• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

23 Biology courses in Liverpool delivered Live Online

A-level biology tuition

By A level biology tutor

Online A-level biology tutor. 100% increase in grade pass rate. All uk exam boards covered. Excellent reviews on trustpilot.

A-level biology tuition
Delivered Online
Dates arranged on request
£80

KS3 Biology Tuition (1 hour)

By Savvy Tutor

Need some help with science homework? Or striving for those top grades in class? Savvytutor is here to help.

KS3 Biology Tuition (1 hour)
Delivered on-request, onlineDelivered Online
£25

KS4 Biology Tuition (1 hour)

By Savvy Tutor

Need some help with science homework? Or striving for those top grades in class? Savvytutor is here to help.

KS4 Biology Tuition (1 hour)
Delivered on-request, onlineDelivered Online
£25

Clinical coach training for non- Abbeydale Training Practices- July cohort

By Samantha Morgan-Hourd

This is an online course sat at your own pace to introduce you to clinical coaching. During the course we will go into the concept of training a student, learning methods, tutorial techniques, safeguarding and how to use the Central Skills Log (CSL). The course is open for 2 months. Once completed we can then arrange access to the CSL for one of Abbeydale’s students.

Clinical coach training for non- Abbeydale Training Practices- July cohort
Delivered Online1 hour, Jul 1st, 08:00
£50

Clinical coach training for Abbeydale Training Practices- July cohort

By Samantha Morgan-Hourd

This is an online course sat at your own pace to introduce you to clinical coaching. As an Abbeydale training practice the cost of this course is including with the annual TP fee. During the course we will go into the concept of training a student, learning methods, tutorial techniques, safeguarding and how to use the Central Skills Log (CSL). The course is open for 2 months. Once completed we can then arrange access to the CSL for one of Abbeydale’s students.

Clinical coach training for Abbeydale Training Practices- July cohort
Delivered Online1 hour, Jul 1st, 08:00
FREE

A Trauma Informed Approach to Workplace Bullying Cases

0.0(7)

By Conduct Change Ltd

A TRAUMA INFORMED APPROACH TO WORKPLACE BULLYING CASES Using a trauma informed approach to workplace bullying & harassment cases reduces the risks of adding another layer of injury. We look at how workplace trauma develops, and how it is different from other traumas, and what that means in terms of being able to present the facts in an investigation.

A Trauma Informed Approach to Workplace Bullying Cases
Delivered Online3 hours, Jul 16th, 13:00 + 3 more
£150

Neurodiversity Workshop Awareness: Signs, Strengths, Struggles

By Mpi Learning - Professional Learning And Development Provider

In this workshop, you will gain a better understanding of the benefits and challenges of working with neurodiverse people. Make your Organisation a more inclusive place for neurodiverse individuals.

Neurodiversity Workshop Awareness: Signs, Strengths, Struggles
Delivered in-person, on-request, onlineDelivered Online & In-Person in Loughborough
£534

