Tallo logoTallo logo

Courses

Discover thousands of courses from top institutions and platforms worldwide

53,517 Courses Found

Sort by:
  • Newest First
  • Highest Rated
  • Most Reviewed
  • A to Z
  • Z to A
  • Price: Low to High
  • Price: High to Low
  • Duration: Short to Long
  • Duration: Long to Short
Master Certified Fraud Examiner (CFE) Essential Training course thumbnail

Udemy

Certificate

Master Certified Fraud Examiner (CFE) Essential Training

Fraud Prevention
Data Analytics
Forensic Accounting

Uncover Fraud & Safeguard Finances, Techniques, Strategies, & Ethical Considerations, CFE Exam Prep & Tips. What you'll learn: Gain a deep understanding of what fraud is, its various forms, and the significant impact it can have on individuals and organizations.Learn about the role of a CFE, their ethical obligations, and the tools and techniques they use to uncover and combat fraud.Guided through the systematic process of fraud examination, from initial suspicion to gathering evidence and reporting findings.Ethical dilemmas that may arise during fraud examinations will be explored, along with guidance on how to navigate them with integrity and professionalism.Become familiar with various types of fraud.Discover the importance of internal controls in fraud prevention and learn how data analytics can be used for fraud detection.Cover the criminal and civil law aspects of fraud cases, the role of regulatory bodies, and the processes of gathering and preserving evidence.Develop advanced skills in conducting interviews, forensic accounting, data analysis, surveillance, and undercover operations.Developing robust fraud prevention programs.Gain insights into cross-border fraud investigations, money laundering schemes, global anti-fraud initiatives, and more.Prepare for the Certified Fraud Examiner (CFE) certification exam, demonstrating their expertise and commitment to combatting fraud.and much more IMPORTANT before enrolling:This course is not intended to replace studying any official vendor material for certification exams, is not endorsed by the certification vendor, and you will not be getting the official certification study material or a voucher as a part of thiscourse.Welcome to the "Comprehensive Course in Fraud Examination and Prevention," you'll embark on a comprehensive journey through the world of fraud. This course is designed to equip both beginners and experienced professionals with the knowledge and skills needed to combat fraud effectively.A Certified Fraud Examiner (CFE) is a professional designation awarded by the Association of Certified Fraud Examiners (ACFE) to individuals who have demonstrated expertise in the field of fraud examination and prevention. The CFE credential is highly regarded in the fields of accounting, auditing, and fraud investigation.Explore the intricacies of fraud, its various forms, and the profound impacts it has on individuals and organizations. Dive into the role and responsibilities of a Certified Fraud Examiner (CFE) and gain insights into the ethical considerations that guide this profession.You'll be guided through the systematic process of fraud examination, from initial suspicion to the collection of evidence and the reporting of findings. Throughout the course, you'll learn to navigate ethical dilemmas with integrity, adhering to the code of conduct for CFEs.Gain a deep understanding of different types of fraud, including financial statement fraud, occupational fraud, corruption, bribery, money laundering, cyber fraud, and identity theft. Recognize the unique characteristics and red flags associated with each type.Explore fraud prevention and detection strategies, including the crucial role of internal controls and the use of data analytics for detection. Learn to identify red flags and warning signs, master interview techniques, and understand the art of document examination.Delve into the legal aspects of fraud examination, including criminal and civil law in fraud cases, the involvement of regulatory bodies, and the processes of gathering and preserving evidence. Real-life case studies will illuminate these concepts.Develop advanced skills in fraud investigation techniques, including conducting interviews, forensic accounting, data analysis, surveillance, and undercover operations. Discover how to effectively report your findings while ensuring compliance with legal requirements.Explore fraud prevention strategies, such as developing robust prevention programs, conducting risk assessments, implementing internal auditing procedures, and guarding against vendor and supplier fraud. Understand the significance of whistleblower programs in fraud prevention.Additionally, you'll gain insights into international aspects of fraud examination, including cross-border investigations, money laundering schemes, global anti-fraud initiatives, and the cultural and ethical challenges involved in international fraud cases.Certified Fraud Examiners are experts in investigating and preventing fraud in various settings, including corporate organizations, government agencies, law enforcement, and consulting firms. They play a critical role in identifying and addressing fraudulent activities, such as embezzlement, financial statement fraud, corruption, and money laundering.The CFE credential is highly respected and recognized internationally, making CFEs valuable assets in the fight against fraud and white-collar crime.As a culmination, prepare for the Certified Fraud Examiner (CFE) certification exam, demonstrating your expertise and dedication to combatting fraud. This course will empower you to become a proficient CFE, equipped to safeguard organizations from the pervasive threat of fraud. Join us on this educational journey to master the art and science of fraud examination and prevention.Thank you.

