• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3215 Pha courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Certified Data Centre Professional (CDCP)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is any IT, facilities or data centre professional who works in and around the data centre and who has the responsibility to achieve and improve the availability and manageability of the data centre. Overview After completion of the course the participant will be able to:? Choose an optimum site for mission-critical data centre based on current and future needs? Describe all components that are important for high availability in a data centre and how to effectively setup the data centre? Name and apply the various industry standards? Describe the various technologies for UPS, fire suppression, cooling, monitoring systems, cabling standards, etc, and to select and apply them effectively to cost-efficiently enhance the high-availability of the data centre.? Review the electrical distribution system to avoid costly downtime? Enhance cooling capabilities and efficiency in the data centre by using existing and new techniques and technologies for the increased cooling requirements of the future? Design a highly reliable and scalable network architecture and learn how to ensure installers apply proper testing techniques? Create effective maintenance contracts with equipment suppliers ensuring the best return on investment? Setup effective data centre monitoring ensuring the right people get the right message? Ensure proper security measures, both procedural and technical, are established to safeguard your company's valuable information in the data centre The course will address how to setup and improve key aspects such as power, cooling, security, cabling, safety, etc., to ensure a high available data centre. It will also address key operations and maintenance aspects. THE DATA CENTRE, IT?S IMPORTANCE AND CAUSES FOR DOWNTIME DATA CENTRE STANDARDS AND BEST PRACTICES DATA CENTRE LOCATION, BUILDING AND CONSTRUCTION * Selecting appropriate sites and buildings and how to avoid pitfalls Various components of an effective data centre and supporting facilities setup RAISED FLOOR/SUSPENDED CEILING * Uniform, concentrated and rolling load definitions Applicable standards Raised Floor guidelines Signal Reference Grid, grounding of racks Disability act and regulations Suspended ceiling usage and requirements LIGHT * Standards Light fixture types and placement Emergency lighting, Emergency Power Supply (EPS) POWER INFRASTRUCTURE * Power infrastructure layout from generation to rack level ATS and STS systems Redundancy levels and techniques Three-phase and single-phase usage Power distribution options within the computer room Power cabling versus bus bar trunking Bonding versus grounding Common Mode Noise and isolation transformers Distribution boards, form factors and IP-protection grades Power quality guidelines Real power versus apparent power How to size and calculate load in the data centre Generators Static and dynamic UPS systems, selection criteria, how they operate and energy efficiency option Battery types, correct selection and testing Thermo-graphics ELECTRO MAGNETIC FIELDS * Electrical fields and magnetic fields definitions and units of measurements Sources of EMF Effects of EMF on human health and equipment (H)EMP Standards EMF shielding solutions EQUIPMENT RACKS * Rack standards, properties and selection criteria Security considerations Power rail/strip options COOLING INFRASTRUCTURE * Temperature and humidity recommendations Cooling measurement units and conversion rates Sensible and latent heat definitions Differences between comfort and precision cooling Overview of different air conditioner technologies Raised floor versus non-raised floor cooling Placement of air conditioner units and limitations to be observed Supplemental cooling options Cold aisle/hot aisle containment WATER SUPPLY * Importance of water supply and application areas Backup water supply techniques DESIGNING A SCALABLE NETWORK INFRASTRUCTURE * The importance of a Structured Cabling System Planning considerations Copper and Fiber cable technology and standards ANSI/TIA-942 Cabling hierarchy and recommendations Testing and verification SAN storage cabling Network redundancy Building-to-building connectivity Network monitoring system requirements FIRE SUPPRESSION * Standards for fire suppression Detection systems Various total flooding fire suppression techniques and systems, their benefits and disadvantages Handheld extinguishers Signage and safety Regulatory requirements and best practices DATA CENTRE MONITORING * Data centre monitoring requirements EMS versus BMS Water leak detection systems Notification options and considerations OPERATIONAL SECURITY AND SAFETY PRACTICES * Data centre security layers Physical, infrastructure and organisational security Safety measures and essential signage LABELLING * Choosing a labelling scheme Recommended labelling practices Network labelling DOCUMENTATION * How to setup proper documentation Document management policies and procedures CLEANING * Cleaning practices for the data centre MTBF/MTTR * Standards and definitions Calculation models The ?real? value MAINTENANCE CONTRACTS/SLA/OLA EXAM: CERTIFIED DATA CENTRE PROFESSIONAL ADDITIONAL COURSE DETAILS: Nexus Humans Certified Data Centre Professional (CDCP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Data Centre Professional (CDCP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Data Centre Professional (CDCP)
Delivered Online3 days, Jun 3rd, 07:00 + 5 more
£1500

