Become an FSSC 22000 v6 Lead Auditor with our CQI and IRCA certified course. Gain the skills to lead food safety management audits and elevate your career. Enroll today!
Lean Six Sigma Black Belt Certification Program: Virtual In-House Training This course is specifically for people wanting to become Lean Six Sigma Black Belts, who are already Lean Six Sigma practitioners. If advanced statistical analysis is needed to identify root causes and optimal process improvements, (Lean) Six Sigma Green Belts typically ask Black Belts or Master Black Belts to conduct these analyses. This course will change that. Green Belts wanting to advance their statistical abilities will have a considerable amount of hands-on practice in techniques such as Statistical Process Control, MSA, Hypothesis Testing, Correlation and Regression, Design of Experiments, and many others. Participants will also work throughout the course on a real-world improvement project from their own business environment. This provides participants with hands-on learning and provides the organization with an immediate ROI once the project is completed. IIL instructors will provide free project coaching throughout the course. What you Will Learn At the end of this program, you will be able to: Use Minitab for advanced data analysis Develop appropriate sampling strategies Analyze differences between samples using Hypothesis Tests Apply Statistical Process Control to differentiate common cause and special cause variation Explain and apply various process capability metrics Conduct Measurement System Analysis and Gage R&R studies for both discrete and continuous data Conduct and analyze simple and multiple regression analysis Plan, execute, and analyze designed experiments Drive sustainable change efforts through leadership, change management, and stakeholder management Successfully incorporate advanced analysis techniques while moving projects through the DMAIC steps Explain the main concepts of Design for Six Sigma including QFD Introduction: DMAIC Review IIL Black Belt Certification Requirements Review Project Selection Review Define Review Measure Review Analyze Review Improve Review Control Introduction: Minitab Tool Introduction to Minitab Minitab basic statistics and graphs Special features Overview of Minitab menus Introduction: Sampling The Central Limit Theorem Confidence Interval of the mean Sample size for continuous data (mean) Confidence Interval for proportions Sample size for discrete data (proportions) Sampling strategies (review) Appendix: CI and sample size for confidence levels other than 95% Hypothesis Testing: Introduction Why use advanced stat tools? What are hypothesis tests? The seven steps of hypothesis tests P value errors and hypothesis tests Hypothesis Testing: Tests for Averages 1 factor ANOVA and ANOM Main Effect Plots, Interaction Plots, and Multi-Vari Charts 2 factor ANOVA and ANOM Hypothesis Testing: Tests for Standard Deviations Testing for equal variance Testing for normality Choosing the right hypothesis test Hypothesis Testing: Chi Square and Other Hypothesis Test Chi-square test for 1 factor ANOM test for 1 factor Chi-square test for 2 factors Exercise hypothesis tests - shipping Non-parametric tests Analysis: Advanced Control Charts Review of Common Cause and Special Cause Variation Review of the Individuals Control Charts How to calculate Control Limits Four additional tests for Special Causes Control Limits after Process Change Discrete Data Control Charts Control Charts for Discrete Proportion Data Control Charts for Discrete Count Data Control Charts for High Volume Processes with Continuous Data Analysis: Non-Normal Data Test for normal distribution Box-Cox Transformation Box-Cox Transformation for Individuals Control Charts Analysis: Time Series Analysis Introduction to Time Series Analysis Decomposition Smoothing: Moving Average Smoothing: EWMA Analysis: Process Capability Process capability Discrete Data: Defect metrics Discrete Data: Yield metrics Process Capability for Continuous Data: Sigma Value Short- and long-term capabilities Cp, Cpk, Pp, Ppk capability indices Analysis: Measurement System Analysis What is Measurement System Analysis? What defines a good measurement system? Gage R&R Studies Attribute / Discrete Gage R&R Continuous Gage R&R Regression Analysis: Simple Correlation Correlation Coefficient Simple linear regression Checking the fit of the Regression Model Leverage and influence analysis Correlation and regression pitfalls Regression Analysis: Multiple Regression Analysis Introduction to Multiple Regression Multicollinearity Multiple Regression vs. Simple Linear Regression Regression Analysis: Multiple Regression Analysis with Discrete Xs Introduction Creating indicator variables Method 1: Going straight to the intercepts Method 2: Testing for differences in intercepts Logistic Regression: Logistic Regression Introduction to Logistic Regression Logistic Regression - Adding a Discrete X Design of Experiments: Introduction Design of Experiment OFAT experimentation Full factorial design Fractional factorial design DOE road map, hints, and suggestions Design of Experiments: Full Factorial Designs Creating 2k Full Factorial designs in Minitab Randomization Replicates and repetitions Analysis of results: Factorial plots Analysis of results: Factorial design Analysis of results: