• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

368 Certified Cryptocurrency Investigator Course (CCI) courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Certified Information Security Manager (CISM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification. Overview Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Identify and manage information security risks to achieve business objectives. Create a program to implement the information security strategy. Implement an information security program. Oversee and direct information security activities to execute the information security program. Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents. In this course, students will establish processes to ensure that information security measures align with established business needs. Prerequisites Information security governance Information risk management Information security program development Information security program management Incident management and response 1 - INFORMATION SECURITY GOVERNANCE * Develop an Information Security Strategy * Align Information Security Strategy with Corporate Governance * Identify Legal and Regulatory Requirements * Justify Investment in Information Security * Identify Drivers Affecting the Organization * Obtain Senior Management Commitment to Information Security * Define Roles and Responsibilities for Information Security * Establish Reporting and Communication Channels 2 - INFORMATION RISK MANAGEMENT * Implement an Information Risk Assessment Process * Determine Information Asset Classification and Ownership * Conduct Ongoing Threat and Vulnerability Evaluations * Conduct Periodic BIAs * Identify and Evaluate Risk Mitigation Strategies * Integrate Risk Management into Business Life Cycle Processes * Report Changes in Information Risk 3 - INFORMATION SECURITY PROGRAM DEVELOPMENT * Develop Plans to Implement an Information Security Strategy * Security Technologies and Controls * Specify Information Security Program Activities * Coordinate Information Security Programs with Business Assurance Functions * Identify Resources Needed for Information Security Program Implementation * Develop Information Security Architectures * Develop Information Security Policies * Develop Information Security Awareness, Training, and Education Programs * Develop Supporting Documentation for Information Security Policies 4 - INFORMATION SECURITY PROGRAM IMPLEMENTATION * Integrate Information Security Requirements into Organizational Processes * Integrate Information Security Controls into Contracts * Create Information Security Program Evaluation Metrics 5 - INFORMATION SECURITY PROGRAM MANAGEMENT * Manage Information Security Program Resources * Enforce Policy and Standards Compliance * Enforce Contractual Information Security Controls * Enforce Information Security During Systems Development * Maintain Information Security Within an Organization * Provide Information Security Advice and Guidance * Provide Information Security Awareness and Training * Analyze the Effectiveness of Information Security Controls * Resolve Noncompliance Issues 6 - INCIDENT MANAGEMENT AND RESPONSE * Develop an Information Security Incident Response Plan * Establish an Escalation Process * Develop a Communication Process * Integrate an IRP * Develop IRTs * Test an IRP * Manage Responses to Information Security Incidents * Perform an Information Security Incident Investigation * Conduct Post-Incident Reviews

Certified Information Security Manager (CISM)
Delivered Online4 days, May 21st, 13:00 + 6 more
£1995

