• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

87 Audit courses in Glasgow

Public Financial Administration

5.0(10)

By GBA Corporate

Overview The effective management of finances is a fundamental function for any organisation but particularly so in the public sector. Governments, under the scrutiny of the citizens they represent, are increasingly under pressure to improve public services whilst at the same time identifying ways to cut spending and increase efficiency. This programme recognises these difficulties and ensures that participants leave the programme with a full understanding of effective financial management in the public sector - including budgeting systems, auditing, preparing financial statements and tracking expenditure. 

Public Financial Administration
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Forensic Accounting for Frauds

5.0(10)

By GBA Corporate

Overview Corporate frauds have the inherent power to bring large organizations to their knees, cause huge monetary loss, prompt lawsuits followed by significant legal expenses, lead to the imprisonment of employees and deteriorate confidence in the market, governments, and institutions. In response, corporations and governments across the globe have stepped up their effort to inspect, prevent and penalize fraudulent practices; resulting in a greater emphasis on the domains of forensic auditing and accounting in the current economy. This training course will empower you to recognize the root causes of fraud and white-collar crime in the current economy, understand the categories of fraud, equip you with methodologies of fraud detection and prevention, and heighten your ability to detect potential fraudulent situations. In addition to the fundamentals of fraud investigation and detection in a digital environment; profit-loss evaluation, analysis of accounting books, legal concepts, and quantification of financial damages are also examined in this course

Forensic Accounting for Frauds
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Compliance and Risk Management

5.0(10)

By GBA Corporate

Overview This Compliance and Risk Management Course is designed for anyone looking for a pathway into this profession and wanting to develop their industry knowledge and skills. It covers the role of the Compliance Officer and compliance department in detail, with step-by-step training in compliance auditing and risk management. This Compliance and Risk Management Training Course will equip you with the fundamental skills needed to identify and manage regulatory risk in your organization, taking you through key topics such as how to implement an efficient Compliance Management System, ethics and compliance, risk types and classifications, and how to design a solid risk management strategy. By the end of this Compliance and Risk Management Training Course, you'll have an excellent understanding of core compliance issues, as well as how to promote a positive compliance culture for your organization, which will give you a head start when it comes to standing out in the relevant job market. 

Compliance and Risk Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Windows certificates for engineers

5.0(3)

By Systems & Network Training

Windows certificates training course description A hands-on training course concentrating solely on PKI using Windows certificates. What will you learn Explain how PKI works. Install windows certificates. Configure windows certificates. Troubleshoot windows certificates. Windows certificates training course details Who will benefit: Technical security staff. Prerequisites: Windows server. Duration 3 days Windows certificates training course contents PKI Symmetric encryption, asymmetric encryption, authentication, digital signing, hashing, certificates, Certification Authorities, Root CA, Intermediate CA, policy CA, Issuing CA, Certificate Revocation Lists. Hands on Inspecting a certificate. Policies and PKI Security policy, certification policy. CA hierarchy Impact of CAs on Active Directory, CA architecture, number of tiers, issuing CA organisation, CA configuration files. CA security. Hands on CA installation PKI health tool, monitoring. Certificate revocation When to revoke, OCSP. Hands on Revoking certificates. Certificate validation Discovery, validation, checks, revocation checking, certificate chains, certification publication. Hands on Event viewer. Certificate templates Version 1, version 1, default, modifying templates. Hands on Template management. Roles Criteria roles, CA administrator, Certificate manager, Backup operator, Auditor. Other PKI management roles. Disaster recovery Backups, recovery. Hands on certutil. Issuing certificates The certificate enrolment process, enrolment methods, manual enrolment, automatic enrolment. Trust between organisations Creating Trust, CTLs, common root CA, cross certification, bridge CA. Web servers and certificates SSL encryption, certificate authentication. Hands on Web servers. VPN Hands on Certificate deployment for VPN. WiFi Hands on 802.1X

Windows certificates for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,497

Securing Microsoft systems

5.0(3)

By Systems & Network Training

Microsoft security training course description A hands on training course focusing on security in the Microsoft environment. The course progresses from patch management onto the use of Microsoft security tools. Then server, desktop and network security are studied in the Microsoft environment. What will you learn Use Microsoft security tools. Secure Microsoft servers. Secure Microsoft desktops. Secure Microsoft networks. Microsoft security training course details Who will benefit: Technical server support staff. Technical desktop support staff. Technical network staff. Technical security staff. Prerequisites: Supporting Windows server 2016 Networking Microsoft systems. Duration 3 days Microsoft security training course contents Introduction Security threats, Microsoft defaults, admin accounts, security patches, patch management, patch tools. Hands on: Studying Microsoft defaults, applying security patches. Microsoft security tools Microsoft updates, WSUS, Inventory tool, baseline security analyser, URLscan, EventCombMT, Cipher security tool, Port reporter, PortQry. Tools hackers use. Hands on: Using Microsoft security tools. Server security Checklists, core server security, AD, Member server security, Domain controller security, Specific roles. Hands on Hardening Microsoft servers, security templates. Active Directory Admin authority in AD, group policy, trust and authentication. Desktop security Checklists, core client security, anti virus software, anti spyware software, firewalls, securing clients with AD, securing clients with group policy, software restriction policies. Hands on Securing Microsoft desktops. Network security Checklist, IP security, VPNs, PKI, certificate authorities, RAS, RRAS, IAS. Hands on: VPN configuration, IAS configuration. Monitoring Auditing, authorisation and logons, tracking, system monitoring, detecting attacks. Hands on: Monitoring Microsoft systems. Summary Microsoft security response centre, security advisories.

