Tallo logoTallo logo

Courses

Discover thousands of courses from top institutions and platforms worldwide

1,593 Courses Found

Sort by:
  • Newest First
  • Highest Rated
  • Most Reviewed
  • A to Z
  • Z to A
  • Price: Low to High
  • Price: High to Low
  • Duration: Short to Long
  • Duration: Long to Short
Forensic Investigator Intermediate course thumbnail

Udemy

Certificate

Forensic Investigator Intermediate

Digital Forensics
Cyber Security
Legal Compliance

Enhance your knowledge What you'll learn: Investigation processes in Computer forensicsLegal issues involved in investigationsSearching evidence and digital handprintsMethodologies of Acquisition and seizingRecover deleted files and hard disk partitions and Many More.. Computer Security and Computer Investigations are changing terms. Many systems are built on a regular basis for computer investigations, be it cyber fraud, forensic analysis, cyber audits, or even basic electronic data recovery. The methods and techniques discussed in this class will train students to conduct computer investigations using revolutionary digital forensics technology.Get certified in using forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of custody, and write a findings report on various levels of computer attacks.With this course, a professional can feel confident about his knowledge and ability to analyze any security flaws that may arise in the system. REGISTER TODAY!

Practical: Cyber Investigator course thumbnail

FutureLearn

Certificate

Practical: Cyber Investigator

Cybercrime
Criminology
Sociology

Put what you have learned into practice to develop your digital forensics skills Almost every investigation: criminal, civil, corporate, HR, or security will include a digital element. It is vital that the investigator can correctly interpret and present the complex digital evidence so that it can withstand scrutiny – it may be the key that proves or disproves an investigation. Once you have completed the courses on the Digital Forensics and Incident Response (DFIR) Expert Track, this four-week practical course will help you gain hands-on experience in using digital evidence. You’ll learn how to put the five-phase investigation model into practice, with a focus on the identification and preservation of digital evidence. Learn how to carry out data interpretation The course will help you develop an understanding of the requirements for a digital investigation. You’ll explore different scenarios to learn how to examine, recover, extract, and interpret data. This understanding will help you collect data in a forensically sound manner, translate raw data from sources that are compressed, encoded, or encrypted, and provide investigational context to the data. You’ll also learn how to present your interpreted data in a way that can be understood by others. Learn practical skills for dealing with digital evidence alongside PA Consulting By the end of the course, you’ll be able to explain the importance of evidential and forensic integrity. You’ll know how data can be hidden from the investigator and be able to present complex digital matters that can withstand scrutiny. Learning from Jim Metcalfe, a digital forensic investigator, cyber security incident responder, and expert witness at PA Consulting, you’ll finish the course with practical knowledge on how to handle digital evidence required for legal or disciplinary proceedings. This course is designed for anyone who has completed the Digital Forensics and Incident Response (DFIR) Expert Track. It will help you gain practical experience in digital investigation and forensics.

Meet a Scleroderma Investigator course thumbnail
FREE

YouTube

Meet a Scleroderma Investigator

Scleroderma
Autoimmune Diseases
Immunology

Discover the work of scleroderma researcher Dr. Suzanne C. Li in this 27-minute video from the National Scleroderma Foundation. Gain insights into Dr. Li's investigations, her approach to studying scleroderma, and the potential impact of her research on understanding and treating this complex autoimmune disease. Learn about the latest developments in scleroderma research and the challenges faced by investigators in this field. Explore the importance of collaborative efforts in advancing scientific knowledge and improving patient care for those affected by scleroderma.

Digital Investigator - Intrusion Detection Examples course thumbnail
FREE

YouTube

Digital Investigator - Intrusion Detection Examples

Network Security
Malware Analysis
Intrusion Detection

Explore real-world network intrusion detection scenarios through practical examples in this 34-minute video lecture. Delve into various types of intrusions, including P2P communications, viruses, and different scanning techniques such as TCP scans, ARP sweeps, OS scans, user account scans, and Tet scans. Learn how to identify and analyze suspicious network activities, interpret logging data, and understand the importance of monitoring for potential security threats. Gain valuable insights into the digital investigator's role in detecting and responding to network intrusions, enhancing your cybersecurity skills and knowledge.