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. COMPUTER FORENSICS IN TODAY?S WORLD * 1.1. Understand the Fundamentals of Computer Forensics * 1.2. Understand Cybercrimes and their Investigation Procedures * 1.3. Understand Digital Evidence * 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security * Operations Center) in Computer Forensics * 1.5. Identify the Roles and Responsibilities of a Forensic Investigator * 1.6. Understand the Challenges Faced in Investigating Cybercrimes * 1.7. Understand Legal Compliance in Computer Forensics * COMPUTER FORENSICS INVESTIGATION PROCESS * 2.1. Understand the Forensic Investigation Process and its Importance * 2.2. Understand the Pre-investigation Phase * 2.3. Understand First Response * 2.4. Understand the Investigation Phase * 2.5. Understand the Post-investigation Phase * UNDERSTANDING HARD DISKS AND FILE SYSTEMS * 3.1. Describe Different Types of Disk Drives and their Characteristics * 3.2. Explain the Logical Structure of a Disk * 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems * 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems * 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools * 3.6 Understand Storage Systems * 3.7. Understand Encoding Standards and Hex Editors * 3.8. Analyze Popular File Formats Using Hex Editor * DATA ACQUISITION AND DUPLICATION * 4.1. Understand Data Acquisition Fundamentals * 4.2. Understand Data Acquisition Methodology * 4.3. Prepare an Image File for Examination * DEFEATING ANTI-FORENSICS TECHNIQUES * 5.1. Understand Anti-forensics Techniques * 5.2. Discuss Data Deletion and Recycle Bin Forensics * 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions * 5.4. Explore Password Cracking/Bypassing Techniques * 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch * 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption * 5.7. Detect Program Packers and Footprint Minimizing Techniques * 5.8. Understand Anti-forensics Countermeasures * WINDOWS FORENSICS * 6.1. Collect Volatile and Non-volatile Information * 6.2. Perform Windows Memory and Registry Analysis * 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers * 6.4. Examine Windows Files and Metadata * 6.5. Understand ShellBags, LNK Files, and Jump Lists * 6.6. Understand Text-based Logs and Windows Event Logs * LINUX AND MAC FORENSICS * 7.1. Understand Volatile and Non-volatile Data in Linux * 7.2. Analyze Filesystem Images Using The Sleuth Kit * 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec * 7.4. Understand Mac Forensics * * NETWORK FORENSICS * 8.1. Understand Network Forensics * 8.2. Explain Logging Fundamentals and Network Forensic Readiness * 8.3. Summarize Event Correlation Concepts * 8.4. Identify Indicators of Compromise (IoCs) from Network Logs * 8.5. Investigate Network Traffic * 8.6. Perform Incident Detection and Examination with SIEM Tools * 8.7. Monitor and Detect Wireless Network Attacks * INVESTIGATING WEB ATTACKS * 9.1. Understand Web Application Forensics * 9.2. Understand Internet Information Services (IIS) Logs * 9.3. Understand Apache Web Server Logs * 9.4. Understand the Functionality of Intrusion Detection System (IDS) * 9.5. Understand the Functionality of Web Application Firewall (WAF) * 9.6. Investigate Web Attacks on Windows-based Servers * 9.7. Detect and Investigate Various Attacks on Web Applications * DARK WEB FORENSICS * 10.1. Understand the Dark Web * 10.2. Determine How to Identify the Traces of Tor Browser during Investigation * 10.3. Perform Tor Browser Forensics * DATABASE FORENSICS * 11.1. Understand Database Forensics and its Importance * 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server * 11.3. Collect Evidence Files on MSSQL Server * 11.4. Perform MSSQL Forensics * 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory * 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis * 11.7. Perform MySQL Forensics on WordPress Web Application Database * CLOUD FORENSICS * 12.1. Understand the Basic Cloud Computing Concepts * 12.2. Understand Cloud Forensics * 12.3. Understand the Fundamentals of Amazon Web Services (AWS) * 12.4. Determine How to Investigate Security Incidents in AWS * 12.5. Understand the Fundamentals of Microsoft Azure * 12.6. Determine How to Investigate Security Incidents in Azure * 12.7. Understand Forensic Methodologies for Containers and Microservices * INVESTIGATING EMAIL CRIMES * 13.1. Understand Email Basics * 13.2. Understand Email Crime Investigation and its Steps * 13.3. U.S. Laws Against Email Crime * MALWARE FORENSICS * 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware * 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis * 14.3. Understand and Perform Static Analysis of Malware * 14.4. Analyze Suspicious Word and PDF Documents * 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches * 14.6. Analyze Malware Behavior on System Properties in Real-time * 14.7. Analyze Malware Behavior on Network in Real-time * 14.8. Describe Fileless Malware Attacks and How they Happen * 14.9. Perform Fileless Malware Analysis - Emotet * MOBILE FORENSICS * 15.1. Understand the Importance of Mobile Device Forensics * 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices * 15.3. Explain the Steps Involved in Mobile Forensics Process * 15.4. Investigate Cellular Network Data * 15.5. Understand SIM File System and its Data Acquisition Method * 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices * 15.7. Perform Logical Acquisition on Android and iOS Devices * 15.8. Perform Physical Acquisition on Android and iOS Devices * 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report * IOT FORENSICS * 16.1. Understand IoT and IoT Security Problems * 16.2. Recognize Different Types of IoT Threats * 16.3. Understand IoT Forensics * 16.4. Perform Forensics on IoT Devices *