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. COMPUTER FORENSICS IN TODAY?S WORLD * 1.1. Understand the Fundamentals of Computer Forensics * 1.2. Understand Cybercrimes and their Investigation Procedures * 1.3. Understand Digital Evidence * 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security * Operations Center) in Computer Forensics * 1.5. Identify the Roles and Responsibilities of a Forensic Investigator * 1.6. Understand the Challenges Faced in Investigating Cybercrimes * 1.7. Understand Legal Compliance in Computer Forensics * COMPUTER FORENSICS INVESTIGATION PROCESS * 2.1. Understand the Forensic Investigation Process and its Importance * 2.2. Understand the Pre-investigation Phase * 2.3. Understand First Response * 2.4. Understand the Investigation Phase * 2.5. Understand the Post-investigation Phase * UNDERSTANDING HARD DISKS AND FILE SYSTEMS * 3.1. Describe Different Types of Disk Drives and their Characteristics * 3.2. Explain the Logical Structure of a Disk * 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems * 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems * 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools * 3.6 Understand Storage Systems * 3.7. Understand Encoding Standards and Hex Editors * 3.8. Analyze Popular File Formats Using Hex Editor * DATA ACQUISITION AND DUPLICATION * 4.1. Understand Data Acquisition Fundamentals * 4.2. Understand Data Acquisition Methodology * 4.3. Prepare an Image File for Examination * DEFEATING ANTI-FORENSICS TECHNIQUES * 5.1. Understand Anti-forensics Techniques * 5.2. Discuss Data Deletion and Recycle Bin Forensics * 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions * 5.4. Explore Password Cracking/Bypassing Techniques * 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch * 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption * 5.7. Detect Program Packers and Footprint Minimizing Techniques * 5.8. Understand Anti-forensics Countermeasures * WINDOWS FORENSICS * 6.1. Collect Volatile and Non-volatile Information * 6.2. Perform Windows Memory and Registry Analysis * 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers * 6.4. Examine Windows Files and Metadata * 6.5. Understand ShellBags, LNK Files, and Jump Lists * 6.6. Understand Text-based Logs and Windows Event Logs * LINUX AND MAC FORENSICS * 7.1. Understand Volatile and Non-volatile Data in Linux * 7.2. Analyze Filesystem Images Using The Sleuth Kit * 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec * 7.4. Understand Mac Forensics * * NETWORK FORENSICS * 8.1. Understand Network Forensics * 8.2. Explain Logging Fundamentals and Network Forensic Readiness * 8.3. Summarize Event Correlation Concepts * 8.4. Identify Indicators of Compromise (IoCs) from Network Logs * 8.5. Investigate Network Traffic * 8.6. Perform Incident Detection and Examination with SIEM Tools * 8.7. Monitor and Detect Wireless Network Attacks * INVESTIGATING WEB ATTACKS * 9.1. Understand Web Application Forensics * 9.2. Understand Internet Information Services (IIS) Logs * 9.3. Understand Apache Web Server Logs * 9.4. Understand the Functionality of Intrusion Detection System (IDS) * 9.5. Understand the Functionality of Web Application Firewall (WAF) * 9.6. Investigate Web Attacks on Windows-based Servers * 9.7. Detect and Investigate Various Attacks on Web Applications * DARK WEB FORENSICS * 10.1. Understand the Dark Web * 10.2. Determine How to Identify the Traces of Tor Browser during Investigation * 10.3. Perform Tor Browser Forensics * DATABASE FORENSICS * 11.1. Understand Database Forensics and its Importance * 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server * 11.3. Collect Evidence Files on MSSQL Server * 11.4. Perform MSSQL Forensics * 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory * 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis * 11.7. Perform MySQL Forensics on WordPress Web Application Database * CLOUD FORENSICS * 12.1. Understand the Basic Cloud Computing Concepts * 12.2. Understand Cloud Forensics * 12.3. Understand the Fundamentals of Amazon Web Services (AWS) * 12.4. Determine How to Investigate Security Incidents in AWS * 12.5. Understand the Fundamentals of Microsoft Azure * 12.6. Determine How to Investigate Security Incidents in Azure * 12.7. Understand Forensic Methodologies for Containers and Microservices * INVESTIGATING EMAIL CRIMES * 13.1. Understand Email Basics * 13.2. Understand Email Crime Investigation and its Steps * 13.3. U.S. Laws Against Email Crime * MALWARE FORENSICS * 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware * 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis * 14.3. Understand and Perform Static Analysis of Malware * 14.4. Analyze Suspicious Word and PDF Documents * 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches * 14.6. Analyze Malware Behavior on System Properties in Real-time * 14.7. Analyze Malware Behavior on Network in Real-time * 14.8. Describe Fileless Malware Attacks and How they Happen * 14.9. Perform Fileless Malware Analysis - Emotet * MOBILE FORENSICS * 15.1. Understand the Importance of Mobile Device Forensics * 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices * 15.3. Explain the Steps Involved in Mobile Forensics Process * 15.4. Investigate Cellular Network Data * 15.5. Understand SIM File System and its Data Acquisition Method * 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices * 15.7. Perform Logical Acquisition on Android and iOS Devices * 15.8. Perform Physical Acquisition on Android and iOS Devices * 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report * IOT FORENSICS * 16.1. Understand IoT and IoT Security Problems * 16.2. Recognize Different Types of IoT Threats * 16.3. Understand IoT Forensics * 16.4. Perform Forensics on IoT Devices *

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered Online6 days, Jun 10th, 13:00 + 2 more
£3495

