• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

341 Law courses in Hale delivered Live Online

Certified Kanban System Design – KMP I - 24-26 September

By Tom Reynolds

Attend our world class Kanban University accredited Certified Kanban System Design training course and learn to implement Kanban in your company

Certified Kanban System Design – KMP I - 24-26 September
Delivered OnlineFlexible Dates
£1,074 to £1,194

Equality, Diversity and Inclusion

By Prima Cura Training

Our Equality and Diversity Training course covers the Equality Act 2010 and discusses the details relating to discrimination as well as unfair treatment within a professional environment.

Equality, Diversity and Inclusion
Delivered in person or OnlineFlexible Dates
Price on Enquiry

Auditing and Internal Control

5.0(10)

By GBA Corporate

Overview Internal control, as defined by accounting and auditing, is a process for assuring an organization's objectives in operational effectiveness and efficiency, reliable financial reporting, and compliance with laws, regulations and policies. It is very important for the organisation to have a smooth flow of accounting as it plays a very important role in the development of the organisation. Financial Managers or any person who deals with Accounts need to see that the company accounts are very updated and are free from any risks that can become a problem during the time of Auditing.  This course will feed you with all the skills required to have a good Internal Management process it is important to analyse Risk Management to see if the process is working efficiently and measures the effectiveness of controls put in place to alleviate risks. 

Auditing and Internal Control
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Forensic Accounting for Frauds

5.0(10)

By GBA Corporate

Overview Corporate frauds have the inherent power to bring large organizations to their knees, cause huge monetary loss, prompt lawsuits followed by significant legal expenses, lead to the imprisonment of employees and deteriorate confidence in the market, governments, and institutions. In response, corporations and governments across the globe have stepped up their effort to inspect, prevent and penalize fraudulent practices; resulting in a greater emphasis on the domains of forensic auditing and accounting in the current economy. This training course will empower you to recognize the root causes of fraud and white-collar crime in the current economy, understand the categories of fraud, equip you with methodologies of fraud detection and prevention, and heighten your ability to detect potential fraudulent situations. In addition to the fundamentals of fraud investigation and detection in a digital environment; profit-loss evaluation, analysis of accounting books, legal concepts, and quantification of financial damages are also examined in this course

Forensic Accounting for Frauds
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Mental Health First Aid

5.0(43)

By Knight Training (UK) Ltd

Take a look at this new Mental Health First Aid course at Knight Training. Watching over your mental health is very important, having this knowledge can be of use at any environment, and is suitable for anyone. Come get train with us at https://knight.training/products/mental-health-online-mh-first-aid?variant=43369922199787

Mental Health First Aid
Delivered OnlineFlexible Dates
£75

Certificate in Intellectual Property (CIP)

By EMG Associates UK Limited

Certificate in Intellectual Property (CIP) Why Attend As international trade and business continues to evolve, the importance of Intellectual Property Rights (IPRs) becomes increasingly vital. With new technologies and products relying heavily on IPRs, governments around the world are competing to offer higher levels of protection in order to attract investments and promote local innovation and production. Due to the complex nature of the scientific, economic, social, and theoretical aspects of IPRs, it is crucial for entities to have a comprehensive understanding of these issues. During this course, through practical workshops, case studies and expert knowledge, participants will gain an understanding of the concepts, theories, legislative and practical elements necessary to develop a successful IP strategy for their organization. Course Methodology In this interactive training course participants will frequently work in pairs as well as in larger groups to complete exercises, and regional and international case studies Course Objectives By the end of the course, participants will be able to: Understand the theoretical background of Intellectual Property (IP) and the various types of IP existence Understand the international and local set of conventions and laws governing IPRs Demonstrate deep knowledge of the conditions that should exist in each type of IPR, their registration, licensing and enforcement Apply knowledge of IPRs in all legal fields including contracts and litigation Participate effectively in building a comprehensive IP strategy for their organization Target Audience This course is suitable for professionals working in the legal and IP filed, including but not limited to; lawyers, in-house counsels, governmental officials, police, customs, health authorities, researchers, university lecturers, publishers, IP agents as well as researchers who are interested in having deeper knowledge about IP in the GCC. It will also highly benefit in-house councils who recently joined their companies in the GCC as it will give them all the knowledge needed to handle all IP issues within the region. Target Competencies General principles of IPRs Trademarks, Patents, Copyright Principles of IP Enforcement Building IP Strategy Note The Dubai Government Legal Affairs Department has introduced a Continuing Legal Professional Development (CLPD) programme to legal consultants authorised to practise through a licensed firm in the Emirate of Dubai. We are proud to announce that the Dubai Government Legal Affairs Department has accredited EMG Associates as a CLPD provider. In addition, all our legal programmes have been approved. This PLUS Specialty Training Legal course qualifies for 4 elective CLPD points. Introduction and basic concepts Types of IPRs Main theories justifying IP protection The role of IP in economic development The Role of IP in innovation and creativity The globalization of IPRs protection International conventions Trade-Related Aspects of Intellectual Property Rights (TRIPS) and the World Trade Organization The GCC Cooperation in the field of IP protection Trademarks and copyright Definition and types of marks Scope of trade marks protection Registration procedures and rights conferred to trade mark owner Legal protection of trade marks Subject matter and conditions of copyright Types of protected works Financial and moral rights Fair use, duration of protection and legal protection for copyright Patents and trade secrets Patentable inventions and types of patents Registration process Ownership and rights conferred to patent owner Employer-employee inventions and legal protection for patents Definition of trade secrets and confidential information Elements of trade secrets Utilization of trade secrets commercially Legal protection of trade secrets Building a strong IP strategy and strategic management of IPRs Overview and basic concepts Understand your business and your IP needs IP audit and building the portfolio Onward licensing (licensing process and contracts) IP commercialization mechanisms and maximizing the benefits Practical steps to building a successful IP strategy IP valuation - your gateway to know how much your IP worth Assessment of the IP strategy for further success