Fits and Residuals Analysis of results: Response Optimizer Analysis of results: Review Design of Experiments: Pragmatic Approaches Designs with no replication Fractional factorial designs Screening Design of Experiment Case Study Repair Time Blocking Closing: Organizational Change Management Organizational change management Assuring project sponsorship Emphasizing shared need for change Mobilizing stakeholder commitment Closing: Project Management for Lean Six Sigma Introduction to project management Project management for Lean Six Sigma The project baseline plan Work Breakdown Structure (WBS) Resource planning Project budget Project risk Project schedule Project executing Project monitoring and controlling and Closing Closing: Design for Lean Six Sigma Introduction to Design for Lean Six Sigma (DMADV) Introduction to Quality Function Deployment (QFD) Summary and Next Steps IIL's Lean Six Sigma Black Belt Certification Program also prepares you to pass the IASSC Certified Black Belt Exam (optional)
What does this course cover? This is an online course for developing history leadership in primary teaching. This term, we will be piloting the course as an immersive programme covering the key elements of primary history subject leadership, enabling all involved in history leadership at primary to carry out their role effectively. How is this course structured and delivered? Sessions 1, 8 and 10 are compulsory to attend live. Participants will be required to complete a gap task after each session and contribute to an online reflection diary. The other sessions will be recorded for participants to work through at their convenience. Who is this course for? This programme is designed for anyone who is a subject coordinator or subject leader for history in their primary school. You may have just been appointed as a subject leader, or be more experienced but looking for formal training or fresh inspiration and direction. What are the outcome? This course will: equip you fully for the demands of history leadership in primary schools increase your confidence to develop an innovative, inclusive and effective history curriculum in your school develop your understanding of efficient action planning and how to make a wider impact help you to make the case for history with senior leaders enable you to enthuse others and lead staff meetings about history develop your understanding of current issues in primary history education The course will include a chance to share resources and assessment approaches, plus much more What will each session cover? Session 1: Introductory meeting (Live attendance) Wednesday 15 October 2025, 4pm–5.30pm Introduction and aims Reflection activity on the current state of history in your school Key responsibilities of the history subject leader Current Ofsted implications for the subject and what to expect in an inspection How the HA and latest Ofsted material can support you Session 2: What makes an effective history subject leader? (Recorded) How to effectively support teachers and learners as a history leader How to create a vision, lead change, and manage time Effective action planning and improvement Auditing your history provision and building your evidence trail Developing an innovative, inclusive and effective history curriculum in your school Disciplinary knowledge: What is history? What do historians do? Suggested gap task: Conducting teacher and/or pupil voice questionnaires. Compulsory gap task: Add to your reflection diary for the programme. If relevant, reflect on how you will use the teacher questionnaire or pupil voice. Session 3: What makes effective teaching of history? (Recorded) The role of the teacher Supporting SEND pupils Securing substantive knowledge and concepts across the curriculum How to support colleagues by identifying core knowledge How to involve the whole staff in mapping out and embedding the progression of concepts across the curriculum Suggested gap task: Consider SEND in your curriculum. Compulsory gap task: Add to your reflection diary for the programme reflecting on SEND. Session 4: Curriculum and practice at EYFS (Recorded) Unpicking and supporting the requirements of the EYFS curriculum and Development Matters Developing historical and chronological understanding in EYFS as part of Understanding the world Progression and transition from EYFS to Key Stage 1 Ensuring coherence: how to start developing concepts Making use of the local history on your doorstep for EYFS and KS1 Accessing resources and support for EYFS Suggested gap task: Fact finding and liaison. Compulsory gap task: Add to your reflection diary for the programme reflecting on current EYFS practice. Session 5: Curriculum and practice at Key Stage 1 (Recorded) Unpicking and supporting the requirements of the National Curriculum for KS1 Progression: building upon transition from EYFS What do KS1 require before KS2? Ensuring coherence: further developing the school’s chosen substantive concepts How to develop disciplinary concepts Developing appropriate chronological understanding in KS1 Enhancing and engaging children’s knowledge and retention through enquiry The use of working walls in KS1 to support learning Accessing resources and support for KS1 Suggested gap task: Check your KS1 curriculum for coverage and progression, building upon what they have learnt in EYFS. Compulsory