• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

135 Educators providing Other courses in Coventry delivered Online

The Island Project

the island project

Meriden

The Island Project School was set up to provide a school for children and young people with autism. It was founded by parents whose children had previously been taught at home using Applied Behaviour Analysis ("ABA"). Without functional communication, adults with autism can be isolated from their family, community and even carers. Without clear and early intervention, children and young people may grow into adults with no communication or independence skills meaning that they become the most dependent, and sadly most vulnerable group whilst needing the largest amount of support. If, as a school, we can give young people a means of communication plus independence skills, we can give them a better quality of life, whilst reducing their long term dependence upon their community. Unfortunately, whilst Local Authorities have a legal obligation to provide appropriate education for all children, they do not have the space, funding, or expertise to provide appropriate education for all pupils, particularly those with complex communication needs and associated difficulties, or for those who have ABA on their EHC Plans In the West Midlands, there were no ABA schools when the Island Project was founded, and this remains largely the case. The School was founded using the principles of ABA, and the Pyramid Approach to Education which gives pupils an effective means of communication using the Picture Exchange System. The School recognises that having an effective means of communication, putting in place strategies around managing sensory difficulties, and the development of independence skills are key to enabling children and young people to successfully access education and a better quality of life in the future. In recognition of this, all pupils at the School have input from a Multi Disciplinary Team which includes Behaviour Analysts, Speech and Language Therapists and Occupational Therapists specialising in Sensory Integration. The School originated with three pupils in a small unit in Balsall Common. The Schoo was founded as a charity, and within a few years, had outgrown its original building and moved to new premises at Diddington Hall in Meriden.

Dental Team Qualifications

dental team qualifications

Leamington Spa

DTQ awards post-registration qualifications to General Dental Council (GDC) registrants, who are working as part of the dental team and who wish to develop additional skills beyond the profession-standardised learning objectives and assessment criteria for GDC registration, and qualifications to non-registrant members of the dental team who are working in dental administration roles. Any dental care professional wishing to carry out additional duties must be able to demonstrate their competence to do so, and therefore undertake additional development of their skills, knowledge and understanding. The purpose of DTQ’s qualifications is to provide a structure for dental care professionals to develop additional skills on which they are assessed, and for non-registrants to learn and develop knowledge, understanding and skills relating to dental administration and gain qualifications and professional recognition for such development. Our focus is to develop and quality assure modern assessments and qualifications for the dental team, including apprenticeship end-point assessments; which are not only fit for purpose for 21st century dentistry, but follow evidence-based educational and assessment principles, which produce high quality members of the clinical and administrative dental team, following General Dental Council requirements. We have extensive knowledge and experience in dentistry, including expertise in examining and designing assessments, and have a thorough understanding of what training organisations want and need from an Awarding Organisation. The GDC’s Standards for Education and Scope of Practice documents underpin the development of any new DTQ qualifications. Working closely with training providers and other key stakeholders, we have created a range of innovative qualifications that are fit for purpose for 21st century dentistry and the wider dental team. Our qualifications are geared to supporting your day to day role in dentistry, whilst enhancing your personal development and that of your team. We have researched the provision of education for the dental team as part of a PhD study, and have peer-reviewed publications which continue to underpin our evidence-based approach to training and assessment for dental professionals. Our team members examine from dental nurse through to Royal College specialty assessments and include GDC and Royal College Education Associates. We aim for excellence in all that we do. Our Research DTQ have pioneered and examined the pedagogy of adult dental education and training for the integrated dental team. We have extensively researched interprofessional education as part of a PhD study. Our qualifications are evidence – based relating to our findings, enabling assessments geared to facilitating educational processes which not only focus on developing knowledge, but it’s application to enhance understanding. This allows dental professionals to maximize their potential and deliver enhanced patient care. We practice exactly what we preach and have proven results based upon work in our own centres. DTQ Mission statement DTQ aims to provide high quality end-point assessments and qualifications for the dental profession, which reflect contemporaneous dental practice, in collaboration with the GDC and under the regulatory guidance of the Qualifications Credit Framework. Our values are to deliver excellence in all that we do. To achieve this we engage expertise in the dental education and examination field, liaise with our partner organisations, listen to our learners and continually reflect and react to improve our qualifications and processes.

