• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

62 Investigator courses in Edinburgh delivered Live Online

Good Laboratory Practice Refresher and Hot Topics

By Research Quality Association

Course Information Join us for a comprehensive refresher focusing on crucial Good Laboratory Practice (GLP) requirements, including an emphasis on data integrity, recent developments, and emerging trends gleaned from MHRA inspections. The programme dives into specific domains such as risk assessment, OECD guidance on sponsor influence, and the advisory from OECD on QA. Additionally, delegates can benefit from a dedicated GLP clinic, facilitating discussions on understanding and upholding GLP compliance. Is this course for you? This course is tailored for study directors, principal investigators, test facility management, and QA professionals seeking to refresh their knowledge and responsibilities within the GLP framework. Tutors Tutors will be comprised of (click the photos for biographies): Vanessa Grant -, - Tim Stiles Consultant, Qualogy Ltd Programme Please note timings may be subject to alteration. Day 1 09:00 Registration, Welcome and Introduction 09:20 Development of Good Laboratory Practice A reminder of the history of GLP, its current scope and application, with a synopsis of current UK, European and international standards. 09:50 Roles and Responsibilities of Study Director, Test Facility Management, Principal Investigator, Test Site Management, Study Staff and QA A reminder of the roles and responsibilities with regard to the GLP management and oversight of the Test Facility and the management and control of the study, as defined by GLP. 10:30 Break 10:45 Workshop 1 Workshop 1 Roles and responsibilities 11:15 Influence of Sponsors The published OECD Position Paper No. 21 regarding Possible Influence of Sponsors on conclusions of GLP Studies is reviewed and discussed. 11:45 Data Integrity The fundamentals of data integrity according to the OECD Guidance No. 22 on Data Integrity is discussed along with the responsibilities of Study Director, Test Facility Management, and study staff in ensuring the integrity of the GLP study data. 12:30 Lunch 13:15 Quality Assurance and GLP OECD Advisory No. 23 (Revision of OECD No.4)- A walk through of the changes to the OECD Guidance on the role and activities of Quality Assurance 13:45 Quality Improvement Tools and GLP The tools that might be considered for GLP and their role and operation when used in Test Facilities- OECD Position Paper No.24 published July 2022 14:15 Workshop 2 Workshop 2 Change control 14:30 Risk Assessment How should we assess risk and how can we use the process to assist in evaluation audit findings? 15:00 Break 15:15 Current hot topics in GLP Explore the current issues in Industry and trends /types of Regulatory inspection findings 15:50 GLP Clinic An opportunity to discuss any other issues regarding understanding and maintaining GLP Compliance. 16:30 Close of Course Extra Information Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam. CPD Points 7 Points   Development Level Learn

Good Laboratory Practice Refresher and Hot Topics
Delivered Online
£379 to £508

Real Estate Analyst (Investment Cash Flow Modelling in Excel)

4.3(5)

By Bayfield Training

The Real Estate Analyst course has been taught non-stop to global real estate firms over the last 25 years, and is without doubt the core financial modelling training in your career portfolio. Whether you have an upcoming financial modelling test for a new job or an APC exam, the Real Estate Analyst course is the choice for you.

Real Estate Analyst (Investment Cash Flow Modelling in Excel)
Delivered in person or Online + more
£1,750

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered OnlineFlexible Dates
£3,495

