Courses
Discover thousands of courses from top institutions and platforms worldwide
Level
Course Type
Duration

Udemy
Certification course What you'll learn: After successfully completing this course, the students shall be able to:Cyber Defense AnalysisIncident ResponseCyber security ManagementSystems AnalysisVulnerability Assessment and Management This course was originally designed only for the U.S. Agency for Government Intelligence. The CNFE certification program is designed to prepare students to master true advanced networking forensics strategies through the use of open source laboratories in an exclusive cyber-range.The CNFE takes digital and network forensic skills to the next level by navigating through over twenty network forensic theme modules.The CNFE provides practical training through our laboratory simulations that replicate real-world situations that include the inspection and recovery of network data, Physical Surveillance, Information Collection, Analysis, Wireless Attacks and SNORT.The course focuses on the centralization and analysis of monitoring mechanisms and networking devices. SIGN UP NOW! This course was originally designed only for the U.S. Agency for Government Intelligence. The CNFE certification program is designed to prepare students to master true advanced networking forensics strategies through the use of open source laboratories in an exclusive cyber-range.The CNFE takes digital and network forensic skills to the next level by navigating through over twenty network forensic theme modules.The CNFE provides practical training through our laboratory simulations that replicate real-world situations that include the inspection and recovery of network data, Physical Surveillance, Information Collection, Analysis, Wireless Attacks and SNORT.The course focuses on the centralization and analysis of monitoring mechanisms and networking devices. SIGN UP NOW!

Udemy
Master the fundamental principles of construction claims. What you'll learn: Construction ClaimsDefinition of a ClaimProcess of Making A ClaimClaim IdentificationExtensions of TimeClaims for Additional PaymentLiquidated / Delay DamagesImportance of Record Keeping This is an introductory course aimed at helping students better understand the basics of construction claims. This course also provides students with a solid foundation on which to build their knowledge of more advanced topics in the field of construction claims.This course is recommended for anyone working with construction claims and especially those working for construction contractors and tasked with managing the contract or claim process. For example, Quantity Surveyors, Engineers, Project Managers, Contract Administrators, etc.To achieve these learning objectives this course will cover the following topics:· Students will be provided with a general introduction and background to construction claims.· The definition of a claim and the purpose and role of claims in the context of construction contracts.· The process of making a claim under typical construction contracts.· The events that typically cause construction claims.· The types of relief and compensation that both parties to a construction contract may claim for.· The requirement to prove entitlement to the relief and compensation claimed.Please Note: This is an entry-level course designed to teach students the basic aspects of construction claims. Professionals that have not had significant exposure to construction claims will greatly benefit from this course. This course is not recommended for professionals that have significant experience in construction claims.

YouTube
Explore a comprehensive collection of historical videos covering pivotal moments, influential figures, and societal developments that have shaped our world. Delve into topics ranging from ancient civilizations to modern political events, examining wars, social movements, technological advancements, and cultural shifts. Gain insights into the lives of notable leaders, the evolution of nations, and the forces that have driven human progress. Analyze key historical events such as World War II, the Civil Rights Movement, and the Cold War through expert commentary and archival footage. Discover lesser-known stories and perspectives that offer a nuanced understanding of history. Enhance your knowledge of global affairs, political systems, and societal changes while developing a deeper appreciation for the complexities of human history.

