• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

124 Injection courses delivered On Demand

Pet Business Certificate

4.3(43)

By John Academy

Description Learn how to train animals, walk them safely, look after them and start your own pet business! This Pet Business Certificate starts with the basics of first aid and find out how to administer pills, liquid medications, and injections to an uncooperative cat or dog. You will explore pet care, including nutrition, exercise, first aid, and identification of common diseases. You'll also explore sticky situations that can arise, such as lost pets, pets that die unexpectedly, and pets that need immediate veterinary care. You will learn about finances and explore start-up costs, accounting, fee-setting, business plans, and low-cost marketing. You'll learn how to obtain required insurance, hire employees as your business expands, and entice financial institutions to loan you money.  By the end of this course, you'll have all the knowledge you need to become a professional pet sitter. In addition, you'll see how your pet sitting business can grow to continually challenge and satisfy you. Assessment: This course does not involve any MCQ test. Students need to answer assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Once the answers are submitted, the instructor will check and assess the work. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is This Pet Business Certificate Course for? Pet Business Certificate is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Pet Business Certificate is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Introduction Introduction 00:06:00 Legal Requirements Legal Requirements 00:37:00 Running Your Own Business Running Your Own Business 00:16:00 Marketing Marketing 00:16:00 Setting Your Prices Setting Your Prices 00:11:00 Business Costs Business Costs 00:08:00 Forms & Record Keeping Forms & Record Keeping 00:15:00 Pre-Service Visit Pre-Service Visit 00:07:00 Difficulties & Challenges Difficulties & Challenges 00:17:00 Assessment Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Pet Business Certificate
Delivered Online On Demand2 hours 13 minutes
£21

BlackArch Linux Course

4.5(3)

By Studyhub UK

  Cybersecurity is like being a digital guardian, and the BlackArch Linux Course is all about it. In today's connected world, it's super important to understand and be good at keeping digital stuff safe. This course helps you do just that by diving into ethical hacking and how to defend computer networks. You get hands-on experience with Kali and BlackArch Linux, learning about virtualization, gathering information, and doing advanced hacking tricks.   Taking this course has some cool benefits. You'll become a pro at ethical hacking, mastering skills to hack into Android and Windows 7 systems, secure websites, and do advanced computer network tricks. It's not just theory; you get real tools to make digital spaces safer. Whether you dream of being a cybersecurity pro, love IT, or work with networks, this course gives you a leg up, helping you reach your goals in the ever-changing world of cybersecurity. It's not just a class; it's a practical step towards success in the exciting field of digital security.   