Courses matching "Other"

Show all 15332

ADVANCED APPLIED EXISTENTIAL SUPERVISION GROUP with Dr. Betty Cannon

By Therapy Harley Street

A playful, active, experientially based form of supervision that is deeply and specifically grounded on Sartre's philosophy -------------------------------------------------------------------------------- This group is a place to hone skills and consider important issues of therapy from the perspective of existential philosophy. Combining the leader’s experience with the wisdom of the group fosters an active experientially oriented and interpersonally open way of doing supervision. It includes role-playing clients as well as looking at stuck points in therapy – stuck points that may belong to the therapist or supervisor as well as the client. It uses body-oriented as well as verbal interventions to get beyond words to the pre-reflective bodily-lived intentionality of all three. Applied Existential Supervision is rooted in a psychotherapeutic approach developed and taught by Betty Cannon at the Boulder Psychotherapy Institute for more than 30 years. Thoroughly and specifically grounded in the philosophy of Sartre, Applied Existential Psychotherapy also draws inspiration from Gestalt Therapy, Rogerian person-centred therapy, body-oriented psychotherapy, and classical and contemporary psychoanalysis. Betty agrees with British object relations theorist D.W. Winnicott that psychotherapy is (or ought to be) a very special form of ‘two people playing together. When one of them, hopefully, the client, is unable to play, therapy becomes two people learning to play together. Both Winnicott and Sartre view play as arising in what Winnicott calls the ‘transitional space’ between the subjective and objective worlds. This is the place where, phenomenologically speaking, this world becomes my world – or your world. Focusing on this transitional space allows us to move from doing therapy in what Sartre calls the ‘spirit of seriousness’ (which is the deterministic mechanistic approach of a great deal of contemporary psychotherapy) to what Betty has elsewhere called the ‘spirit of play’. It is a perspective that encourages us to recognize and support our own and our client’s freedom – in situation. And it can help open us to new more creative and authentic possibilities for living, loving, and being with each other. Because taking this perspective makes room for the radically new and the unpredictable and relieves us of the burden of trying to ‘fix’ our clients, it is less tiring and less likely to produce therapist burnout. It can also make therapy more satisfying, joyful and exhilarating for both client and therapist. But therapy done in the spirit of play becomes at the same time less certain and predictable. We cannot know the outcome of the therapy because our client is free. For this reason, approaching therapy (and supervision) in this way can be anxiety-provoking or even terrifying. Moving from the spirit of seriousness to the spirit of play makes us aware of the lightness as well as the heaviness of being – and that can be challenging as well liberating. Of course, no one can live with the full awareness of freedom, responsibility, and possibility all the time. The temptation to bad faith is universal for all humans, including therapists. But if the challenge to do so at least some of the time appeals, please come play with us in Applied Existential Supervision Group. Betty Cannon, PhD, licensed psychologist, is the founder of Applied Existential Psychotherapy (AEP). Her book on Sartre and Psychoanalysis (1991) is often considered a classic in the field, as Ernesto Spinelli predicted it would be. She has published many articles and chapters on existential philosophy, psychology, and psychotherapy. Betty’s mentor, Hazel E. Barnes, translated Sartre into English and was the world’s foremost Sartre scholar until her death in 2008. Betty is Hazel’s literary executor, and her book on Sartre is dedicated to Hazel. She is currently working on a new book: In the Spirit of Play: Applied Existential Psychotherapy. Betty is the president and founder of the Boulder Psychotherapy Institute, an emerita professor of the Colorado School of Mines, a senior adjunct professor at Naropa University, and a member of the editorial boards of three international journals: Sartre Studies International, Existential Analysis, and Review of Existential Psychology and Psychiatry. In addition to Applied Existential Psychotherapy, she has recently introduced an Applied Existential Coaching Class at the Boulder Psychotherapy Institute. Betty has taught AEP to hundreds (if not thousands) of students over the past years. She has also done therapy with individuals, couples, and groups in Boulder for the past forty years, as well as presented at many professional conferences and workshops. She is particularly interested in an existential approach to relationships and groups and leads 15 to 20 groups (therapy, practice, process, and supervision) each month. All dates: Saturdays 13 January, 10 February, 9 March, 13 April, 11 May, 8 June, 14 September, 12 October, 9 November and 7 December 2024 Fee: £1260 the whole year (£140 per session) Time: Saturdays from 3 pm to 6 pm (UK time) Venue: Online – Zoom CPD by Therapy Harley Street