gap task: Add to your reflection diary for the programme reflecting on KS1 practice in your setting. Session 6: Curriculum and practice at Key Stage 2 (Recorded) Unpicking and supporting the requirements of the National Curriculum for KS2 How to incorporate local history with progression in KS2 What do we want the children in Year 6 to leave with? Developing appropriate chronological understanding in KS2 Preparing for transition to Key Stage 3 Ensuring coherence: building upon the school’s chosen concepts for progression What the HA can do to support the teaching of KS2 units? Resources and support for KS2 Suggested gap task: Check your KS2 curriculum for coverage and progression, building upon what they have learnt in EYFS and KS1. Compulsory gap task: Add to your reflection diary for the programme reflecting on KS2 practice in your setting. Session 7: Approaching sensitive issues in history (Recorded) What do we mean by diversity in history and why is it important? How to ensure a wider diversity in your history teaching Barriers to making the curriculum more diverse and how to overcome them Approaches to sensitive issues in history lessons, including: - Refugees and migration history - War - Climate change Suggested gap task: Consider opportunities for increasing diverse voices and raising climate issues in your curriculum. Compulsory gap task: Add to your reflection diary for the programme considering how you might address the sensitive or current issues raised in this session. Session 8: Interim review meeting (Live attendance) Monday 19 January 2026, 4pm–5.30pm A review session allowing subject leaders to reflect upon their progress so far Opportunity to respond to suggestions, clarify information, or raise issues from the previous sessions Time to ask questions, share good practice or recommended resources with the rest of the cohort Suggested gap task: Time to follow up on anything raised in this session or to complete any previous tasks, following clarification and inspiration from this session. Compulsory gap task: Add to your reflection diary for the programme, reflecting on your priorities and actions using suggestions from the presenter or other delegates. Session 9: Assessment and evidence (Recorded) Assessment and expectations A word about writing Triangulating the evidence What to look for in a work scrutiny Suggested gap task: Conduct a work scrutiny on one aspect to check across the school, in conjunction with a focused pupil voice on the same aspect. Compulsory gap task: Add to your reflection diary considering how you will conduct a work scrutiny and what you will focus on – or, if relevant, reflect on what you discovered and how you will address any issues. Session 10: Final meeting (Live attendance) Wednesday 11 February 2026, 4pm–5.30pm Following up any requests arising from the interim meeting (Session 8) Discussion or clarification of any issues arising from previous sessions Discussion of priorities, next steps and any issues Sharing ideas for enthusing others and leading staff meetings: “What worked for me?” Communicating with headteachers, governors, colleagues and parents Are you ready for the HA Quality Mark? Suggested gap task: Identifying your school’s next steps Compulsory gap task: Complete your final piece in your reflection diary.
Perl training course description A hands on introduction to programming in Perl. What will you learn Write Perl programs. Use Perl modules. Debug Perl programs. Examine existing code and determine its function. Perl training course details Who will benefit: Anyone wishing to learn Perl. Prerequisites: None although experience in another high level language would be useful. Duration 5 days Perl training course contents Introduction to Perl What is Perl? When to use Perl, downloading Perl, installing Perl, documentation, perldoc, running Perl, the Perl environment. Perl under UNIX, Perl under Windows. "Hello world". Variables Scalars, data types, $_, strings and numbers, assignment, constants, strict, scope, STDIN. Operators Number operators, string operators, precedence and associativity, converting numbers and strings, shortcut operators. Flow control Blocks, if, else, elseif, unless, foreach, while, for do, until. Regular expressions What are regular expressions? Pattern matching, Perl as a filter, file editing. Strings Comparing strings, concatenating, substrings, chomp, chop, formatting, string manipulation. Subroutines Comparing strings, concatenating, substrings, chomp, chop, formatting, string manipulation. Arrays and hashes Working with arrays, element access, push(), pop(), shift(), unshift(), <STDIN> as an array, associative arrays, hashes of arrays, hash references, arrays of hashes, hashes of hashes. Files Simple file handling, open, close, <FILEHANDLE>, <>, file tests, directory access, directory handles, database access, packing and packing binary data. I/O STDIN, STDOUT and STDERR, Command line arguments,@ARGV. Perl debugging The built in debugger, running the debugger, debugger commands, graphical debuggers. Script syntax errors, single stepping, breakpoints, watches. Packages and modules CPAN, Finding modules, installing modules, using modules, scope. Report formatting Formats, defining a format, invoking a format, field holders. Process management System interaction, system(), exec(), signals. Security issues.