Construction Claims - Foundation Course course thumbnail

Udemy

Certificate

Construction Claims - Foundation Course

Construction
Applied Science
Project Management

Master the fundamental principles of construction claims. What you'll learn: Construction ClaimsDefinition of a ClaimProcess of Making A ClaimClaim IdentificationExtensions of TimeClaims for Additional PaymentLiquidated / Delay DamagesImportance of Record Keeping This is an introductory course aimed at helping students better understand the basics of construction claims. This course also provides students with a solid foundation on which to build their knowledge of more advanced topics in the field of construction claims.This course is recommended for anyone working with construction claims and especially those working for construction contractors and tasked with managing the contract or claim process. For example, Quantity Surveyors, Engineers, Project Managers, Contract Administrators, etc.To achieve these learning objectives this course will cover the following topics:· Students will be provided with a general introduction and background to construction claims.· The definition of a claim and the purpose and role of claims in the context of construction contracts.· The process of making a claim under typical construction contracts.· The events that typically cause construction claims.· The types of relief and compensation that both parties to a construction contract may claim for.· The requirement to prove entitlement to the relief and compensation claimed.Please Note: This is an entry-level course designed to teach students the basic aspects of construction claims. Professionals that have not had significant exposure to construction claims will greatly benefit from this course. This course is not recommended for professionals that have significant experience in construction claims.

Disinformation Campaigns vs. Attribution Claims course thumbnail
FREE

YouTube

Disinformation Campaigns vs. Attribution Claims

ShmooCon
Cybersecurity
Digital Forensics

Explore the complex interplay between disinformation campaigns and attribution claims in cybersecurity through this 37-minute conference talk by Mark Kuhr at Shmoocon 2017. Delve into the challenges of accurately attributing cyber attacks amidst deliberate misinformation efforts, and gain insights into the evolving landscape of digital warfare and intelligence operations. Learn how security professionals navigate the murky waters of online deception to uncover the true sources of cyber threats.

Introducing the Renée Fleming Neuroarts Investigator Awards course thumbnail
FREE

YouTube

Introducing the Renée Fleming Neuroarts Investigator Awards

Neuroscience
Biology
Behavioral Science

Discover the groundbreaking Renée Fleming Neuroarts Investigator Awards in this informative 25-minute webinar presented by the NeuroArts Blueprint team. Learn about this innovative research program designed to foster cutting-edge studies in the emerging field of neuroarts. Explore how the arts and aesthetic experiences measurably impact the body, brain, and behavior, and how this knowledge can be applied to advance health and wellbeing. Gain insights into the one-year grant opportunities available for both basic and applied research, aimed at expanding the evidence base in neuroarts. Hear a special welcome from Renée Fleming herself as she kicks off this exciting initiative. Get answers to frequently asked questions about the program and application process, and discover how you can contribute to this pioneering field of study.

Digital Investigator: Introduction to Intrusion Detection Systems (IDS) course thumbnail
FREE

YouTube

Digital Investigator: Introduction to Intrusion Detection Systems (IDS)

Network Security
Snort
Threat Detection

Explore the fundamentals of Intrusion Detection Systems (IDS) in this comprehensive 31-minute video lecture. Delve into network security terminology, threat detection methods, and various types of IDS, with a focus on network-based systems. Learn how to create a simple Snort rule and analyze logs for effective security monitoring. Gain valuable insights into the world of digital investigation and cybersecurity from expert Bill Buchanan OBE.