Udemy
Uncover Fraud & Safeguard Finances, Techniques, Strategies, & Ethical Considerations, CFE Exam Prep & Tips. What you'll learn: Gain a deep understanding of what fraud is, its various forms, and the significant impact it can have on individuals and organizations.Learn about the role of a CFE, their ethical obligations, and the tools and techniques they use to uncover and combat fraud.Guided through the systematic process of fraud examination, from initial suspicion to gathering evidence and reporting findings.Ethical dilemmas that may arise during fraud examinations will be explored, along with guidance on how to navigate them with integrity and professionalism.Become familiar with various types of fraud.Discover the importance of internal controls in fraud prevention and learn how data analytics can be used for fraud detection.Cover the criminal and civil law aspects of fraud cases, the role of regulatory bodies, and the processes of gathering and preserving evidence.Develop advanced skills in conducting interviews, forensic accounting, data analysis, surveillance, and undercover operations.Developing robust fraud prevention programs.Gain insights into cross-border fraud investigations, money laundering schemes, global anti-fraud initiatives, and more.Prepare for the Certified Fraud Examiner (CFE) certification exam, demonstrating their expertise and commitment to combatting fraud.and much more IMPORTANT before enrolling:This course is not intended to replace studying any official vendor material for certification exams, is not endorsed by the certification vendor, and you will not be getting the official certification study material or a voucher as a part of thiscourse.Welcome to the "Comprehensive Course in Fraud Examination and Prevention," you'll embark on a comprehensive journey through the world of fraud. This course is designed to equip both beginners and experienced professionals with the knowledge and skills needed to combat fraud effectively.A Certified Fraud Examiner (CFE) is a professional designation awarded by the Association of Certified Fraud Examiners (ACFE) to individuals who have demonstrated expertise in the field of fraud examination and prevention. The CFE credential is highly regarded in the fields of accounting, auditing, and fraud investigation.Explore the intricacies of fraud, its various forms, and the profound impacts it has on individuals and organizations. Dive into the role and responsibilities of a Certified Fraud Examiner (CFE) and gain insights into the ethical considerations that guide this profession.You'll be guided through the systematic process of fraud examination, from initial suspicion to the collection of evidence and the reporting of findings. Throughout the course, you'll learn to navigate ethical dilemmas with integrity, adhering to the code of conduct for CFEs.Gain a deep understanding of different types of fraud, including financial statement fraud, occupational fraud, corruption, bribery, money laundering, cyber fraud, and identity theft. Recognize the unique characteristics and red flags associated with each type.Explore fraud prevention and detection strategies, including the crucial role of internal controls and the use of data analytics for detection. Learn to identify red flags and warning signs, master interview techniques, and understand the art of document examination.Delve into the legal aspects of fraud examination, including criminal and civil law in fraud cases, the involvement of regulatory bodies, and the processes of gathering and preserving evidence. Real-life case studies will illuminate these concepts.Develop advanced skills in fraud investigation techniques, including conducting interviews, forensic accounting, data analysis, surveillance, and undercover operations. Discover how to effectively report your findings while ensuring compliance with legal requirements.Explore fraud prevention strategies, such as developing robust prevention programs, conducting risk assessments, implementing internal auditing procedures, and guarding against vendor and supplier fraud. Understand the significance of whistleblower programs in fraud prevention.Additionally, you'll gain insights into international aspects of fraud examination, including cross-border investigations, money laundering schemes, global anti-fraud initiatives, and the cultural and ethical challenges involved in international fraud cases.Certified Fraud Examiners are experts in investigating and preventing fraud in various settings, including corporate organizations, government agencies, law enforcement, and consulting firms. They play a critical role in identifying and addressing fraudulent activities, such as embezzlement, financial statement fraud, corruption, and money laundering.The CFE credential is highly respected and recognized internationally, making CFEs valuable assets in the fight against fraud and white-collar crime.As a culmination, prepare for the Certified Fraud Examiner (CFE) certification exam, demonstrating your expertise and dedication to combatting fraud. This course will empower you to become a proficient CFE, equipped to safeguard organizations from the pervasive threat of fraud. Join us on this educational journey to master the art and science of fraud examination and prevention.Thank you.

