• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

43203 Learning courses in Manchester delivered Online

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

Youth Workers & Leadership: Part 1

By iStudy UK

Course Description This Youth Workers and Leadership: Part 1 course is intended to help you broaden your knowledge about various aspects of youth work and leadership development. By doing this course, you will understand the necessity of youth work around the world and the need for effective youth workers in society. Moreover, you will be introduced to the competencies and skills that an individual requires to become an effective youth worker. You will explore the methodology and philosophy behind the practice of a youth worker's role and how it will be inevitably influenced by the setting and surroundings of its operation. Additionally, this Youth Workers and Leadership: Part 1 course will present the legal responsibilities that a youth worker owns while interacting with young people. Enrol the course today to get a better understanding of youth works and leadership. Learning outcome  Explore the vital role of the youth worker Learn the effective skills of a youth worker Understand the technique's and philosophies required as a youth leader Get introduced to the legal responsibilities of youth workers How Much Do Youth Workers Earn? Senior - £30,000(Appx.) Average - £22,000(Appx.) Starting - £19,000(Appx.) Requirement Our Youth Workers & Leadership: Part 1 is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Youth Workers & Leadership: Part 1 Module 01: Introduction to Youth Work 00:13:00 Module 02: Who Are the Youth Workers? 00:11:00 Module 03: Youth Worker Role and Methods 00:20:00 Module 04: Legal Responsibilities 00:17:00 Assignment Assignment - Youth Workers & Leadership: Part 1 00:00:00

Youth Workers & Leadership: Part 1
Delivered Online On Demand1 hour 1 minutes
£25

Information Field Hypothesis: Shifting From a Red to a Green Worldview

By IIL Europe Ltd

Information Field Hypothesis: Shifting From a Red to a Green Worldview Shifting from a Red to a Green Worldview How we lead our life, run our business and shape the world around us, depends on our self-conception. This self-conception is based on our worldview - our perception of how reality works. Updating our worldview can therefore result in a Better Life, a Better Business, and a Better World. This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies. Fractions of PDUs may also be reported. The smallest increment of a PDU that can be reported is 0.25. This means that if you spent 15 minutes participating in a qualifying PDU activity, you may report 0.25 PDU. If you spend 30 minutes in a qualifying PDU activity, you may report 0.50 PDU.

Information Field Hypothesis: Shifting From a Red to a Green Worldview
Delivered Online On Demand15 hours
£10

Strategic Planning for Organisation

4.8(9)

By Skill Up

Welcome to 'Strategic Planning for Organisation,' a transformative journey that will empower you to navigate the turbulent seas of modern business.

Strategic Planning for Organisation
Delivered Online On Demand1 hour 49 minutes
£25

Dancing in the Moment with our Stakeholders

By IIL Europe Ltd

Dancing in the Moment with our Stakeholders We typically engage with stakeholders with a clear sense of what we want to achieve, and we can miss what is showing up in the moment. Jane will explore how, by remaining present to the now, we can use this space to explore and uncover hidden stakeholder expectations and concerns. This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies. Fractions of PDUs may also be reported. The smallest increment of a PDU that can be reported is 0.25. This means that if you spent 15 minutes participating in a qualifying PDU activity, you may report 0.25 PDU. If you spend 30 minutes in a qualifying PDU activity, you may report 0.50 PDU.

Dancing in the Moment with our Stakeholders
Delivered Online On Demand14 hours
£10

Technical Report Writing and Presentation Skills for Oil & Gas Engineers and Technical Professionals

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course Oil & Gas professionals increasingly need to translate complex findings, analysis and recommendations for effective decision-making. If you face challenges in getting your findings into paper, you will benefit from this training course. The Technical Report Writing and Presentation Skills for Oil & Gas Engineers and Technical Professionals course focuses on the unique needs of technical professionals who write for both technical and non-technical readers. This separately bookable training course will demonstrate how technical professionals can use their technical knowledge and logical edge to write in a reader-friendly style, produce grammatically accurate reports and persuasively communicate for buy-in purposes. An ILM Recognised programme. Training Objectives LEARNING OUTCOMES FOR TECHNICAL REPORT WRITING SKILLS By the end of this course, participants will be able to: Write and turn-around accurate technical documents quickly to meet deadlines and productivity goals Understand how technical reports should be structured by applying a systematic approach to the writing task, involving planning, drafting, revision and production Use clear & powerful language to target and persuade readers for positive results Use tried and tested proof reading techniques to check and review documents more effectively Identify and avoid common pitfalls in technical report writing LEARNING OUTCOMES FOR TECHNICAL PRESENTATION SKILLS By the end of this course, participants will be able to: Present and sell your technical presentation more effectively both internally and externally Plan and structure your meetings and presentations for maximum effect Capture your technical and non-technical audience by delivering your presentation with power and authority Handle questions, interruptions and objections with confidence Target Audience This programme has been researched and developed for all Oil & Gas Engineers and Technical Professionals Course Level Basic or Foundation Trainer Your course leader managed the Business Skills Unit of the British Council programmes as well as oversee all training-related matters from 1997. The trainer considers himself a trainer first and specialises predominantly in high-level writing and technical report writing programmes. In addition to conducting training in Technical Writing, the trainer has also been the chief editor for many large writing projects. These include a year-long project editing the entire Start-Up Manual (including the Black Start Manual) for Nippon Oil's Helang Integrated Platform, a 4-month project rewriting the manuals for the Puteri Dulang FSO off Terengganu, and editing the current revision of the PETRONAS Procedures and Guidelines for Upstream Activities (PPGUA). POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Technical Report Writing and Presentation Skills for Oil & Gas Engineers and Technical Professionals
Delivered in Internationally or OnlineFlexible Dates
£1,719 to £1,999