Learning Outcomes of BlackArch Linux Understand the installation and configuration of both Kali and BlackArch Linux. Develop proficiency in virtualization basics for practical cybersecurity applications. Acquire skills in information gathering, validation, and storage using various tools. Master NMAP techniques and Dracnmap scripts for efficient information gathering. Gain expertise in ethical hacking on Android and Windows 7 using BlackArch tools. Learn web application and website hacking, including browser injections and attacks. Explore advanced techniques such as Man-in-the-Middle attacks on wireless networks. Develop competence in using BEEF for browser attacks and hacking Facebook.   Who Is This BlackArch Linux Course For Aspiring Ethical Hackers IT Professionals Seeking Cybersecurity Skills Students Pursuing Careers in Information Security Network Administrators Enhancing Security Knowledge Individuals Interested in Advanced Linux Distributions   Why Choose This BlackArch Linux Course Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success.   Career Path Ethical Hacker - Salary Range: £40,000 - £70,000 Information Security Analyst - Salary Range: £45,000 - £75,000 Cybersecurity Consultant - Salary Range: £50,000 - £80,000 Network Security Engineer - Salary Range: £45,000 - £75,000 Penetration Tester - Salary Range: £45,000 - £80,000   Certification Upon successful completion of the BlackArch Linux Course, a written assignment test is administered. After passing the test, students can obtain a PDF certificate for a fee of £4.99. For those desiring an original hard copy certificate, it can be ordered at an additional cost of £8.   Prerequisites No prior qualifications or experience are necessary for enrolling in the BlackArch Linux Course. This course, crafted by seasoned professionals, is compatible with PCs, Macs, tablets, and smartphones. Accessibility is seamless, allowing learning from any location with a reliable internet connection. Course Curriculum BlackArch Linux Masterclass Module 01: Kali Linux Installation and Updates 00:31:00 Module 02: Kali Linux Operating System Configuration 00:32:00 Module 03: Virtualization Basics 00:18:00 Module 04: BlackArch Linux Introduction and Installation 00:43:00 Module 05: BlackArch Configuration 00:33:00 Module 06: Information Gathering and Validation 00:33:00 Module 07: Gathering Information with Maltego 00:15:00 Module 08: Cherrytree for Information Database Storage 00:08:00 Module 09: NMAP Techniques for Information Gathering 00:24:00 Module 10: Dracnmap Scripts for BlackArch 00:09:00 Module 11: Android Hacking with BlackArch 00:24:00 Module 12: Windows 7 Hacking with BlackArch 00:21:00 Module 13: Netcat NC Network Hacking with BlackArch 00:14:00 Module 14: Web Application and Website Hacking with BlackArch 00:26:00 Module 15: BEEF, Browser Injections, and Other Browser Attacks 00:25:00 Module 16: Hacking Facebook with BlackArch 00:12:00 Module 17: Hacking Wireless Networks with BlackArch Tools 00:29:00 Module 18: Man in the Middle Attacks with BlackArch 00:20:00 Assignment Assignment - BlackArch Linux Course 00:00:00

