• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

249 Audit courses

Total sFlow for engineers

5.0(3)

By Systems & Network Training

Total sFlow training course description A comprehensive hands on course covering sFlow. The course starts with the basics of flows moving swiftly onto configuring sFlow and studying the information it provides. What will you learn Describe sFlow. Use Nmap. Recognise how sFlow can be used. Describe the issues in using sFlow. Compare SFlow with SNMP and NetFlow. Total sFlow training course details Who will benefit: Technical staff working with sFlow. Prerequisites: TCP/IP foundation for engineers. Duration 1 day Total sFlow training course content What is SFlow? Where to monitor traffic. Packet based sampling, Time based sampling. Adaptive sampling. Flow samples, Counter samples. Hands on Wireshark flow analysis. Getting started with sFlow sFlow configuration. Enabling sFlow. Per interface. Hands on Accessing sFlow data using the CLI. sFlow architecture SFlow agents and collectors. When flows are exported. Distributed sFlow architecture, subagents. sFlow reporting products. SolarWinds. Hands on Collector software. sFlow features and benefits Troubleshooting with sFlow, controlling congestion, security and audit trail analysis. Hands on Using sFlow. sFlow versus other technologies Flows. sFlow impact and scalability. sFlow versus SNMP and RMON, SFlow versus NetFlow/IPFIX. Hands on Advanced sFlow configuration.

Total sFlow for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,397

HP iMC for engineers

5.0(3)

By Systems & Network Training

HP iMC for engineers training course description A hands on course focusing on network management using HP iMC on Microsoft Windows or UNIX. What will you learn Describe the network management architecture. Use HP NNMi. Diagnose faults using HP iMC. Recognise the MIB structure. HP iMC for engineers training course details Who will benefit: Network administrators. Network operators Those wishing to find out more about how their NMS works Anyone wishing to implement NFV using OpenStack. Prerequisites: Introduction to Virtualization Duration 2 day HP iMC for engineers training course content Network management What is network management? Benefits, issues. Getting started with HP iMC Starting HP iMC, IP discovery, IP monitoring, controlling IP discovery. Hands on Initial HP iMC configuration. Using HP iMC Viewing devices, Device view, IP view, network view, polling. Hands on Using HP iMC. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. Hands on Configuring network devices for HP iMC. Parts of SNMP SNMP architecture, MIBs, The protocol. HP iMC SNMP configuration. Hands on HP iMC SNMP configuration. MIBs The MIB2 groups, additional MIBs, MIB compilers, vendor MIBs. HP iMC MIB loader and browser. Hands on MIB browsing. Monitoring devices Polling, obtaining MIB information. Hands on HP iMC performance management. Configuration and change management Configuration templates, software library, configuration compare, configuration audit and reports. Hands on Using the configuration center. Reports Report templates, Real time reports, scheduling reports. Hands on Using real time reports. HP iMC fault management Alarms, polling, fault management, setting thresholds and configuring traps. Syslog. Hands on Working with alarms. Security alarms.

HP iMC for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Administering Microsoft SQL Server

5.0(3)

By Systems & Network Training

Administering Microsoft SQL Server course description This course provides students with the knowledge and skills to maintain a Microsoft SQL Server database. The course focuses on how to use SQL Server 2016 product features and tools related to maintaining a database. Note: This course is designed for customers who are interested in learning SQL Server 2014 or SQL Server 2016. It covers the new features in SQL Server 2016, but also the important capabilities across the SQL Server data platform. What will you learn Describe core database administration tasks and tools. Configure SQL Server databases and storage. Import and export data. Monitor SQL Server. Trace SQL Server activity. Manage SQL Server security. Audit data access and encrypt data. Administering Microsoft SQL Server course details Who will benefit: Individuals who work with SQL Server databases. Individuals who develop applications that deliver content from SQL Server databases. Prerequisites: Introduction to data communications & networking. Duration 3 days Administering Microsoft SQL Server course contents Introduction to SQL Server administration Database administration, SQL Server platform, database management tools and techniques. Hands on SQL Server Management Studio, sqlcmd Windows PowerShell with SQL Server. Working with databases and storage Data storage with SQL Server, managing storage for system databases, managing storage for user databases, moving database files, configuring the buffer pool extension. Hands on Configuring tempdb storage, creating databases, attaching a database. Importing and exporting data Transferring data, importing and exporting table data, copying or moving a database. Hands on import and export wizard, bcp utility, BULK INSERT statement, OPENROWSET function. Monitoring SQL Server 2014 Monitoring SQL Server, dynamic management views and functions, performance monitor. Hands on Baseline metrics, monitoring a workload. Tracing SQL Server activity Tracing workload activity, using traces. Hands on Capturing a trace in SQL Server profiler, generating tuning recommendations. Managing SQL Server security SQL Server security, server-level security, database-level principals, database permissions. Hands on SQL Server security. Testing access.