EC-Council Certified Cybersecurity Technician (C|CT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to: Early-career IT professionals, IT managers, career changers, and career advancers Students and recent graduates Overview After completing this course, you will understand: Key concepts in cybersecurity, including information security and network security Information security threats, vulnerabilities, and attacks The different types of malware Identification, authentication, and authorization Network security controls Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management) Application security design and testing techniques Fundamentals of virtualization, cloud computing, and cloud security Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures Cryptography and public-key infrastructure Data security controls, data backup and retention methods, and data loss prevention techniques Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic The incident handling and response process Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation Concepts in business continuity and disaster recovery Risk management concepts, phases, and frameworks EC-Council?s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs. COURSE OUTLINE * Information Security Threats and Vulnerabilities * Information Security Attacks * Network Security Fundamentals * Identification, Authentication, and Authorization * Network Security Controls: Administrative Controls * Network Security Controls: Physical Controls * Network Security Controls: Technical Controls * Network Security Assessment Techniques and Tools * Application Security * Virtualization and Cloud Computing * Wireless Network Security * Mobile Device Security * Internet of Things (IoT) and Operational Technology (OT) Security * Cryptography * Data Security * Network Troubleshooting * Network Traffic Monitoring * Network Log Monitoring and Analysis * Incident Response * Computer Forensics * Business Continuity and Disaster Recovery * Risk Management

EC-Council Certified Cybersecurity Technician (C|CT)
Delivered Online6 days, Jun 10th, 13:00 + 1 more
£3495

EC-Council Certified Chief Information Security Officer (C|CISO)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is designed for the aspiring or sitting upper-level manager striving to advance his or her career by learning to apply their existing deep technical knowledge to business problems. In this course, students will learn in-depth content in each of the 5 CCISO Domains DOMAIN 01 - GOVERNANCE * Define, Implement, Manage, and Maintain an Information Security Governance Program * Information Security Drivers * Establishing an information security management structure * Laws/Regulations/Standards as drivers of Organizational Policy/Standards/Procedures * Managing an enterprise information security compliance program * Risk Management * Risk mitigation, risk treatment, and acceptable risk * Risk management frameworks * NIST * Other Frameworks and Guidance (ISO 31000, TARA, OCTAVE, FAIR, COBIT, and ITIL) * Risk management plan implementation * Ongoing third-party risk management * Risk management policies and processes * Conclusion DOMAIN 2 - SECURITY RISK MANAGEMENT, CONTROLS, & AUDIT MANAGEMENT * INFORMATION SECURITY CONTROLS * COMPLIANCE MANAGEMENT * GUIDELINES, GOOD AND BEST PRACTICES * AUDIT MANAGEMENT * SUMMARY DOMAIN 03 - SECURITY PROGRAM MANAGEMENT AND OPERATIONS * PROGRAM MANAGEMENT * OPERATIONS MANAGEMENT * Summary DOMAIN 04 - INFORMATION SECURITY CORE CONCEPTS * ACCESS CONTROL * PHYSICAL SECURITY * NETWORK SECURITY * ENDPOINT PROTECTION * APPLICATION SECURITY * ENCRYPTION TECHNOLOGIES * VIRTUALIZATION SECURITY * CLOUD COMPUTING SECURITY * TRANSFORMATIVE TECHNOLOGIES * Summary DOMAIN 05 - STRATEGIC PLANNING, FINANCE, PROCUREMENT AND VENDOR MANAGEMENT * STRATEGIC PLANNING * Designing, Developing, and Maintaining an Enterprise Information Security Program * Understanding the Enterprise Architecture (EA) * FINANCE * PROCUREMENT * VENDOR MANAGEMENT * Summary

EC-Council Certified Chief Information Security Officer (C|CISO)
Delivered Online5 days, Jul 8th, 13:00 + 1 more
£3495