University of Cambridge & Bayfield Training - Real Estate Financial Modelling Certificate (Online Self-Study)

4.3(5)

By Bayfield Training

Bayfield Training and the University of Cambridge Department of Land Economy This prestigious eight-week online Real Estate course is suitable for modellers new to Real Estate and experienced Real Estate Analysts looking to formalise their skill set. This course will equip you with skills to start building your own financial models and the certificate will give your employers and colleagues reassurance of your expertise. If you want to enhance your financial modelling skills over an extended period, the Real Estate Financial Modelling Certificate is the course for you. This online real estate course has been put together exclusively for the Real Estate Financial Modelling certificate, using state of the art digital resources such as animations, video-steps, digital whiteboard and video-interactions as well as the spreadsheets, text based resources and tutor contact you would expect from any of Bayfield Training’s classroom based courses.  Assessment is in the form of a guided model build exercise and written model appraisal. Participants benefit from an additional months access to the course platform after submission of the assessment. ON THIS COURSE YOU WILL: * Become a competent model builder, building Real Estate Financial Models from scratch * Learn tricks and concepts from financial modelling experts with decades of experience in practice and academia * Learn how to use Real Estate Financial Models to make informed investment decisions * Learn at a consistent pace over 8 weeks allowing you to take the time to fully grasp this important skill THIS COURSE IS SUITABLE FOR: * Chartered Surveyors * Asset Managers * Financial Controllers * Financial Analysts * Investment Managers * Property Managers * Real Estate Students/Recent Graduates Course Outline: Module 1 - Economic Context Introduction to Real Estate Asset Modelling and how it relates to and is distinct from Econometric Models. * Introduction to Real Estate Asset Modelling and how it relates to and is distinct from Econometric Models. * Why Real Estate Asset Modelling is important * Understanding the occupier, asset and development markets and the relevant modelling approaches for each * Real Estate Sub-Sector Key Performance Indicators * Introduction to conventional valuations and financial mathematics * Understanding and minimising errors in Financial Models Module 2 - Cash Flow Fundamentals Constructing a financial model from first principles. * Understanding all the components of a basic cash flow model * Understand why Corporate Finance Models and Real Estate Models are different * Financial Model Design * Making the link between valuations, income mathematics and discounted cash flows * Internal Rate of Return, Net Present Value,Worth and other metrics * Features and techniques to aid fast model building Module 3 - Developing the Cash Flow Adapting financial models for different periodicities and building rent functions for different rent behaviour. * Understanding how leases vary with respect to rent over time: Rent Reviews, Break Clauses, Rent Free Periods, Lease Expiries etc. * Developing the concept of a Rent Function in Excel * Logic mathematics and Logic functions * Projecting rent to adapt to different lease contracts and growth patterns * Alternative solutions to Logic functions * Comparative analysis of lease structures in different jurisdictions and adapting financial models Module 4 - Real Estate Data Understanding the different sources of data, constructing basic time series models and recognising basic patterns. * Key Property market indicators * Characteristics and application of key input metrics for Real Estate Appraisals * Understanding the eight components of Real Estate Price Dynamics * Awareness of the different sources of data * Reading and using general property market reports * Constructing basic time series models and recognising basic patterns Module 5 - Development Appraisals Constructing a development appraisal from first principles and understanding development return metrics. * Understanding the key components of a development project * Understanding the difference between development and investment appraisals * Residual Appraisals and Profit Calculations * Cost orientated cash flows and phased sales * Cumulative construction cost patterns: incidental, fixed, loaded and S-curve * Development return metrics and Modified IRRs Module 6 - Multi-let Cash Flows Constructing an advanced multi-let cash flow model and learn different techniques to build flexible rent functions. * Multi-let and portfolio model design principles * Building complex date functions and date series * The three multi-let rent projection techniques * Perpendicular Rent Functions * Incorporate advanced rent adjustments into the Rent Function * Incorporate sector and period varying rental growth rates * Simplifying OPEX and CAPEX projections * Discounting techniques on complex and volatile cash flows Module 7 - Project Finance Constructing a flexible Real Estate Debt Finance model. * Revision of the Mathematics of amortisation and debt finance * Basic senior debt models and geared net cash flow * LTV, IRR and Interest Rate Dynamics * Flexible term, repayment options and deferred interest * Loan covenant tests * Understanding different tranches of debt * Understanding how complex debt structures impact the returns to different parties Module 8 - Model Interpretation and Risk Analysis Learn how to read, analyse and report on real estate financial models. * Understand how to read models and develop an investment narrative * Visualise model outputs using graph functions, conditional formatting, dynamic symbols and dashboards * Learn how to use built-in Sensitivity, Scenario Analysis tools and third-party add-ins * Learn how to construct varied project scenarios in a systematic way * Introduction to Monte Carlo Analysis and VBA * Optimising sale dates and other parameters * Create well written, attractive and persuasive reports Included in the Course * Bayfield Training and University of Cambridge Accredited Certificate & LinkedIn Proficiency Badge * 64 CPD Hours * 1 Month Post-Course Access to the Digital Platform - 12 Months Post-Course Access to the Platform can be purchased for an additional fee * Course Files * Q&A Webinars and Guest Speaker Webinars * Further Learning Resources (Reading, Files and Videos) * Post Course Support - Two Months of Questions & Answers 2024 Cohort Dates Include: * 3rd June to 29th July * 5th August to 25th September 2024 * 30th September to 25th November For more information, please contact Sam on the Bayfield Training Sales team: E - s.musgrave@bayfieldtraining.com T - 01223 517851 W - www.bayfieldtraining.com [https://www.bayfieldtraining.com/]