Administering Microsoft SQL Server
Delivered in Internationally or OnlineFlexible Dates
£2,367

Exploration & Production (E&P) Accounting Level 2

By EnergyEdge - Training for a Sustainable Energy Future

Enhance your knowledge of exploration and production accounting with EnergyEdge's course. Join our classroom training for expert guidance and industry-relevant skills. Enroll now!

Exploration & Production (E&P) Accounting Level 2
Delivered In-PersonFlexible Dates
£2,699 to £2,799

Low Voltage Authorised Person Training (APLV)

4.7(1243)

By Technique Learning Solutions

This comprehensive course will equip you with the essential knowledge and skills required to perform the duties and responsibilities of a low voltage Authorised Person (Electrical Low Voltage). You will learn how to ensure compliance with the Electricity at Work Regulations 1989, utilising JSP375 as the reference for safe procedures. Authorised Person Electric Low Voltage Course Objectives: ✅Understanding low voltage equipment, including switchgear and protective devices✅Comprehensive overview of the Electricity at Work Regulations✅Implementing safe working practices with electricity (HSG85 and JSP375)Procedures for the safe isolation of standby power supplies and UPS equipment✅Clarifying roles and duties of personnel involved in low voltage operations✅ Mastering low voltage working procedures✅Audit requirements and best practices✅ Practical exercises in the completion of safety documentation and hands-on implementation✅Proper maintenance of log books and associated documentation✅Experience in producing safety documents for various situations involving operations on electrical systems✅Building confidence in performing practical and procedural duties in line with regulatory requirements and standardised electrical safety guidance for low voltage systems Who Should Attend: This course is designed for experienced engineering staff within the MOD and Commercial sectors who have responsibility for the control, operation, or maintenance of installed low voltage systems. It is particularly beneficial for those who may be appointed as an Authorised Person (Electrical Low Voltage).

Low Voltage Authorised Person Training (APLV)
Delivered In-PersonFlexible Dates
£500

Exploration & Production (E&P) Accounting Level 3

By EnergyEdge - Training for a Sustainable Energy Future

Join EnergyEdge's classroom training course and gain valuable insights into Exploration and Production Accounting - Level 3. Enroll today!

Exploration & Production (E&P) Accounting Level 3
Delivered In-PersonFlexible Dates
£2,699 to £2,799