Certified Information Systems Auditor (CISA)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security. Overview Upon successful completion of this course, students will be able to: - implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices. - evaluate an organizations structure, policies, accountability, mechanisms, and monitoring practices. - evaluate information systems acquisition, development, and implementation. - evaluate the information systems operations, maintenance, and support of an organization; and evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained. - define the protection policies used to promote the confidentiality, integrity, and availability of information assets. In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives. 1 - THE PROCESS OF AUDITING INFORMATION SYSTEMS * ISACA Information Systems Auditing Standards and Guidelines * Fundamental Business Processes * Develop and Implement an Information Systems Audit Strategy * Plan an Audit * Conduct an Audit * The Evidence Life Cycle * Communicate Issues, Risks, and Audit Results * Support the Implementation of Risk Management and Control Practices 2 - IT GOVERNANCE AND MANAGEMENT * Evaluate the Effectiveness of IT Governance * Evaluate the IT Organizational Structure and HR Management * Evaluate the IT Strategy and Direction * Evaluate IT Policies, Standards, and Procedures * Evaluate the Effectiveness of Quality Management Systems * Evaluate IT Management and Monitoring of Controls * IT Resource Investment, Use, and Allocation Practices * Evaluate IT Contracting Strategies and Policies * Evaluate Risk Management Practices * Performance Monitoring and Assurance Practices * Evaluate the Organizations Business Continuity Plan 3 - INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT, AND IMPLEMENTATION * Evaluate the Business Case for Change * Evaluate Project Management Frameworks and Governance Practices * Development Life Cycle Management * Perform Periodic Project Reviews * Evaluate Control Mechanisms for Systems * Evaluate Development and Testing Processes * Evaluate Implementation Readiness * Evaluate a System Migration * Perform a Post-Implementation System Review 4 - INFORMATION SYSTEMS OPERATIONS, MAINTENANCE, AND SUPPORT * Perform Periodic System Reviews * Evaluate Service Level Management Practices * Evaluate Third-Party Management Practices * Evaluate Operations and End User Management Practices * Evaluate the Maintenance Process * Evaluate Data Administration Practices * Evaluate the Use of Capacity and Performance Monitoring Methods * Evaluate Change, Configuration, and Release Management Practices * Evaluate Problem and Incident Management Practices * Evaluate the Adequacy of Backup and Restore Provisions 5 - PROTECTION OF INFORMATION ASSETS * Information Security Design * Encryption Basics * Evaluate the Functionality of the IT Infrastructure * Evaluate Network Infrastructure Security * Evaluate the Design, Implementation, and Monitoring of Logical Access Controls * Risks and Controls of Virtualization * Evaluate the Design, Implementation, and Monitoring of Data Classification Process * Evaluate the Design, Implementation, and Monitoring of Physical Access Controls * Evaluate the Design, Implementation, and Monitoring of Environmental Controls

Certified Information Systems Auditor (CISA)
Delivered Online6 days, Aug 12th, 13:00 + 1 more
£3250

Certified TIA-942 Internal Auditor (CTIA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audiences for this course are quality directors and quality assurance managers, managers responsible for the governance of an enterprise and management of its risks, technical experts, project managers and consultants, internal auditors, compliance officers and virtually anybody involved in ANSI/TIA-942 compliance certification related projects either from an end-user or vendor perspective. Participants must hold a valid CTDC certificate in order to be able to register for the CTIA class. Overview After completion of the course the participant will be able to: 1. Prepare the organisation for an audit according to ANSI/TIA-942 including preparation of the required documents, resource planning and management of the audit process itself 2. Conduct an internal audit according to ANSI/TIA-942 following ISO-19011 guidelines 3. Facilitate and support the external audit to ANSI/TIA-942 4. Manage the post-audit process with respect to CAR (Corrective Action Reports), gap closing and _nal certification 5. Facilitate surveillance and recertification audits This intensive course builds further on the technical understanding of the standard acquired in the CTDC© (Certified TIA-942 Design Consultant) course. FUNDAMENTAL CONCEPTS AND PROCESS OF AN INTERNAL AUDIT * Terms and de_nitions * Difference between an internal and external auditor * Audit principles * Auditor competency requirements MANAGING AN AUDIT PROGRAMME * Establishing the audit objectives * Establishing the audit programme PLANNING THE AUDIT * Planning the schedule * Resource planning * Tools/equipment required * Document requirements * - Design documents * - Process documents * - Declarations CONDUCTING THE AUDIT * Conducting an opening meeting * Conducting the audit * Interviews * Document review * Facility review * Typical non-conformities * - Architectura * - Electrica * - Mechanical * - Telecommunications * Preparing the audit conclusions * Conducting the closing meeting PREPARING AND DISTRIBUTING THE AUDIT REPORT * Audit report requirements * Classification of non-conformities * Typical format of an audit report FOLLOWING UP ON THE AUDIT * The CAR ? Corrective Action Report * Evaluation of the Corrective Action Report REQUESTING A FORMAL EXTERNAL AUDIT ISSUING A CONFORMITY CERTIFICATE * Requirements of the certificate * Registration of the certificate SURVEILLANCE AUDITS RECERTIFICATION AUDITS EXAM: CERTIFIED TIA-942 INTERNAL AUDITOR) * Actual course outline may vary depending on offering center. Contact your sales representative for more information. ADDITIONAL COURSE DETAILS: Nexus Humans Certified TIA-942 Internal Auditor (CTIA) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified TIA-942 Internal Auditor (CTIA) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified TIA-942 Internal Auditor (CTIA)
Delivered Online3 days, Sept 19th, 07:00
£1500