ADVANCED APPLIED EXISTENTIAL SUPERVISION GROUP with Dr. Betty Cannon
Delivered Online3 hours, Jun 8th, 14:00 + 4 more
£140 to £1260

Advanced Phlebotomy - Skills & Techniques (GPT005)

4.6(39)

By Geopace Training

The UK's first and only Level 4 qualification in Phlebotomy (equivalent to Ireland Level 6) FDSc (Foundation Degree Level) qualification Nationally Recognised certificate Dually accredited: Open College Network and CPD Covers both aspirated and evacuated systems Covers specialised blood collection systems & methods Classroom or Virtual Classroom learning options Comprehensive Training Kit is provided when booking our Virtual Classroom option (yours to keep) Complete your training from beginner to advanced level This course either follows on from our Introduction to Phlebotomy Course or can be combined with our introductory course as part of a course package (see below) Available to candidates who have completed (or are currently enrolled to complete) our Introduction to Phlebotomy Course or have previous phlebotomy practical experience.

Advanced Phlebotomy - Skills & Techniques (GPT005)
Delivered Online or in Liverpool + 20 more locations3 hours, Jun 29th, 16:30 + 45 more
£195

Working With Children Training - On Set Date

5.0(1)

By Wahid Academy

This Working with ChildrenTraining course does not provide a direct job qualification. However, you must deal with children as a parent, teacher, family member, or other professional. That is why it is critical to understand the Working with Children.

Working With Children Training - On Set Date
Delivered Online1 hour, Jun 9th, 03:00 + 21 more
£12

Sunday Openings at The Soul Shed

4.7(3)

By The Soul Shed

Time and space for you to reconnect with your intuitive guidence in gentle restorative community.

Sunday Openings at The Soul Shed
Delivered Online1 hour 30 minutes, Jun 9th, 16:00 + 5 more
£12

ICA International Diploma in Governance, Risk and Compliance

By International Compliance Association

ICA INTERNATIONAL DIPLOMA IN GOVERNANCE, RISK AND COMPLIANCE New technologies are changing the role of a compliance professional. Fintech and Regtech are now embedded in compliance lexicon, but what do the terms mean, and what are the practical impacts, both positive and negative, that we need to understand and manage? The ICA International Diploma in Governance, Risk and Compliance helps you to answer these questions and apply the answers directly within your organisation. Gain a broad understanding of the regulatory environment as well as the specialist skills and knowledge to be able to identify and manage key regulatory risks today and in the future. * Get to grips with the nuances of the regulatory environment and the impact to your organisation. * Understand why promoting a positive compliance culture is not just good for compliance but good for business. * Explore how to maximise the benefits of emerging technologies. * Develop your inter-personal skills so you can be the best Compliance Manager. * Learn from the experiences of compliance professionals from other firms and sectors and share ideas. This governance, risk and compliance course is awarded in association with Alliance Manchester Business School, the University of Manchester. Benefits of studying with ICA: * Flexible learning solutions that are suited to you * Our learner-centric approach means that you will gain relevant practical and academic skills and knowledge that can be used in your current role * Improve your career options by undertaking a globally recognised qualification that hiring managers look for as part of their hiring criteria * Many students have stated that they have received a promotion and/or pay rise as a direct result of gaining their qualification * The qualifications ensure that you are enabled to develop strategies to help manage and prevent risk within your firm, thus making you an invaluable asset within the current climate Completion of this training course will provide participants with the following professional qualification: ICA Diploma in Governance, Risk and Compliance. In addition, participants will be entitled to use the following designation 'Dip (Comp).' These qualifications are awarded in association with Alliance Manchester Business School, the University of Manchester. What will you learn? * Understanding governance, risk and regulatory compliance * Why we need to understand the regulated environment * Why are governance and culture essential for effective regulatory compliance risk management? * The role of the compliance department and the compliance professional * Risk management as the key to effective compliance * Case Studies