GenAI for Fraud Analysts: Improving Detection Efficiency course thumbnail

Coursera

Certificate

GenAI for Fraud Analysts: Improving Detection Efficiency

Fraud Detection
Python
Risk Management

This course, GenAI for Fraud Analysts: Improving Detection Efficiency, empowers fraud analysts and compliance professionals with cutting-edge Generative AI (GenAI) techniques to stay ahead of sophisticated fraud schemes. Through hands-on learning and real-world applications, you will master AI-driven anomaly detection, synthetic data generation, and automated compliance checks. Using tools like Python, Scikit-learn, ChatGPT, and Faker, you'll develop fraud detection pipelines, visualize actionable insights, and enhance risk management strategies. This course is designed for beginner fraud analysts, compliance officers, financial professionals, IT security specialists, and data analysts who want to enhance their fraud detection and compliance strategies using Generative AI (GenAI). It is also ideal for aspiring professionals looking to explore AI-driven anomaly detection, risk management, and fraud prevention. Whether you're aiming to improve detection accuracy or automate compliance workflows, this course will equip you with the skills to stay ahead of evolving fraud tactics. To get the most out of this course, learners should have a basic understanding of fraud detection concepts such as transaction monitoring, anomaly detection, KYC (Know Your Customer), and AML (Anti-Money Laundering). Familiarity with data analysis tools like Excel and visualization software is recommended, along with a foundational knowledge of Generative AI tools such as ChatGPT and Python. No advanced programming experience is required, but a willingness to explore AI applications in fraud prevention will be beneficial. By the end of this course, learners will be able to analyze the role of Generative AI in fraud detection and compliance and effectively integrate it into existing workflows. They will gain hands-on experience in applying AI-powered tools like ChatGPT and Python to identify anomalies, generate synthetic data, and enhance fraud detection accuracy. Additionally, participants will learn to design AI-driven workflows to automate compliance tasks, improve operational efficiency, and evaluate fraud detection patterns to make more informed, proactive decisions in combating fraud.

Detecting Financial Statement Fraud | Forensic Accounting course thumbnail

Udemy

Certificate

Detecting Financial Statement Fraud | Forensic Accounting

Asset Valuation
Finance
Forensic Accounting

Learn Financial Statement Fraud Schemes like Fictitious Revenue, Timing Difference and Analytical techniques. What you'll learn: Identify Frauds in Financial StatementsUnderstand the 5 Fraud Schemes in Financial Statement FraudsIdentification of Red Flags of the Financial Statement Fraud SchemesLearn The Key Ratios & Parameters to detect Financial Statement FraudsLearn Fraud Prevention Techniques Financial Statement Frauds constitute one of the highest median loss in occupational fraud landscape. As per Reports To The Nation Survey, 2022, published by The Association of Certified Fraud Examiners (ACFE), Financial Statement Fraud Schemes constitute 9% of the total fraud and a median loss of $593000. The top management (CXOs) are primarily responsible for such frauds. Not having ethical tone at the top and managements power to override existing controls contribute to such frauds. You will learn the following in this course:What is financial statement fraud?The Fraud TreeThe Fraud Triangle by Dr. Donald Cressey which includes:Pressure OpportunityRationalizationFictitious RevenueRed Flags to identify Fictitious RevenueTiming DifferencesRed Flags to identify Timing DifferencesImproper Asset ValuationRed Flags to identify Improper Asset ValuationConcealed Liabilities & Expenses Red Flags to identify Concealed Liabilities & Expenses Improper DisclosuresRed Flags to identify Improper DisclosuresHow to analyse Financial StatementsVertical AnalysisHorizontal AnalysisRatio AnalysisTax Return AnalysisPrevention of Financial Statement FraudsSimple techniques and examples, illustrations have been used in an immersive way to enhance learner experience. Concepts are explained in a lucid manner enabling beginners to CXOs to understand the frauds perpetrated in financial statements.