Digital Investigator: Network Fundamentals and Protocols - Pre-introduction course thumbnail
FREE

YouTube

Digital Investigator: Network Fundamentals and Protocols - Pre-introduction

Network Topologies
Digital Forensics
Computer Networks

Explore the fundamentals of digital investigation in this pre-introductory video lecture. Gain an overview of key networking concepts essential for digital forensics, including user types, communication modes like simplex and full duplex, network topologies such as point-to-point, star, and mesh, and technologies like Ethernet and coaxial cables. Examine the components of wide area networks, application protocols, data packets, network devices, and infrastructure. Learn to recognize network symbols and understand the importance of network addresses in digital investigations. Prepare for a comprehensive digital investigator course by building a strong foundation in these crucial networking principles.

Become a Digital Forensics Investigator with Autopsy! course thumbnail

Udemy

Certificate

Become a Digital Forensics Investigator with Autopsy!

Digital Forensics
Cybersecurity
Computer Security

Learn a new career using just your computer and a desire for justice. What you'll learn: install and manage autopsylearn to become a digital forensics expertfind hidden data in fileslearn forensics for law enforcement Have you always wanted to help law enforcement catch the bad guys? I bet you do, and you probably just need a good place to start. You also need a good paying job and want to use your computer to do it. I have great news for you. Digital forensics is a growing field and you can become a part of it by becoming an investigator yourself. Also, if you already work for law enforcement, but you need to add to your skills, then this course is for you. You don’t need to be a computer expert to be an investigator. You just need to know how to use the free tools that are already available.Autopsy is a free forensics software application you can install on your Windows computer. If you're looking for a new career, or just want to brush up on your digital forensics skills, then this course can help you achieve those goals.You'll learn how to install and investigate a case from beginning to conclusion by finding hidden hacks inside data, website history, picture file hidden messages, and creating reports for legal cases. Join me in your journey for becoming a digital forensics investigator using the best free forensics software in the business.

Mixed Reality for Crime Scene Investigators course thumbnail
FREE

YouTube

Mixed Reality for Crime Scene Investigators

Forensic Science
Mixed Reality
Crime Scene Investigation

Explore the transformative potential of mixed reality in crime scene investigation through this insightful 54-minute talk by Dr. Jurrien Bijhold. Gain a deeper understanding of how mixed reality technologies can revolutionize CSI applications, enhance training and education in forensic science, and improve courtroom presentations. Discover the stark differences between common perceptions and the actual reality faced by crime scene investigators. Learn about innovative approaches that leverage mixed reality to overcome challenges in forensic investigations and evidence presentation. Delve into practical applications and real-world examples that demonstrate the power of this technology in solving crimes and ensuring justice.

The Investigators Labyrinth - A Data-Driven Perspective course thumbnail
FREE

YouTube

The Investigators Labyrinth - A Data-Driven Perspective

Security Onion
Cybersecurity
Digital Forensics

Explore "The Investigators Labyrinth: A Data-Driven Perspective" in this 30-minute conference talk by Chris Sanders at Security Onion Conference 2016. Delve into the economics of security, the evolution of Network Security Monitoring (NSM), and the cognitive revolution in Digital Forensics and Incident Response (DFIR). Examine investigations as mental labyrinths and learn how to navigate them effectively. Discover a scenario-based approach to investigation analysis, including key data sources and their impact on analysis speed and efficiency. Analyze patterns in analyst behavior, such as initial data focus, disposition judgement steps, and the tendency to prove or disprove alerts. Gain insights into key phrase mapping and its role in enhancing investigative processes.