ISO 14298:2021 Security Printing Management System Lead Auditor Course

By Cognicert Limited

The "ISO 14298:2021 Lead Auditor Course" integrates the principles of ISO 14298:2021, the International Standard for Security Printing Management, with the methodologies outlined in ISO 19011:2018, the Guidelines for Auditing Management Systems. The course equips participants with the skills and knowledge required to lead security printing audits effectively, ensuring compliance with ISO 14298:2021, and applies the principles of ISO 17011:2017 for conformity assessment bodies. It covers audit planning, execution, and reporting while emphasizing risk management and continual improvement.

ISO 14298:2021 Security Printing Management System Lead Auditor Course
Delivered In-Person in London5 days, Sept 23rd, 08:00
£1160 to £1450

Investment Advisor Certification (IAC) - CPD Approved

5.0(2)

By Academy for Health and Fitness

***Limited Time Offer*** In a world where over 60% of adults lack basic financial literacy and with markets more volatile than ever, the need for skilled investment advisors has never been higher. Our Investment Advisor Certification Bundle is expertly designed to meet these demands. It is a comprehensive collection of 25 CPD-accredited and QLS-endorsed courses to make you an expert in Investment and Finance! Whether you're a new investor, an aspiring business analyst, or a seasoned financial advisor, this bundle is your ultimate guide for navigating the complex financial landscape. Discover a World of Knowledge Across 25 Diverse Courses! From the fundamentals of Investment and Basic Business Finance to the strategies of Stock Trading and investing, each course in this Investment Advisor bundle is made to improve your financial knowledge. Learn about specialised topics like Cryptocurrency, Gold Trading, and Financial Risk Management, or broaden your understanding with courses on International Business Principles, Business Intelligence and much more. Dual Certification - A Mark of Excellence! What sets this Investment Advisor bundle apart? Not one, but two prestigious certificates await you at the end of each course - both in PDF and Hardcopy formats. That's 50 PDF and Hardcopy Certificates in total, symbolising your dedication and expertise. Each CPD and QLS certificate you earn is a testament to your commitment and a valuable asset in your professional journey. You will also get Full Study Assistance, and Career Support. This will help you easily get the dream job you want or start an investment agency. Courses Included In this Investment Advisor Certification (IAC) * Course 01: Investment Advisor Certification (IAC) * Course 02: Investment * Course 03: Basic Business Finance * Course 04: Business Funding * Course 05: Investing in Recession * Course 06: Financial Modelling for Decision Making and Business plan * Course 07: Corporate Finance: Working Capital Management * Course 08: Business Management and Finance Course * Course 09: Making Budget & Forecast * Course 10: Financial Risk Management * Course 11: Fundamentals to Making a Powerful Investor Pitch * Course 12: Capital Budgeting & Investment Decision Rules * Course 13: Create a Compelling Company Overview for Investors * Course 14: Stock Trading Analysis with Volume Trading * Course 15: Technical Analysis Masterclass for Trading & Investing * Course 16: Stock Trading: Quick Start Guide To Stock Trading * Course 17: Stock Trading & Investing * Course 18: Cryptocurrency: Wallets, Investing & Trading * Course 19: Investing In Gold & Gold Mining Stocks Course * Course 20: Business Plan for Entrepreneurs * Course 21: Research Methods in Business * Course 22: Financial Analysis: Finance Reports * Course 