University of Cambridge & Bayfield Training - Real Estate Financial Modelling Certificate (Online Self-Study)
Delivered Online or in person8 weeks, Jun 3rd, 09:00 + 2 more
£2500

CertNexus Certified Cyber Secure Coder (CSC-210)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for software developers, testers, and architects who design and develop software in various programming languages and platforms, including desktop, web, cloud, and mobile, and who want to improve their ability to deliver software that is of high quality, particularly regarding security and privacy. This course is also designed for students who are seeking the CertNexus Cyber Secure Coder (CSC) Exam CSC-210 certification Overview In this course, you will employ best practices in software development to develop secure software.You will: Identify the need for security in your software projects. Eliminate vulnerabilities within software. Use a Security by Design approach to design a secure architecture for your software. Implement common protections to protect users and data. Apply various testing methods to find and correct security defects in your software. Maintain deployed software to ensure ongoing security... The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle. This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development. IDENTIFYING THE NEED FOR SECURITY IN YOUR SOFTWARE PROJECTS * Identify Security Requirements and Expectations * Identify Factors That Undermine Software Security * Find Vulnerabilities in Your Software * Gather Intelligence on Vulnerabilities and Exploits HANDLING VULNERABILITIES * Handle Vulnerabilities Due to Software Defects and Misconfiguration * Handle Vulnerabilities Due to Human Factors * Handle Vulnerabilities Due to Process Shortcomings DESIGNING FOR SECURITY * Apply General Principles for Secure Design * Design Software to Counter Specific Threats DEVELOPING SECURE CODE * Follow Best Practices for Secure Coding * Prevent Platform Vulnerabilities * Prevent Privacy Vulnerabilities IMPLEMENTING COMMON PROTECTIONS * Limit Access Using Login and User Roles * Protect Data in Transit and At Rest * Implement Error Handling and Logging * Protect Sensitive Data and Functions * Protect Database Access TESTING SOFTWARE SECURITY * Perform Security Testing * Analyze Code to find Security Problems * Use Automated Testing Tools to Find Security Problems MAINTAINING SECURITY IN DEPLOYED SOFTWARE * Monitor and Log Applications to Support Security * Maintain Security after Deployment

CertNexus Certified Cyber Secure Coder (CSC-210)
Delivered Online4 days, Jun 4th, 13:00 + 1 more
£2085

