• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

17404 Other courses in Rochester delivered Online

Supervision of supervision - online bi-monthly reflective group

5.0(2)

By Supervision Institute

bi-monthly online group for supervisors of counsellors, psychotherapists or coaches who want a reflective space to discuss your supervision practice with other supervisors

Supervision of supervision - online bi-monthly reflective group
Delivered OnlineFlexible Dates
Price on Enquiry

Workshop: Academic Language & Skills Module 4

By Scotland Study Centre (SSC)

Advanced Level workshop that introduces you to the basic Techniques of Academic English that will help you to: i)  Read and Write Academic tests more effectively, and ii)  give effective Academic Presentations. 

Workshop: Academic Language & Skills Module 4
Delivered OnlineFlexible Dates
£95

Workshop: Academic Language & Skills Module 3

By Scotland Study Centre (SSC)

Advanced Level workshop that introduces you to the basic Techniques of Academic English that will help you to: i)  Read and Write Academic tests more effectively, and ii)  give effective Academic Presentations. 

Workshop: Academic Language & Skills Module 3
Delivered OnlineFlexible Dates
£95

Workshop: Academic Language & Skills Module 2

By Scotland Study Centre (SSC)

Advanced Level workshop that introduces you to the basic Techniques of Academic English that will help you to: i)  Read and Write Academic tests more effectively, and ii)  give effective Academic Presentations. 

Workshop: Academic Language & Skills Module 2
Delivered OnlineFlexible Dates
£95

Workshop: Academic Language & Skills Module 1

By Scotland Study Centre (SSC)

Advanced Level workshop that introduces you to the basic Techniques of Academic English that will help you to: i)  Read and Write Academic tests more effectively, and ii)  give effective Academic Presentations. 

Workshop: Academic Language & Skills Module 1
Delivered OnlineFlexible Dates
£95

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

AZ-204T00 Developing Solutions for Microsoft Azure

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Students in this course are interested in Azure development or in passing the Microsoft Azure Developer Associate certification exam. This course teaches developers how to create end-to-end solutions in Microsoft Azure. Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services, and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions. Prerequisites To be successful in this course, learners should have the following: Hands-on experience with Azure IaaS and PaaS solutions, and the Azure Portal. Experience writing in an Azure supported language at the intermediate level. (C#, JavaScript, Python, or Java) Ability to write code to connect and perform operations on, a SQL or NoSQL database product. (SQL Server, Oracle, MongoDB, Cassandra or similar) Experience writing code to handle authentication, authorization, and other security principles at the intermediate level. A general understanding of HTML, the HTTP protocol and REST API interfaces. 1 - Explore Azure App Service Examine Azure App Service Examine Azure App Service plans Deploy to App Service Explore authentication and authorization in App Service Discover App Service networking features 2 - Configure web app settings Configure application settings Configure general settings Configure path mappings Enable diagnostic logging Configure security certificates 3 - Scale apps in Azure App Service Examine autoscale factors Identify autoscale factors Enable autoscale in App Service Explore autoscale best practices 4 - Explore Azure App Service deployment slots Explore staging environments Examine slot swapping Swap deployment slots Route traffic in App Service 5 - Explore Azure Functions Discover Azure Functions Compare Azure Functions hosting options Scale Azure Functions 6 - Develop Azure Functions Explore Azure Functions development Create triggers and bindings Connect functions to Azure services 7 - Explore Azure Blob storage Explore Azure Blob storage Discover Azure Blob storage resource types Explore Azure Storage security features Discover static website hosting in Azure Storage 8 - Manage the Azure Blob storage lifecycle Explore the Azure Blob storage lifecycle Discover Blob storage lifecycle policies Implement Blob storage lifecycle policies Rehydrate blob data from the archive tier 9 - Work with Azure Blob storage Explore Azure Blob storage client library Create a client object Manage container properties and metadata by using .NET Set and retrieve properties and metadata for blob resources by using REST 10 - Explore Azure Cosmos DB Identify key benefits of Azure Cosmos DB Explore the resource hierarchy Explore consistency levels Choose the right consistency level Explore supported APIs Discover request units 11 - Work with Azure Cosmos DB Explore Microsoft .NET SDK v3 for Azure Cosmos DB Create stored procedures Create triggers and user-defined functions Explore change feed in Azure Cosmos DB 12 - Manage container images in Azure Container Registry Discover the Azure Container Registry Explore storage capabilities Build and manage containers with tasks Explore elements of a Dockerfile 13 - Run container images in Azure Container Instances Explore Azure Container Instances Run containerized tasks with restart policies Set environment variables in container instances Mount an Azure file share in Azure Container Instances 14 - Implement Azure Container Apps Explore Azure Container Apps Explore containers in Azure Container Apps Implement authentication and authorization in Azure Container Apps Manage revisions and secrets in Azure Container Apps Explore Dapr integration with Azure Container Apps 15 - Explore the Microsoft identity platform Explore the Microsoft identity platform Explore service principals Discover permissions and consent Discover conditional access 16 - Implement authentication by using the Microsoft Authentication Library Explore the Microsoft Authentication Library Initialize client applications 17 - Implement shared access signatures Discover shared access signatures Choose when to use shared access signatures Explore stored access policies 18 - Explore Microsoft Graph Discover Microsoft Graph Query Microsoft Graph by using REST Query Microsoft Graph by using SDKs Apply best practices to Microsoft Graph 19 - Implement Azure Key Vault Explore Azure Key Vault Discover Azure Key Vault best practices Authenticate to Azure Key Vault 20 - Implement managed identities Explore managed identities Discover the managed identities authentication flow Configure managed identities Acquire an access token 21 - Implement Azure App Configuration Explore the Azure App Configuration service Create paired keys and values Manage application features Secure app configuration data 22 - Explore API Management Discover the API Management service Explore API gateways Explore API Management policies Create advanced policies Secure APIs by using subscriptions Secure APIs by using certificates 23 - Explore Azure Event Grid Explore Azure Event Grid Discover event schemas Explore event delivery durability Control access to events Receive events by using webhooks Filter events 24 - Explore Azure Event Hubs Discover Azure Event Hubs Explore Event Hubs Capture Scale your processing application Control access to events Perform common operations with the Event Hubs client library 25 - Discover Azure message queues Choose a message queue solution Explore Azure Service Bus Discover Service Bus queues, topics, and subscriptions Explore Service Bus message payloads and serialization Explore Azure Queue Storage Create and manage Azure Queue Storage and messages by using .NET 26 - Monitor app performance Explore Application Insights Discover log-based metrics Instrument an app for monitoring Select an availability test Troubleshoot app performance by using Application Map 27 - Develop for Azure Cache for Redis Explore Azure Cache for Redis Configure Azure Cache for Redis Interact with Azure Cache for Redis by using .NET 28 - Develop for storage on CDNs Explore Azure Content Delivery Networks Control cache behavior on Azure Content Delivery Networks Interact with Azure Content Delivery Networks by using .NET