Implementing Good Clinical Laboratory Practice

By Research Quality Association

Course Information Join our comprehensive course, meticulously designed to equip individuals implementing Good Clinical Laboratory Practice (GCLP) within laboratories handling samples from clinical trials. Delve into the current regulatory landscape governing laboratory work supporting clinical trials, referencing key guidelines such as the ICH Guideline for Good Clinical Practice, the Clinical EU Trials Directive, relevant regulations, and leveraging insights from the RQA guidance document on GCLP. Is this course for you? This course is tailored for laboratory managers, analysts, investigators, trial coordinators, monitors, and auditors operating in diverse settings such as pharmaceutical company laboratories, central laboratories, contract research organisations, hospital laboratories, clinics, and investigator sites. This course will give you: Guidance on effectively interpreting and applying GCLP within the broader framework of Good Clinical Practice (GCP) Insight into the seamless integration of GCLP within clinical programmes (GCP) Practical strategies for implementing GCLP in the nuanced environment of clinical research laboratories The chance to update your knowledge with the latest interpretations and guidance on clinical laboratories by the UK Medicines and Healthcare Products Regulatory Agency (MHRA) Access to a seasoned panel of speakers with extensive expertise A unique opportunity to deepen your understanding of GCLP's application across diverse scenarios. Engage in: Lively discussions to foster ideas Problem-solving sessions targeting specific challenges Detailed exploration of specific aspects within the realms of GCP and GCLP. Tutors Tutors will be comprised of (click the photos for biographies): Vanessa Grant -, - Louise Handy Director, Handy Consulting Ltd Tim Stiles Consultant, Qualogy Ltd Programme Please note timings may be subject to alteration. Day 1 08:50 Registration 09:00 Welcome and Introduction 09:20 Good Clinical Practice and the Requirements of Good Clinical Laboratory Practice A review of Good Clinical Practice and its requirements for the laboratory analysis of samples from a trial. The thought processes behind the development of Good Clinical Laboratory Practice, its objective, scope, interpretation and application are explained. 10:00 Safety and Ethical Consideration Informed consent, confidentiality, expedited reporting, blinding and unblinding and serious breaches of the GCP are discussed. 10:40 Break 10:55 Organisation and Personnel Responsibilities within GCP and the Laboratory The responsibilities of key functions that should exist within a clinical laboratory including personnel records of training and competence are discussed. 11:30 Staff Training and Training Records Personnel records of training and competency assessments are discussed. 11:45 Laboratory Facilities, Equipment and Materials Suitable facility design, organisation and operation will be discussed. The calibration, validation and maintenance of equipment used in the conduct of sample analysis are examined, as are the suitability of materials and the identification and labelling of reagents and solutions. 12:30 Lunch 13:15 Workshop 1 - Facilities, Equipment and Responsibilities Some practical problems with regard to the facilities, equipment and responsibilities are explored. 13:45 Workshop 1 - Feedback 14:15 Computer Systems Validation Systems, including computerised systems, used in the analysis, collection and reporting of results should be appropriately tested, operated and controlled. What this means in practice is discussed. 14:45 Trial Protocols, Analytical Plans During this session we examine the purpose, content, control and change of these important documents. 15:30 Break 15:45 Workshop 2 - SOPs, Clinical Protocols, Analytical Plans and Validation The practicalities of managing and documenting the planning phase of analytical work on a trial are explored along with computerised system validation. 16:30 Workshop 2 - Feedback 17:00 Close of Day Day 2 09:00 Conduct of the Work and Quality Control Many of the issues that surround the conduct of sample collection, shipment, storage, analysis and management of Analytical Methods are discussed. This includes the quality control of the assay that may be employed and Quality Control checks. 10:00 Deviation Management The expectations around deviations and CAPA are discussed. 10:15 Workshop 3 - Conduct of the Work and Quality Control Practical work conduct and quality control issues are explored. 10:45 Break 11:00 Workshop 3 - Feedback 11:30 Source Data, Data Integrity, Records and Reports The creation and subsequent management of source data and records, data integrity, are discussed, together with the process of reporting analytical results. 12:10 Workshop 4 - Data, Records and Reports Practical problems with data, records and reports are investigated. 12:45 Lunch 13:30 Workshop 4 - Feedback 14:00 Quality Audit The requirements for and purpose of quality audits are discussed. The difference between quality audit and quality control are explained along with the role of the quality audit staff and their interaction with the analytical project managers, laboratory management and study staff. 14:40 Risk Management How should we assess risk and how can we use the process to assist in evaluation of audit findings. 15:15 Break 15:30 Regulatory Inspection The conduct of regulatory inspections and current expectations of the inspectors. Preparation for inspections and conduct during them will be discussed. 16:00 Panel Session This panel session will address any outstanding issues raised by the delegates. 16:15 Close of Course Extra Information Face-to-face course Course Material Course material will be available in PDF format for delegates attending this course. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course. The material will be emailed in advance of the course and RQA will not be providing any printed copies of the course notes during the training itself. Delegates wishing to have a hard copy of the notes should print these in advance to bring with them. Alternatively delegates are welcome to bring along their own portable devices to view the material during the training sessions. Remote course Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam. CPD Points 14 Points Development Level Develop

Implementing Good Clinical Laboratory Practice
Delivered In-PersonFlexible Dates
£858 to £1,112