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered Online6 days, Sept 16th, 13:00 + 1 more
£3495

Access to HE – Level 3 Health & Social Care

By Step Into Learning

Access to HE courses provide a good foundation in the knowledge and skills required for studying at university level, so that students are confident and well prepared when they go on to higher education.

Access to HE – Level 3 Health & Social Care
Delivered on-request, onlineDelivered Online
£3384

This Coaching Program is unlike any other Coaching certification in the Market, It gives you the exclusive opportunity to be qualified as an Executive & Life Coach, as well as learn the NLP tools and the business building aspect.

Success Coaching Diploma
Delivered on-request, onlineDelivered Online
£1500

Educators matching "Biology"

Show all 21
TeamTSP: Friends of Trinity St Peter’s Primary

teamtsp: friends of trinity st peter’s primary

Formby

Giving is part of the fabric of our community at TSP and what makes our school so special. Our staff give their time and expertise to create a memorable education for our children, and the children give so much energy and enthusiasm to their work. We would also like to invite members of the wider TSP community to give time, talent or treasure, however they can, in support of our school to make a direct difference to our children’s lives. Recent projects that have been supported / funded include: · Contributing to the refurbishment of the Hall through purchasing a new projector and speakers · Improving year 3 and 4 classrooms · Sourcing new ICT equipment · Extra workshops to further enhance the school’s curriculum The school’s current focus is on: · enhancing the Year 1 playground area. This small, contained area is very tired and in need of some improvements to create a stimulating, engaging space for play. Your contributions will make a difference every day for the children who pass through year 1 each year. · improving the Key Stage 1 playground which is a thoroughfare for the school and is also used as the play area for Clubhouse, our wrap around care service. · Following the refurbishment of the school hall which has improved central space for the children to use throughout the day, to now also upgrade the sound and lighting equipment which would further enhance our school performances and workshops. We aim to raise a minimum of £5,000 each academic year to support projects such as these – the more we can raise, the sooner our children can benefit. We know that giving money isn’t always possible, so here’s what you can do, whatever your circumstances:

5D Health Protection Group Ltd

5d health protection group ltd

Liverpool

5D Health Protection Group Ltd is a globally leading accredited microbiology and contract research organisation (CRO) offering exceptional contract scientific testing services on a global scale. We are our customers partner of choice in the field of microbiology, biofilm science, antimicrobials, infection prevention and control. In particular, we have exceptional skills in standard and customised microbiological, antibiofilm, biological and antimicrobial testing. We have over 28 years experience in developing ‘fit for purpose’ scientific research and models that mimic, as close as possible, the complexities of ‘real-life’. Our Liverpool site is segregated into independent laboratory areas that provide a wide range of scientific testing support services. With a dedicated team of very highly skilled PhD scientists with specialisms in an array of different fields including microbiology, biofilms, antimicrobials, biologics, cellular biology, regenerative medicine, biomaterials, clinical engineering, chemistry and diagnostics and biosensors, 5D are able to offer a flexible service to deliver on all your existing and on-going scientific needs. The 5D group work closely with our global customers who operate in many different sectors. These sectors include medical devices, wound care, pharmaceuticals, cosmetics & personal care, veterinary medicine, oral care & dentistry, food & drink, infection prevention & control, built environment, industrial & engineered systems and potable water. We also provide and develop customer specific CPD accredited training courses as part of the 5D Education Academy. As a ‘one stop shop for all microbiology and scientific testing’ the 5D group also provide on-going advice and support to our customers during their development of technical files and design dossiers for CE marks and 510k submissions. At 5D we are always advancing our skills and knowledge to improve on our existing scientific service offerings to our customers.