Introduction to Menopause

By BBO Training

Introduction to Menopause (via Zoom) Course Focus: This comprehensive two-day course serves as an invaluable introduction to menopause care within the primary care setting. Understanding menopause, its effective management, and the ensuing implications for women's well-being are pivotal aspects for healthcare practitioners, particularly practice nurses who frequently engage with women facing menopausal transitions during their consultations. Course Highlights: Understanding Menopause: Dive into the core concepts of menopause, grasping its multifaceted aspects, and gaining a deep understanding of its physical, emotional, and psychological dimensions. Effective Menopause Management: Explore optimal strategies for managing menopause, equipping practitioners to provide well-informed guidance to women traversing this life phase. Short and Long-Term Implications: Delve into the implications of menopause for women's well-being, both in the short and long term, enabling practitioners to offer holistic care that addresses immediate concerns and promotes long-term health. Tailored Approach for Practice Nurses and AHP's: Recognize the pivotal role of practice nurses and AHP's in menopause care, understanding the specific challenges they encounter during consultations with menopausal patients. Competency Framework for Progression: Access a comprehensive competency framework that empowers nurses to work towards mastery in menopause care. This framework can be validated by experienced team members, fostering ongoing skill development. Dynamic Learning Environment: Through interactive sessions, case studies, and discussions, participants will engage in a dynamic learning environment that facilitates the absorption of knowledge and practical insights. The course encourages networking and collaboration, enabling practitioners to learn from both expert facilitators and fellow participants. Learning Outcomes: Upon completion of this two-day course, participants will be equipped to approach menopause care with heightened confidence and competence. Whether they occasionally encounter menopausal patients or engage with them more regularly, practitioners will leave with the tools and strategies to provide informed and supportive care, positively impacting women's well-being during this transitional phase. Target Audience: This course is tailored for a diverse range of primary care practitioners, including practice nurses, cervical sample takers, and those who regularly engage with menopausal patients without specialized training. All practitioners seeking to enhance their expertise in menopause care are welcome to attend. Day One 09.15Coffee and registration 09.30Introduction and course objectives 09.40Physiology and definitions 10.00Menopause symptoms 10.45Coffee 11.00What do we need to ask? 13.00Lunch 14.00Management Strategies: Hormonal and non-hormonal treatment of menopause symptoms 14.30Diet, Lifestyle and Exercise 14.30Complementary therapies 15.00Case Studies  15.30Action plan, evaluation, and resources 15.45Close DAY 2 09.15Coffee and registration 09.30Review of Day 1 and tasks 09.45Women with special needs 10.00Contraceptive options for peri-menopausal women 10.45Coffee 11.00What do we need to ask? 13.00Lunch 14.00Which HRT when and how 14.30The older woman 15.00Case Studies  15.30Action plan, evaluation, and resources 15.45Close

Introduction to Menopause
Delivered Online6 hours 30 minutes, Jun 5th, 08:30 + 1 more
£300

Interpreting Blood Results

By BBO Training

Interpreting Blood Results BBO Training has been inundated with requests for courses following the success of our previous offerings, such as NMP Update, Minor Illness, and Diabetes. In response to this demand, we are delighted to introduce a full-day course on the crucial topic of 'Interpreting Blood Results within Primary Care.' This comprehensive program is tailored for experienced Practice Nurses, ANP's, ENP's, Paramedics, and Pharmacists who seek to enhance their proficiency in this vital area. Course Details: Course Schedule: - 09:15 - Coffee and Registration - 09:30 - Introduction and Course Objectives - 09:45 - The 'Full Blood Count,' Including Anemias and B12 - 11:30 - Coffee Break - 11:50 - The 'LFT' - How to Recognize and Manage Deranged LFTs - 12:30 - Lunch - 13:30 - U&E (Urea and Electrolytes) - 14:15 - Acute Kidney Injury (AKI) - 15:00 - Lipids - 15:45 - Evaluations and Course Conclusion Learning Outcomes: By the end of this course, participants will have achieved the following learning outcomes: 1. Understanding of FBC: Develop the ability to interpret a Full Blood Count (FBC), including knowing when to repeat, escalate, and manage simple anemias effectively. 2.Organ-Blood Test Link: Gain insight into the connections between various organs and their relevant blood tests, fostering a holistic understanding of patient health. 3. Medication-Test Relationship: Review the links between different drug groups and the necessary monitoring required for safe practice and prescribing. 4. Chronic Disease Relevance: Develop an awareness of why specific tests are appropriate within various chronic disease groups, improving patient care. 5. National Guidance Awareness: Examine the connections between national guidance (e.g., NICE) and professional judgment, ensuring adherence to best practices. 6. Professional Development: Enhance your awareness of ongoing development within your practice and uphold professional accountability in this specialized field. Our course is designed to provide valuable Continuing Professional Development (CPD) for GPs, nurses, and pharmacists. It's ideal for professional revalidation, with reflective discussions seamlessly integrated into the program. We look forward to welcoming you to this engaging and informative training session. Join us in advancing your knowledge and expertise in interpreting blood results within the primary care setting.