Introduction to Computer Systems Validation

By Research Quality Association

Course Information Join our comprehensive three-day training programme tailored for individuals seeking a foundational grasp of computerised system validation. This course equips participants with essential knowledge to effectively validate systems within their respective organisations for utilisation in GxP (GLP, GCP, GMP, GDP, and GPvP) environments. Attendees will also gain proficiency in auditing validated computerised systems, ensuring compliance with pertinent GxP regulations. Commencing with an overview of regulatory prerequisites and the system life cycle, the course transitions into practical aspects, centered around validating computerised systems and conducting subsequent audits. Engage in a dynamic blend of presentations, interactive discussions, and hands-on practical workshops throughout the course. This course will provide delegates with an understanding of the computerised system validation process, including: Definition of end user requirements Risk management, including supplier assessment and techniques for audit planning Validation planning and reporting Linking system development with good business practices Formal testing and qualification Understanding of data integrity and security issues How to assess system validation documentation to verify compliance. Is this course for you? IT professionals new to implementing computerised systems into regulated environments Quality professionals who monitor or audit computerised systems System owners, end users, tester and project staff. Tutors Tutors will be comprised of (click the photos for biographies): Nichola Stevens Director and Principal Consultant, Nuncius Compliance Solutions Ltd Barry McManus Consultancy Partner, Empowerment Quality Engineering Ltd Programme Please note timings may be subject to alteration. Day 1 09:00 Welcome, Introduction and Course Objectives 09:45 Why Validate? Regulations and Guidance on Computerised System Validation Overview of the regulations and guidance applicable to CSV and their key expectations. 10:30 Break 10:45 The System Lifecycle The concept of the SLC and the key outputs from it. 12:00 Lunch 12:45 The Validation Process The approach to validation for different system types and a look at some of the key deliverables. 14:00 Project Introduction 14:15 Exercise 1 - User Requirements Capturing, agreeing and documenting the user requirements for a system. 15:15 Break 15:30 Exercise 1 - Feedback 16:00 Risk Management Risk management and its impact on validation. Identifying the deliverables required. Then group discussion on risk assessment for three systems. 17:00 Questions and Answers Answers to any outstanding questions from Day 1. 17:15 Close of Day Day 2 09:00 Supplier Assessment The different approaches to supplier assessment and the things to be considered when assessing a supplier. 10:15 Exercise 2 - Supplier Assessment Planning a vendor audit with a focus on the key validation deliverables. 11:00 Break 11:15 Exercise 2 - Feedback 11:45 Test Overview and Test Planning The different test phases, the purpose of each test phase and things to be considered when planning and reporting testing. 12:45 Lunch 13:30 Test Overview and Test Planning Continued. 14:15 Test Script Design, Execution and Review What a good test script looks like and the key things to consider when creating, executing and reviewing a test script. 15:30 Break 15:45 Exercise 3 - Creating a Test Script Create a test script based on user requirements created on Day 1. 17:15 Close of Day Day 3 09:00 Exercise 3 Feedback 09:30 Infrastructure Configuration and Qualification 10:30 Break 10:45 Validation Reporting Overview of the Validation Report and what should be included in it. 11:15 Maintaining the Validated State The procedures and records needed to ensure the system remains fit for purpose. 12:30 Lunch 13:15 Change Control Key concepts related to making changes to validated systems. 14:00 Data Integrity and Security How can we assure the integrity and security of our data. 15:15 Break 15:30 Course Objectives Summary and Panel Discussion A round up of key learning from the course. 17:00 Close of Course Extra Information Face-to-face course Course Material Course material will be available in PDF format for delegates attending this course. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course. The material will be emailed in advance of the course and RQA will not be providing any printed copies of the course notes during the training itself. Delegates wishing to have a hard copy of the notes should print these in advance to bring with them. Alternatively delegates are welcome to bring along their own portable devices to view the material during the training sessions. Remote course Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam. CPD Points 19 Points Development Level Develop

Introduction to Computer Systems Validation
Delivered In-PersonFlexible Dates
£1,297 to £1,687

Securing UNIX systems

5.0(3)

By Systems & Network Training

Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in Internationally or OnlineFlexible Dates
£4,997

How to recover from a poor Ofsted inspection outcome

By Marell Consulting Limited

Get a clear strategy for bouncing back after a poor Ofsted inspection outcome; develop your DfE action plan; know what to expect from a progress monitoring inspection.

How to recover from a poor Ofsted inspection outcome
Delivered in Birmingham or UK Wide or OnlineFlexible Dates
£997