Good Clinical Practice Auditing - Principles and Practice

By Research Quality Association

Course Information Our comprehensive course is used as a gateway to those stepping into the world of auditing clinical studies. Tailored for those already acquainted with Good Clinical Practice (GCP) and those transitioning from other audit disciplines, this programme stands as a pivotal guide. Pre-existing knowledge of GCP will significantly enhance your learning experience in auditing against these guidelines. How is this course run? Engage in immersive workshops providing hands-on practice with auditing techniques in a GCP context. Our seasoned tutors, boasting extensive audit experience, intertwine theory with practical insights drawn from their own professional journeys. What will I learn? A comprehensive understanding of the historical backdrop and objectives driving Good Clinical Practice, incorporating the latest industry developments Solid grounding in quality assurance activities aligned with regulatory standards Insight into potential pitfalls within clinical trials and the pivotal role of auditors in addressing these issues Clarity on the roles and responsibilities inherent to clinical trials auditing Exposure to a diverse range of audit techniques complemented by illustrative examples and supportive documents A nuanced understanding of regulatory inspectors' activities Expanded professional networks to propel your auditing career forward. Benefits include: A clear understanding of the role of the auditor under Good Clinical Practice improved audits Improved Good Clinical Practice compliance for your clinical trials. This course is structured to encourage delegates to: Discuss and develop ideas Solve specific problems Examine particular aspects of Good Clinical Practice. Tutors Tutors will be comprised of (click the photos for biographies): Rosemarie Corrigan EVP Global Quality, Worldwide Clinical Trials Cathy Dove Director and Owner, Dove Quality Solutions Julie Kelly Associate Director, Clinical Quality Assurance, Corcept Therapeutics Susana Tavares Director of Research Quality Assurance, - Programme Please note timings may be subject to alteration. Day 1 12:30 Registration 13:00 Welcome and Objectives for the first day of the course 13:30 Laying the Foundations Introduction to the clinical development process, the concepts of quality assurance, quality control and audit. 14:30 Break 15:00 Patient Protection Requirements for informed consent and ethics committee. Access to source documentation. Including a patient protection exercise. 16:05 Workshop 1 - Case Study on Informed Consent 16:45 End of Day Questions and Answers 17:00 Close of Day Day 2 08:50 Questions and Answers from Day 1 09:00 Effective Site Audits The procedures involved in selecting and setting up audits at investigator sites. 09:40 Workshop 1 - Planning the Effective Audit 10:30 Break 10:45 Source Data Verification The need for and purpose of verifying data. 11:25 Workshop 2 - Source Data Verification 12:30 Lunch 13:30 IMP Management The requirements surrounding the distribution of investigational medicinal products. Accountability from release to destruction. 14:15 Critical Document Audits The conduct of other study specific audits including protocols, databases and reports. 15:00 Break 15:15 Non-compliance Determining the acceptability of data. 16:00 Fraud - Fact or Fiction? How to identify fraud and its consequences 16:45 End of Day Questions and Answers 17:00 Close of Day Day 3 08:50 Questions and Answers from Days 1 and 2 09:00 Auditing Third Parties A review of audits of contract research organisations. 10:00 System Audits The concept of auditing processes across many clinical trials, including a practical exercise in process mapping. 10:45 Break 11:00 Workshop 3 - Process Mapping 11:45 Effective Audits Where theory meets reality. 12:30 Lunch 13:20 Audit Reports - Closing the Loop An examination of the processes which follow the evidence gathering phase of the audit. 14:20 Workshop 4 - Audit Reports Audit reports, corrective and preventive action. 15:00 Break 15:10 Regulatory Inspection Auditors and regulatory inspections -how the QA team can help the organisation to perform during a regulatory inspection. 15:55 Final Questions and Answers 16:10 Close of Course Extra Information Face-to-face course Course Material Course material will be available in PDF format for delegates attending this course. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course. The material will be emailed in advance of the course and RQA will not be providing any printed copies of the course notes during the training itself. Delegates wishing to have a hard copy of the notes should print these in advance to bring with them. Alternatively delegates are welcome to bring along their own portable devices to view the material during the training sessions. Remote course Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam. CPD Points 17 Points Development Level Develop

Good Clinical Practice Auditing - Principles and Practice
Delivered in person or OnlineFlexible Dates
£1,068 to £1,390

Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Although there are no mandatory prerequisites, the course is particularly suited for the following audiences: Cybersecurity engineer Cybersecurity investigator Incident manager Incident responder Network engineer SOC analysts currently functioning at entry level with 2+ years of experience Overview After taking this course, you should be able to: Describe the types of service coverage within a SOC and operational responsibilities associated with each. Compare security operations considerations of cloud platforms. Describe the general methodologies of SOC platforms development, management, and automation. Explain asset segmentation, segregation, network segmentation, micro-segmentation, and approaches to each, as part of asset controls and protections. Describe Zero Trust and associated approaches, as part of asset controls and protections. Perform incident investigations using Security Information and Event Management (SIEM) and/or security orchestration and automation (SOAR) in the SOC. Use different types of core security technology platforms for security monitoring, investigation, and response. Describe the DevOps and SecDevOps processes. Explain the common data formats, for example, JavaScript Object Notation (JSON), HTML, XML, CommaSeparated Values (CSV). Describe API authentication mechanisms. Analyze the approach and strategies of threat detection, during monitoring, investigation, and response. Determine known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs). Interpret the sequence of events during an attack based on analysis of traffic patterns. Describe the different security tools and their limitations for network analysis (for example, packet capture tools, traffic analysis tools, network log analysis tools). Analyze anomalous user and entity behavior (UEBA). Perform proactive threat hunting following best practices. The Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course guides you through cybersecurity fundamentals and prepares you for the role of Information Security Analyst on a Security Operations Center team. You?ll learn to automate for security using cloud platforms and how to apply your knowledge to real-world scenarios Course Outline Understanding Risk Management and SOC Operations Understanding Analytical Processes and Playbooks Investigating Packet Captures, Logs, and Traffic Analysis Investigating Endpoint and Appliance Logs Understanding Cloud Service Model Security Responsibilities Understanding Enterprise Environment Assets Threat Tuning Threat Researching and Threat Intelligence Practices Understanding APIs Understanding SOC Development and Deployment Models Performing Security Analytics and Reports in a SOC Malware Forensics Basics Threat Hunting Basics Additional course details: Nexus Humans Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0
Delivered OnlineFlexible Dates
Price on Enquiry