BlackArch Linux Course
Delivered Online On Demand6 hours 57 minutes
£10.99

Weight Loss Coach Certification (Accredited): All Levels

4.5(3)

By Studyhub UK

Embarking on a journey towards a healthier self is an adventure many dreams of, yet only some understand how to navigate effectively. The 'Weight Loss Coach Certification (Accredited): All Levels' course is a beacon of hope, guiding you through the maze of weight loss injections, ozempic weight loss, and the myriad of weight loss pills with precision. It's not just about shedding pounds; it's a transformative experience that incorporates the science of weight loss calculators and the inspiring stories of individuals like Peter Kay, Letitia Dean, Mark Labbett, Alison Hammond, and Nikocado Avocado. This course is meticulously designed to equip you with the knowledge and tools to make meaningful changes in your life and the lives of others. Learning Outcomes of Weight Loss Coach Certification: Understand the foundational principles of weight loss nutrition and the effectiveness of various diets. Master the coaching process tailored for weight management and how to personalise plans for diverse needs. Gain insights into solving common weight related challenges using scientific and motivational strategies. Learn to build and promote a personal brand in the fitness coaching industry. Acquire the skills to motivate clients and monitor their progress through practical and theoretical approaches. Why buy this Weight Loss Coach Certification? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Certification After studying the course materials of the Weight Loss Coach Certification (Accredited): All Levels there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this Weight Loss Coach Certification for? Individuals passionate about health, wellness, and nutrition seeking to guide others in their weight-loss journeys. Fitness professionals aiming to broaden their expertise in weight management coaching. Anyone interested in understanding the science behind losing weight and how to apply it effectively. Career changers looking for a rewarding profession in the health and wellness industry. Health bloggers or influencers wanting to enhance their knowledge and credibility in losing weight. Prerequisites This Weight Loss Coach Certification (Accredited): All Levels does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Weight Loss Coach Certification (Accredited): All Levels was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Weight Loss Coach: £25,000 - £35,000 per annum Nutritionist: £20,000 - £40,000 per annum Personal Trainer: £18,000 - £50,000 per annum Health and Wellness Blogger/Influencer: Variable depending on reach and engagement Corporate Wellness Consultant: £30,000 - £45,000 per annum Health Club Manager: £24,000 - £40,000 per annum Course Curriculum Introduction Introduction 00:03:00 The Roles & Responsibilities Of A Weight Loss Coach 00:02:00 5 Reasons For Becoming A Weight Loss Coach 00:04:00 The Skills Your Need As A Weight Loss Coach 00:03:00 How Much Does A Weight Loss Coach Earn 00:03:00 Coaching Process The Different Coaching Business Models 00:04:00 Client Assesment Introduction 00:01:00 Getting To Know Your Client 00:04:00 Understanding Your Client's Painpoints 00:03:00 How To Set SMART Goals 00:06:00 Body Mass Index Explained 00:03:00 How To Keep Clients Motivated During The Coaching Process 00:04:00 Weight Loss Nutrition Theory Common Weight Loss Myths Debunked 00:09:00 The Weight Loss Nutrition Pyramid 00:05:00 The Science Of Successful Weight Loss 00:05:00 Weight Loss vs Fat Loss 00:03:00 What About Fat Loss Foods? 00:06:00 Determining calorie need (TDEE) 00:03:00 Adjusting A Diet For Weight Loss 00:03:00 How Much Protein For Weight Loss 00:02:00 How Much Fat For Weight Loss 00:01:00 How Many Carbs For Weight Loss 00:01:00 Combining Macronutrients 00:02:00 Ideal Meal Timing & Meal Frequency 00:04:00 How to create a diet plan for a client 00:09:00 The Best Fat Loss Supplements 00:04:00 Common Diets Explained Gluten Free Diet 00:03:00 Paleo Diet 00:04:00 Low Carb Diet 00:03:00 Intermittent Fasting 00:03:00 Vegan Diet 00:05:00 Ketogenic Diet 00:06:00 Weight Loss Training Theory Common Weight Loss Exercising Myths Debunked 00:08:00 The Perfect Weight Loss Workout 00:07:00 HIIT Explained 00:07:00 How To Progress With HIIT Workouts 00:02:00 Can You Build Muscle & Lose Fat At The Same Time? 00:08:00 Strength Training & Weight Loss 00:01:00 Why You Shouldn't Do More Reps When Trying To Lose Weight 00:03:00 Should You Train Fasted? 00:06:00 How To Solve Common Weight Loss Problems The Right Cheat Meals 00:05:00 How To Correctly Take Diet Breaks 00:05:00 How To Break Through A Fat Loss Plateau 00:04:00 How To Explain Sudden Weight Changes 00:03:00 Is Starvation Mode Real? 00:03:00 Weight Loss Motivation Weight Loss Motivation Overview 00:01:00 How To Track Progress 00:04:00 What's The Ideal Rate Of Fat Loss? 00:02:00 How To Stop Relying On Willpower 00:02:00 How To Avoid The 'What The Hell Effect' 00:01:00 Building Your Brand Marketing & Selling Introduction 00:02:00 Your Marketing Game Plan 00:02:00 Your Sales Approach 00:05:00 Content Marketing For Coaches 00:06:00 How To Define Your Mission Statement 00:03:00 Your Coaching Outline 00:02:00

Weight Loss Coach Certification (Accredited): All Levels
Delivered Online On Demand3 hours 33 minutes
£10.99

Effective Physiotherapy Protocols for Diagnosing & Managing Anterior Hip Pain - Case Study

