• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

48 Educators providing Legal Compliance courses

123...5

Courses matching "Legal Compliance"

Show all 170

The Candidate Journey

5.0(1)

By Noble Foods

The candidate journey is the process job applicants go through when interacting with Noble Foods. It encompasses every interaction in person and online, from the moment a candidate first becomes aware of us to the final hiring decision – and even beyond. You play a key role in the successful recruitment of new starters. It’s important that you have the skills to navigate all stages of the recruitment process to give the candidates the best experience, hire top talent and ensure we remain legally compliant. What does the course cover? What is the candidate journey and why is it important? The role of the line manager Legal Compliance The Noble Foods Candidate Journey How to fill out a Requisition How to post a job Selection Process Interviews Flexible Working Requests

The Candidate Journey
Delivered in Staines + 3 more or Online + more
FREE

Driver CPC 1-Day Periodic 7-Hour Course: Accidents, Incidents, Breakdowns & Compliant Driver

By Total Compliance

Enhance your road safety knowledge and compliance. This course provides 7 hours of Driver CPC training, focusing on critical areas of road safety and legal compliance. Accidents, Incidents and Breakdowns module will equip you with the skills to: Prevent accidents: Understand common causes of accidents and how to mitigate risks. Handle incidents effectively: Learn proper procedures for dealing with accidents, breakdowns, and other incidents. Protect yourself and others: Develop strategies to ensure personal safety and the safety of fellow road users. Compliant Driver module will cover: Understanding driving regulations: Stay informed about the latest road traffic laws and regulations. Maintaining driver hours: Learn how to comply with driving and rest time regulations. Digital tachograph and record keeping: Gain knowledge of tachograph use and accurate record keeping. By completing this course, you will be better prepared to handle unexpected situations on the road, reduce the risk of accidents, and ensure legal compliance. Ideal for professional drivers looking to refresh their knowledge and improve their overall safety performance.

Driver CPC 1-Day Periodic 7-Hour Course: Accidents, Incidents, Breakdowns & Compliant Driver
Delivered In-Person in Grantham
£69.95

Driver CPC 1-Day Periodic 7-Hour Course: Accidents, Incidents, Breakdowns / DG Awareness Training - ONLINE

By Total Compliance

Enhance your road safety knowledge and compliance. This course provides 7 hours of Driver CPC training, focusing on critical areas of road safety and legal compliance. Accidents, Incidents and Breakdowns module will equip you with the skills to: Understand common causes of accidents and how to mitigate risks. Learn proper procedures for dealing with accidents, breakdowns, and other incidents. Develop strategies to ensure personal safety and the safety of fellow road users. Dangerous Goods Awareness module will cover: Understand the different hazard classes and types of dangerous goods. Learn about the legal requirements for transporting and storing dangerous goods. Discover the essential safety protocols for handling hazardous materials. Identify and assess potential risks associated with dangerous goods. Apply best practices for documentation and labeling. By completing this course, you will be better prepared to handle unexpected situations on the road, reduce the risk of accidents, and ensure legal compliance. Ideal for professional drivers looking to refresh their knowledge and improve their overall safety performance.

Driver CPC 1-Day Periodic 7-Hour Course: Accidents, Incidents, Breakdowns / DG Awareness Training - ONLINE
Delivered Online
£69.95

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered Online
£3,495

Business Ethics in the Workplace: Principles and Practice

4.3(43)

By John Academy

Explore the principles and practices of business ethics in the workplace with our comprehensive course. Gain insights into ethical theories, navigating dilemmas, legal compliance, and fostering an ethical work environment. Develop crucial skills for ethical decision-making and leadership. Enroll now to promote integrity and responsibility in your organization.

Business Ethics in the Workplace: Principles and Practice
Delivered Online On Demand2 minutes
£23.99

New Manager

5.0(1)

By LearnDrive UK

Equip yourself for success as a new manager with our comprehensive “New Manager” course, covering essential leadership, communication, team building, and legal compliance skills. Gain the confidence and competence to lead effectively in today’s dynamic workplace.

New Manager
Delivered Online On Demand1 hour
£5

IOSH Working Safely

By MJ Electrical Training

Explore IOSH's Working Safely course, offered by the world's largest health and safety membership body. This online program delves into vital workplace health and safety basics, serving professionals in various industries. Completion leads to a globally recognised IOSH certificate, enhancing your credentials in the global job market.