ICA International Diploma in Governance, Risk and Compliance
Delivered Online9 months, Jun 10th, 08:00
£3900

Power BI Data Analyst (PL300)

By Online Productivity Training

OVERVIEW This official Microsoft Power BI training course will teach you how to connect to data from many sources, clean and transform it using Power Query, create a data model consisting of multiple tables connected with relationships and build visualisations and reports to show the patterns in the data. The course will explore formulas created using the DAX language, including the use of advanced date intelligence calculations. Additional visualisation features including interactivity between the elements of a report page are covered as well as parameters and row-level security, which allows a report to be tailored according to who is viewing it. The course will also show how to publish reports and dashboards to a workspace on the Power BI Service. COURSE BENEFITS: * Learn how to clean, transform, and load data from many sources * Use database queries in Power Query to combine tables using append and merge * Create and manage a data model in Power BI consisting of multiple tables connected with relationships * Build Measures and other calculations in the DAX language to plot in reports * Manage advanced time calculations using date tables * Optimise report calculations using the Performance Analyzer * Manage and share report assets to the Power BI Service * Prepare for the official Microsoft PL-300 exam using Microsoft Official Courseware WHO IS THE COURSE FOR? * Data Analysts with little or no experience of Power BI who wish to upgrade their knowledge to include Business Intelligence * Management Consultants who need to conduct rapid analysis of their clients’ data to answer specific business questions * Analysts who need to upgrade their organisation from a simple Excel or SQL-based management reporting system to a dynamic BI system * Data Analysts who wish to develop organisation-wide reporting in the form of web reports or phone apps * Marketers in data-intensive organisations who wish to build visually appealing, dynamic charts for their stakeholders to use COURSE OUTLINE Module 1 Getting Started With Microsoft Data Analytics * Data analytics and Microsoft * Getting Started with Power BI Module 2 Get Data In Power BI * Get data from various data sources * Optimize performance * Resolve data errors Lab: Prepare Data in Power BI Desktop Module 3 Clean, Transform And Load Data In Power BI * Data shaping * Data profiling * Enhance the data structure Lab: Load Data in Power BI Desktop Module 4 Design A Data Model In Power BI * Introduction to data modelling * Working with Tables * Dimensions and Hierarchies Lab: Model Data in Power BI Desktop Module 5 Create Model Calculations Using DAX In Power BI * Introduction to DAX * Real-time Dashboards * Advanced DAX Lab 1: Create DAX Calculations in Power BI Desktop, Part 1 Lab 2: Create DAX Calculations in Power BI Desktop, Part 2 Module 6 Optimize Model Performance * Optimize the data model for performance * Optimize DirectQuery models Module 7 Create Reports * Design a Report * Enhance the Report Lab 1: Design a Report in Power BI Desktop, Part 1 Lab 2: Design a Report in Power BI Desktop, Part 2 Module 8 Create Dashboards * Create a Dashboard * Real-time Dashboards * Enhance a Dashboard Lab: Create a Power BI Dashboard Module 9 Perform Advanced Analytics * Advanced analytics * Data Insights through AI Visuals Lab: Perform Data Analysis in Power BI Desktop Module 10 Create And Manage Workspaces * Creating Workspaces * Sharing and managing assets Module 11 Manage Datasets In Power BI * Parameters * Datasets Module 12 Row-Level Security * Security in Power BI Lab: Enforce Row-Level Security

Power BI Data Analyst (PL300)
Delivered Online3 days, Jun 10th, 08:00
£1200

Critical Incident Stress Debriefing: 2-day online training

4.9(13)

By Psychotherapy For Healthcare Ltd

Train with us to facilitate Critical Incident Stress Debriefings. CISD are effective interventions that help care professionals to process stressful events in the workplace. A CISD helps restore well-being and protect from prolonged reactions. This excellent 2-day training will cover theory and practice, including lectures, videos, and small-group work. By the end you will be able to facilitate CISDs.