By Physiotherapy Online

This anterior hip pain live webinar provides the detail information about anterior hip pain, giving a complete picture of differential diagnoses both orthopedic & systematic aspects .This online case study webinar will explore different causes, pathophysiology of anterior hip pain. By end of this online webinar, participants will have a good understanding about the hip joint anatomy, biomechanics which contribute to anterior hip pain. Participants will understand different special testing which are required during the assessment of anterior hip pain. This webinar will also include the discussion of physiotherapy management of anterior hip pain using knowledge of best practice exercises, manual therapy, modalities , with complete comprehensive and practical demonstrations. What you'll learn 1. Understanding Anterior Hip Pain Objectives: Gain foundational knowledge of the anatomy and biomechanics of the hip joint. Understand the different types of hip pain and their locations, with a focus on anterior hip pain. Topics Covered: Anatomy of the hip joint: bones, muscles, tendons, and ligaments. Key biomechanics involved in hip function. Overview of anterior hip pain: characteristics and patient presentation. 2. Common Causes of Anterior Hip Pain Identify and differentiate between the common causes of anterior hip pain. Explore the risk factors associated with specific pathologies. Topics Covered: Labral tears and hip impingement (FAI). Hip flexor strains and tendinitis. Osteoarthritis and its early manifestations. Less common causes: hernias, referred pain from lumbar spine. 3. Anterior Hip Pain - Case Study Apply diagnostic principles through a real-life patient case. Develop clinical reasoning for selecting appropriate interventions. Topics Covered: Detailed case history and clinical presentation. Differential diagnosis approach. Evaluation of imaging and test results. Discussion of treatment planning and decision-making.Physical therapy protocols: stretching, strengthening, and neuromuscular re-education. Pharmacological options and when they are indicated. Interventional procedures (e.g., injections) and surgical options. Patient education and self-management strategies. 4. Management Strategies for Anterior Hip Pain Objectives: Learn evidence-based management approaches for anterior hip pain. Explore both conservative and interventional strategies. Topics Covered: Physical therapy protocols: stretching, strengthening, and neuromuscular re-education. Pharmacological options and when they are indicated. Interventional procedures (e.g., injections) and surgical options. Patient education and self-management strategies. Who Should Enroll Physiotherapist Sport & Exercise Physiologist Occupational Therapist MSK therapist CPD Credit Hours 1.5 hour Resources 60 days Access to Learning Resources Downloadable Course Material CPD Certificate Disclaimer: Our online physiotherapy courses meet the criteria and guidelines for CPD (Continuing Professional Development). The CPD hours indicated on the certificate contribute towards fulfilling professional standards and requirements necessary for CPD audits conducted by the HCPC and AHPRA. These CPD hours are important for maintaining physiotherapy registration and ensuring compliance with CPD audit and Physiotherapy registration renewal processes. Our courses are recognized as valuable continuing education resources across the UK, Australia, New Zealand, and throughout Asia and the Middle East.

Effective Physiotherapy Protocols for Diagnosing & Managing Anterior Hip Pain - Case Study
Delivered Online On Demand5 hours
£20

Online Options

Show all 174

Vaccination / Injection Course (GPT601)

4.6(39)

By Geopace Training

Learn how to administer vaccines or injections ... Nationally Recognised Qualification Includes IM, ID and Sub-Cut Injection methods OCN Accredited - Level 4 (Foundation Degree - FDSc) Covers all steps to safely perform a vaccination Use same techniques and skills for aesthetic therapies Includes B12, Vitamin C and other treatments Essential qualification for all injections Basic understanding of English language required OPEN TO ALL APPLICANTS

Vaccination / Injection Course (GPT601)
Delivered in Milton Keynes + 6 more or Online + more
£195

Vaccination / Injection Course (GPT601) - Refresher

4.6(39)

By Geopace Training

Update your vaccination / injection certificate online ... Update and renew your Nationally Recognised Qualification - dual accreditation Awards a new current certificate and updates your registration OCN Accredited - Level 4 (foundation degree - FDSc) CPD Accredited Add a further 3 FDSc level credits to your C.V. Includes IM, ID and Sub-Cut Injection methods Complete Part 1 (theory) only to renew your registration Add an optional training kit and full video instructions Include practical training at home with the purchase of our comprehensive Practise@Home Training kit with instructional video tutorial for only £39.95. ​ Add this option at time of booking. ONLY OPEN TO APPLICANTS WHO HAVE PREVIOUSLY COMPLETED GEOPACE VACCINATION COURSE

Vaccination / Injection Course (GPT601) - Refresher
Delivered OnlineFlexible Dates
£79.95