AWS SimuLearn: Flagging Suspicious Healthcare Claims course thumbnail

AWS Skill Builder

Certificate

AWS SimuLearn: Flagging Suspicious Healthcare Claims

Amazon Web Services (AWS)
Cloud Computing
Machine Learning

AWS SimuLearn is an online learning experience that pairs generative AI-powered simulations with hands-on practice to help individuals learn how to translate business problems into technical solutions through the simulation of dialog between a customer and a technology professional. AWS SimuLearn: Flagging Suspicious Healthcare Claims In this AWS SimuLearn assignment, you will review a real-world scenario helping a fictional customer design a solution on AWS. After the design is complete, you will build the proposed solution in a guided lab within a live AWS Console environment. You will gain hands-on experience working with AWS services, using the same tools technology professionals use to construct AWS solutions. How does it work? AWS SimuLearn is powered by generative AI that enables you to have life-like conversations with AI customers. Your responses to the AI are evaluated to help develop your soft skills like communication. and problem solving. As you provide the correct responses, a quiz agent with test you and you can also get help from Dr. Newton, the helper agent when you get stuck. Once you provide all of the correct responses for the solution you will move to building it and validating in a live AWS Console environment. AWS SimuLearn: Flagging Suspicious Healthcare Claims - Services Used Flagging Suspicious Healthcare Claims AWS Lambda, Amazon API Gateway, Amazon CloudFront, Amazon DynamoDB, Amazon S3, Amazon SageMaker

Data Science for Healthcare Claims Data course thumbnail

Udemy

Certificate

Data Science for Healthcare Claims Data

Data Mining
Medical Billing
Process Mining

Learn and practice how to transform raw healthcare claims data into valuable knowledge and actionable insights! What you'll learn: In this course, you will learn and practice, how to transform raw healthcare claims data into valuable knowledge and actionable insights. The most commonly available and widely used type of data in healthcare is claims data. Claims data is sometimes also called billing data, insurance data or administrative data. The reason why claims data is the most large scale, reliable and complete type of big data in healthcare is rather straightforward. It has to do with reimbursement, that is, the payment of health care goods and services depends on claims data. Healthcare providers may not always find the time to fill in all required paperwork in healthcare, but they will always do that part of their administration on which their income depends. Thus, in many cases, analyzing healthcare claims data is a much more pragmatic alternative for extracting valuable insights.Claims data allows for the analysis of many non-biological elements pertaining to the organization of health care, such as patient referral patterns, patient registration, waiting times, therapy adherence, health care financing, patient pathways, fraud detection and budget monitoring. Claims data also allows for some inferences about biological facts, but these are limited when compared to medical records. By following this course, students will gain a solid theoretical understanding of the purpose of healthcare claims data. Moreover, a significant portion of this course is dedicated to the application of data science and health information technology (Healthcare IT) to obtain meaningful insights from raw healthcare claims data.This course is for professionals that (want to) work in health care organizations (providers and payers) that need to generate actionable insights out of the large volume of claims data generated by these organizations. In other words, people that need to apply data science and data mining techniques to healthcare claims data.Examples of such people are: financial controllers and planners, quality of care managers, medical coding specialists, medical billing specialists, healthcare or public health researchers, certified electronic health records specialist, health information technology or health informatics personnel, medical personnel tasked with policy, personnel at procurement departments and fraud investigators. Finally, this course will also be very useful for data scientists and consultants that lack domain knowledge about the organization of healthcare, but somehow got pulled into a healthcare claims data project. The instructor of this course is Dennis Arrindell, MSc., MBA. Dennis has a bachelor’s degree in Public Health, a master’s degree in Health Economics and a Master’s degree in Business Administration. Upon completion of this course, students will be able to contribute significantly towards making healthcare organizations (providers and payers) more data driven. What this course is NOT about:- Although we will be applying some important statistics and machine learning concepts, this course is NOT about statistics or machine learning as a topic on itself. - Although we will be using multiple software tools and programming languages for the practical parts of this course, this course is NOT about any of these tools (Excel, SQL, Python, Celonis for process mining) as topics on themselves.

