• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2101 Courses

PRINCE2 Agile Foundation and Practitioner Passport: On-Demand

By IIL Europe Ltd

PRINCE2 Agile® Foundation and Practitioner Passport: On-Demand PRINCE2 Agile® Foundation and Practitioner Passport is your route to achieving the PRINCE2® Agile certification at your own pace. This on-demand course is accredited by AXELOS to support self-study distance learning for the PRINCE2 Agile® Foundation and Practitioner examinations. Who Should Attend Anyone currently working on Agile-based projects Individuals who wish to add Agile PM to their skills and capabilities Project Managers Team Leaders Business Analysts Technical Coordinators Project Sponsors Senior Management Prerequisites Fundamental knowledge of project management It is advised that participants attending this course have some knowledge and experience of Agile methods and project management Passing the Foundation exam is required before sitting the Practitioner exam. The DSDM Atern Foundation and Advanced Practitioner certificates are also acceptable prerequisites for the practitioner exam. Getting Started Fundamentals and the Philosophy Principles Preparation Lifecycle and Products Team Structures Roles and Responsibilities Communication MoSCoW and Timeboxing Lifecycle Configuration Estimation and Measurement Quality and Maintainability Planning, Control, and Risk Implementing AgilePM® Examination Approaches

PRINCE2 Agile Foundation and Practitioner Passport: On-Demand
Delivered Online On Demand30 hours
£1,350

Security+

5.0(3)

By Systems & Network Training

Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in Internationally or OnlineFlexible Dates
£2,797

Accredited PRINCE2® Foundation 6th Edition (official exam included)

By Hudson

PRINCE2 (an acronym for PRojects INaControlled Environment series 2) is a de facto process-based method for effective project management. Used extensively by the UK Government, PRINCE2 is also widely recognised and used in the private sector, both in the UK and internationally. The PRINCE2 method is in the public domain, and offers non-proprietorial best practice guidance on project management.

Accredited PRINCE2® Foundation 6th Edition (official exam included)
Delivered Online On Demand
£649

STATUTORY SURVEYOR AND FLAG STATE INSPECTOR

By Lloyd's Maritime Institute

CLASS SURVEYOR ADVANCED CERTIFICATE PROGRAM is CPD ACCREDITED ✔️- The course content is aimed at providing newly appointed surveyors and those as yet limited practical experience with solid technical knowledge about classification and statutory matters and thus allows participants to obtain "work-ready" knowledge. The training program is specifically structured for those looking to taking up the role of a Non-exclusive surveyor enabling them to properly undertake the duty imposed under the relevant Classification rules, it is intended to facilitate access to the knowledge and skills demanded by increasingly sophisticated maritime technology while meeting the requirements of: - Mandatory parts of the code for Recognized Organizations (IMO RO Code) and IMO Resolution A.1120(30), - IACS Proc Req. 2009/Rev.2 2019, - ISO 9001:2015, - ISO/IEC 17020:2012 standards.

STATUTORY SURVEYOR AND FLAG STATE INSPECTOR
Delivered Online On Demand
£700

CWDP training course description The CWDP course consists of instructor-led training applicable to the design of wireless LANs using the latest technologies including 802.11n and 802.11ac. The course goes in-depth into the design process and provides attendees with the knowledge needed to plan, deploy and test modern 802.11-based networks. It also prepares students for the CWDP examination. Students who complete the course will acquire the necessary skills for preparing, planning performing and documenting site surveys and wireless LAN design procedures. What will you learn Design enterprise WiFi networks. Select appropriate antennas and Access points. Perform site surveys. Describe the security requirements required for enterprise networks. Test, validate and troubleshoot installations. CWDP training course details Who will benefit: Anyone looking for the skills to analyze, troubleshoot, and optimize any enterprise level Wi-Fi network, no matter which brand of equipment your organization deploys. Anyone looking to become a CWNP. Prerequisites: CWNA Duration 5 days CWDP training course contents WLAN design overview Importance of good design, Impact of bad design, Design process, Design skills, Design toolkit. Requirements analysis Pre-planning, Customer interaction, Requirements gathering, Discovering existing systems, Documenting the environment, Defining constraints, Creating documentation. Designing for clients and applications Client Device types, Application types, Application-specific design, High density design issues. Designing for industry Standard corporate networks, Industry-specific designs, Government, Healthcare, Hospitality, Retail, Public hotspots, Transportation, Mobile offices, Outdoor and mesh, Remote networks and branch offices, Last-miles / ISP and bridging. Vendor selection processes Defining vendor issues, Operational planes, Design models, Understanding architectures. Radio Frequency (RF) planning RF spectrum, RF behaviors, Modulation and coding schemes, RF accessories, Throughput factors. WLAN hardware selection Antennas, 802.11n and antennas, Choosing Aps, Powering Aps. Site surveys Site survey tools, Site survey preparation, Predictive site surveys, Manual site surveys, Site survey principles and processes. Designing for Quality of Service (QoS) QoS overview, QoS application points, Roaming support. Designing for security Bad security, Authentication solutions, Encryption solutions, Security best practices, Intrusion prevention. Installation testing, validation and troubleshooting Network health status, Troubleshooting and validation process, Troubleshooting and validation tools, Common problems. Hands-on lab exercises Hands-on labs depend on the audience and can include use of: Spectrum analyzers, Protocol analyzers, Site Survey software, Diagramming software, Various wireless access points, Various wireless adapters and antennas.