Botox Essential Settings & Injection Techniques

By Medical Aesthetics Academy

Botox Essential Settings & Injection Techniques - CPD Accredited Course Everything you need to know on consumables, reconstitution, marking and injection techniques fo the upper face What will you learn Learn the essential clinical settings for the practice of Botox (Botulinum Toxin) aesthetic treatments Become familiar with treatment room requirements, products, medications and consumables needed for the safe administration of the treatment Guidance on Botox reconstitution Guidance on syringe and needle selection and handling Learn the marking techniques for upper face treatment (glabella, forehead and peri-orbital) Learn the injection techniques for upper face treatment (glabella, forehead and peri-orbital) Course RequirementsHealth professionals (doctors, dentists, nurses, etc.) that are legally entitled to offer aesthetic injectable treatments in their country/stateNo experience in aesthetic medicine needed Description The most popular aesthetic treatment, with increasing demand. Its popularity is not surprising, considering how effective and safe it is. Today’s patients are actively looking out for well-trained medical professionals to carry out their treatments on a regular basis. This CPD accredited course covers the essential clinical settings for the practice of Botox (Botulinum Toxin) aesthetic treatments . You will become familiar with the treatment room requirements, products, medications and consumables needed for the safe administration of the treatment. Guidance on Botox reconstitution, syringe and needle selection and handling is included, to help inexperienced practitioners choose the safest and most cost-effective products and techniques. Also, you will learn marking and injection techniques for most popular areas of treatment: glabella, forehead and peri-orbital.  This course is a perfect introduction to the use of botulinum toxin in medical aesthetics. It is ideal for beginners, but it is also useful for professionals who have attended courses elsewhere and wish to re-establish a solid knowledge foundation. Great emphasis is placed on the safest and more effective techniques, which are used as a point of reference internationally. Our specialised training is aimed at doctors, dentists and other health professionals interested in starting their career in aesthetic medicine, improve their existing skills with the most established techniques, or simply expand their knowledge. We have used our experience of more than 20 years in the non-surgical aesthetic medicine industry as a base to develop specific training courses. 

Botox Essential Settings & Injection Techniques
Delivered Online On Demand
£79.99

Hyaluronic Acid Essential Settings & Injection Techniques

By Medical Aesthetics Academy

Hyaluronic Acid Essential Settings & Injection Techniques - CPD Accredited Course Everything you need to know on consumables, products and injection techniques for peri-oral, naso-labial and glabellaWhat will you learn Learn the essential clinical settings for the practice of Hyaluronic Acid (HA) fillers in aesthetic medicine treatments Become familiar with treatment room requirements, products, medications and consumables needed for the safe administration of the treatment Guidance on local anaesthesia options HA syringe and needle assembly and handling Differences between the use of needles and cannulas Learn injection techniques for glabella, peri-oral and naso-labial areas RequirementsYou must be health professional (doctor, dentist, nurse, etc.) that is legally entitled to offer aesthetic injectable treatments in your country/state No experience in aesthetic medicine needed Course Description This CPD accredited course covers the essential clinical settings for the practice of Hyaluronic Acid (HA) dermal filler aesthetic treatments, together with treatment demonstrations for the most popular areas, peri-oral, naso-labials and glabella . You will become familiar with the treatment room requirements, products, medications and consumables needed for the safe administration of the treatment. Guidance on local anaesthesia options, differences between the use of needles and cannulas, HA syringe and needle assembly and handling is included, to help inexperienced practitioners choose the safest and most cost-effective products and techniques. This course is a perfect introduction to the use of Hyaluronic Acid (HA) in medical aesthetics. It is ideal for beginners, but it is also useful for professionals who have attended courses elsewhere and wish to re-establish a solid knowledge foundation. Great emphasis is placed on the safest and more effective techniques, which are used as a point of reference internationally. Our specialised training is aimed at doctors, dentists and other health professionals interested in starting their career in aesthetic medicine, improve their existing skills with the most established techniques, or simply expand their knowledge. We have used our experience of more than 20 years in the non-surgical aesthetic medicine industry as a base to develop specific training courses. 

Hyaluronic Acid Essential Settings & Injection Techniques
Delivered Online On Demand
£79.99

Aesthetic Therapy Training - Beginner to Advanced PACKAGE

4.6(39)

By Geopace Training

THIS COURSE PACKAGE INCLUDES: 1: PERIPHERAL I.V. CANNULATION - IV THERAPIES COURSE (GPT008) 2: VACCINATION / INJECTION COURSE (GPT601) Learn how to administer injectables and intravenous therapies ... FAST-TRACK YOUR AESTHETICS TRAINING WITH OUR COMPLETE TRAINING PACKAGE 20% Multi-Course Discount Cover all stages from Level 1 through to Level 4 (FDSc) Cover your theory training online Complete your advanced practical training in 1 day Practical training in Classroom or Virtual Classroom Comprehensive Practise@Home training kits for VC Awards 2 accredited qualifications Dual Accreditations for all courses Covers all steps required to safely perform injectables Covers all steps required to safely perform IV therapies Practise IV on artificial arm with fake blood Practise injection techniques on realistic injection pads Learn beginner to advanced skills and techniques Basic understanding of English language required OPEN TO ALL APPLICANTS