Certified Network Forensics Examiner : CNFE course thumbnail

Udemy

Certificate

Certified Network Forensics Examiner : CNFE

Network Forensics
Digital Forensics
Incident Response

Certification course What you'll learn: After successfully completing this course, the students shall be able to:Cyber Defense AnalysisIncident ResponseCyber security ManagementSystems AnalysisVulnerability Assessment and Management This course was originally designed only for the U.S. Agency for Government Intelligence. The CNFE certification program is designed to prepare students to master true advanced networking forensics strategies through the use of open source laboratories in an exclusive cyber-range.The CNFE takes digital and network forensic skills to the next level by navigating through over twenty network forensic theme modules.The CNFE provides practical training through our laboratory simulations that replicate real-world situations that include the inspection and recovery of network data, Physical Surveillance, Information Collection, Analysis, Wireless Attacks and SNORT.The course focuses on the centralization and analysis of monitoring mechanisms and networking devices. SIGN UP NOW! This course was originally designed only for the U.S. Agency for Government Intelligence. The CNFE certification program is designed to prepare students to master true advanced networking forensics strategies through the use of open source laboratories in an exclusive cyber-range.The CNFE takes digital and network forensic skills to the next level by navigating through over twenty network forensic theme modules.The CNFE provides practical training through our laboratory simulations that replicate real-world situations that include the inspection and recovery of network data, Physical Surveillance, Information Collection, Analysis, Wireless Attacks and SNORT.The course focuses on the centralization and analysis of monitoring mechanisms and networking devices. SIGN UP NOW!

Examine the Past - History course thumbnail
FREE

YouTube

Examine the Past - History

World History
History
Military History

Explore a comprehensive collection of historical videos covering pivotal moments, influential figures, and societal developments that have shaped our world. Delve into topics ranging from ancient civilizations to modern political events, examining wars, social movements, technological advancements, and cultural shifts. Gain insights into the lives of notable leaders, the evolution of nations, and the forces that have driven human progress. Analyze key historical events such as World War II, the Civil Rights Movement, and the Cold War through expert commentary and archival footage. Discover lesser-known stories and perspectives that offer a nuanced understanding of history. Enhance your knowledge of global affairs, political systems, and societal changes while developing a deeper appreciation for the complexities of human history.

Forensic accounting, fraud investigation and fraud analytics course thumbnail

Udemy

Certificate

Forensic accounting, fraud investigation and fraud analytics

Digital Forensics
Accounting
Statistical Analysis

The course helps to understand fraud examination, forensic audit,financial crime, data analytics What you'll learn: Financial Crimes,Forensic accountingBank Frauds,Digital Banking FraudsForensic audit,Digital ForensicsFraud Prevention,Fraud analytics,Data Analytics This course contains 100+practice Questions and case studiesThis comprehensive course is very helpful to budding professionals and students who have developed a deep passion towards forensic accounting and audit This course is explained with the help of illustrations and case studies.Forensic accounting is the investigation of fraud or financial manipulation by performing extremely detailed research and analysis of financial information. Forensic accountants are often hired to prepare for litigation related to insurance claims, insolvency, divorces, embezzlement, fraud, skimming, and any type of financial theft.A forensic audit is an analysis and review of the financial records of a company or person to extract facts, which can be used in a court of law. Forensic auditing is a speciality in the accounting industry, and most major accounting firms have a department forensic auditing. Forensic audits include the experience in accounting and auditing practices as well as expert knowledge of forensic audit's legal framework.Forensic audits cover a large spectrum of investigative activities. There may be a forensic audit to prosecute a party for fraud, embezzlement or other financial crimes. The auditor may be called in during the process of a forensic audit to serve as an expert witness during trial proceedings. Forensic audits could also include situations that do not involve financial fraud, such as bankruptcy filing disputes, closures of businesses, and divorces.The following are the contents of the course :1. fraud theories2. red flag, yellow flag and green flag3. types of frauds4. types of interviews5. types of questions6. digital forensics7. forensic techniques8. stastical techniques9. applicable laws around the world10. case studies11. Bank Frauds12.Government Frauds13. Financial Statement Frauds Please read the contents of the course before purchasing