CWDP
Delivered in Internationally or OnlineFlexible Dates
£3,497

Comprehensive Aesthetic Specialist Training Package

By Cosmetic College

Take your beauty therapy skills to the next level with our Comprehensive Aesthetic Specialist Training Package. This all-inclusive package combines six of our most sought-after VTCT Level 4 courses, providing you with the knowledge and practical experience to offer a wide range of advanced aesthetic treatments. Our package includes the following courses: Level 4 Award in Skin Needling: Learn the art of skin rejuvenation with this microneedling course, which is ever growing in the industry. Level 4 Award in Dermaplaning: Learn the art of dermaplaning, a popular exfoliating treatment that removes dead skin cells and peach fuzz, leaving the skin smooth and radiant. Level 4 Award in High-Intensity Focused Ultrasound (HIFU): Gain the skills to offer HIFU treatments, a non-invasive procedure that tightens and lifts the skin, reducing the appearance of wrinkles and improving skin elasticity. Level 4 Certificate in Radio Frequency: Master the principles and practice of radio frequency therapy, a treatment that stimulates collagen production to reduce the appearance of fine lines and loose skin. Level 4 Chemical Skin Peels: Learn to perform skin peeling treatments, which can improve the appearance of the skin by reducing the visibility of scars, wrinkles, and hyperpigmentation. Level 4 in Ultrasound: Add ultrasound therapy to your repertoire, a treatment that can promote cellular renewal and repair, tone muscles, increase blood circulation, and improve skin care product penetration. Laser Hair Removal: Become a fully qualified laser aesthetic technician, capable of providing high-quality, safe, and effective laser hair removal treatments. Benefits of the Package: This comprehensive package is designed to equip you with a broad range of skills, making you a versatile and highly sought-after professional in the aesthetics industry. By completing these courses, you will not only expand your treatment offerings but also enhance your career prospects, whether you're looking to work in a salon, spa, or start your own business. What's Included: Each course in this package includes the VTCT Level 4 Qualification, all certificate and examination fees, refreshments, a complimentary treatment for your model, a professional treatment kit, membership discounts, and access to online community support groups. Flexible Payment Options: We understand that investing in your future is a big decision. That's why we offer flexible payment options, allowing you to spread your training costs over 3, 6, 9, or 12 months interest-free. Secure your place in our Comprehensive Aesthetic Specialist Training Package today with a minimal deposit. Join Us: Embark on a transformative journey with the Cosmetic College. Enhance your skills, boost your career, and become a highly qualified aesthetic specialist. Contact us today to learn more about our Comprehensive Aesthetic Specialist Training Package.

Comprehensive Aesthetic Specialist Training Package
Delivered In-PersonFlexible Dates
£5,000

BOHS RP405 Refresher Online - Management of Asbestos in Buildings

By Airborne Environmental Consultants Ltd

P405 Managing Asbestos in Buildings is the industry standard qualification for those whose work involves asbestos management, such as duty holders and building managers. In addition to holding the qualification, they are required to undertake and provide evidence of annual refresher training. RP405 Refresher is a new course, specifically designed to meet this requirement. RP405 Refresher enables candidates to revise and update their knowledge on good asbestos management practices, and to receive a certificate of course completion by passing a written examination, which covers both the theory and practice of managing asbestos in buildings.

BOHS RP405 Refresher Online - Management of Asbestos in Buildings
Delivered in Manchester + 1 more or OnlineFlexible Dates
£225

Statutory Surveyor and Flag State Inspector

By International Maritime Training

🔥 Limited Time Offer 🔥 Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Statutory Surveyor and Flag State Inspector
Delivered Online & In-PersonFlexible Dates
£600

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered OnlineFlexible Dates
£3,495

BOHS P304 - COSHH - Fundamentals of Risk Assessment and Control

By Airborne Environmental Consultants Ltd

BOHS P304 is designed to give practical guidance on assessing the health risks caused by hazardous substances, in order to meet the requirements of the Control of Substances Hazardous to Health (COSHH) Regulations 2002 for a 'suitable and sufficient' risk assessment.

BOHS P304 - COSHH -  Fundamentals of Risk Assessment and Control
Delivered in Manchester + 1 more or OnlineFlexible Dates
£625