• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

713 Courses in Liverpool

Introduction to Forensic Science

4.6(39)

By Geopace Training

NATIONALLY RECOGNISED AND ACCREDITED FORENSIC SCIENCE COURSE Level Three (advanced), awarding 3 credits.   DUAL ACCREDITATION: Awarding Body: Open College Network (OCN Credit4Learning) Awarding Body: CPD (21 CPD Points)   A modular "hybrid" forensic science course - eLearning (online) theory and one full day classroom based practical training (Crime Scene Investigations). The practical day covers a wide range of CSI techniques with "hands-on" practical training. On completion awards an OCN Nationally Recognised and Accredited Certificate in Forensic Science. This course is additionally CPD Accredited and also awards 21 CPD points on completion.   PART 1 - THEORY Complete this part of your course online (eLearning Course) in the comfort of your own home or workplace. Please allow approx. 6-8 hours to complete the elearning modules. You do not need to complete Part 1 in one single "sitting” and can log on/off as many times as you wish and when convenient to you. You must complete both parts 1 and 2 to successfully pass this course.   PART 2 - CLASSROOM Attend your forensic science practical day in the classroom, covering a number of key CSI investigative processes and procedures. You will develop your crime scene investigator skills with "hands-on" training in a classroom environment at the training location you have selected. Please note that we will provide protective clothing (disposable aprons), goggles and gloves. As you will be participating in a range of forensic activities we would suggest you wear easy clothing, short-sleeved top and closed-toe shoes.   You can complete Part 1 before or after comleting Part 2.   DOWNLOAD A COURSE ITINERARY HERE Course Itinerary M01 - Overview and Historical Background: A look at definitions, historical perspective highlighting major forensic advancements covering since early times, the beginning of modern forensics including the advent of fingerprinting, toxicology and DNA, and how DNA solved the first case (a double murder). Understanding the services of Forensic Labs and the major disciplines.   M02 - Observational Skills Crime Scene Investigation & Recording Examination of the crime scene, photography, videography, sketch recording principles, using a CAD package.   M03 - Forensic Pathology Understanding the job role, working within hospitals, mortuaries, the pathological processes and manner of death.   M04 - Forensic Anthropology How does forensic anthropology help forensic scientists? Using physical markers present on a skeleton to determine age, sex, stature, and race. Bone anatomy and stages of development from foetal to elderly individual. Differentiating male and female: skull, pelvis, femur and humerus.   M05 - Forensic Entomology How entomologists determine time of death as well as advanced investigations involving abuse and neglect. The life cycle of the blowfly and environmental influences. Using insect gut DNA to help solve crimes.   CS01 - Case Study - Forensic Entomology - The Jigsaw Murders   M06 - Forensic Serology Understanding presumptive tests and confirmatory tests. Tests in detail - processes and methods with options for: Blood, Saliva, Semen, Urine.   M07 - Using the Microscope Correct procedures for using the light microscope. A look at the electron microscope and scanning probe microscope and their applications in forensic science. Detailed process guide including mounting slides.

Introduction to Forensic Science
Delivered In-Person in Manchester + 6 more + more
£195

Organisation Programme - Bribery and corruption risk assessment

By Global Risk Alliance Ltd

Our training programme will provide those involved at any stage of the process for procuring goods and/or services within their organisations with the knowledge and skillset to identify and mitigate the threat posed by the breadth and multi-layered complexity of procurement fraud, corruption and associated financial crime and money laundering.

Organisation Programme - Bribery and corruption risk assessment
Delivered In-Person in InternationallyFlexible Dates
£7,000 to £9,000

Organisation Programme - How to identify and mitigate procurement fraud and corruption

By Global Risk Alliance Ltd

Our training programme will provide those involved at any stage of the process for procuring goods and/or services within their organisations with the knowledge and skillset to identify and mitigate the threat posed by the breadth and multi-layered complexity of procurement fraud and corruption.