Human Growth and Development

4.5(3)

By Studyhub UK

Embarking on a journey through the intricate stages of human existence, our 'Human Growth and Development' course meticulously explores the continuous progression of life. From the euphoria of birth to the calm acceptance of ageing, learners will gain comprehensive insights into the multifaceted physical and psychological transformations that we undergo. Beyond mere academic theories, this curriculum delves deep into the realms of life transitions, the broader human life cycle, and the invaluable role of healthcare in ensuring smooth transitions. Learning Outcomes Understand the dynamic changes throughout the human lifespan. Recognise the interplay between physical and psychological alterations during ageing. Analyse the various stages and transitions present in life. Comprehend the diverse phases within the human life cycle. Ascertain the importance of safeguarding and training for those in the support sector. Why buy this Human Growth and Development course? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Human Growth and Development there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this Human Growth and Development course for? Individuals keen to explore the intricate journey of human life. Healthcare practitioners aiming to enhance their understanding of life transitions. Support workers desiring to upskill in their safeguarding duties. Academics and researchers in the field of human development. Counsellors and therapists aiming to gain deeper insights into the human psyche. Prerequisites This Human Growth and Development does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Human Growth and Development was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Life Cycle Researcher: £35,000 - £50,000 Transition Counsellor: £30,000 - £45,000 Healthcare Transition Specialist: £40,000 - £55,000 Support Worker Supervisor: £25,000 - £35,000 Safeguarding Officer: £28,000 - £42,000 Developmental Psychologist: £40,000 - £60,000 Course Curriculum Module 01: Growth and Development throughout the human lifespan Growth and Development throughout the human lifespan 00:17:00 Module 02: Physical and Psychological changes linked to ageing Physical and Psychological changes linked to ageing 00:17:00 Module 03: Stages & Transitions in Life Stages & Transitions in Life 00:16:00 Module 04: Human Life Cycle Human Life Cycle 00:16:00 Module 05: Supporting Transition in Healthcare Supporting Transition in Healthcare 00:16:00 Module 06: Safeguarding Safeguarding 00:18:00 Module 07: Training Needs for Support Workers Training Needs for Support Workers 00:13:00