Interpreting Blood Results
Delivered Online6 hours 30 minutes, Jun 5th, 08:30
£180

Student Visas & Other Routes Course

By Immigration Advice Service

Our Student Visas & Other Routes course is a half-day course dedicated to those who want to develop a better understanding of student routes available in the UK. -------------------------------------------------------------------------------- COURSE OVERVIEW:  Our Student Visas & Other Routes course is a comprehensive half-day training course dedicated to providing you with a better understanding of student routes in the UK. This highly requested course has been meticulously designed to offer invaluable insights into the various student visa options available. During the training, we will cover a range of crucial areas. This includes a comprehensive overview of different routes available for students, such as the Tier 4 visa and the Graduate visa. You will gain a deep understanding of the specific requirements for student visas and the suitability criteria for each route. Additionally, our course will address what happens when a student visa is nearing its end, providing you with valuable insights into the options and procedures available during this crucial phase.   -------------------------------------------------------------------------------- The course will cover: * Different routes available for students such as the Tier 4 visa and the Graduate visa * Student visa requirements * Suitability * What happens once a student visa is coming to an end. * Any updates to student visas when they are announced.   Course joining links, materials and instructions are sent out 24hours before the course starts.

Student Visas & Other Routes Course
Delivered Online4 hours, Jun 5th, 09:00
£120

ABT/NVQ Level 3 Upgrade Electrolysis Course

By The Angel Academy Of Teaching & Training

What Does The Course Include? When choosing a course ensure that it includes both theory and a wide variety of practical content. Every course should include: Anatomy and Physiology Types & structure of the hair Skin, blood and lymphatic circulation Reproductive and endocrine system Theory of Electric Currents Consultations & Record Cards Contra-indications & contra-actions Aftercare advice Choice of needles / probes Accurate probing techniques Legislation, Hygiene and Sterilisation Performing the correct stretch Short-wave Diathermy Galvanic/Blend The Heating Pattern Correct Insertion Techniques The Target Area Unusual Hair Growth FAQ’s Health and Safety Areas Treated This informal and structured weekend will teach all the required techniques necessary to perform successful hair removal treatments. Performed on massage couches, each student will receive guidance on how to effectively perform a full electrolysis treatment on the following areas: Leg Bikini Underarm Nape of Neck Brow Lip Chin Chest The Angel Academy prides itself on always a 100% pass rate for all of its courses since 2003. Classes are kept relatively small so that the tuition can always be of the highest standard. Over the years, all manner of student has come to the Angel Academy from Celebrity to Supermodel to Housewife to Career person looking for a way to relax from the every-day stress and strains that life presents them with.

ABT/NVQ Level 3 Upgrade Electrolysis Course
Delivered In-Person in LoughtonFull day, Jun 8th, 08:00 + 5 more
£699

EC-Council Certified Cybersecurity Technician (C|CT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to: Early-career IT professionals, IT managers, career changers, and career advancers Students and recent graduates Overview After completing this course, you will understand: Key concepts in cybersecurity, including information security and network security Information security threats, vulnerabilities, and attacks The different types of malware Identification, authentication, and authorization Network security controls Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management) Application security design and testing techniques Fundamentals of virtualization, cloud computing, and cloud security Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures Cryptography and public-key infrastructure Data security controls, data backup and retention methods, and data loss prevention techniques Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic The incident handling and response process Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation Concepts in business continuity and disaster recovery Risk management concepts, phases, and frameworks EC-Council?s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs. COURSE OUTLINE * Information Security Threats and Vulnerabilities * Information Security Attacks * Network Security Fundamentals * Identification, Authentication, and Authorization * Network Security Controls: Administrative Controls * Network Security Controls: Physical Controls * Network Security Controls: Technical Controls * Network Security Assessment Techniques and Tools * Application Security * Virtualization and Cloud Computing * Wireless Network Security * Mobile Device Security * Internet of Things (IoT) and Operational Technology (OT) Security * Cryptography * Data Security * Network Troubleshooting * Network Traffic Monitoring * Network Log Monitoring and Analysis * Incident Response * Computer Forensics * Business Continuity and Disaster Recovery * Risk Management

EC-Council Certified Cybersecurity Technician (C|CT)
Delivered Online6 days, Jun 10th, 13:00 + 1 more
£3495

