• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

42 Police courses in Cardiff delivered Live Online

Certificate in Intellectual Property (CIP)

By EMG Associates UK Limited

Certificate in Intellectual Property (CIP) Why Attend As international trade and business continues to evolve, the importance of Intellectual Property Rights (IPRs) becomes increasingly vital. With new technologies and products relying heavily on IPRs, governments around the world are competing to offer higher levels of protection in order to attract investments and promote local innovation and production. Due to the complex nature of the scientific, economic, social, and theoretical aspects of IPRs, it is crucial for entities to have a comprehensive understanding of these issues. During this course, through practical workshops, case studies and expert knowledge, participants will gain an understanding of the concepts, theories, legislative and practical elements necessary to develop a successful IP strategy for their organization. Course Methodology In this interactive training course participants will frequently work in pairs as well as in larger groups to complete exercises, and regional and international case studies Course Objectives By the end of the course, participants will be able to: Understand the theoretical background of Intellectual Property (IP) and the various types of IP existence Understand the international and local set of conventions and laws governing IPRs Demonstrate deep knowledge of the conditions that should exist in each type of IPR, their registration, licensing and enforcement Apply knowledge of IPRs in all legal fields including contracts and litigation Participate effectively in building a comprehensive IP strategy for their organization Target Audience This course is suitable for professionals working in the legal and IP filed, including but not limited to; lawyers, in-house counsels, governmental officials, police, customs, health authorities, researchers, university lecturers, publishers, IP agents as well as researchers who are interested in having deeper knowledge about IP in the GCC. It will also highly benefit in-house councils who recently joined their companies in the GCC as it will give them all the knowledge needed to handle all IP issues within the region. Target Competencies General principles of IPRs Trademarks, Patents, Copyright Principles of IP Enforcement Building IP Strategy Note The Dubai Government Legal Affairs Department has introduced a Continuing Legal Professional Development (CLPD) programme to legal consultants authorised to practise through a licensed firm in the Emirate of Dubai. We are proud to announce that the Dubai Government Legal Affairs Department has accredited EMG Associates as a CLPD provider. In addition, all our legal programmes have been approved. This PLUS Specialty Training Legal course qualifies for 4 elective CLPD points. Introduction and basic concepts Types of IPRs Main theories justifying IP protection The role of IP in economic development The Role of IP in innovation and creativity The globalization of IPRs protection International conventions Trade-Related Aspects of Intellectual Property Rights (TRIPS) and the World Trade Organization The GCC Cooperation in the field of IP protection Trademarks and copyright Definition and types of marks Scope of trade marks protection Registration procedures and rights conferred to trade mark owner Legal protection of trade marks Subject matter and conditions of copyright Types of protected works Financial and moral rights Fair use, duration of protection and legal protection for copyright Patents and trade secrets Patentable inventions and types of patents Registration process Ownership and rights conferred to patent owner Employer-employee inventions and legal protection for patents Definition of trade secrets and confidential information Elements of trade secrets Utilization of trade secrets commercially Legal protection of trade secrets Building a strong IP strategy and strategic management of IPRs Overview and basic concepts Understand your business and your IP needs IP audit and building the portfolio Onward licensing (licensing process and contracts) IP commercialization mechanisms and maximizing the benefits Practical steps to building a successful IP strategy IP valuation - your gateway to know how much your IP worth Assessment of the IP strategy for further success

Certificate in Intellectual Property (CIP)
Delivered OnlineFlexible Dates
£3,822

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered OnlineFlexible Dates
£3,495

Personal safety (In-House)

By The In House Training Company

This is an essential programme for members of staff whose role involves external meetings, including seeing members of the public in their own home. Based around advice from agencies including the Suzy Lamplugh Trust and the police, this programme takes a sensible look at how to remain safe in the role. 1 What's happening? Issues around us Risks in context 2 Safety fundamentals Risk assessment Dynamic risk assessment Identifying and minimising risks Sensible precautions Use of technology and personal safety Lone working Visits and travelling 3 Harassment and stalking What constitutes harassment and definition of stalking Early warning signals 4 Reporting principles Importance of incidence reporting Taking care of us What next?

Personal safety (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

WORKSHOP: Working as a Psychologist Expert Witness specialising in Trauma and Memory: From Instruction to Cross Examination

By London Trauma Specialists

WORKSHOP: Working as a Psychologist Expert Witness specialising in Trauma and Memory: From Instruction to Cross Examination An online practical workshop for Clinical, Counselling and Forensic Psychologists, guiding you through the process of working as an Expert Witness.

WORKSHOP: Working as a Psychologist Expert Witness specialising in Trauma and Memory: From Instruction to Cross Examination
Delivered OnlineJoin Waitlist
£150

2nd Women in Local Government Leadership Workshop

5.0(1)

By Own Your Success

Women in Local Government Leadership Workshop is for Local Government professionals looking to learn new skills with like-minded peers and further or advance their within Local government.