23: Business Intelligence and Data Mining * Course 24: Business Law: Applied Fundamentals * Course 25: International Business Principles What Will You Learn? Here are some key learning outcomes of this Investment Advisor Certification bundle: * Deepen your understanding of basic investment and stock trading concepts. * Acquire skills to invest effectively in fluctuating economic conditions. * Develop expertise in financial modelling for business decision-making. * Gain knowledge in working capital management and corporate finance. * Learn how to create compelling pitches for potential investors. * Understand the principles of financial risk management in various scenarios. * Explore the fundamentals of cryptocurrency trading and investment. * Master the art of creating robust business plans and financial analysis. * Get insights into international business laws and their applications. * Learn strategies for investing in gold and stock markets with technical analysis. The Investment Advisor Certificate (IAC) is designed for recent graduates embarking on their careers in finance, aiming to augment their expertise and demonstrate their dedication to ongoing growth within the financial sector, before pursuing FCA-regulated qualifications. This complete Investment Advisor Certification bundle offers deep insights into various sectors of investment and finance. It will equip you with the knowledge and skills to navigate today's dynamic economic landscape. You will learn the techniques to grow your investment portfolio. The comprehensive modules will teach you how to recommend your client based on investment, risk, liquidity, liability, and returns to make the most successful investments. Also, upon completion, you'll receive 50 prestigious certificates (25 CPD and 25 QLS in both PDF and Hardcopy), marking your expertise and dedication in the financial sector. CPD 500 CPD hours / points Accredited by CPD Quality Standards WHO IS THIS COURSE FOR? The Investment Advisor Certificate (IAC) is an appropriate certification for recent graduates embarking on their professional journey in the financial sector. It aims to augment their existing knowledge and demonstrate their dedication to continuous growth and improvement before pursuing regulatory qualifications mandated by the Financial Conduct Authority (FCA). The certification serves as a stepping stone for individuals commencing their careers, equipping them with essential insights and showcasing their commitment to the industry prior to undertaking regulated qualifications. This Investment Advisor Certification bundle is perfect for: * Aspiring financial advisors looking for complete knowledge in investment and finance. * Business professionals aiming to improve their financial decision-making skills. * Entrepreneurs looking to understand financial management and investor relations. * Individuals interested in diversifying their investment portfolios, including stocks and cryptocurrencies. * Career changers looking to enter the finance and investment sector with accredited qualifications. REQUIREMENTS Level 3 qualification or equivalent, e.g. A levels CAREER PATH Upon successful completion of this Investment Advisor Certification bundle, you can easily pursue the following career paths: * Financial Advisor: £30,000 to £100,000 * Investment Analyst: £35,000 and £80,000 * Business Consultant: £40,000 to £110,000 * Portfolio Manager: £50,000 to over £150,000 * Corporate Finance Manager: £45,000 and £150,000 * Cryptocurrency Analyst/Trader: £40,000 to £200,000 CERTIFICATES CERTIFICATE OF COMPLETION - DIGITAL CERTIFICATE Digital certificate - Included CERTIFICATE OF COMPLETION - HARD COPY CERTIFICATE Hard copy certificate - Included

