and firmly grounded in research and evidence-based practice our training follows the Baby Friendly Initiative. This two-day workshop is accredited for 12 CPD Hours by The CPD Certification Service; “This is a good course delivering clear learning value. It has a well-written and engaging presentation and a variety of activities and tasks to aid interactivity and learner engagement.” Workshop Aims To provide community staff with up-to-date evidence based knowledge to develop their theoretical and practical understanding of sleep needs; sleep patterns; sleep cycles and common difficulties. To support community staff to enhance their confidence, skills and knowledge base in providing guidance to parents regarding sleep difficulties in infants and children. To provide an overview of evidence based interventions used to help behavioural sleep difficulties in infants and children. Learning Outcomes By the end of this two-day course participants will be able to: Understand the science of sleep, sleep hygiene and sleep needs Understand common sleep difficulties Gain an understanding of a range of common sleep interventions used to help behavioural sleep difficulties in children Understand how to undertake a sleep assessment, incorporating a sleep history and the use of a sleep diary Understand common paediatric disorders that may impact sleep Provide anticipatory sleep advice and interventions to parents Modify a sleep programme to suit an individual family’s needs and support the family’s capacity to change

Our Two-day In-depth Sleep Workshop (6 months to 6 years)
Delivered OnlineFlexible Dates
£385

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered OnlineFlexible Dates
£3,495