Aesthetic Therapy Training - Beginner to Advanced PACKAGE
Delivered in Liverpool or Online + more
£292

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

Natural Gas Properties & Sulphur Recovery

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT) This 5 half-day VILT course will comprehensively cover the technical aspects of gas processing. The scope will be from the wellhead through the typical gas processing plant and discuss gas gathering (pipeline hydraulics), natural gas treating (H2S, CO2 removal), acid gas injection and sulfur recovery. One unique aspect of this training course is the operations and troubleshooting discussions in each module. This VILT course is suited to technical personnel or technical management. Training Objectives After the completion of this VILT course, participants will be able to: Grasp the key specifications of natural gas and liquid products Understand the physical and transport properties of gases and liquids and liquid-vapor phase behavior Explore the various technologies for processing natural gas and to make the specifications Examine the design of the technologies Learn how to diagnose operating problems to keep facilities running reliably Target Audience This VILT course is intended for all surface technical personnel such as process engineers & technologists, facility engineers and production engineers & technologists. This VILT course will greatly benefit but not limited to: Process, petroleum and production engineers Field operators and technicians Personnel involved in gas treatment and processing Managers and Supervisors involved with gas processing operations Course Level Basic or Foundation Intermediate Training Methods The VILT course will be delivered online in 5 half-day sessions comprising 4 hours per day, with 2 breaks of 10 minutes per day. Course Duration: 5 half-day sessions, 4 hours per session (20 hours in total). The maximum number of participants for this course is 20 persons. Case studies and Exercises: This VILT course will use actual case references throughout its duration in various forms. This will allow the application of the participants' newly-acquired knowledge. Case studies also stimulate independent thinking and discussion among the participants Trainer Your expert course leader has written several papers that have been published in both academic and industry journals. He has over 30 years of industry experience, specializing in gas processing (pipeline hydraulics, separation, dehydration, treating, sulphur recovery and refrigeration processes) and also has experience with crude oil dehydration, stabilization and micro-refining topping plants. He has experience with developing new technology and is recently involved in lithium, waste biomass and used motor oil pyrolysis and geothermal projects. He has recognized expertise in thermodynamics and physical and transport properties of fluids. He has consulted for several EPC and operating companies through his company Chem-Pet Process Tech., and currently holds the role of Director of Technology in an integrated engineering and solutions provider to the energy industry. He is currently involved with a small power-based carbon capture project as well as helping clients determine the best options for utilities decisions. He has been involved with CO2 dehydration and CO2 flood gas treating as well as acid gas injection projects for several years. Highlighted Achievements: Developed ORC geothermal model to determine the available power from wells in Alberta Acting on the Technical Advisory Board for E3 Metals, extracting lithium from formation water. Acted as a Subject Matter Expert for assessing the performance of the Plains Midstream Canada, Empress 1 Deep Cut Straddle Plant in a potential litigation. Acted as an Expert Witness for JL Transportation patent defence of a dense phase technology. Process engineer lead on the addition of the new Orloff gas plant for Deltastream. Also troubleshooted the oil battery shipping pump, plate exchanger and FWKO and treater. Evaluated gas processing and sulphur recovery options for new feeds to the Zhaikmunai Zelenovsky Gas Plant, Kazakhstan (with PM Lucas, Serbia). Completed capacity analysis for hydrocarbon dew point versus liquid recovery of three trains at Birchcliff Pouce Coupe facility including amine unit, refrigerated gas plant and acid gas injection. Completed process design for CO2 flue gas dehydration for Husky Energy Inc (with Status Engineering) Provided simulations of EnCana Foster Creek and Christina Lake and Husky McMullen SAGD facilities (with Vista Projects). Performed process engineering for Cenovus Pelican Lake SAGD pilot (with GRB Engineering) Bear Lake heavy oil polymer injection pilot (with GRB Engineering). Lead process engineer on the design of IEC Kerrobert crude oil micro-refinery (topping plant). Provided engineering support and troubleshooting for Enerchem Slave Lake Crude tower and product blending (with Status Engineering). POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Natural Gas Properties & Sulphur Recovery
Delivered in Internationally or OnlineFlexible Dates
£1,393 to £2,630