Organisation Programme - How to identify and mitigate procurement fraud and corruption
Delivered In-Person in InternationallyFlexible Dates
£7,000 to £9,000

Securing UNIX systems

5.0(3)

By Systems & Network Training

Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in Internationally or OnlineFlexible Dates
£4,997

Mastering Feedback, Enhancing Growth and Dialogue

5.0(5)

By Puritas

Mastering effective feedback is crucial for empowering others but can be damaging if not delivered thoughtfully. This course equips mangers and leaders with tools to deliver sensitive, factual, and specific feedback for positive outcomes. It also guides them in soliciting feedback, processing it constructively, and fostering a growth mindset for continuous improvement. This course is available to book for delivery in-house for your organisation and people exclusively, for either a half or full days training workshop. Prices are dependent on size of group ranging from a minimum of 4 to a maximum of 12 delegates. If you have a smaller number of delegates the Puritas 1:1 Leadership Coaching Programme is recommended.

Mastering Feedback, Enhancing Growth and Dialogue
Delivered In-Person in Bishop Stortford + 9 more or UK WideFlexible Dates
£1,500 to £2,500

Lean Six Sigma Black Belt Certification Program: In-House Training

By IIL Europe Ltd

Lean Six Sigma Black Belt Certification Program: In-House Training This course is specifically for people wanting to become Lean Six Sigma Black Belts, who are already Lean Six Sigma practitioners. If advanced statistical analysis is needed to identify root causes and optimal process improvements, (Lean) Six Sigma Green Belts typically ask Black Belts or Master Black Belts to conduct these analyses. This course will change that. Green Belts wanting to advance their statistical abilities will have a considerable amount of hands-on practice in techniques such as Statistical Process Control, MSA, Hypothesis Testing, Correlation and Regression, Design of Experiments, and many others. Participants will also work throughout the course on a real-world improvement project from their own business environment. This provides participants with hands-on learning and provides the organization with an immediate ROI once the project is completed. IIL instructors will provide free project coaching throughout the course. What you Will Learn At the end of this program, you will be able to: Use Minitab for advanced data analysis Develop appropriate sampling strategies Analyze differences between samples using Hypothesis Tests Apply Statistical Process Control to differentiate common cause and special cause variation Explain and apply various process capability metrics Conduct Measurement System Analysis and Gage R&R studies for both discrete and continuous data Conduct and analyze simple and multiple regression analysis Plan, execute, and analyze designed experiments Drive sustainable change efforts through leadership, change management, and stakeholder management Successfully incorporate advanced analysis techniques while moving projects through the DMAIC steps Explain the main concepts of Design for Six Sigma including QFD Introduction: DMAIC Review IIL Black Belt Certification Requirements Review Project Selection Review Define Review Measure Review Analyze Review Improve Review Control Introduction: Minitab Tool Introduction to Minitab Minitab basic statistics and graphs Special features Overview of Minitab menus Introduction: Sampling The Central Limit Theorem Confidence Interval of the mean Sample size for continuous data (mean) Confidence Interval for proportions Sample size for discrete data (proportions) Sampling strategies (review) Appendix: CI and sample size for confidence levels other than 95% Hypothesis Testing: Introduction Why use advanced stat tools? What are hypothesis tests? The seven steps of hypothesis tests P value errors and hypothesis tests Hypothesis Testing: Tests for Averages 1 factor ANOVA and ANOM Main Effect Plots, Interaction Plots, and Multi-Vari Charts 2 factor ANOVA and ANOM Hypothesis Testing: Tests for Standard Deviations Testing for equal variance Testing for normality Choosing the right hypothesis test Hypothesis Testing: Chi Square and Other Hypothesis Test Chi-square test for 1 factor ANOM test for 1 factor Chi-square test for 2 factors Exercise hypothesis tests - shipping Non-parametric tests Analysis: Advanced Control Charts Review of Common Cause and Special Cause Variation Review of the Individuals Control Charts How to calculate Control Limits Four additional tests for Special Causes Control Limits after Process Change Discrete Data Control Charts Control Charts for Discrete Proportion Data Control Charts for Discrete Count Data Control Charts for High Volume Processes with Continuous Data Analysis: Non-Normal Data Test for normal distribution Box-Cox Transformation Box-Cox Transformation for Individuals Control Charts Analysis: Time Series Analysis Introduction to Time Series Analysis Decomposition Smoothing: Moving Average Smoothing: EWMA Analysis: Process Capability Process capability Discrete Data: Defect metrics Discrete Data: Yield metrics Process Capability for Continuous Data: Sigma Value Short- and long-term capabilities Cp, Cpk, Pp, Ppk capability indices Analysis: Measurement System Analysis What is Measurement System Analysis? What defines a good measurement system? Gage R&R Studies Attribute / Discrete Gage R&R Continuous Gage R&R Regression Analysis: Simple Correlation Correlation Coefficient Simple linear regression Checking the fit of the Regression Model Leverage and influence analysis Correlation and regression pitfalls Regression Analysis: Multiple Regression Analysis Introduction to Multiple Regression Multicollinearity Multiple Regression vs. Simple Linear Regression Regression Analysis: Multiple Regression Analysis with Discrete Xs Introduction Creating indicator variables Method 1: Going straight to the intercepts Method 2: Testing for differences in intercepts Logistic Regression: Logistic Regression Introduction to Logistic Regression Logistic Regression - Adding a Discrete X Design of Experiments: Introduction Design of Experiment OFAT experimentation Full factorial design Fractional factorial design DOE road map, hints, and suggestions Design of Experiments: Full Factorial Designs Creating 2k Full Factorial designs in Minitab Randomization Replicates and repetitions Analysis of results: Factorial plots Analysis of results: Factorial design Analysis of results: Fits and Residuals Analysis of results: Response Optimizer Analysis of results: Review Design of Experiments: Pragmatic Approaches Designs with no replication Fractional factorial designs Screening Design of Experiment Case Study Repair Time Blocking Closing: Organizational Change Management Organizational change management Assuring project sponsorship Emphasizing shared need for change Mobilizing stakeholder commitment Closing: Project Management for Lean Six Sigma Introduction to project management Project management for Lean Six Sigma The project baseline plan Work Breakdown Structure (WBS) Resource planning Project budget Project risk Project schedule Project executing Project monitoring and controlling and Closing Closing: Design for Lean Six Sigma Introduction to Design for Lean Six Sigma (DMADV) Introduction to Quality Function Deployment (QFD) Summary and Next Steps IIL's Lean Six Sigma Black Belt Certification Program also prepares you to pass the IASSC Certified Black Belt Exam (optional)