GenAI in Insurance: Automating Claims & Risk Mitigation course thumbnail

Coursera

Certificate

GenAI in Insurance: Automating Claims & Risk Mitigation

Generative AI
Artificial Intelligence
Risk Management

Unlock the future of insurance by diving into AI-driven claims solutions and transformative risk management strategies. In a recent IBM study, 77% of insurance executives admitted that they need to adopt GenAI quickly, but customers and insurers don’t exactly see eye-to-eye on how this technology should be utilized. Between legacy systems, siloed data, and rising customer expectations, there’s a lot to untangle. That’s where this course comes in. We’ll take you through the essentials of GenAI and how it’s revolutionizing claims processing, underwriting, and customer experience. You’ll explore real-world case studies, test-drive practical GenAI tools, and discover how to design customer-centric, GenAI-powered insurance products and services that make a difference. This course is designed for insurance professionals, data analysts, and business leaders seeking to harness the power of Generative AI to transform key industry functions. Whether you're involved in claims processing, risk management, or underwriting, you'll gain valuable insights into how GenAI can drive innovation and efficiency. The content is tailored to support forward-thinking professionals ready to enhance service delivery and develop customer-centric insurance solutions using emerging technologies. To get the most out of this course, learners should have a basic understanding of the insurance industry and its operational frameworks. Familiarity with digital tools and commonly used software in insurance processes is recommended. While a foundational knowledge of artificial intelligence concepts is helpful, the course is designed to be accessible to those who are motivated to explore new technologies and adapt to the rapidly evolving digital landscape. By the end of this course, learners will be able to define how GenAI and prompt engineering function and how they apply to the insurance sector. They will analyze how GenAI enhances risk assessment, streamlines underwriting processes, and supports strategic decision-making. Learners will also apply GenAI to create personalized insurance products and develop automated solutions for key business functions such as decision support, cost management, and claims resolution.

Dynatrace Security Investigator App - Sneak Peek and Demo course thumbnail
FREE

YouTube

Dynatrace Security Investigator App - Sneak Peek and Demo

Threat Hunting
Cybersecurity
Data Analysis

Explore the Dynatrace Security Investigator App in this 27-minute spotlight video featuring Tiit Hallas, Principal Product Manager. Discover how this innovative tool, announced at Perform 2024 and set for GA release in April 2024, accelerates evidence-driven security investigations and threat hunting. Learn about the app's unique branch-based analysis approach, which preserves data context and enhances investigation speed and accuracy. Gain insights into the threat-hunting process, from theoretical linear progression to practical branched reality, and understand how the Security Investigator addresses common tooling challenges. Watch a live demo showcasing the app's capabilities and learn where to find additional resources, including the announcement blog and Dynatrace Hub. Perfect for security professionals seeking to streamline their investigative processes and improve threat detection efficiency.

Computer Hacking Forensics Investigator (CHFI) V10.0 (Live Online) course thumbnail

CourseHorse

Computer Hacking Forensics Investigator (CHFI) V10.0 (Live Online)