Critical Incident Stress Debriefing: 2-day online training
Delivered OnlineTwo days, Jun 10th, 08:00
£280

Level 3 Award in Education and Training (Remote Online Tutor-led) PTLLS

5.0(37)

By ATC Training Limited

The Level 3 Award in Education and Training (RQF) formerly known as PTLLS, has been designed to introduce teaching for individuals who aspire or currently work in adult education. This includes FE colleges, training providers, workplace training departments and/or Local Authorities. It is a nationally recognised qualification and is also often the preference for employers to source as an accredited train-the-trainer qualification. This qualification includes written assignments and a practical micro-teach session, which can be completed remotely. Online Remote Tutor-led Sessions This version of the course allows you to attend two days of online sessions led by an experienced tutor. Then come back online 2-3 weeks later to deliver your micro-teach session to your peers. Use this gap in time to prepare your micro-teach and complete the written work for the qualification. This allows you to fully complete in as little as 2-3 weeks. The micro-teach date is flexible and you can also enrol for self-study learning if preferred.

Level 3 Award in Education and Training (Remote Online Tutor-led) PTLLS
Delivered Online6 hours 30 minutes, Jun 10th, 08:30 + 11 more
£289.99

55354 Administering Office 365

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT professionals who are responsible for planning, configuring, and managing an Office 365 environment. Students who attend this course are expected to have a fairly broad understanding of several on-premises technologies such as Domain Name System (DNS) and Active Directory Domain Services (AD DS). In addition, they should have a general understanding of Microsoft Exchange Server, Microsoft Teams, and Microsoft SharePoint. Overview Plan and provision Office 365 Manage Users and Groups in Office 365 Deploy and Configure Tools and Applications for Office 365 Plan and Manage Exchange Online Plan and Manage SharePoint Online Plan and Manage Microsoft Teams Plan and Manage other Office 365 Services Implement Security and Compliance in Office 365 Report, Monitor and Troubleshoot Office 365 This five-day course describes how to set up, configure and manage an Office 365 tenant including identities, and the core services of Microsoft 365. In this five-day course, you will learn how to plan the configuration of an Office 365 tenant including integration with existing user identities; plan, configure and manage core services; and report on key metrics. Although this course and the associated labs are written for Office 365 with Windows 11, the skills taught will also be backwards compatible with Windows 10. This course is based on the features available in the Office 365 E3 license as these are the core features in Office 365 and Microsoft 365 plans. 