AZ-204T00 Developing Solutions for Microsoft Azure
Delivered OnlineFlexible Dates
£2,975

Kick Start Your Career with CompTIA's Data Analysis Certification - Live Classes

5.0(1)

By Media Tek Training Solutions Ltd

Get job ready with CompTIA's Data Analysis Certification. Live Classes - Career Guidance - Exam Included.

Kick Start Your Career with CompTIA's Data Analysis Certification - Live Classes
Delivered OnlineFlexible Dates
£1,595

Influenza (Flu) Update

5.0(22)

By Wren Healthcare Ltd

Empower healthcare professionals with advanced flu immunisation skills. Comprehensive training covers vaccination strategies, legal considerations, and effective communication. Elevate community protection against seasonal flu threats.

Influenza (Flu) Update
Delivered OnlineFlexible Dates
£630

Becoming an effective primary history subject leader

5.0(1)

By Historical Association

What does this course cover? This is an online course for developing history leadership in primary teaching. This term, we will be piloting the course as an immersive programme covering the key elements of primary history subject leadership, enabling all involved in history leadership at primary to carry out their role effectively. How is this course structured and delivered? Sessions 1, 8 and 10 are compulsory to attend live. Participants will be required to complete a gap task after each session and contribute to an online reflection diary. The other sessions will be recorded for participants to work through at their convenience. Who is this course for? This programme is designed for anyone who is a subject coordinator or subject leader for history in their primary school. You may have just been appointed as a subject leader, or be more experienced but looking for formal training or fresh inspiration and direction. What are the outcome? This course will: equip you fully for the demands of history leadership in primary schools increase your confidence to develop an innovative, inclusive and effective history curriculum in your school develop your understanding of efficient action planning and how to make a wider impact help you to make the case for history with senior leaders enable you to enthuse others and lead staff meetings about history develop your understanding of current issues in primary history education The course will include a chance to share resources and assessment approaches, plus much more What will each session cover? Session 1: Introductory meeting (Live attendance) Wednesday 15 October 2025, 4pm–5.30pm Introduction and aims Reflection activity on the current state of history in your school Key responsibilities of the history subject leader Current Ofsted implications for the subject and what to expect in an inspection How the HA and latest Ofsted material can support you Session 2: What makes an effective history subject leader? (Recorded) How to effectively support teachers and learners as a history leader How to create a vision, lead change, and manage time Effective action planning and improvement Auditing your history provision and building your evidence trail Developing an innovative, inclusive and effective history curriculum in your school Disciplinary knowledge: What is history? What do historians do? Suggested gap task: Conducting teacher and/or pupil voice questionnaires. Compulsory gap task: Add to your reflection diary for the programme. If relevant, reflect on how you will use the teacher questionnaire or pupil voice. Session 3: What makes effective teaching of history? (Recorded) The role of the teacher Supporting SEND pupils Securing substantive knowledge and concepts across the curriculum How to support colleagues by identifying core knowledge How to involve the whole staff in mapping out and embedding the progression of concepts across the curriculum Suggested gap task: Consider SEND in your curriculum. Compulsory gap task: Add to your reflection diary for the programme reflecting on SEND. Session 4: Curriculum and practice at EYFS (Recorded) Unpicking and supporting the requirements of the EYFS curriculum and Development Matters Developing historical and chronological understanding in EYFS as part of Understanding the world Progression and transition from EYFS to Key Stage 1 Ensuring coherence: how to start developing concepts Making use of the local