Forensic Accounting: Fraud Investigation! (Course 2 of 4) course thumbnail

Udemy

Certificate

Forensic Accounting: Fraud Investigation! (Course 2 of 4)

Fraud Prevention
Forensic Accounting
Fraud Examination

Fraud Examination, Fraud Prevention, Fraud Detection, and Fraud Correction What you'll learn: Define Check TamperingAnalyze Forged Maker Frauds and Forged Endorsement FraudsAnalyze Altered Payee FraudsIdentify Concealment and Check TamperingDefine, identify, and analyze Payroll FraudsDefine, identify, and analyze Expense Reimbursement FraudsDefine, identify, and analyze Register Disbursement Frauds Learn how to Prevent, Detect, and Correct Fraud in your organization. Learn like you have never learned before! This is the second course in the series of four courses. Even though it is a series of courses, you can take each one independently from each other. Try to complete all four courses as the topics are very interesting in each one. This course should help you if you are pursuing the Certified Fraud Examiner, or CFE certification. This course is packed with bite-sized, animated, cartoon-like video lectures. Each video is no longer than 5 minutes. These videos do not only make it easy for you to learn and understand, but to also have fun learning. You can preview the course and some of the videos that were made available for review. Each video lecture is followed by a short quiz, so you can assess your knowledge. At the end of each learning section, you will find a real-life case, that you will need to solve. The cases will be presented to you via video, and then there will be a proposed solution so that you can check your answer. The topics covered in this course include:Tampering with ChecksPayroll FraudsExpense Reimbursement FraudsRegister Disbursements Frauds Enroll and learn about this exciting topic! Enroll, and learn like you never learned before!

MD-102 Examine application management course thumbnail
FREE

Microsoft Learn

MD-102 Examine application management

Application Deployment
DevOps
Mobile Application Management

This module introduces Mobile Application Management (MAM). Students will learn about considerations for implementing MAM and will be introduced to the management of MAM using Intune and Configuration Manager.After this module, you should be able to: Explain Mobile Application Management. Understand application considerations in MAM. Explain how to use Configuration Manager for MAM. Use Intune for MAM. Implement and manage MAM policies. In this module, you'll master deploying applications using Intune, Configuration Manager, Group Policy, and Microsoft Store Apps. These powerful tools and techniques will equip you to manage and maintain diverse applications across your organization effectively.After this module, you should be able to: Explain how to deploy applications using Intune and Configuration Manager. Learn how to deploy applications using Group Policy. Understand Microsoft Store Apps. Learn how to deploy apps using Microsoft Store Apps. Learn how to configure Microsoft Store Apps. In this module, you're introduced to managing apps on Intune managed devices. The module will then conclude with an overview of how to use IE Mode with Microsoft Edge.After this module, you should be able to: Explain how to manage apps in Intune. Understand how to manage apps on nonenrolled devices. Understand how to deploy Microsoft 365 Apps using Intune. Learn how to configure and manage IE mode in Microsoft Edge. Learn about app inventory options in Intune.

Identifying Food Fraud course thumbnail
FREE

FutureLearn

Certificate

Identifying Food Fraud

Industry Specific
Analytical Chemistry
Food Safety

The food industry is one of the most important commercial sectors in the world. Everyone uses it, but how many people abuse it? As we witness the increasing globalisation of the supply chain, a growing challenge is verifying the questionable identity of raw materials in the food we eat. In this course we will look at topical issues concerning ‘food fraud’ and explore ways in which analytical chemistry can help in its identification and prevention. We’ll share fascinating examples, such as the history of white bread and a surprising ingredient once found in bitter beer. The University of East Anglia has joined forces with the world-renowned Institute of Food Research (IFR) to bring you this unique course. You’ll be led by Kate Kemsley, a specialist in the use of advanced instrumentation for measuring the chemical composition of food materials. Course content is linked with UEA’s MChem postgraduate programme, which supports final-year students’ practical research projects in this area of science. Where could this course take me? If you are planning to study Chemistry at college or university - this course will give you an essential overview of some instrumental techniques that you are likely to encounter. This includes exploration of infrared technology, NMR and mass spectrometry; important areas of Chemistry for A-Level students to grasp. This course is also designed to support the professional development of those currently working in the food industry, who want to delve deeper into the methods analytical chemists take in the measurements of food materials and ingredients. It will act as the perfect refresher for your current knowledge base, as you can interact online with thousands of individuals working in the food sector today. What and how will I learn? You’ll acquire knowledge and understanding of infrared technology, NMR and mass spectrometry with practical examples linked to current standards and issues in the food sector. You will gain a global perspective of the value of chemistry in this area and learn from analytical chemists in action. By enjoying a balance of theory and practical applications, students learn directly from academics at the University of East Anglia and scientists from the Institute of Food Research, with a brilliant chance to network throughout the duration of the course. No formal qualifications, just an interest in food fraud and a basic understanding of chemistry.