Digital Forensics
Incident Response
Network Forensics

EC-Council’s Certified Hacking Forensic Investigator (CHFI) is the only comprehensive ANSI accredited, lab-focused program in the market that gives organizations vendor-neutral training in digital forensics. CHFI provides its attendees with a firm grasp of digital forensics, presenting a detailed and methodological approach to digital forensics and evidence analysis that also pivots around Dark Web, IoT, and Cloud Forensics. The tools and techniques covered in this program will prepare the learner for conducting digital investigations using ground-breaking digital forensics technologies.Course ObjectivesThe program is designed for IT professionals involved with information system security, computer forensics, and incident response. It will help fortify the application knowledge in digital forensics for forensic analysts, cybercrime investigators, cyber defense forensic analysts, incident responders, information technology auditors, malware analysts, security consultants, and chief security officers.The program equips candidates with the necessary skills to proactively investigate complex security threats, allowing them to investigate, record, and report cybercrimes to prevent future attacks.Who Should Attend?The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response.Course PrerequisitesEC-Council Certified Ethical Hacker (CEH) v11Course Outline1 - Computer Forensics in Today’s WorldUnderstand the Fundamentals of Computer ForensicsUnderstand Cybercrimes and their Investigation ProceduresUnderstand Digital EvidenceUnderstand Forensic Readiness, Incident Response and the Role of SOC (SecurityOperations Center) in Computer ForensicsIdentify the Roles and Responsibilities of a Forensic InvestigatorUnderstand the Challenges Faced in Investigating CybercrimesUnderstand Legal Compliance in Computer Forensics2 - Computer Forensics Investigation ProcessUnderstand the Forensic Investigation Process and its ImportanceUnderstand the Pre-investigation PhaseUnderstand First ResponseUnderstand the Investigation PhaseUnderstand the Post-investigation Phase3 - Understanding Hard Disks and File SystemsDescribe Different Types of Disk Drives and their CharacteristicsExplain the Logical Structure of a DiskUnderstand Booting Process of Windows, Linux and Mac Operating SystemsUnderstand Various File Systems of Windows, Linux and Mac Operating SystemsExamine File System Using Autopsy and The Sleuth Kit ToolsUnderstand Storage SystemsUnderstand Encoding Standards and Hex EditorsAnalyze Popular File Formats Using Hex Editor4 - Data Acquisition and DuplicationUnderstand Data Acquisition FundamentalsUnderstand Data Acquisition MethodologyPrepare an Image File for Examination5 - Defeating Anti-forensics TechniquesUnderstand Anti-forensics TechniquesDiscuss Data Deletion and Recycle Bin ForensicsIllustrate File Carving Techniques and Ways to Recover Evidence from Deleted PartitionsExplore Password Cracking/Bypassing TechniquesDetect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension MismatchUnderstand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and EncryptionDetect Program Packers and Footprint Minimizing TechniquesUnderstand Anti-forensics Countermeasures6 - Windows ForensicsCollect Volatile and Non-volatile InformationPerform Windows Memory and Registry AnalysisExamine the Cache, Cookie and History Recorded in Web BrowsersExamine Windows Files and MetadataUnderstand ShellBags, LNK Files, and Jump ListsUnderstand Text-based Logs and Windows Event Logs7 - Linux and Mac ForensicsUnderstand Volatile and Non-volatile Data in LinuxAnalyze Filesystem Images Using The Sleuth KitDemonstrate Memory Forensics Using Volatility & PhotoRecUnderstand Mac Forensics8 - Network ForensicsUnderstand Network ForensicsExplain Logging Fundamentals and Network Forensic ReadinessSummarize Event Correlation ConceptsIdentify Indicators of Compromise (IoCs) from Network LogsInvestigate Network TrafficPerform Incident Detection and Examination with SIEM ToolsMonitor and Detect Wireless Network Attacks9 - Investigating Web AttacksUnderstand Web Application ForensicsUnderstand Internet Information Services (IIS) LogsUnderstand Apache Web Server LogsUnderstand the Functionality of Intrusion Detection System (IDS)Understand the Functionality of Web Application Firewall (WAF)Investigate Web Attacks on Windows-based ServersDetect and Investigate Various Attacks on Web Applications10 - Dark Web ForensicsUnderstand the Dark WebDetermine How to Identify the Traces of Tor Browser during InvestigationPerform Tor Browser Forensics11 - Database ForensicsUnderstand Database Forensics and its ImportanceDetermine Data Storage and Database Evidence Repositories in MSSQL ServerCollect Evidence Files on MSSQL ServerPerform MSSQL ForensicsUnderstand Internal Architecture of MySQL and Structure of Data DirectoryUnderstand Information Schema and List MySQL Utilities for Performing Forensic Analysis12 - Cloud ForensicsUnderstand the Basic Cloud Computing ConceptsUnderstand Cloud ForensicsUnderstand the Fundamentals of Amazon Web Services (AWS)Determine How to Investigate Security Incidents in AWSUnderstand the Fundamentals of Microsoft AzureDetermine How to Investigate Security Incidents in AzureUnderstand Forensic Methodologies for Containers and Microservices13 - Investigating Email CrimesUnderstand Email BasicsUnderstand Email Crime Investigation and its StepsU.S. Laws Against Email Crime14 - Malware ForensicsDefine Malware and Identify the Common Techniques Attackers Use to Spread MalwareUnderstand Malware Forensics Fundamentals and Recognize Types of Malware AnalysisUnderstand and Perform Static Analysis of MalwareAnalyze Suspicious Word and PDF DocumentsUnderstand Dynamic Malware Analysis Fundamentals and ApproachesAnalyze Malware Behavior on System Properties in Real-timeAnalyze Malware Behavior on Network in Real-timeDescribe Fileless Malware Attacks and How they HappenPerform Fileless Malware Analysis - Emotet15 - Mobile ForensicsUnderstand the Importance of Mobile Device ForensicsIllustrate Architectural Layers and Boot Processes of Android and iOS DevicesExplain the Steps Involved in Mobile Forensics ProcessInvestigate Cellular Network DataUnderstand SIM File System and its Data Acquisition MethodIllustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS DevicesPerform Logical Acquisition on Android and iOS DevicesPerform Physical Acquisition on Android and iOS DevicesDiscuss Mobile Forensics Challenges and Prepare Investigation Report16 - IoT ForensicsUnderstand IoT and IoT Security ProblemsRecognize Different Types of IoT ThreatsUnderstand IoT ForensicsPerform Forensics on IoT Devices