Investment Advisor Certification (IAC) - CPD Approved
Delivered Online On Demand
£499

Blockchain Basics: Navigating the Cryptocurrency Era

5.0(2)

By Studyhub UK

24 Hour Flash Deal **25-in-1 Blockchain Basics: Navigating the Cryptocurrency Era Mega Bundle** Blockchain Basics: Navigating the Cryptocurrency Era Enrolment Gifts **FREE PDF Certificate**FREE PDF Transcript ** FREE Exam** FREE Student ID ** Lifetime Access **FREE Enrolment Letter ** Take the initial steps toward a successful long-term career by studying the Blockchain Basics: Navigating the Cryptocurrency Era package online with Studyhub through our online learning platform. The Blockchain Basics: Navigating the Cryptocurrency Era bundle can help you improve your CV, wow potential employers, and differentiate yourself from the mass. This Blockchain Basics: Navigating the Cryptocurrency Era course provides complete 360-degree training on Blockchain Basics: Navigating the Cryptocurrency Era. You'll get not one, not two, not three, but twenty-five Blockchain Basics: Navigating the Cryptocurrency Era courses included in this course. Plus Studyhub's signature Forever Access is given as always, meaning these Blockchain Basics: Navigating the Cryptocurrency Era courses are yours for as long as you want them once you enrol in this course This Blockchain Basics: Navigating the Cryptocurrency Era Bundle consists the following career oriented courses: * Course 01: Blockchain & Cryptocurrency * Course 02: Blockchain Project Management Training * Course 03: Ethereum & Blockchain Applications Development with Solidity * Course 04: Ethereum Blockchain DApp using Solidity * Course 05: Cryptocurrency * Course 06: Introduction to Cryptocurrency * Course 07: Cryptocurrency: Wallets, Investing & Trading * Course 08: Investment: Complete Investing Course * Course 09: Stock Market Day Trading Strategies for Beginners * Course 10: Stock Market Investment: Plan for Retirement * Course 11: Stock Trading Diploma * Course 12: Stock Trading: Technical Analysis, Risks & Frauds * Course 13: Day Trading Stocks With Volume Analysis * Course 14: Day Trading & Scalping Strategies * Course 15: Penny Stocks Day Trading Course * Course 16: Swing Trading Beginners Guide: Part Time Stock Trading * Course 17: Stock and Bond Investment Fundamentals: Building a Diverse Portfolio * Course 18: Trading and Financing: Candlestick Pattern * Course 19: Forex Scalping Strategy Course * Course 20: Forex Trading * Course 21: Chart Patterns for Day Trading * Course 22: Forex Swing Trading Course * Course 23: Price Action Day Trading with Tape Reading * Course 24: Crypto Sniper Trading Masterclass * Course 25: Passive Income - An Ultimate Guide The Blockchain Basics: Navigating the Cryptocurrency Era course has been prepared by focusing largely on Blockchain Basics: Navigating the Cryptocurrency Era career readiness. It has been designed by our Blockchain Basics: Navigating the Cryptocurrency Era specialists in a manner that you will be likely to find yourself head and shoulders above the others. For better learning, one to one assistance will also be provided if it's required by any learners. The Blockchain Basics: Navigating the Cryptocurrency Era Bundle is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This Blockchain Basics: Navigating the Cryptocurrency Era bundle course has been created with twenty-five premium courses to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Blockchain Basics: Navigating the Cryptocurrency Era Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into Blockchain Basics: Navigating the Cryptocurrency Era Elementary modules, allowing our students to grasp each lesson quickly. The Blockchain Basics: Navigating the Cryptocurrency Era course is self-paced and can be taken from the comfort of your home, office, or on the go! With our Student ID card you will get discounts on things like music, food, travel and clothes etc. In this exclusive Blockchain Basics: Navigating the Cryptocurrency Era bundle, you really hit the jackpot. Here's what you get: * Step by step Blockchain Basics: Navigating the Cryptocurrency Era lessons * One to one assistance from Blockchain Basics: Navigating the Cryptocurrency Eraprofessionals if you need it * Innovative exams to test your knowledge after the Blockchain Basics: Navigating the Cryptocurrency Eracourse * 24/7 customer support should you encounter any hiccups * Top-class learning portal * Unlimited lifetime access to all twenty-five Blockchain Basics: Navigating the Cryptocurrency Era courses * Digital Certificate, Transcript and student ID are all included in the price * PDF certificate immediately after passing * Original copies of your Blockchain Basics: Navigating the Cryptocurrency Era certificate and transcript on the next working day * Easily learn the Blockchain Basics: Navigating the Cryptocurrency Era skills and knowledge you want from the comfort of your home CPD 250 CPD hours / points Accredited by CPD Quality Standards WHO IS THIS COURSE FOR? This Blockchain Basics: Navigating the Cryptocurrency Era training is suitable for - * Students * Recent graduates * Job Seekers * Individuals who are already employed in the relevant sectors and wish to enhance their knowledge and expertise in Blockchain Basics: Navigating the Cryptocurrency Era REQUIREMENTS To participate in this Blockchain Basics: Navigating the Cryptocurrency Era course, all you need is - * A smart device * A secure internet connection * And a keen interest in Blockchain Basics: Navigating the Cryptocurrency Era CAREER PATH You will be able to kickstart your Blockchain Basics: Navigating the Cryptocurrency Era career because this course includes various courses as a bonus. This Blockchain Basics: Navigating the Cryptocurrency Era is an excellent opportunity for you to learn multiple skills from the convenience of your own home and explore Blockchain Basics: Navigating the Cryptocurrency Era career opportunities. CERTIFICATES CPD ACCREDITED CERTIFICATE Digital certificate - Included * CPD Accredited e-Certificate - Free * CPD Accredited Hardcopy Certificate - Free * Enrolment Letter - Free * Student ID Card - Free

Blockchain Basics: Navigating the Cryptocurrency Era
Delivered Online On Demand
£279

Introduction to Investment Risk and Taxation

5.0(2)