history on your doorstep for EYFS and KS1 Accessing resources and support for EYFS Suggested gap task: Fact finding and liaison. Compulsory gap task: Add to your reflection diary for the programme reflecting on current EYFS practice. Session 5: Curriculum and practice at Key Stage 1 (Recorded) Unpicking and supporting the requirements of the National Curriculum for KS1 Progression: building upon transition from EYFS What do KS1 require before KS2? Ensuring coherence: further developing the school’s chosen substantive concepts How to develop disciplinary concepts Developing appropriate chronological understanding in KS1 Enhancing and engaging children’s knowledge and retention through enquiry The use of working walls in KS1 to support learning Accessing resources and support for KS1 Suggested gap task: Check your KS1 curriculum for coverage and progression, building upon what they have learnt in EYFS. Compulsory gap task: Add to your reflection diary for the programme reflecting on KS1 practice in your setting. Session 6: Curriculum and practice at Key Stage 2 (Recorded) Unpicking and supporting the requirements of the National Curriculum for KS2 How to incorporate local history with progression in KS2 What do we want the children in Year 6 to leave with? Developing appropriate chronological understanding in KS2 Preparing for transition to Key Stage 3 Ensuring coherence: building upon the school’s chosen concepts for progression What the HA can do to support the teaching of KS2 units? Resources and support for KS2 Suggested gap task: Check your KS2 curriculum for coverage and progression, building upon what they have learnt in EYFS and KS1. Compulsory gap task: Add to your reflection diary for the programme reflecting on KS2 practice in your setting. Session 7: Approaching sensitive issues in history (Recorded) What do we mean by diversity in history and why is it important? How to ensure a wider diversity in your history teaching Barriers to making the curriculum more diverse and how to overcome them Approaches to sensitive issues in history lessons, including: - Refugees and migration history - War - Climate change Suggested gap task: Consider opportunities for increasing diverse voices and raising climate issues in your curriculum. Compulsory gap task: Add to your reflection diary for the programme considering how you might address the sensitive or current issues raised in this session. Session 8: Interim review meeting (Live attendance) Monday 19 January 2026, 4pm–5.30pm A review session allowing subject leaders to reflect upon their progress so far Opportunity to respond to suggestions, clarify information, or raise issues from the previous sessions Time to ask questions, share good practice or recommended resources with the rest of the cohort Suggested gap task: Time to follow up on anything raised in this session or to complete any previous tasks, following clarification and inspiration from this session. Compulsory gap task: Add to your reflection diary for the programme, reflecting on your priorities and actions using suggestions from the presenter or other delegates. Session 9: Assessment and evidence (Recorded) Assessment and expectations A word about writing Triangulating the evidence What to look for in a work scrutiny Suggested gap task: Conduct a work scrutiny on one aspect to check across the school, in conjunction with a focused pupil voice on the same aspect. Compulsory gap task: Add to your reflection diary considering how you will conduct a work scrutiny and what you will focus on – or, if relevant, reflect on what you discovered and how you will address any issues. Session 10: Final meeting (Live attendance) Wednesday 11 February 2026, 4pm–5.30pm Following up any requests arising from the interim meeting (Session 8) Discussion or clarification of any issues arising from previous sessions Discussion of priorities, next steps and any issues Sharing ideas for enthusing others and leading staff meetings: “What worked for me?” Communicating with headteachers, governors, colleagues and parents Are you ready for the HA Quality Mark? Suggested gap task: Identifying your school’s next steps Compulsory gap task: Complete your final piece in your reflection diary.

Becoming an effective primary history subject leader
Delivered Online + more
£215 to £299.17