Chair Diversity Investigator Awardee Presentations - 24 May 2023 course thumbnail
FREE

YouTube

Chair Diversity Investigator Awardee Presentations - 24 May 2023

Public Health
Epidemiology
Community-Based Interventions

Explore groundbreaking research on health inequities and immigrant health in this Stanford Department of Medicine Grand Rounds presentation. Delve into two compelling studies: "Cutting Health Inequities: A Barbershop Based Hypertension Care Model" and "The Association between Local Area Immigrant Fraction and Prevalence of Cardiovascular Diseases in the United States." Join Clinical Assistant Professor Dr. Tem Woldeyesus and Instructor Dr. Robert Huang as they share insights from their Chair Diversity Investigator Award-winning research. Gain valuable knowledge about innovative approaches to addressing hypertension in barbershop settings and understand the relationship between immigrant populations and cardiovascular disease prevalence across the United States.

Fundamentals of Good Clinical Practice: Prep and Personnel course thumbnail

Coursera

Certificate

Fundamentals of Good Clinical Practice: Prep and Personnel

Clinical Research
Health Care
Institutional Review Boards

Welcome to 'Fundamentals of Good Clinical Practice: Prep and Personnel'! This course is designed to introduce you to preparing for a clinical trial. This is Course Two in the Clinical Trial Teams series - the first course 'Introduction to Good Clinical Practice' provides background on what clinical trials are as well as the basic principles and practices of GCP. If you are new to the world of clinical research, we suggest starting your journey with Course One. In Course Two, we turn our attention to the conduct of clinical trials, exploring in detail the role of the Investigator and site staff throughout a study. Whether you are new to the field or seeking to refresh your knowledge, this course will equip you with the necessary understanding to begin to navigate the complex world of clinical research. The course is divided into several modules, each covering specific stages of a clinical trial. The modules include a variety of videos, a fictional case study and interactive quizzes to reinforce your learning. We are excited to embark on this learning journey with you as we delve into the world of Good Clinical Practice. Enroll now and start building a strong foundation in the conduct of clinical research!

Hodgkin's Disease - The Contributions of Stanford Investigators course thumbnail
FREE

YouTube

Hodgkin's Disease - The Contributions of Stanford Investigators

Oncology
Health Care
Cancer Treatment

Explore the groundbreaking contributions of Stanford investigators to Hodgkin's Disease research in this 58-minute Grand Rounds presentation. Join Dr. Richard Hoppe, the Henry S. Kaplan-Harry Lebeson Professor of Cancer Biology and Professor of Radiation Oncology, as he delves into the significant advancements made by Stanford researchers in understanding and treating Hodgkin's Disease. Gain valuable insights into the historical context, key discoveries, and innovative approaches that have shaped the field of Hodgkin's lymphoma treatment. This informative session, presented by the Stanford Department of Medicine, offers a unique opportunity to learn about the pivotal role Stanford has played in improving outcomes for patients with this form of cancer.