Certificate in Intellectual Property (CIP)
Delivered OnlineFlexible Dates
£3,822

We Solve Murders - Thursdays from 16th January

5.0(22)

By Book Club School

Read and discuss this witty, best-selling murder mystery - clever and compelling Highlights Join this book club and gain extra motivation to read in English 7 hours of live classes to help you develop fluent speaking in English Read this amusing book to develop your understanding of colloquial English Be corrected by an expert English teacher to remove errors and mistakes Practise and develop your English online in this 7 week English book club course using the Richard Osman's new series after The Thursday Murder Club, We Solve Murders. Each week you read some chapters, discuss them in class and improve specific areas of vocabulary or grammar while also examining literary aspects of the novel. Personalised feedback improves your grammar, vocabulary and pronunciation. The Book Club book This is the first in a new series for detective duo Steve and Amy Wheeler. Steve is happily retired and likes his routines: the pub quiz, sitting outside, his cat. His past was full of adventure, but now he likes a quiet life. His daughter-in-law Amy, however, loves adrenaline. She's a private security officer, protecting a world-famous author Rosie D’Antonio on a remote island. It should be a simple job, until there's a murder, a lot of money and someone trying to kill Amy. This thriller is filled with action, amusing lines and warmth. And you need to work out "whodunnit" - who committed the crime! 'The thing that shines through in Osman’s writing is that he really likes people and revels in all their foibles and eccentricities. All of which makes for a delightful read' THE OBSERVER Geoff says: "Richard Osman is the famous author of the best-selling Thursday Murder Club series. This new book has broken all records as the best-selling adult hardback fiction book in the UK. It is full of action, yet witty, with interesting characters, and full of British English idioms and colloquialisms - great for improving your knowledge of how English is actually spoken!"

We Solve Murders - Thursdays from 16th January
Delivered OnlineJoin Waitlist
£137

We Solve Murders - Wednesdays from 15th January

5.0(22)

By Book Club School

Read and discuss this witty, best-selling murder mystery - clever and compelling Highlights Join this book club and gain extra motivation to read in English 7 hours of live classes to help you develop fluent speaking in English Read this amusing book to develop your understanding of colloquial English Be corrected by an expert English teacher to remove errors and mistakes Practise and develop your English online in this 7 week English book club course using the Richard Osman's new series after The Thursday Murder Club, We Solve Murders. Each week you read some chapters, discuss them in class and improve specific areas of vocabulary or grammar while also examining literary aspects of the novel. Personalised feedback improves your grammar, vocabulary and pronunciation. The Book Club book This is the first in a new series for detective duo Steve and Amy Wheeler. Steve is happily retired and likes his routines: the pub quiz, sitting outside, his cat. His past was full of adventure, but now he likes a quiet life. His daughter-in-law Amy, however, loves adrenaline. She's a private security officer, protecting a world-famous author Rosie D’Antonio on a remote island. It should be a simple job, until there's a murder, a lot of money and someone trying to kill Amy. This thriller is filled with action, amusing lines and warmth. And you need to work out "whodunnit" - who committed the crime! 'The thing that shines through in Osman’s writing is that he really likes people and revels in all their foibles and eccentricities. All of which makes for a delightful read' THE OBSERVER Geoff says: "Richard Osman is the famous author of the best-selling Thursday Murder Club series. This new book has broken all records as the best-selling adult hardback fiction book in the UK. It is full of action, yet witty, with interesting characters, and full of British English idioms and colloquialisms - great for improving your knowledge of how English is actually spoken!"

We Solve Murders - Wednesdays from 15th January
Delivered OnlineJoin Waitlist
£137

We Solve Murders - Mondays from 13th January

5.0(22)

By Book Club School

Read and discuss this witty, best-selling murder mystery - clever and compelling Highlights Join this book club and gain extra motivation to read in English 7 hours of live classes to help you develop fluent speaking in English Read this amusing book to develop your understanding of colloquial English Be corrected by an expert English teacher to remove errors and mistakes Practise and develop your English online in this 7 week English book club course using the Richard Osman's new series after The Thursday Murder Club, We Solve Murders. Each week you read some chapters, discuss them in class and improve specific areas of vocabulary or grammar while also examining literary aspects of the novel. Personalised feedback improves your grammar, vocabulary and pronunciation. The Book Club book This is the first in a new series for detective duo Steve and Amy Wheeler. Steve is happily retired and likes his routines: the pub quiz, sitting outside, his cat. His past was full of adventure, but now he likes a quiet life. His daughter-in-law Amy, however, loves adrenaline. She's a private security officer, protecting a world-famous author Rosie D’Antonio on a remote island. It should be a simple job, until there's a murder, a lot of money and someone trying to kill Amy. This thriller is filled with action, amusing lines and warmth. And you need to work out "whodunnit" - who committed the crime! 'The thing that shines through in Osman’s writing is that he really likes people and revels in all their foibles and eccentricities. All of which makes for a delightful read' THE OBSERVER Geoff says: "Richard Osman is the famous author of the best-selling Thursday Murder Club series. This new book has broken all records as the best-selling adult hardback fiction book in the UK. It is full of action, yet witty, with interesting characters, and full of British English idioms and colloquialisms - great for improving your knowledge of how English is actually spoken!"

We Solve Murders - Mondays from 13th January
Delivered OnlineJoin Waitlist
£137

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered OnlineFlexible Dates
£3,495