YouTube
Explore the complex interplay between disinformation campaigns and attribution claims in cybersecurity through this 37-minute conference talk by Mark Kuhr at Shmoocon 2017. Delve into the challenges of accurately attributing cyber attacks amidst deliberate misinformation efforts, and gain insights into the evolving landscape of digital warfare and intelligence operations. Learn how security professionals navigate the murky waters of online deception to uncover the true sources of cyber threats.
Microsoft Learn
This module introduces Mobile Application Management (MAM). Students will learn about considerations for implementing MAM and will be introduced to the management of MAM using Intune and Configuration Manager.After this module, you should be able to: Explain Mobile Application Management. Understand application considerations in MAM. Explain how to use Configuration Manager for MAM. Use Intune for MAM. Implement and manage MAM policies. In this module, you'll master deploying applications using Intune, Configuration Manager, Group Policy, and Microsoft Store Apps. These powerful tools and techniques will equip you to manage and maintain diverse applications across your organization effectively.After this module, you should be able to: Explain how to deploy applications using Intune and Configuration Manager. Learn how to deploy applications using Group Policy. Understand Microsoft Store Apps. Learn how to deploy apps using Microsoft Store Apps. Learn how to configure Microsoft Store Apps. In this module, you're introduced to managing apps on Intune managed devices. The module will then conclude with an overview of how to use IE Mode with Microsoft Edge.After this module, you should be able to: Explain how to manage apps in Intune. Understand how to manage apps on nonenrolled devices. Understand how to deploy Microsoft 365 Apps using Intune. Learn how to configure and manage IE mode in Microsoft Edge. Learn about app inventory options in Intune.
Microsoft Learn
Ransomware attacks are growing at an alarming rate. But what exactly is a ransomware attack? This module will define ransomware, determine the scope of the ransomware problem, describe who ransomware victims are, and will touch on a few notable ransomware "families" that everyone should know.By the end of this module, you'll be able to: Define ransomware. Identify different attack types. Explain what a ransomware family is. Describe a real-life ransomware attack. How will you know if you are a victim of ransomware? This module will cover the top ransomware families for today's threat landscape and the vectors they use to enter and infect your organization's files and systems.By the end of this module, you'll be able to: Describe the nature of the threat landscape and an attack vector Describe different entry points and how they are used to breach your security Describe the specialization of ransomware Prevention against ransomware is essential because such an attack can lead to major disruption for you or your business. In this module, you'll learn about best practices to protect yourself against ransomware and other extortion-based attacks.By the end of this module, you'll be able to: Describe different defense mechanisms used to prevent ransomware. List the steps to prevent ransomware. Describe how antivirus/antimalware tools work. Any organization or individual runs the risk of a ransomware attack. As such, the ability to promptly spot and respond to an attack remains essential for successful recovery. In this module, you'll learn how to detect, and recover from a ransomware attack.By the end of this module, you'll be able to: Describe the different indicators of a ransomware attack. Describe the different measures used to identify an attack. Describe how to investigate a ransomware attack. Describe how to recover from a ransomware attack.

YouTube
Explore the new Medical Examiner System in England and Wales through a 31-minute video lecture by Prof. Jason Payne-James. Learn about the role of national medical examiners, their responsibilities in providing safeguards for the public, patient safety monitoring, and contributing to the learning from deaths agenda. Discover the system's background, implementation timeline, and structure, including the roles of medical examiner officers. Gain insights into the impact of the Covid-19 pandemic on the system and its implementation at Norfolk Norwich University Hospital. Understand the results achieved so far and future prospects for this important initiative in the UK healthcare system.