Real Estate Financial Modelling School

4.3(5)

By Bayfield Training

This week long CPD accredited training is ideal for those Real Estate professionals, who are looking to bolster the DCF modelling skills. This course covers Real Estate Investment, Development, Finance & Risk.

Real Estate Financial Modelling School
Delivered in person or Online + more
£4,600

Real Estate Investor (Advanced Development Cash Flow Modelling in Excel)

4.3(5)

By Bayfield Training

The Real Estate Investor course primarily focuses on financial modelling and commercial considerations in the real estate industry across various sectors, geographies, and project types.

Real Estate Investor (Advanced Development Cash Flow Modelling in Excel)
Delivered in person or Online + more
£2,000

Real Estate Finance (Debt Financing)

4.3(5)

By Bayfield Training

This Real Estate Financial Modelling course will enhance delegates skills in crafting sophisticated financial models tailored for debt financing within the Real Estate sector.

Real Estate Finance (Debt Financing)
Delivered in person or Online + more
£1,500

An Introduction to Real Estate (12 Hours Online Self-Study)

4.3(5)

By Bayfield Training

Are you looking to enter the dynamic world of real estate? Our course is designed to equip you with the knowledge and tools you need to communicate effectively with real estate professionals and develop key skills in real estate investment strategy and analytics. At the end of the course, you'll be able to read and interpret real estate market reports, and have a firm grasp of how iconic buildings, cities, and companies fit into the overall picture of the real estate sector. On this course, you will… Become familiar with the players, structure, general terminology and overall needs of Real Estate. Learn what is Real Estate and why it is different from other asset classes Get to grips with the overall size and structure of the UK Real Estate Market Learn and analyse the links between the different parts of the property market Understand who works in the Real Estate Market, their qualifications and their job descriptions Recognise how and when to use basic real estate concepts: Rent, Value, Yield, Risk and Return, etc… Learn how to read a real estate market report Understand how current affairs, politics and economics affects Real Estate Investment Use household names and iconic companies, cities and buildings to help consolidate your appreciation of this exciting sector Who will benefit from this course: Graduates or undergraduates studying economics, finance. Professionals working in Marketing or Accounting teams within Real Estate firms. APC students. Anyone interested in Real Estate. School leavers/A-Level Students looking to gain an understanding of Real Estate. Non cognate students who wish to transfer into Real Estate/Finance careers. Course Outline Module 1: What is and why buy Real Estate? The property Market The Size and Structure of the UK property market The impact of Real Estate in the Economy Module 2: The Real Estate Market System The Space Market The Asset Market The Development Market Module 3: How to value Real Estate An Introduction to Financial Mathematics The difference between Price, Value and Worth Property Yield Conventional Valuation Methods Module 4: How to read a Real Estate Market Report Property Market Indicators: Stock Indicators Property Market Indicators: Investment Indicators Module 5: Who works in Real Estate? The build Environment by Cobalt Recruitment Rea; Estate Agents Examples of Real Estate Market Agents CVs Real Estate Network

An Introduction to Real Estate (12 Hours Online Self-Study)
Delivered in person or OnlineFlexible Dates
£1,500

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites CompTIA Network+ Certification 1 - Security and Risk Management Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training 2 - Asset Security Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling 3 - Security Engineering Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities 4 - Information Security Management Goals Organizational Security The Application of Security Concepts 5 - Information Security Classification and Program Development Information Classification Security Program Development 6 - Risk Management and Ethics Risk Management Ethics 7 - Software Development Security Software Configuration Management Software Controls Database System Security 8 - Cryptography Ciphers and Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Hashing and Message Digests Email, Internet, and Wireless Security Cryptographic Weaknesses 9 - Physical Security Physical Access Control Physical Access Monitoring Physical Security Methods Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered OnlineFlexible Dates
£3,395
123...7

Educators matching "Investigator"

Show all 1