Lean Six Sigma Black Belt Certification Program: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£6,295

Trauma Risk Managment - TRiM Practitioner

5.0(1)

By Strongmind Resiliency Training Ltd

Trauma Risk Management is an evidence based, peer delivered risk assessment and ongoing support system, designed specifically to help in the management of traumatic events.

Trauma Risk Managment - TRiM Practitioner
Delivered In-Person in InternationallyFlexible Dates
£4,800

FORENSIC ACCOUNTING AND AUDITING

5.0(10)

By GBA Corporate

Overview This training course will empower you to recognize the root causes of fraud and white-collar crime in the current economy, understand the categories of fraud, equip you with methodologies of fraud detection and prevention, and heighten your ability to detect potential fraudulent situations. In addition to the fundamentals of fraud investigation and detection in a digital environment; profit-loss evaluation, analysis of accounting books, legal concepts, and quantification of financial damages are also examined in this course

FORENSIC ACCOUNTING AND AUDITING
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,779

Financial Modelling and Analysis in Project Financing

5.0(10)

By GBA Corporate

Overview Business modelling requires analysts to produce the quantitative models that top management uses to support their decision-making, but top management must also understand the strengths and weaknesses of the models if they are to use them effectively to support their decisions and robustly navigate the strategic negotiation landscape. This is particularly important for PPP projects where long-term commitments are made now based on bankability, value for money and risk allocation. During the course, participants will gain knowledge and skills on the frameworks, tools, and methodologies necessary to build quantitative models for financial decision-making in order to improve the financial viability and bankability of PPP projects. Participants will master modelling frameworks on capital budgeting, risk measurement, regression analysis and Monte Carlo Simulation among others.

Financial Modelling and Analysis in Project Financing
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,779

Advance Strategic Procurement Management

5.0(10)

By GBA Corporate

Overview Advance Strategic Procurement is designed to understand the process that continuously enhances and evaluates purchasing activities of an organisation. The participant will have in-depth knowledge of procurement functions within the organisation and will also gain a deeper knowledge of advanced supply chain concepts.  Through this course, you will attain the knowledge of how to increase strategic roles and new methods and techniques of procurement performance measurements. It will also highlight the government's role and its importance in procurement in order to develop sustainable procurement. 

Advance Strategic Procurement Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626