IOSH Working Safely
Delivered Online On Demand
£118

Human Resources: A Guide to Workplace Integrity

5.0(9)

By Chart Learning Solutions

In the dynamic world of business, maintaining workplace integrity is a paramount challenge. This course delves into the complexities of ethical conduct, compliance with laws and regulations, and the promotion of a respectful, inclusive, and discrimination-free workplace. Participants will learn the knowledge and skills needed to uphold integrity in the workplace, fostering an ethical culture and ensuring legal compliance, ultimately enhancing organizational reputation and employee well-being. Learning Objectives The following are some of the key outcomes in this course: Learn what is workplace integrity. Explore multiple examples of workplace integrity. Understand the benefits and challenges of integrity. Learn how to maintain your integrity at work. Target Audience Human Resources Professionals. Managers, Team Leaders, Young Professionals

Human Resources: A Guide to Workplace Integrity
Delivered Online On Demand25 minutes
£34.95

Workplace Business Ethics

By Online Training Academy

Taking a Workplace Business Ethics course is essential in today's modern world, where business integrity and ethical conduct are paramount. Understanding business ethics is not just about knowing the right thing to do; it's about embedding ethical practices into every aspect of a business. This course will guide you through various ethical theories and frameworks, help you navigate ethical dilemmas, and ensure legal compliance within the business environment. Learning business ethics can significantly enhance your daily life and professional career by fostering a trustworthy and responsible work culture. In the UK, possessing strong business ethics skills can open doors to numerous job opportunities, with salaries ranging from £25,000 to £50,000, depending on the role and industry. The demand for professionals with business ethics knowledge is increasing, with this sector growing by approximately 15% annually. Enrolling in this course will give you a competitive edge, demonstrating your commitment to ethical business practices and making you a valuable asset to any organization. Key Features: CPD Certified Workplace Business Ethics course Free Certificate from Reed CIQ Approved Workplace Business Ethics course Developed by Specialist Lifetime Access Course Curriculum Module 01: Introduction to Business Ethics Module 02: Ethical Theories and Frameworks Module 03: Navigating Ethical Dilemmas in the Workplace Module 04: Business Ethics and Work Environment Module 05: Ethics and Legal Compliance Module 06: Implementing Ethical Practices in the Workplace Learning Outcomes: Analyse ethical theories, forging a personal moral framework. Navigate workplace dilemmas, showcasing moral acumen in decision-making. Enhance the work environment through ethical business practices. Align business ethics with legal parameters for comprehensive compliance. Master the art of implementing and sustaining ethical practices at work. Cultivate a heightened sense of moral responsibility within professional realms. CPD 10 CPD hours / points Accredited by CPD Quality Standards Workplace Business Ethics 1:42:12 1: Module 01: Introduction to Business Ethics Preview 21:43 2: Module 02: Ethical Theories and Frameworks 20:38 3: Module 03: Navigating Ethical Dilemmas in the Workplace 15:34 4: Module 04: Business Ethics and Work Environment 13:16 5: Module 05: Ethics and Legal Compliance 15:19 6: Module 06: Implementing Ethical Practices in the Workplace 14:42 7: CPD Certificate - Free 01:00 Who is this course for? This Workplace Business Ethics course is accessible to anyone eager to learn more about this topic. Through this course, you'll gain a solid understanding of Workplace Business Ethics. Moreover, this course is ideal for: Professionals seeking to infuse ethical wisdom into their careers. Managers aspiring to foster an ethical work culture. Entrepreneurs committed to ethical business practices. Individuals aiming to align personal values with professional conduct. Anyone passionate about contributing to an ethically robust corporate landscape. Requirements There are no requirements needed to enrol into this Workplace Business Ethics course. We welcome individuals from all backgrounds and levels of experience to enrol into this Workplace Business Ethics course. Career path After finishing this Workplace Business Ethics course you will have multiple job opportunities waiting for you. Some of the following Job sectors of Workplace Business Ethics are: Compliance Officer - £25K to 50K/year. HR Manager - £35K to 60K/year. Corporate Social Responsibility Manager - £30K to 55K/year. Business Consultant - £40K to 70K/year. Ethics and Compliance Analyst - £28K to 45K/year. Certificates Digital certificate Digital certificate - Included Reed Courses Certificate of Completion Digital certificate - Included Will be downloadable when all lectures have been completed.

Workplace Business Ethics
Delivered Online On Demand1 hour 42 minutes
£12

Licensed Premises Approved Online Staff Training

By Twig Services Ltd

Licensed Premises Approved Online Staff Training

Licensed Premises Approved Online Staff Training
Delivered Online On Demand1 hour
£29