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. COMPUTER FORENSICS IN TODAY?S WORLD * 1.1. Understand the Fundamentals of Computer Forensics * 1.2. Understand Cybercrimes and their Investigation Procedures * 1.3. Understand Digital Evidence * 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security * Operations Center) in Computer Forensics * 1.5. Identify the Roles and Responsibilities of a Forensic Investigator * 1.6. Understand the Challenges Faced in Investigating Cybercrimes * 1.7. Understand Legal Compliance in Computer Forensics * COMPUTER FORENSICS INVESTIGATION PROCESS * 2.1. Understand the Forensic Investigation Process and its Importance * 2.2. Understand the Pre-investigation Phase * 2.3. Understand First Response * 2.4. Understand the Investigation Phase * 2.5. Understand the Post-investigation Phase * UNDERSTANDING HARD DISKS AND FILE SYSTEMS * 3.1. Describe Different Types of Disk Drives and their Characteristics * 3.2. Explain the Logical Structure of a Disk * 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems * 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems * 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools * 3.6 Understand Storage Systems * 3.7. Understand Encoding Standards and Hex Editors * 3.8. Analyze Popular File Formats Using Hex Editor * DATA ACQUISITION AND DUPLICATION * 4.1. Understand Data Acquisition Fundamentals * 4.2. Understand Data Acquisition Methodology * 4.3. Prepare an Image File for Examination * DEFEATING ANTI-FORENSICS TECHNIQUES * 5.1. Understand Anti-forensics Techniques * 5.2. Discuss Data Deletion and Recycle Bin Forensics * 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions * 5.4. Explore Password Cracking/Bypassing Techniques * 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch * 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption * 5.7. Detect Program Packers and Footprint Minimizing Techniques * 5.8. Understand Anti-forensics Countermeasures * WINDOWS FORENSICS * 6.1. Collect Volatile and Non-volatile Information * 6.2. Perform Windows Memory and Registry Analysis * 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers * 6.4. Examine Windows Files and Metadata * 6.5. Understand ShellBags, LNK Files, and Jump Lists * 6.6. Understand Text-based Logs and Windows Event Logs * LINUX AND MAC FORENSICS * 7.1. Understand Volatile and Non-volatile Data in Linux * 7.2. Analyze Filesystem Images Using The Sleuth Kit * 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec * 7.4. Understand Mac Forensics * * NETWORK FORENSICS * 8.1. Understand Network Forensics * 8.2. Explain Logging Fundamentals and Network Forensic Readiness * 8.3. Summarize Event Correlation Concepts * 8.4. Identify Indicators of Compromise (IoCs) from Network Logs * 8.5. Investigate Network Traffic * 8.6. Perform Incident Detection and Examination with SIEM Tools * 8.7. Monitor and Detect Wireless Network Attacks * INVESTIGATING WEB ATTACKS * 9.1. Understand Web Application Forensics * 9.2. Understand Internet Information Services (IIS) Logs * 9.3. Understand Apache Web Server Logs * 9.4. Understand the Functionality of Intrusion Detection System (IDS) * 9.5. Understand the Functionality of Web Application Firewall (WAF) * 9.6. Investigate Web Attacks on Windows-based Servers * 9.7. Detect and Investigate Various Attacks on Web Applications * DARK WEB FORENSICS * 10.1. Understand the Dark Web * 10.2. Determine How to Identify the Traces of Tor Browser during Investigation * 10.3. Perform Tor Browser Forensics * DATABASE FORENSICS * 11.1. Understand Database Forensics and its Importance * 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server * 11.3. Collect Evidence Files on MSSQL Server * 11.4. Perform MSSQL Forensics * 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory * 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis * 11.7. Perform MySQL Forensics on WordPress Web Application Database * CLOUD FORENSICS * 12.1. Understand the Basic Cloud Computing Concepts * 12.2. Understand Cloud Forensics * 12.3. Understand the Fundamentals of Amazon Web Services (AWS) * 12.4. Determine How to Investigate Security Incidents in AWS * 12.5. Understand the Fundamentals of Microsoft Azure * 12.6. Determine How to Investigate Security Incidents in Azure * 12.7. Understand Forensic Methodologies for Containers and Microservices * INVESTIGATING EMAIL CRIMES * 13.1. Understand Email Basics * 13.2. Understand Email Crime Investigation and its Steps * 13.3. U.S. Laws Against Email Crime * MALWARE FORENSICS * 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware * 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis * 14.3. Understand and Perform Static Analysis of Malware * 14.4. Analyze Suspicious Word and PDF Documents * 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches * 14.6. Analyze Malware Behavior on System Properties in Real-time * 14.7. Analyze Malware Behavior on Network in Real-time * 14.8. Describe Fileless Malware Attacks and How they Happen * 14.9. Perform Fileless Malware Analysis - Emotet * MOBILE FORENSICS * 15.1. Understand the Importance of Mobile Device Forensics * 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices * 15.3. Explain the Steps Involved in Mobile Forensics Process * 15.4. Investigate Cellular Network Data * 15.5. Understand SIM File System and its Data Acquisition Method * 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices * 15.7. Perform Logical Acquisition on Android and iOS Devices * 15.8. Perform Physical Acquisition on Android and iOS Devices * 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report * IOT FORENSICS * 16.1. Understand IoT and IoT Security Problems * 16.2. Recognize Different Types of IoT Threats * 16.3. Understand IoT Forensics * 16.4. Perform Forensics on IoT Devices *