1 - PLANNING AND PROVISIONING OFFICE 365 * Overview of Office 365 * Core Services of Office 365 * Requirements for an Office 365 Tenant * Planning a Pilot and Deployment * Creating an Office 365 Tenant * Adding Custom Domains and Managing DNS Settings * Lab: Provisioning Office 365 2 - MANAGING USERS AND GROUPS IN OFFICE 365 * Managing User Accounts and Licences * Managing Passwords and Authentication * Create and Managing the Different Types of Groups in Office 365 * Managing Users and Groups with PowerShell * Managing Users and Groups in the Azure AD Admin Center * Role Based Access and Administrative Roles * Planning and Configuring Directory Synchronization * Lab: Managing Users and Groups in Office 365 * Lab: Planning and Configuring Directory Synchronisation 3 - DEPLOYING AND CONFIGURING TOOLS AND APPLICATIONS FOR OFFICE 365 * Planning Network Configuration for Office 365 Tools and Applications * Using the Office Configuration Tool * Click to Run Installation Use and Control * Managing Centralized Deployment of Tools, Applications and Add-ins * Reporting * Lab: Deploying and Configuring Tools and Applications for Office 365 4 - PLANNING AND MANAGING EXCHANGE ONLINE * What is Exchange Online * Managing Exchange Online Mailboxes * Managing Office 365 Groups in Exchange Online * Configuring Exchange Online Permissions * Managing Exchange Online using PowerShell * Plan and Configure Mail Flow * Plan and Configure Email Protection * Lab: Planning and Managing Exchange Online 5 - PLANNING AND MANAGING SHAREPOINT ONLINE * What is SharePoint Online * Understanding the relationship between SharePoint, OneDrive, Teams, and Office 365 Groups * SharePoint Online Architecture * Configure SharePoint Online * Configure and Control External Sharing * Managing SharePoint Online Site Collections * Managing SharePoint Online using PowerShell * Lab: Planning and Managing SharePoint Online 6 - PLANNING AND MANAGING MICROSOFT TEAMS * What is Microsoft Teams * How Microsoft Teams integrates with other Office 365 Services * Create and Manage Organization Wide Settings * Create, Manage and Assign Microsoft Teams Policies * Plan and Configure External and Guest Access * Managing Microsoft Teams using PowerShell * Lab: Planning and Managing Microsoft Teams 7 - PLANNING AND MANAGING OTHER OFFICE 365 SERVICES * Yammer * Planner * Visio * Bookings * Delve * Forms * Power Platform * Stream * Sway * Viva * Scheduler * Add-ins, including Find Time and Junk Reporter * Lab: Planning and Managing Office 365 Services 8 - SECURITY AND COMPLIANCE IN OFFICE 365 * Overview of Security and Compliance Features in Office 365 * Extending Security and compliance Features with Additional Licences * Using the Microsoft Defender Portal and Secure Score * Using the Office 365 Compliance Portal and Compliance Score * Plan and Configure Retention Labels and Policies * Plan and Configure Data Loss Prevention Policies * Create and Assign Sensitivity Labels * Configure Safe Attachments and Safe Links Policies * Plan and Configure Multi Factor Authentication * Lab: Configure Security and Compliance in Office 365 9 - REPORTING, MONITORING AND TROUBLESHOOTING OFFICE 365 * Monitoring Office 365 Service Health * Troubleshooting Administrative Access in Office 365 * Troubleshoot Directory Synchronization * Troubleshooting Exchange Online * Troubleshooting SharePoint Online * Troubleshooting Microsoft Teams * Troubleshooting Office 365 Security and Compliance * Lab: Reporting, Monitoring and Troubleshooting in Office 365