AWS Skill Builder
AWS SimuLearn is an online learning experience that pairs generative AI-powered simulations with hands-on practice to help individuals learn how to translate business problems into technical solutions through the simulation of dialog between a customer and a technology professional. AWS SimuLearn: Flagging Suspicious Healthcare Claims In this AWS SimuLearn assignment, you will review a real-world scenario helping a fictional customer design a solution on AWS. After the design is complete, you will build the proposed solution in a guided lab within a live AWS Console environment. You will gain hands-on experience working with AWS services, using the same tools technology professionals use to construct AWS solutions. How does it work? AWS SimuLearn is powered by generative AI that enables you to have life-like conversations with AI customers. Your responses to the AI are evaluated to help develop your soft skills like communication. and problem solving. As you provide the correct responses, a quiz agent with test you and you can also get help from Dr. Newton, the helper agent when you get stuck. Once you provide all of the correct responses for the solution you will move to building it and validating in a live AWS Console environment. AWS SimuLearn: Flagging Suspicious Healthcare Claims - Services Used Flagging Suspicious Healthcare Claims AWS Lambda, Amazon API Gateway, Amazon CloudFront, Amazon DynamoDB, Amazon S3, Amazon SageMaker

Udemy
Learn and practice how to transform raw healthcare claims data into valuable knowledge and actionable insights! What you'll learn: In this course, you will learn and practice, how to transform raw healthcare claims data into valuable knowledge and actionable insights. The most commonly available and widely used type of data in healthcare is claims data. Claims data is sometimes also called billing data, insurance data or administrative data. The reason why claims data is the most large scale, reliable and complete type of big data in healthcare is rather straightforward. It has to do with reimbursement, that is, the payment of health care goods and services depends on claims data. Healthcare providers may not always find the time to fill in all required paperwork in healthcare, but they will always do that part of their administration on which their income depends. Thus, in many cases, analyzing healthcare claims data is a much more pragmatic alternative for extracting valuable insights.Claims data allows for the analysis of many non-biological elements pertaining to the organization of health care, such as patient referral patterns, patient registration, waiting times, therapy adherence, health care financing, patient pathways, fraud detection and budget monitoring. Claims data also allows for some inferences about biological facts, but these are limited when compared to medical records. By following this course, students will gain a solid theoretical understanding of the purpose of healthcare claims data. Moreover, a significant portion of this course is dedicated to the application of data science and health information technology (Healthcare IT) to obtain meaningful insights from raw healthcare claims data.This course is for professionals that (want to) work in health care organizations (providers and payers) that need to generate actionable insights out of the large volume of claims data generated by these organizations. In other words, people that need to apply data science and data mining techniques to healthcare claims data.Examples of such people are: financial controllers and planners, quality of care managers, medical coding specialists, medical billing specialists, healthcare or public health researchers, certified electronic health records specialist, health information technology or health informatics personnel, medical personnel tasked with policy, personnel at procurement departments and fraud investigators. Finally, this course will also be very useful for data scientists and consultants that lack domain knowledge about the organization of healthcare, but somehow got pulled into a healthcare claims data project. The instructor of this course is Dennis Arrindell, MSc., MBA. Dennis has a bachelor’s degree in Public Health, a master’s degree in Health Economics and a Master’s degree in Business Administration. Upon completion of this course, students will be able to contribute significantly towards making healthcare organizations (providers and payers) more data driven. What this course is NOT about:- Although we will be applying some important statistics and machine learning concepts, this course is NOT about statistics or machine learning as a topic on itself. - Although we will be using multiple software tools and programming languages for the practical parts of this course, this course is NOT about any of these tools (Excel, SQL, Python, Celonis for process mining) as topics on themselves.