Data Analyst course thumbnail

edX

Certificate

Data Analyst

Data Analysis
Python
SQL

This eight-course Professional Certificate from IBM prepares you with job-ready skills for an entry level data analyst role. Position yourself competitively and power your data analyst career for a job in a thriving market or leverage foundational data skills to explore problems in an increasingly data-driven professional world. The U.S. Bureau of Labor Statistics projects a growth rate of 20% in the data analytics industry until 2028. You will learn the core principles of data analysis, participate in hands-on skills-based practice, and gain the knowledge to help companies make smarter business decisions. You will work with a variety of data sources, project scenarios, and data analysis tools, including Excel, SQL, Python, Jupyter Notebooks, and Cognos Analytics. These online learning tools will offer you practical experience with data manipulation and the application of analytical and data visualization techniques. This Professional Certificate does not require any prior programming or statistical skills, and is suitable for learners with or without college degrees. A willingness to learn, basic computer literacy, comfort working with numbers, high school math, and a desire to enrich your profile with valuable skills is all you need to get started in this course. With the IBM Data Analyst Professional Certificate you will develop the confidence and portfolio to begin a career as an associate or junior data analyst by learning the essential skills that help professionals in a wide range of job functions and industries explore business problems.

Data Analyst course thumbnail

Udacity

Certificate

Data Analyst

Data Analysis
Data Visualization
Machine Learning

Clean up messy data, uncover patterns and insights, and communicate your findings. You'll start with an introduction to data analysis tools, including Jupyter Notebook, NumPy, pandas, and Matplotlib. Using these tools, you will ask questions about data and answer them through data collection, exploration, wrangling, and visualization. This intermediate-level program includes real-world projects where you will choose your own datasets, research questions, and analysis approach. As you progress through the program, each course will repeat the data analysis process while introducing more advanced techniques, such as applying data imputation to fill in missing data and applying appropriate encodings when developing data visualizations.

Security Analyst course thumbnail

Udacity

Certificate

Security Analyst

Cybersecurity
Network Security
Risk Management

The goal of the Security Analyst Nanodegree Program is to equip students with the skills required to be successful in an analyst role.

Cybersecurity Analyst course thumbnail

edX

Certificate

Cybersecurity Analyst

Cybersecurity
Network Security
Digital Forensics

The US Bureau of Labor Statistics projects a 23% increase in cybersecurity jobs to 2033. The demand for cybersecurity analysts is growing ever stronger! What do cybersecurity analysts do? Cybersecurity analysts protect an organization's digital assets by identifying, analyzing, and mitigating security threats, ensuring data and systems remain secure against cyberattacks. This IBM Cybersecurity Professional Certificate has been designed by industry experts to provide you with the job-ready cybersecurity and digital forensic skills you need to jumpstart your cybersecurity career. No prior cybersecurity experience is required. To begin, you’ll build your foundational knowledge of cybersecurity essentials, tools, and technologies, operating systems, networking fundamentals, and the basics of cyberattacks. You’ll explore database fundamentals and vulnerabilities and learn about the steps a cybersecurity analyst would take to prevent, manage, and mitigate cybersecurity attacks. Plus, you’ll learn about cybersecurity architecture, compliance frameworks, standards, and regulations. You’ll also explore gen AI for cybersecurity and build valuable skills and hands-on experience in penetration testing, incident response, forensics, and threat intelligence. You’ll work on real-world projects developing cybersecurity plans and compliance frameworks, giving you great practical work to talk about in interviews. Plus, you’ll use real-world case studies that demonstrate that you can: Apply incident response methodologies and forensics practices. Use industry-specific security tools. Apply cybersecurity industry standards and best practices that mitigate risks, enhance security, and ensure compliance through audit processes. Use gen AI tools to boost cybersecurity effectiveness and productivity. Investigate a real-world security breach by identifying the attack, vulnerabilities, costs, and prevention. Take advantage of the insights provided by seasoned industry experts to guide your job search, resume creation, and Interviewing to help you land your first cybersecurity role. This program will also prepare you to take and earn a 30% discount on the CompTIA Security+ and CySA+ certification exams. After successfully completing this program, you’ll have an industry-recognized IBM Professional Certificate that you can add to your resume and portfolio. If you’re looking to kickstart your cybersecurity career as a sought-after analyst, ENROLL TODAY, and look forward to being job-ready in less than 6 months!

