• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3 Courses in Belfast

NR Medical Training offers the Qualsafe First Response Emergency Care (FREC 3) Level 3 RQF, a nationally accredited qualification ideal for anyone aspiring to be a first responder. This course is tailored for a wide range of professionals, including police officers, firefighters, and event medical staff, as well as roles like Emergency/Community First Responders, Door Supervisors, and Security Guards.

FREC 3
Delivered In-Person in Bury St Edmunds + 1 more or UK WideFlexible Dates
Price on Enquiry

This comprehensive course, developed in line with the esteemed guidelines of the Resuscitation Council (UK), Skills for Health, and the Faculty of Pre-Hospital Care (RCS Ed), is designed to enhance your abilities in delivering superior emergency care across various settings.

FREC 4
Delivered In-Person in Bury St Edmunds + 1 more or UK WideFlexible Dates
Price on Enquiry

Level 4 Award in Immediate Life Support (ILS) Course

By NR Medical Training

The Level 4 Award in Immediate Life Support (RQF) is ideal for a wide range of healthcare professionals. This includes doctors, dental professionals, medical students, nurses, midwives, and physiotherapists who need an ILS qualification for their registration with regulatory bodies like the GMC, GDC, NMC, and HCPC. It's also perfect for those looking to advance in their careers or needing an ILS certification for new job opportunities.

Level 4 Award in Immediate Life Support (ILS) Course
Delivered In-Person in Bury St Edmunds + 1 more or UK WideFlexible Dates
Price on Enquiry

Online Options

Show all 7

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered Online
£3,495

Subject Access Requests - How to Manage Data Subject Rights

By Computer Law Training

How to handle Subject Access Requests and other Data Subject Rights.

Subject Access Requests - How to Manage Data Subject Rights
Delivered OnlineFlexible Dates
£200

Maritime Mental Health Awareness Training: Modules 1 & 2

4.2(46)

By International Seafarers' Welfare and Assistance Network

Improve your awareness of mental health and the challenges faced by seafarers, in ISWAN's Maritime Mental Health Awareness training.

Maritime Mental Health Awareness Training: Modules 1 & 2
Delivered OnlineFlexible Dates
£200

Fire Scene Investigation Course

3.5(2)

By Elearncollege

Description Fire Scene Investigation Diploma Introducing the Fire Scene Investigation Diploma: an online course tailored for those passionate about understanding the intricate details and science behind fire scene investigations. This diploma aims to provide learners with comprehensive knowledge about the various facets of fire scene investigations, ensuring they are equipped with the skills and expertise needed in this specialised field. The course commences with 'Setting the Scene: An Introduction to Fire Investigation.' This module lays the foundation, ensuring that students grasp the basics and are prepared for the advanced topics that follow. Students will learn the importance of initial observations and first response actions at a fire scene. The journey then leads to 'Understanding Fire Dynamics', shedding light on the complex nature of fires and how they develop and spread. This is pivotal for any investigator, as knowing the behaviour of fire can offer clues about its origin and cause. Subsequently, 'The Fire Scene: Evidence and Clues' module assists learners in identifying and analysing evidence from a fire scene. Every charred remnant or burn pattern can tell a story, and it's crucial to interpret these signs accurately. 'Investigative Methodologies' takes students through systematic processes that professionals use to investigate fires. This methodology ensures all aspects are covered, and no evidence goes unnoticed. As one proceeds, 'The Chemistry of Fire' explains the underlying science. By understanding how different materials react to fire, investigators can better deduce how, why, and where a fire started. Then, the course covers 'Electrical Fires and Their Tell-Tale Signs.' Electrical fires have unique characteristics that set them apart from other fires. Being able to identify these signs can sometimes make or break a case. 'Interdisciplinary Collaboration in Fire Investigation' emphasises the importance of working with professionals from other fields. Fire investigation isn't a solo task. Collaboration often reveals insights that might otherwise remain hidden. Legal ramifications are crucial in any investigation. 'Legal Aspects of Fire Investigation' will familiarise learners with the legalities surrounding fires, ensuring that all investigations are conducted ethically and lawfully. Advancements in technology have immensely benefited the field of fire scene investigation. 'Advanced Techniques and Technologies in Fire Investigation' introduces students to state-of-the-art tools and methods, further enhancing their investigative skills. Finally, 'Case Studies and Lessons Learned' will provide learners with real-world scenarios. By analysing previous cases, students can gain insights, learn from mistakes, and apply best practices in their future investigations. In conclusion, the Fire Scene Investigation Diploma offers a meticulously crafted curriculum, ensuring that every student emerges with a robust understanding of fire scene investigations. This online course is ideal for both novices wanting to enter the field and professionals looking to enhance their skills. Equip yourself with the knowledge and expertise you need and embark on a rewarding journey into the world of fire scene investigations. What you will learn 1:Setting the Scene: An Introduction to Fire Investigation 2:Understanding Fire Dynamics 3:The Fire Scene: Evidence and Clues 4:Investigative Methodologies 5:The Chemistry of Fire 6:Electrical Fires and Their Tell-Tale Signs 7:Interdisciplinary Collaboration in Fire Investigation 8:Legal Aspects of Fire Investigation 9:Advanced Techniques and Technologies in Fire Investigation 10:Case Studies and Lessons Learned Course Outcomes After completing the course, you will receive a diploma certificate and an academic transcript from Elearn college. Assessment Each unit concludes with a multiple-choice examination. This exercise will help you recall the major aspects covered in the unit and help you ensure that you have not missed anything important in the unit. The results are readily available, which will help you see your mistakes and look at the topic once again. If the result is satisfactory, it is a green light for you to proceed to the next chapter. Accreditation Elearn College is a registered Ed-tech company under the UK Register of Learning( Ref No:10062668). After completing a course, you will be able to download the certificate and the transcript of the course from the website. For the learners who require a hard copy of the certificate and transcript, we will post it for them for an additional charge.

Fire Scene Investigation Course
Delivered Online On Demand9 days
£99

Domestic Abuse Training - Coercive Control

5.0(40)

By Certain Curtain Theatre Company

A unique CPD accredited course delivered online - exploring domestic violence and abuse and coercive control - utilising lived experience and dynamic original theatre to help you make sure your first response is the right response

Domestic Abuse Training - Coercive Control
Delivered OnlineFlexible Dates
£40

How to become a First Aid at Work Instructor

5.0(11)

By Trainmetodo

FAW, EFR, First Aid, CPR, HSE First Aid At Work

How to become a First Aid at Work Instructor
Delivered Online On Demand
FREE

Introduction to CPR and Life Saving Skills Including CPR

5.0(11)

By Trainmetodo

FAW, EFR, First Aid, CPR, HSE First Aid At Work

Introduction to CPR and Life Saving Skills Including CPR
Delivered Online On Demand
FREE