Coursera
Unlock the future of insurance by diving into AI-driven claims solutions and transformative risk management strategies. In a recent IBM study, 77% of insurance executives admitted that they need to adopt GenAI quickly, but customers and insurers don’t exactly see eye-to-eye on how this technology should be utilized. Between legacy systems, siloed data, and rising customer expectations, there’s a lot to untangle. That’s where this course comes in. We’ll take you through the essentials of GenAI and how it’s revolutionizing claims processing, underwriting, and customer experience. You’ll explore real-world case studies, test-drive practical GenAI tools, and discover how to design customer-centric, GenAI-powered insurance products and services that make a difference. This course is designed for insurance professionals, data analysts, and business leaders seeking to harness the power of Generative AI to transform key industry functions. Whether you're involved in claims processing, risk management, or underwriting, you'll gain valuable insights into how GenAI can drive innovation and efficiency. The content is tailored to support forward-thinking professionals ready to enhance service delivery and develop customer-centric insurance solutions using emerging technologies. To get the most out of this course, learners should have a basic understanding of the insurance industry and its operational frameworks. Familiarity with digital tools and commonly used software in insurance processes is recommended. While a foundational knowledge of artificial intelligence concepts is helpful, the course is designed to be accessible to those who are motivated to explore new technologies and adapt to the rapidly evolving digital landscape. By the end of this course, learners will be able to define how GenAI and prompt engineering function and how they apply to the insurance sector. They will analyze how GenAI enhances risk assessment, streamlines underwriting processes, and supports strategic decision-making. Learners will also apply GenAI to create personalized insurance products and develop automated solutions for key business functions such as decision support, cost management, and claims resolution.

YouTube
Explore advanced quantitative finance concepts in this Fields Institute seminar presented by Dr. Matthew Lorig from the University of Washington. Delve into semi-parametric pricing and hedging techniques for barrier-style claims on price and volatility. Learn about model assumptions, replication strategies, and various claim types including knock-in, knockout, and rebate-style claims. Examine time-change exponential models, variance swaps, and shift operators. Gain insights into the shortcomings of current methods and discuss potential improvements in pricing and hedging complex financial instruments.

YouTube
Explore the concept of connascence in software development through this in-depth conference talk. Delve into the definition and implications of connascence as a measure of coupling between software components. Examine how excessive connascence can impact system maintainability and flexibility. Compare two different web application architectures, evaluating their levels of connascence and coupling. Learn about various types of connascence, including control coupling, named kinases, and race conditions. Gain practical insights through script examples and discussions on multiple wikis. Understand how connascence analysis can be applied to real-world software systems to improve design and maintainability.

YouTube
Explore the critical role of threat intelligence in industrial cybersecurity through this informative 18-minute video featuring Dragos VP of Threat Intelligence, Sergio Caltagirone, and Cyberwire's Dave Bittner. Gain insights into the definition and importance of threat intelligence, its impact on reducing organizational risk profiles, and its application in protecting vulnerable industrial assets. Discover how threat intelligence enhances detection, response, and prevention strategies for securing critical infrastructure. Examine major cyber risks affecting the Oil & Gas and Utilities sectors, and learn how to differentiate threat intelligence meanings in the context of operational technology (OT) environments. Understand the business implications of threat intelligence and its integration into cybersecurity policies for industrial control systems.

Udemy
Learn the basics of construction claims and delay analysis. Learn the claims procedure in Fidic contracts (1st and 2nd) What you'll learn: Understand the construction claims mechanismCauses of construction claimsClaims procedure (FIDIC 1st Edition, 1999)Claims procedure (FIDIC 2nd Edition, 2017)Construction delaysCore knowledge for construction delay analysis techniques. Welcome to the most comprehensive Construction Claims Management Foundations course! Here, you will learn the core knowledge about construction claims management. So, * if you are a beginner just started to learn about construction claims, or * a relatively experienced construction professional searching for a reference tool for construction claims,then, this course is the perfect match for you. What will you learn after completing this course?You will learn:* The construction claims mechanism* Causes of construction claims* Claims procedure (FIDIC 1st Edition, 1999)* Claims procedure (FIDIC 2nd Edition, 2017)* Types of construction delays* Core knowledge of delay analysis techniquesThis course also includes 2 WORKSHOPS which will help you to clearly understand what you have learned in the course! After completing this course, you will get your COURSECOMPLETION CERTIFICATE from casePM! PLUS: If you are a PMP certified project professional, then you will earn 2 PDUs after completing this course! If you are a Project Manager or aiming to become a Project Manager, then the information you will learn in this course will help you confidently manage the claims process of your construction project. Or, if you want to start a new career as a claims specialist, this course is the best starting point for you. After completing this course, you can go further by attending more advanced classes and by gaining practical experience in your projects. (But please note that this course is not for experienced claims management staff having advanced knowledge of claims.)