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered Online6 days, Jun 10th, 13:00 + 2 more
£3495

A System Approach to Good Pharmacovigilance Practice

By Research Quality Association

COURSE INFORMATION In today's evolving landscape, pharmacovigilance (PV) systems face ongoing challenges due to global, national, and company-specific events. This course focuses on developing personnel equipped to navigate these complexities and improve the safe use of medicinal products. We emphasise continuous global thinking, communication, and strategic planning, ensuring adaptability across various levels. The course explores maintaining PV system functionality while adhering to regulatory requirements. Participants will apply European regulatory standards to enhance and sustain PV system effectiveness, contributing to improvement initiatives and ensuring operational integrity. The course covers PV system intricacies, regulatory compliance, and a 'systems approach' for auditors, quality assurance personnel, and PV practitioners. Through presentations and workshops, attendees gain insights into implementing and maintaining an effective PV system. WHO SHOULD ATTEND? * Auditors * Pharmacovigilance Quality System Managers * Pharmacovigilance scientists * The QPPV. COURSE BENEFITS Throughout the course delegates will explore application of the legal requirements for the PV system and quality system and how to assure these systems. They will demonstrate their ability to contribute to: * A systematic investigation of the pharmacovigilance system and its quality system * Examination of how the pharmacovigilance system and quality system interact to achieve compliance. * The risk-based approach to auditing the PV system and quality system * The maintenance of 'inspection readiness' * Explore how to investigate the complex PV system * Discussions about how to monitor and maintain the PV system and assure compliance. COURSE OBJECTIVES CLARIFY WHAT HAS TO BE DONE: * Explore application of the legal requirements. EXPLORE HOW TO DO WHAT HAS TO BE DONE: * Adopt a systemic approach to systematically investigate or implement and maintain the PV system and quality system * Examine how a compliant PV system and a compliant quality system interact to achieve compliance with regulatory requirements for PV * Explore how to investigate the complexity of the PV system. DISCUS HOW TO IDENTIFY WHAT IS MISSING OR WHAT NEEDS TO BE IMPROVED: * Discuss how to monitor and maintain the PV system and assure compliance. THIS COURSE WILL ASSIST DELEGATES WITH: * An understanding of key system principles, * A practical approach to implementing, maintaining and monitoring the PV system and its quality system * A procedure to share expertise to increase efficiency and confidence. THIS COURSE IS STRUCTURED TO ENCOURAGE DELEGATES TO: * Discuss and develop ideas -  Share knowledge and experiences -  Solve specific problems.  BY THE END OF THE COURSE DELEGATES WILL BE ABLE TO: * Understand better the pharmacovigilance system, its quality system and how the components interact to achieve the objectives of pharmacovigilance * Investigate, and analyse the pharmacovigilance system and to identify what is missing and what needs to be improved. -------------------------------------------------------------------------------- TUTORS Tutors will be comprised of (click the photos for biographies): JANA HYANKOVA Head of PV Department, IVIGEE Services a.s. -------------------------------------------------------------------------------- PROGRAMME Please note timings may be subject to alteration. DAY 1 08:30 WELCOME, REGISTRATION, COURSE OBJECTIVES AND INTRODUCTION TO WORK GROUPS Housekeeping notices, meet other delegates, explore how to work in your work group, course objectives. Clarify the definition and objectives of Pharmacovigilance. 09:30 THE REGULATORY FRAMEWORK FOR PHARMACOVIGILANCE Identify the relevant regulations and directives. Explore GVP guidance, structure of the modules and standard format of each module. 10:00 THE PHARMACOVIGILANCE SYSTEM Exploration of how to organise what has to be done, communications. Exploration of the structures and processes for pharmacovigilance. 10:30 BREAK 11:00 WORKSHOP 1 AND FEEDBACK Exploring an organisational model of the pharmaceutical company- cooperation between PV and other stakeholders. 