By Academy for Health and Fitness

Start your journey towards financial expertise with our comprehensive bundle of 17 CPD-accredited and QLS-endorsed courses! Designed for both new and seasoned investors, this Introduction to Investment Risk and Taxation package offers a unique learning experience. From the Fundamentals of Investment and Financial Risk Management to the intricacies of UK Tax Accounting and Anti-Money Laundering (AML) Training, each course is expertly designed to enhance your knowledge and skills. Dive deep into specialised subjects like Investing in Recession, Capital Budgeting, Technical Analysis for Trading, and the dynamic world of Cryptocurrency. Whether you're planning your retirement with our Stock Market Investment course or mastering the art of Corporate Finance, this bundle equips you with the tools to make informed decisions and powerful investor pitches. But here's the real value! Upon completion of each course, you'll receive not just one but two sets of certificates - both in PDF and Hardcopy formats. That's a total of 34 certificates - 17 CPD and 17 QLS - acknowledging your commitment and expertise in each area. These prestigious certificates are recognised across various industries and will significantly enhance your professional profile, opening doors to new opportunities and recognition. You will also get Full Study Assistance and Career Support. So don't worry about a thing, and get started. We got your back. Don't miss this chance to elevate your investment expertise and taxation knowledge. Enroll in the Introduction to Investment Risk and Taxation bundle today and start transforming your potential into success! Courses Included In this Introduction to Investment Risk and Taxation * Course 01: Investment * Course 02: Financial Risk Management * Course 03: Investing in Recession * Course 04: UK Tax Accounting * Course 05: Anti-Money Laundering (AML) Training * Course 06: Business Management and Finance Course * Course 07: Financial Analysis: Finance Reports * Course 08: Capital Budgeting & Investment Decision Rules * Course 09: Fundamentals to Making a Powerful Investor Pitch * Course 10: Create a Compelling Company Overview for Investors * Course 11: Technical Analysis Masterclass for Trading & Investing * Course 12: Stock Trading: Quick Start Guide To Stock Trading * Course 13: Stock Market Investment: Plan for Retirement * Course 14: Stock Trading Analysis with Volume Trading * Course 15: Cryptocurrency: Wallets, Investing & Trading * Course 16: Investing In Gold & Gold Mining Stocks Course * Course 17: Corporate Finance: Working Capital Management What Will You Learn? Upon completing this Introduction to Investment Risk and Taxation bundle, you will be able to: * Master the fundamentals of Investment strategies. * Gain expertise in Financial Risk Management. * Navigate investments confidently even in a recession. * Understand the nuances of UK Tax Accounting. * Become proficient in Anti Money Laundering (AML) compliance. * Develop essential Business Management and Finance skills. * Analyse financial reports like a pro. * Make informed investment decisions with Capital Budgeting. Achieve financial mastery with our Introduction to Investment Risk and Taxation bundle, featuring 17 CPD-accredited and QLS-endorsed courses. Whether you're a newbie or a seasoned investor, this comprehensive package covers everything from investment basics to risk management, tax accounting, and anti-money laundering. Gain confidence in financial analysis, investor pitches, and even learn about cryptocurrency trading. What sets us apart? Upon course completion, you'll receive not just one but two sets of certificates - PDF and Hardcopy for each of the 17 courses, totalling 34 prestigious Certificates. Elevate your financial expertise and open doors to new opportunities today! CPD 180 CPD hours / points Accredited by CPD Quality Standards WHO IS THIS COURSE FOR? This Introduction to Investment Risk and Taxation bundle is perfect for: * Aspiring and experienced investors. * Financial analysts and risk managers. * Tax professionals and accountants. * Compliance officers and AML specialists. * Entrepreneurs seeking financial proficiency. REQUIREMENTS Minimum level 3 qualifications It is recommended that students complete Introduction to UK Regulation and Professional Integrity prior to starting this course. CAREER PATH Upon completion of the courses in this Introduction to Investment Risk and Taxation bundle, you can pursue many career paths, such as: * Investment Analyst: £30,000 - £60,000 * Financial Risk Manager: £40,000 - £90,000 * Tax Accountant: £25,000 - £60,000 * AML Compliance Officer: £30,000 - £70,000 * Financial Director: £60,000 - £150,000 * Entrepreneur/Investor: Varies widely, potential for high earnings. CERTIFICATES CERTIFICATE OF COMPLETION Digital certificate - Included CERTIFICATE OF COMPLETION Hard copy certificate - Included

Introduction to Investment Risk and Taxation
Delivered Online On Demand
£409

Educators matching "Certified Cryptocurrency Investigator Course (CCI)"

Show all 51