YouTube
Explore the differences between roles, claims, and policies in ASP.NET Core authentication and authorization in this 23-minute video tutorial. Gain a comprehensive understanding of these key concepts through practical explanations and demonstrations. Learn how to set up and implement each approach, with a focus on their unique characteristics and use cases. Access the accompanying GitHub project for hands-on practice, and dive deeper into the topic with provided links to official Microsoft documentation and relevant Stack Overflow discussions. Perfect for developers looking to enhance their ASP.NET Core security knowledge and implement robust authorization strategies in their applications.

YouTube
Explore how generative AI revolutionizes healthcare claims processing and fraud detection in this 16-minute conference talk from Conf42 KN 2025. Learn about the current challenges plaguing healthcare claims processing and discover how generative AI transforms traditional workflows through a comprehensive five-layer AI architecture. Dive deep into each architectural layer to understand implementation strategies, then examine advanced fraud detection techniques powered by generative AI technologies. Address critical challenges in scaling AI solutions across healthcare systems while ensuring compliance with healthcare regulations and maintaining patient privacy. Gain insights into the future landscape of AI-driven healthcare claims processing and understand practical considerations for implementing these technologies in real-world healthcare environments.

Pluralsight
Claims-based identity provides a consistent way for applications to handle identity whether they’re accessed locally, via the Internet, across company boundaries, or in other ways. Claims-based identity is becoming the standard approach to working with identity. This course provides an introduction to the concepts of claims-based identity using Microsoft technologies as concrete examples. The goal is to provide a big-picture overview, explaining what this approach offers, how it works, and why you would use it.

Udemy
Learn all about Contracts, Delays & Claims along with practical Delay Analysis using Primavera P6 software What you'll learn: Basic understanding of contracts, delays and claimsHow to identify and record cause of the claimHow to categorize and analyze delaysIn-depth understanding of delay analysis techniquesImplementation of delay analysis techniques using Oracle Primavera P6 softwarePreparation of cost claimUnderstanding of claim settlement and dispute resolution Welcome toContracts, Delays & Claims with Primavera P6online training course. This course is brought to you byCEM Solutions, who are providing construction engineering and management services worldwide for about 7 years. The creators of this course are well versed with contracts, claims and Primavera P6, and beside their vast experience in large scale projects, they have spent about 1 year in research, just to bring an ultimate solution of claims for you. You will see a lot of interesting concepts, best practices and real project samples in this course, which will help you a lot in developing new concepts and skills.This course is an ultimate solution for the people who want to learn about contracts, delay analysis and claim management procedures, and this course also covers an advance training of delay analysis on Primavera P6 software. Whether you are an owner, consultant or a contractor, this course will teach you everything you need to know.On successful completion of this course, you can start your own consultancy of claim management services, or you can implement this knowledge on the projects you are working on. Beside this, you will also earn 2.5 PDUs. So, what re you waiting for? Enroll now and start learning today.

YouTube
Explore how artificial intelligence is transforming healthcare claims processing in this 16-minute conference talk from Conf42 SRE 2025. Discover the current challenges plaguing traditional healthcare claim adjudication systems and learn how AI technologies are revolutionizing this critical process to improve efficiency and combat fraud. Examine real-world case studies demonstrating successful AI implementations in claims processing, understand the specific benefits AI brings to healthcare organizations, and delve into advanced fraud detection capabilities powered by machine learning algorithms. Follow a comprehensive implementation roadmap for integrating AI into healthcare systems, explore future trends and possibilities in AI-driven healthcare, and address key challenges and considerations organizations must navigate. Analyze the return on investment and business case for AI adoption in healthcare claims processing, and gain practical next steps and resources for moving forward with AI implementation in your organization.