12:00 THE QUALITY SYSTEM FOR PHARMACOVIGILANCE Exploration of the structures, processes for the PV quality system and discussion of how it interacts with the pharmacovigilance system to meet the objectives of pharmacovigilance effectively and efficiently. 13:00 LUNCH 14:00 WORKSHOP 2 AND FEEDBACK The quality system puzzle. Explore the organisation of the PV quality system and how it interacts with the PV system. 14:30 THE QUALITY SYSTEM FOR PHARMACOVIGILANCE Exploration of the structures processes for the PV quality system and discussion of how it interacts with the pharmacovigilance system to meet the objectives of pharmacovigilance effectively and efficiently. 15:00 DESCRIPTION OF PV SYSTEM 15:30 BREAK 15:30 WORKSHOP 3 AND FEEDBACK The quality system puzzle Explore the organisation of the PV quality system and how it interacts with the PV system. 16:00 THE PHARMACOVIGILANCE SAFETY MASTER FILE Construction of the Pharmacovigilance System Master File and its purpose. 17:00 WORKSHOP 3 AND FEEDBACK Description of PV System. 18:00 END OF DAY DAY 2 08:30 DRUG SAFETY IN THE CLINICAL TRIAL ENVIRONMENT - PART 1 Information flow and responsibilities of the sponsor. 09:30 WORKSHOP 4 AND FEEDBACK Drug Safety in the Clinical Trial environment: Information flow and responsibilities of the sponsor. 10:30 BREAK 11:00 DRUG SAFETY IN THE CLINICAL TRIAL ENVIRONMENT - PART 2 Information flow and responsibilities of the sponsor. 12:00 LUNCH 13:00 WORKSHOP 5 AND FEEDBACK Drug Safety in the clinical trial environment: Information flow and responsibilities of the sponsor. 13:30 PROCESSING OF SAFETY DATA Exploration of safety data processing, verification, validation, follow up, formatting and collation, reporting requirements, quality and data management. 15:00 BREAK 15:30 EUDRAVIGILANCE Exploration of how EudraVigilance supports the PV system. 16:15 SIGNAL DETECTION AND EVALUATION/RISK BENEFIT ASSESSMENT: PHARMACOVIGILANCE RISK ASSESSMENT COMMITTEE (PRAC): What is a signal? What are the regulatory requirements? How is signal detection and evaluation conducted? Qualitative and quantitative methods of signal detection. Risk benefit assessment. 17:00 RISK MANAGEMENT PLANS A cornerstone of Pharmacovigilance safety communications, direct healthcare professional communication 18:00 END OF DAY DAY 3 08:30 THE PHARMACOVIGILANCE RISK ASSESSMENT COMMITTEE (PRAC) Exploration of how good practice is achieved. Composition, role and responsibilities. Examples of referrals. 09:15 DEVELOPMENT SAFETY UPDATE REPORTS (DSURS): Regulatory requirements, exploring good practice, report format, reference safety information, schedule of submission, analysis evaluations and distribution. 10:00 PERIODIC SAFETY UPDATE REPORTS (PSURS)/PERIODIC BENEFIT RISK EVALUATION REPORTS (PBRERS) Regulatory requirements, exploring good practice, report format, reference safety information, schedule of submission, analysis evaluations and distribution. 10:30 BREAK 11:00 PERIODIC SAFETY UPDATE REPORTS (PSURS)/PERIODIC BENEFIT RISK EVALUATION REPORTS (PBRERS) Regulatory requirements, exploring good practice, report format, reference safety information, schedule of submission, analysis evaluations and distribution. 12:00 WORKSHOP 6 AND FEEDBACK To explore the compilation and submission of the PSUR. 13:00 LUNCH 13:30 ROLE OF THE QPPV Exploration of the legal responsibilities of the QPPV and the MAH. 14:30 BREAK 15:00 WORKSHOP 7 AND FEEDBACK To explore the challenges faced by the QPPV. 15:30 END OF COURSE -------------------------------------------------------------------------------- EXTRA INFORMATION Face-to-Face Course COURSE MATERIAL This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. THE ADVANTAGES OF THIS INCLUDE: * Ability for delegates to keep material on a mobile device< * Ability to review material at any time pre and post course * Environmental benefits – less paper being used per course Access to an online course group to enhance networking You will need a stable internet connection, a microphone and a webcam. CPD POINTS 23 Points   DEVELOPMENT LEVEL Develop

A System Approach to Good Pharmacovigilance Practice
Delivered In-Person in Cambridge3 days, Jun 11th, 08:00
£1297 to £1687

Educators matching "Pha"

Show all 428