Total SIPp for engineers

5.0(3)

By Systems & Network Training

Total SIPp course description SIPp is a robust performance testing tool designed for evaluating the SIP protocol. This comprehensive course takes you on a journey from the initial installation of SIPp to mastering fundamental scenarios, exploring diverse architectures, delving into statistics analysis, and crafting XML scenario files. What will you learn Monitor SIP traffic with SIPp. Use SIPp for performance testing. Use the standard SIPp scenarios. Create custom scenarios in XML for SIPp. Total SIPp course details Who will benefit: Those working with SIP. Prerequisites: Definitive SIP for engineers Duration 2 days Total SIPp course contents Introduction What is SIPp? SIP review: UAC, UAS, INVITE, BYE. Sample SIP call flows. Hands on Wireshark, SIP call flow. Installing SIPp Getting SIPp, installing SIPp. Using SIPp Running sipp. sipp with uas scenario, sipp with uac scenario. The integrated scenarios. Online help. Hands on uac, uas. Controlling SIPp Hot keys, commands, UDP socket. Running SIPp in the background. Traffic control. SIPp performance testing. Hands on Changing call rates, remote control, pausing traffic. Monitoring SIP traffic Scenario screen, statistics. Response times, counters. Hands on Monitoring SIP traffic. More integrated scenarios SIPp and media and RTP. 3PCC. 3PCC extended. Transport modes: UDP, TCP, TLS, SCTP, IPv6 mono and multi socket. Hands on Third Party Call Control. XML What is XML? Content, markup, elements, attributes. Start tags, end tags. Hands on Displaying embedded scenarios, looking at the XML files of the integrated scenarios. Creating your own XML scenarios scenario, message commands, send, recv, nop, pause, sendCmd, recvCmd, common sipp scenario attributes, command specific sipp scenario attributes. XML DTD, jEdit. Hands on uac and uas scenario XML files. Recv actions Log and warning, exec, variables, variable types, variable scope. External variables. Hands on RTP streaming, Change a calls network destination, injection files. Regular expressions What is an RE. POSIX 1003.2. Re injection. Validation. Hands on regex example.

Total SIPp for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Mastering Spring Framework Fundamentals

By Packt

From tackling cross-cutting project concerns with Spring to integrating Spring JDBC to work with databases, this course teaches you the essentials you need to know to confidently use the Spring framework container in the workplace.

Mastering Spring Framework Fundamentals
Delivered Online On Demand5 hours 6 minutes
£101.99

Educators matching "Injection"

Show all 91
The Ultrasound Site - Musculoskeletal Ultrasound Courses

the ultrasound site - musculoskeletal ultrasound courses

5.0(14)

Ashtead

All course delegates who attend our musculoskeletal ultrasound training courses will get unlimited access to diagnostic ultrasound or ultrasound guided injection related online lectures by our course tutors. These provide a more in-depth appreciation of the topics and are an excellent source of learning before and after our courses. We are constantly adding to this selection, so keep your eyes peeled! ULTRASOUND GUIDED COURSES – Needle visualisation, Aseptic technique, Informed consent, Ultrasound guided injections and the evidence base, Why we use cadaveric specimens for our guided injection training. MSK ULTRASOUND COURSES – An introduction to the Physics of MSK ultrasound, An introduction to probe skills and orientation to the image, Ultrasound system settings and knobology, An introduction to recognising pathology on musculoskeletal ultrasound, An introduction to quality assurance and professional issues of MSK ultrasound.  Gain access to our private MSK ultrasound Facebook community By attending our musculoskeletal ultrasound training courses you will gain access to your tutors in our private, Facebook community of MSK Ultrasound practice with specific groups for upper and lower limb MSK Ultrasound pathology, discussing anonymised cases and articles of interest. We also have groups for upper and lower limb guided injection techniques, discuss your techniques – what went well, what could be improved and what the evidence is. Lastly, but importantly we have established groups on training and governance.