Human Growth and Development
Delivered Online On Demand1 hour 53 minutes
£10.99

Support Work in Schools and Colleges

By Training Tale

>> Support Work in Schools and Colleges << The Support Work in Schools and Colleges course is designed to help learners understand the duties and responsibilities of those who support teaching and learning in schools, as well as to provide an opportunity to develop the skills and knowledge needed to do so effectively and freely. The qualification prepares learners to assist the teacher and the delivery of curriculum within a school, as well as develop skills to assist children and young people in developing self-esteem, independence, and learning skills. It aims to improve professional and technical skills and knowledge, as well as an understanding of the value of strong relationships within a school. Learning Outcomes After completing this Support Work in Schools and Colleges Bundle course, the learner will be able to: Understand the organisation of schools and colleges in terms of roles and responsibilities. Gain a thorough understanding of children and young people's development. Understand how to communicate and develop professional relationships with children and young people. Know the legislative and policy framework for health and safety. Know about safeguarding the welfare of children and young people. Understand the importance of promoting equality and diversity in a learning environment. Why Choose Support Work in Schools and Colleges Bundle Course from Us Self-paced course, access available from anywhere. Easy to understand, high-quality study materials. Course developed by industry experts. MCQ quiz after each module to assess your learning. Automated and instant assessment results. 24/7 support via live chat, phone call or email. Free PDF certificate as soon as completing the Support Work in Schools and Colleges course. ***Courses are included in this Support Work in Schools and Colleges Bundle Course Course 01: Level 2 Award in Support Work in Schools and Colleges Course 02: Speech & Language Therapy Course 03: Primary Teaching Diploma Course 04: School Administrator Training Course 05: SEN Teaching Assisstant Course 06: EYFS Teaching Diploma Course 07: Teaching Assistant ***Other Benefits of Support Work in Schools and Colleges Course*** Free 3 PDF Certificate Lifetime Access Free Retake Exam Tutor Support [ Note: Free PDF certificate will provide as soon as completing the Support Work in Schools and Colleges course] >> Support Work in Schools and Colleges << Detail Course Curriculum Of Support Work in Schools and Colleges Module 01: Understand Schools and Colleges as Organisations Module 02: Understand Children and Young People's Development Module 03: Understand Communication and Professional Relationships with Children, Young People and Adults Module 04: Understand Children and Young People's Health and Safety Module 05: Safeguarding Children and Young People Module 06: Understand Equality, Diversity and Inclusion in Work with Children and Young People >>-------------------------<< Assessment Method After completing each module of the Course, you will find automated MCQ quizzes. To unlock the next module, you need to complete the quiz task and get at least 60% marks. Certification After completing the MCQ/Assignment assessment for this course, you will be entitled to a Certificate of Completion from Training Tale. The certificate is in PDF format, which is completely free to download. A printed version is also available upon request. It will also be sent to you through a courier for £13.99. Who is this course for? Support Work in Schools and Colleges course is suitable for a range of learners, including young people, senior learners, learners with special educational needs, and learners for whom English is a second language who want to work in a school or college setting. Requirements >> Support Work in Schools and Colleges << There are no specific requirements for Support Work in Schools and Colleges course because it does not require any advanced knowledge or skills. Certificates Certificate of completion Digital certificate - Included

Support Work in Schools and Colleges
Delivered Online On Demand15 hours
£39

Assessing and Managing Cyber Security Risks for Essential Services Operators

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT) This 3 half-day Virtual Instructor Led Training (VILT) course will help participants grasp the idea of real-world risk management and how this relates to the cyber world. The VILT course will cover topics surrounding identifying cyber risks and vulnerabilities, guidance on applying administrative actions, and comprehensive solutions to ensure your organization is adequately secure and protected. The VILT course will guide participants on how to conduct a security risk assessment for their organization, and equip them with the skills to develop a risk compliance assessment plan as well as methods to develop risk management strategies which can improve their organization's security posture. The VILT course has at least a 30% hands-on approach through the use of Table Top Exercises. The VILT course will cover the following modules: Introduction to Risk Assessments (RA) Threat Actors and Their Motivations Threat and Risk Assessment Critical Controls Identification Maturity Assessment Treated Cyber Risk Profile Target Cyber Risk Profile and Strategy Target Audience The VILT course is intended for professionals responsible for organizational information and security system and those involved in operating and maintenance of critical information and IT network & sotware systems. Professionals who are designated as the Single Point of Accountability (SPoA) as well as system auditors will find this course useful. Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 3 half-day sessions comprising 4 hours per day, with 2 x 10 minutes break per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 3 half-day sessions, 4 hours per session (12 hours in total). This VILT course is delivered in partnership with ENGIE Laborelec. Trainer Your expert course leader is a is specialized in cybersecurity risk management. Before joining ENGIE, she worked for The National Cybersecurity Agency of France (ANSSI) based in Paris (France) and for Deloitte Belgium located in Zaventem (Belgium). She has been involved in cybersecurity projects focusing on the principle of protecting critical infrastructures. Her different experiences in Cyber Security, Anti-Money Laundering and Global Trade Compliance (including Export Control and Customs) gave her the opportunity to use methodologies tackling strategic, operational and financial control issues at all levels of an organization: people, business processes, IT applications and infrastructure, legal and regulatory compliance. She was an EBIOS Risk Manager (RM) trainer while she worked for the French government; EBIOS RM is the French method for assessing and treating digital risks. She also had the opportunity to represent France towards European institutions and other relevant stakeholders for topics related to cybersecurity risk management. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Assessing and Managing Cyber Security Risks for Essential Services Operators
Delivered in Internationally or OnlineFlexible Dates
£1,324 to £2,499

Compressors & Pumps: Selection, Applications, Operation, Troubleshooting and Maintenance

By EnergyEdge - Training for a Sustainable Energy Future

Enhance your expertise in compressor and pump selection, operation, troubleshooting, and maintenance with EnergyEdge's comprehensive classroom training. Elevate your skills today!

Compressors & Pumps: Selection, Applications, Operation, Troubleshooting and Maintenance
Delivered in Internationally or OnlineFlexible Dates
£2,699 to £2,899