55354 Administering Office 365
Delivered Online6 days, Jun 10th, 13:00 + 3 more
£2975

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. COMPUTER FORENSICS IN TODAY?S WORLD * 1.1. Understand the Fundamentals of Computer Forensics * 1.2. Understand Cybercrimes and their Investigation Procedures * 1.3. Understand Digital Evidence * 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security * Operations Center) in Computer Forensics * 1.5. Identify the Roles and Responsibilities of a Forensic Investigator * 1.6. Understand the Challenges Faced in Investigating Cybercrimes * 1.7. Understand Legal Compliance in Computer Forensics * COMPUTER FORENSICS INVESTIGATION PROCESS * 2.1. Understand the Forensic Investigation Process and its Importance * 2.2. Understand the Pre-investigation Phase * 2.3. Understand First Response * 2.4. Understand the Investigation Phase * 2.5. Understand the Post-investigation Phase * UNDERSTANDING HARD DISKS AND FILE SYSTEMS * 3.1. Describe Different Types of Disk Drives and their Characteristics * 3.2. Explain the Logical Structure of a Disk * 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems * 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems * 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools * 3.6 Understand Storage Systems * 3.7. Understand Encoding Standards and Hex Editors * 3.8. Analyze Popular File Formats Using Hex Editor * DATA ACQUISITION AND DUPLICATION * 4.1. Understand Data Acquisition Fundamentals * 4.2. Understand Data Acquisition Methodology * 4.3. Prepare an Image File for Examination * DEFEATING ANTI-FORENSICS TECHNIQUES * 5.1. Understand Anti-forensics Techniques * 5.2. Discuss Data Deletion and Recycle Bin Forensics * 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions * 5.4. Explore Password Cracking/Bypassing Techniques * 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch * 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption * 5.7. Detect Program Packers and Footprint Minimizing Techniques * 5.8. Understand Anti-forensics Countermeasures * WINDOWS FORENSICS * 6.1. Collect Volatile and Non-volatile Information * 6.2. Perform Windows Memory and Registry Analysis * 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers * 6.4. Examine Windows Files and Metadata * 6.5. Understand ShellBags, LNK Files, and Jump Lists * 6.6. Understand Text-based Logs and Windows Event Logs * LINUX AND MAC FORENSICS * 7.1. Understand Volatile and Non-volatile Data in Linux * 7.2. Analyze Filesystem Images Using The Sleuth Kit * 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec * 7.4. Understand Mac Forensics * * NETWORK FORENSICS * 8.1. Understand Network Forensics * 8.2. Explain Logging Fundamentals and Network Forensic Readiness * 8.3. Summarize Event Correlation Concepts * 8.4. Identify Indicators of Compromise (IoCs) from Network Logs * 8.5. Investigate Network Traffic * 8.6. Perform Incident Detection and Examination with SIEM Tools * 8.7. Monitor and Detect Wireless Network Attacks * INVESTIGATING WEB ATTACKS * 9.1. Understand Web Application Forensics * 9.2. Understand Internet Information Services (IIS) Logs * 9.3. Understand Apache Web Server Logs * 9.4. Understand the Functionality of Intrusion Detection System (IDS) * 9.5. Understand the Functionality of Web Application Firewall (WAF) * 9.6. Investigate Web Attacks on Windows-based Servers * 9.7. Detect and Investigate Various Attacks on Web Applications * DARK WEB FORENSICS * 10.1. Understand the Dark Web * 10.2. Determine How to Identify the Traces of Tor Browser during Investigation * 10.3. Perform Tor Browser Forensics * DATABASE FORENSICS * 11.1. Understand Database Forensics and its Importance * 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server * 11.3. Collect Evidence Files on MSSQL Server * 11.4. Perform MSSQL Forensics * 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory * 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis * 11.7. Perform MySQL Forensics on WordPress Web Application Database * CLOUD FORENSICS * 12.1. Understand the Basic Cloud Computing Concepts * 12.2. Understand Cloud Forensics * 12.3. Understand the Fundamentals of Amazon Web Services (AWS) * 12.4. Determine How to Investigate Security Incidents in AWS * 12.5. Understand the Fundamentals of Microsoft Azure * 12.6. Determine How to Investigate Security Incidents in Azure * 12.7. Understand Forensic Methodologies for Containers and Microservices * INVESTIGATING EMAIL CRIMES * 13.1. Understand Email Basics * 13.2. Understand Email Crime Investigation and its Steps * 13.3. U.S. Laws Against Email Crime * MALWARE FORENSICS * 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware * 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis * 14.3. Understand and Perform Static Analysis of Malware * 14.4. Analyze Suspicious Word and PDF Documents * 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches * 14.6. Analyze Malware Behavior on System Properties in Real-time * 14.7. Analyze Malware Behavior on Network in Real-time * 14.8. Describe Fileless Malware Attacks and How they Happen * 14.9. Perform Fileless Malware Analysis - Emotet * MOBILE FORENSICS * 15.1. Understand the Importance of Mobile Device Forensics * 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices * 15.3. Explain the Steps Involved in Mobile Forensics Process * 15.4. Investigate Cellular Network Data * 15.5. Understand SIM File System and its Data Acquisition Method * 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices * 15.7. Perform Logical Acquisition on Android and iOS Devices * 15.8. Perform Physical Acquisition on Android and iOS Devices * 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report * IOT FORENSICS * 16.1. Understand IoT and IoT Security Problems * 16.2. Recognize Different Types of IoT Threats * 16.3. Understand IoT Forensics * 16.4. Perform Forensics on IoT Devices *

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered Online6 days, Jun 10th, 13:00 + 2 more
£3495