2nd Women in Local Government Leadership Workshop
Delivered OnlineJoin Waitlist
£475 to £625

Nutritional Support for Perimenopause and Beyond with Joanne Crovini

By The Motivation Clinic

Are the many perimenopause and menopause getting you down? Feeling flat and unmotivated, feeling exhausted and unable to cope? Do you want to feel calmer, get your focus back, be more productive, sleeping better and feel more like yourself agaain? Come and learn how you don't have to suffer: get the basics back in place so you feel full of energy and get the old you back.

Nutritional Support for Perimenopause and Beyond with Joanne Crovini
Delivered OnlineFlexible Dates
£5

Domestic Abuse Training - Coercive Control

5.0(40)

By Certain Curtain Theatre Company

A unique CPD accredited course delivered online - exploring domestic violence and abuse and coercive control - utilising lived experience and dynamic original theatre to help you make sure your first response is the right response

Domestic Abuse Training - Coercive Control
Delivered OnlineFlexible Dates
£40

Internal Workplace Mediation Skills Course (5 days)

By Buon Consultancy

Workplace Mediation

Internal Workplace Mediation Skills Course (5 days)
Delivered in Edinburgh or UK Wide or OnlineFlexible Dates
Price on Enquiry

How to reduce suicide risk

By Human Givens College

– the practical steps you need to know This live online suicide intervention training covers a wealth of essential information and strategies to help you help anyone you suspect may be thinking about or planning suicide, or who has survived a previous attempt… Accredited CPD Certificate: 6 hours Length: 1 day (9.15am - 4.00pm GMT) You never know when you may need these skills… Brilliant! I’ve been on previous suicide intervention courses over the years, but this is by far the best – great pace, very knowledgeable trainer...who brings real experience into the learning...SUE HASWELL Join Malcolm Hanson LIVE ONLINE on Tuesday 12th March for his essential suicide intervention training, delivered via Zoom. Book your place and we’ll send you the Zoom link the day before the event. BONUS Recording – the training is recorded, in case anyone experiences technical difficulties, so you also get a recording for a limited time afterwards to maximise your learning. Why take this suicide prevention course Suicide can be a difficult subject to broach and a daunting one to deal with – anyone working with distressed or depressed people wants to keep them safe, to give them the hope they need that circumstances can change for the better, and to provide the skills for coping until that comes about. When people can’t envisage an end to their difficulties, particularly in highly challenging times, a slump into depression can all too quickly spiral down into suicidal thoughts, plans and suicide attempts. The negative trance state of depression itself can beguile people into thinking that there is no other way out of their hopelessness. Thankfully, there is much we can do to help – as this indepth suicide intervention course shows. Tutor Malcolm Hanson has a wealth of experience at helping seriously distressed people get through difficulties which he draws upon as he takes you clearly through the steps to take when faced with anyone who feels suicidal. (He worked for 9 years as a psychotherapist in NHS primary care in an area of extreme deprivation, and for many more years since has seen patients referred by GPs, social workers, psychiatrists, police and probation officers for complex issues.) He has successfully helped clients experiencing multiple trauma (including veterans), chronic pain and terminal illness, clients struggling with uncertain asylum status or facing deportation, and also victims of human trafficking – a tragic range of circumstances in which even the most resilient may sometimes sink into despair. His compassion and understanding shine through this course as he shares with you what he has learnt, along with the latest psychiatric research and risk assessment strategies, to give you the knowledge and assurance you need to work confidently and respectfully with clients struggling to find reasons to stay alive. You will learn how to build in expectation of positive change from the start, have plenty of time to benefit from group discussions and will work through case scenarios with other attendees to help embed your learning. Suicide affects countless people, not only those directly involved, and is now the most common cause of death in men aged 17 to 34. The highest suicide rate is in men aged 45–49; in women, it is highest in those aged between 50–54.1 Join us for this practical online suicide prevention training to learn how you can help reverse this state of affairs… Book your place So much helpful and insightful information delivered in a way that was easy to listen to and take on board...STEVEN TESSEYMAN What will you learn Deeper insight into when and why different people consider suicide Crucial elements needed to build rapport with suicidal people Why most suicidal crises are surprisingly temporary How to normalise circumstances safely A model for running therapeutic sessions that best manages suicide risk Ways to use your own demeanour to instil confidence in the person who is feeling suicidal Effective information gathering to challenge unhelpful beliefs What to look for in their answers to your questions How to broach the subject of suicidal thoughts A structure for difficult conversations The ability to reframe unhelpful beliefs Methods of risk assessment that do not risk losing rapport Advances in psychiatric research on suicide risk management and the implications of this for psychotherapy and counselling How to use language of influence Effective means to address beliefs about being a burden How to set realistic and empowering goals How to make best use of the client’s own resources The importance of addressing emotional needs How to create a safety plan Strategies for client safe self-management between sessions The power of guided imagery for working with suicidal clients Powerful insights and hope from real case histories How to take care of yourself – and more… Malcolm is a wonderful communicator: so clear, measured and thoughtful ... it was a pleasure and privilege to learn from himMATTHEW HOPKINS Course Programme The ‘How To Reduce Suicide Risk’ live online course starts at 9.15am and runs until 4.00pm. 9.15am Join the Zoom meeting 9.30am The important first steps for suicide risk management 11.00am Comfort break and discussion 11.30am Working with what the client brings 1.00pm Lunch break 1.45pm Rehearsing the safety plan 2.45pm Comfort break and discussion 3.00pm Putting what you have learned into practice 4.00pm Day ends Who is this suicide awareness and prevention course for? Psychotherapists and counsellors All mental health and welfare professionals – including GPs, social workers, the emergency services, pastoral care and outreach workers – and anyone else working with people with suicidal ideation Anyone concerned for personal or HR reasons – the training contains a lot of key, helpful information which is presented in a clear, easy to understand way, even though it is primarily geared towards carrying out therapy effectively with suicidal clients Anyone working with young people, such as teachers and youth workers, will benefit from this live online suicide intervention course Anyone who may come into contact with people who are very distressed, whether through their paid or volunteer work, will also learn essential live-saving information. Please Note This course is not a substitute for therapy. Reference 1. www.ons.gov.uk/peoplepopulationandcommunity/birthsdeathsandmarriages/deaths/bulletins/suicidesintheunitedkingdom/2019registrations The one certainty in life is that circumstances ALWAYS change... This online suicide awareness and prevention course has been independently accredited by the internationally recognised CPD Standards Office for 6 hours of CPD training. On completion of this training you’ll receive CPD certificates from the College and the CPD Standards Office.