Supporting Windows 10 course description This course is designed to provide students with the knowledge and skills required to support and troubleshoot Windows 10 PCs and devices in a Windows Server domain environment. These skills include understanding of Windows 10 features, how they can be used in an Active Directory environment and how to troubleshoot them. What will you learn Troubleshoot startup issues and operating system services on a Windows 10 PC. Troubleshoot issues related to network connectivity. Troubleshoot client configuration failures and GPO application issues. Troubleshoot issues related to application installation and operation. Recover a PC running Windows 10. Supporting Windows 10 course details Who will benefit: Anyone supporting users running Windows 10 personal computers within a medium to large enterprise. Prerequisites: None. Duration 5 days Supporting Windows 10 course contents Implementing a Troubleshooting Methodology Overview of Windows 10, Introduction to the EDST Job Role, Overview of the Troubleshooting Steps & Tools. Hands on Implementing a Troubleshooting Methodology. Hands on Using Troubleshooting Tools for Windows 10. Troubleshooting Startup Issues Overview of the Windows 10 Startup Recovery Environment, Troubleshooting Startup Settings & Operating System Services Issues, Recovering BitLocker-Protected Drives. Hands on Troubleshooting Startup Issues. Hands on Recovering BitLocker-Encrypted Drives, Creating a New BitLocker Password. Troubleshooting Hardware and Device Drivers Troubleshooting Device Driver Failures & Physical Failures, Overview of Hardware Troubleshooting, Monitoring Reliability, Configuring the Registry. Hands on Troubleshooting Device Driver Issues, Resolving Hardware Issues, Adding a Missing Device Driver to a Driver Store, Reverting a Problematic Device Driver. Hands on Troubleshooting Hardware Issues, Diagnosing Memory, Troubleshooting and Repairing Failed Disk Redundancy Synchronizing Settings, Accessing Data on a Foreign Volume. Troubleshooting Remote Computers Using Remote Desktop and Remote Assistance, Remoting with Windows PowerShell Hands on Troubleshooting Remote Computer by using Remote Desktop and Remote Assistance. Hands on Troubleshooting Remote Computer by using Windows PowerShell. Resolving Network Connectivity Issues Determining Network Settings, Troubleshooting Network Connectivity Issues, Troubleshooting Name Resolution. Hands on Resolving Network Connectivity Issues. Hands onResolving Name Resolution Issues. Troubleshooting Group Policy Overview of Group Policy Application, Resolving Client Configuration Failures and GPO Application Issues. Hands on Troubleshooting Group Policy Application Issues. Hands on Resolving Group Policy Issues. Hands on Installing and Sharing a Printer. Troubleshooting User Settings Troubleshooting Sign In Issues, Troubleshooting the Application of User Settings. Hands on Troubleshooting Sign in Problems. Hands on Troubleshooting the Application of User Settings, Resolving Folder Redirection Problem, Resolving Roaming User Profile Problem. Troubleshooting Remote Connectivity Troubleshooting VPN Connectivity Issues & DirectAccess. Hands on Troubleshooting VPN Connectivity Lab : Configuring and Troubleshooting DirectAccess Configuring and Verifying, DirectAccess Client-Side Settings, Troubleshooting DirectAccess. Troubleshooting Resource Access Within a Domain & File Permissions Issues, Recovering Files Encrypted by EFS, Troubleshooting Printer Access Issues. Lab : Troubleshooting File Access Issues Lab : Troubleshooting Access to Encrypted Files. Hands on Troubleshooting Printer Access Issues Troubleshooting Resource Access for Non Domain Member Clients Configuring and Troubleshooting Device Registration, Configuring and Troubleshooting Work Folders, Configuring and Troubleshooting OneDrive Access. Hands on Troubleshooting Resource Access for Clients that are not Domain Members. Troubleshooting Device Registration, Work Folders and OneDrive for Business. Troubleshooting Applications Troubleshooting Desktop App Installation Issues, Desktop Apps, Managing Windows Store Apps, Troubleshooting Access to Company Web Applications. Hands on Troubleshooting Desktop Apps, AppLocker Policy Application & Application Compatibility issue. Hands on Troubleshooting Access to Company Web Applications, Internet Explorer Issue & Microsoft Edge. Maintaining Windows 10 Managing & Troubleshooting Windows Activation, Troubleshooting Performance, Applying Applications. Hands on Monitoring and Troubleshooting Performance. Recovering Data and Operating System File Recovery in Windows 10, Recovering an OS. Hands on Recovering Data, Recovering Data from Azure Backup, Recovering Deleted File by Using File History. Hands on Provisioning Computer to Comply with Company Standards, Provision Computer to Comply with Company Standards.
Become a certified ISO 9001:2015 Lead Auditor with our CQI and IRCA accredited course. Gain the skills to lead quality management audits and enhance your career. Enroll now!
Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices
Build a rent to rent business using a proven system