Security Analyst course thumbnail

Udemy

Certificate

Security Analyst

Security Analysis
Finance
Cybersecurity

Understand Data Security What you'll learn: Deep knowledge of organization’s IT Systems.IT Security threat analysis and management.IT Security maintenance, training and supportIT security fixes, tools, countermeasures, testing plus upgrade paths This course is designed for anyone who wants to understand the analysis of data security. More than ever, information security analysts are needed to rescue companies when they have been hacked or breached, as well as to put in place controls and counter-measures to avert cyber attacks.Gain the skills required to detect and mitigate information and cyber security threats and vulnerabilities. The security analyst role is an entry point to many other security specialties and is highly in-demand in today’s evolving threat environment.In the fast moving world of cyber security, with new threats evolving daily, up to date knowledge and skills that involves protecting systems and networks of companies and other assets containing mission-critical data as well as designing and developing new security solutions routinely to stay ahead of the hackers and cyber attackers.Learn the essential prerequisites for your career success! ENROLL TODAY!

Data Analyst course thumbnail

edX

Certificate

Data Analyst

Data Analytics
Business Intelligence
Data Analysis

Step into the fast-growing world of data analytics with the Data Analyst program. This comprehensive, beginner-friendly series of courses from Microsoft will equip you with essential skills to collect, clean, model, and visualize data using Power BI—a leading business intelligence platform. Through hands-on projects and interactive lessons, you’ll learn how to turn raw data into actionable insights, build compelling dashboards, and effectively communicate trends and findings to stakeholders. Whether you're aiming to launch a new career in data analysis or upskill in your current role, this program offers the practical knowledge and tools to succeed in today’s data-driven job market.

Examine ransomware and extortion-based threats course thumbnail
FREE

Microsoft Learn

Examine ransomware and extortion-based threats

Ransomware
Cybercrime
Criminology

Ransomware attacks are growing at an alarming rate. But what exactly is a ransomware attack? This module will define ransomware, determine the scope of the ransomware problem, describe who ransomware victims are, and will touch on a few notable ransomware "families" that everyone should know.By the end of this module, you'll be able to: Define ransomware. Identify different attack types. Explain what a ransomware family is. Describe a real-life ransomware attack. How will you know if you are a victim of ransomware? This module will cover the top ransomware families for today's threat landscape and the vectors they use to enter and infect your organization's files and systems.By the end of this module, you'll be able to: Describe the nature of the threat landscape and an attack vector Describe different entry points and how they are used to breach your security Describe the specialization of ransomware Prevention against ransomware is essential because such an attack can lead to major disruption for you or your business. In this module, you'll learn about best practices to protect yourself against ransomware and other extortion-based attacks.By the end of this module, you'll be able to: Describe different defense mechanisms used to prevent ransomware. List the steps to prevent ransomware. Describe how antivirus/antimalware tools work. Any organization or individual runs the risk of a ransomware attack. As such, the ability to promptly spot and respond to an attack remains essential for successful recovery. In this module, you'll learn how to detect, and recover from a ransomware attack.By the end of this module, you'll be able to: Describe the different indicators of a ransomware attack. Describe the different measures used to identify an attack. Describe how to investigate a ransomware attack. Describe how to recover from a ransomware attack.