How to reduce suicide risk
Delivered OnlineFlexible Dates
£125

Criminal Law

By NextGen Learning

Course Overview This Criminal Law course provides an in-depth exploration of the fundamental principles and practices within criminal law. Covering key areas such as the elements of a crime, the role of law enforcement, the trial process, and various criminal offences, this course offers learners a comprehensive understanding of the subject. Learners will gain a solid foundation in criminal law, preparing them for further study or careers within the legal and law enforcement sectors. By the end of the course, participants will have developed a critical understanding of how criminal law operates in the UK, the procedures followed in law enforcement, and the nuances of different criminal offences. Course Description This course delves deeper into the various elements that make up criminal law, covering both theoretical and practical aspects. Topics include the definition and classification of crimes, the process of prosecution, the role of the police, and the broader concepts surrounding sentencing and trials. Learners will explore areas such as youth justice, white-collar crime, terrorism, cybercrime, and the workings of prisons and the probation service. Throughout, learners will acquire knowledge of the law's evolution, the principles of justice, and the importance of ethical considerations in criminal cases. The course offers a structured learning experience with a clear progression, ensuring learners build knowledge step-by-step. Course Modules: Criminal Law Module 1: Introduction to Criminal Law Criminal Law Module 2: Elements of a Crime Criminal Law Module 3: Incitement, Conspiracy and Attempt Criminal Law Module 4: Accomplice Criminal Law Module 5: Crime Prevention Criminal Law Module 6: The Police Criminal Law Module 7: Prosecution, Caution and Diversion Criminal Law Module 8: Youth Justice Criminal Law Module 9: The Trial Criminal Law Module 10: Sentencing Process Criminal Law Module 11: Homicide Criminal Law Module 12: Offences against Person Criminal Law Module 13: Sexual Offences Criminal Law Module 14: Theft Criminal Law Module 15: Blackmail, Robbery & Burglary Criminal Law Module 16: White-Collar Crime Criminal Law Module 17: Terrorism & Law Criminal Law Module 18: Property Offences Criminal Law Module 19: Cybercrime & Piracy Criminal Law Module 20: Prisons Criminal Law Module 21: Probation Service Criminal Law Module 22: War Crimes (See full curriculum) Who is this course for? Individuals seeking to understand the key principles of criminal law. Professionals aiming to expand their legal knowledge and expertise. Beginners with an interest in pursuing a career in law or criminal justice. Those interested in understanding the framework of crime and justice systems. Career Path Criminal lawyer Legal assistant or paralegal Police officer or law enforcement personnel Public prosecutor Correctional officer Compliance officer in corporate law Victim support services Researcher in criminal justice

Criminal Law
Delivered OnlineFlexible Dates
£9.99