The New Medical Examiner System in England and Wales course thumbnail
FREE

YouTube

The New Medical Examiner System in England and Wales

Forensic Medicine
Medicine
Public Health

Explore the new Medical Examiner System in England and Wales through a 31-minute video lecture by Prof. Jason Payne-James. Learn about the role of national medical examiners, their responsibilities in providing safeguards for the public, patient safety monitoring, and contributing to the learning from deaths agenda. Discover the system's background, implementation timeline, and structure, including the roles of medical examiner officers. Gain insights into the impact of the Covid-19 pandemic on the system and its implementation at Norfolk Norwich University Hospital. Understand the results achieved so far and future prospects for this important initiative in the UK healthcare system.

Decoding Fraud: The Evolution and Impact of Netflix's Fraud Metrics course thumbnail
FREE

YouTube

Decoding Fraud: The Evolution and Impact of Netflix's Fraud Metrics

Fraud Detection
Cybersecurity
Threat Intelligence

Explore the evolution and impact of Netflix's fraud metrics in this 30-minute conference talk from BSidesSF 2024. Gain valuable insights into designing effective fraud and security metrics to combat evolving threats. Learn from case studies presented by Aditi Gupta and Yue Wang, as they discuss how these metrics guide strategic decisions and enhance defense posture. Discover practical approaches to creating your own metrics and understand the unique challenges faced in the fight against fraud. Benefit from the speakers' expertise in developing robust security measures for a major streaming platform.

SQL Data Analyst -  SQL , Microsoft SQL, PostgreSQL, MySQL course thumbnail

Udemy

Certificate

SQL Data Analyst - SQL , Microsoft SQL, PostgreSQL, MySQL

SQL
Domain-Specific Languages (DSL)
Data Analysis

Hands-On Data Analysis with SQL What you'll learn: Analyse and manipulate dataCreate Database and TablesAnalyse data using aggregate functionsAnalyse data using analytic functionsAnalyse data using ranking functionsAnalyse data using various operatorsAnalyse data using sub queriesAnalyse data using views A SQL data analyst is a data scientist that uses the SQL language to interpret data. This analysis is used to improve business information and provide new insights to managers.SQL data analysts design scripts and programs to perform specific database functions and to analyse and maintain data. Some SQL Data Analyst Duties and ResponsibilitiesDuties vary for SQL data analysts based on the specific needs of the hiring company and the amount of data being analysed. However, these core tasks are commonly associated with this job:Integrate DataSQL data analysts integrate data from multiple data sets into o:ne database system to streamline information.Create Database FunctionsSQL data analysts program specific database functions to create database triggers and design data tables.Design ReportsAfter reviewing and analysing data, SQL data analysts design reports to show statistics and other information about specific database topics.Clean DatabaseSQL data analysts remove dead data files and other irrelevant information to free up database space.Write ScriptsSQL data analysts write scripts to analyse data and perform specific data queries.Resolve Data IssuesSQL data analysts isolate and resolve issues with data and databases.Add DataSQL data analysts collect data from multiple sources and add it to the database. We will be performing data analysis using SQL on relational databases like: MySQL, PostgreSQL and MS SQL Server.A relational database is a type of database. It uses a structure that allows us to identify and access data in relation to another piece of data in the database. Often, data in a relational database is organized into tables. A relational database includes tables containing rows and columns. For example, a typical business order entry database would include a table that describes a customer with columns for name, address, phone number and so forth.SQL or Structured Query Language is a critical tool for data professionals. It is undoubtedly the most important language for getting a job in the field of data analysis or data sciences. Millions of data points are being generated every minute. And raw data does not have any story to tell. After all this data gets stored in databases and professionals use SQL to extract this data for further analysis.

Homeopathy, Quackery and Fraud course thumbnail
FREE

YouTube

Homeopathy, Quackery and Fraud

TED
Critical Thinking
Skepticism

Watch a legendary skeptic deliver a searing 18-minute indictment of irrational beliefs in this TED talk. Witness a dramatic demonstration as the speaker takes a fatal dose of homeopathic sleeping pills onstage to prove his point. Learn about the million-dollar challenge issued to psychics worldwide to prove their abilities. Explore the dangers of pseudoscience and the importance of critical thinking in evaluating extraordinary claims. Gain insights into the world of skepticism and the ongoing battle against fraudulent practices in alternative medicine and paranormal phenomena.