Securing Microsoft systems
Delivered in Internationally or OnlineFlexible Dates
£3,497

Security+

5.0(3)

By Systems & Network Training

Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in Internationally or OnlineFlexible Dates
£2,797

Transmission Lines: Design, Analysis and Applications

By EnergyEdge - Training for a Sustainable Energy Future

About this training course Transmission lines and sub-stations are essential components in the electrical power systems. Proper design and maintenance are crucial for transmission lines to maintain a continuous operation. The objective of this 5-day training course is to deal appropriately with control systems, design characteristics and electric & magnetic fields. Participants will gain a better understanding on the corona and gap discharge phenomena, constructional features, and optimization of the transmission lines. Training Objectives By participating in this course, you will be able to: Understand transmission line design and its application Examine different types of conductors and electrical characteristics Explore basic and general transmission line parameters Prevent overvoltage through insulation design Determine surge impedance and corona effects Calculate and measure electric and magnetic fields Comprehend the impact of audible noise and electromagnetic interference Identify interference within the transmission line systems Target Audience The course will greatly benefit the following groups but not limited to: Electrical Engineers Civil Engineers Transmission & Distribution Engineers Substation Operators Safety Engineers Reliability Engineers Facility & Plant Engineers Technical Engineers Design Engineers Plant Supervisors Electrical Contractors Course Level Basic or Foundation Intermediate Training Methods The training instructor relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all the topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught in their own organization. Course Duration: 5 days in total (35 hours). Training Schedule 0830 - Registration 0900 - Start of training 1030 - Morning Break 1045 - Training recommences 1230 - Lunch Break 1330 - Training recommences 1515 - Evening break 1530 - Training recommences 1700 - End of Training The maximum number of participants allowed for this training course is 25. This course is also available through our Virtual Instructor Led Training (VILT) format. Trainer Your expert course leader is a professional engineer with extensive experience in power system studies, substation design field-testing, and EHS programs settings for Mining and Electrical Utilities sectors. He was formally the Engineering Manager at GE Canada in Ontario. He received his M.Sc. in electrical engineering from the University of New Brunswick and his MBA from Laurier School of Business in Waterloo. He has managed and executed more than 150 engineering projects on substation design EMF audits and power system studies and analyses, EMF audits and grounding audits, for major electrical utilities, mines, oil and gas, data centers, industrial and commercial facilities in Canada and the U.S. He is a certified professional engineer in the provinces of Ontario and Alberta. He has various IEEE publications, has served as a technical reviewer for many IEEE journals in power systems and control systems, and is the chair of the Industry Application Chapter (IAS) for IEEE Toronto Section. He remains a very active member for the IEEE substation committee of IEEE Std. 81 ground testing (WGE6) and IEEE Std. 80 ground design (WGD7). A certified electrical safety trainer by GE Corporate and a Canadian Standard Association (CSA) committee member at the mining advisory panel for electrical safety, he also taught many technical courses all over Canada to industrial customers, electrical consultants as well as to electrical utilities customers. Highlighted Projects: Various Power System Studies for 345/230 kV Stations - Nova Scotia Power (EMERA) RF audits for Telecom tower and antennas - Cogeco/Rogers Mobile Power System analysis - Powell Canada Structural/Geotechnical Design and upgrades - Oakville Hydro Underground Cables testing and sizing - Plan Group Relay programming and design optimization - Cenovus Canada Different Arc Flash Analysis and BESS Design - SNC Lavalin Environmental site assessment (ESA) Phase I/II for multiple stations - Ontario Electromagnetic compatibility (EMC) assessment for Toronto LRT expansion - MOSAIC Battery energy storage system (BESS) installation at City of London - Siemens Canada EMF audits for 500 kV Transmission Lines - Hydro One EMF audits for 500 kV Transmission Lines - Hydro Quebec AC interference for 138 kV line modeling and mitigations - HBMS Mine POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Transmission Lines: Design, Analysis and Applications
Delivered in Internationally or OnlineFlexible Dates
£3,320

Smart Metering & Power Quality Analytics

By EnergyEdge - Training for a Sustainable Energy Future

About this training course The smart meter or smart grid represents the next-generation electrical power system. This system uses information, data & communication technology within generation, delivery and consumption of electric energy. This 4-day course will equip you with the innovations that are shaping the power generation and distribution systems and will cover topics ranging from Smart Metering Architecture, Cybersecurity, Smart Grid Systems and Power Line Communications. Training Objectives By participating in this course, you will be able to: Comprehend the Smart Grid and Smart Meters architecture Review latest trends and challenges within the Smart Grid Technology Perform analysis on smart electronic meters Comply with regulatory and metering standards Recognize the importance of cybersecurity in smart grids Maximize efficiency, reliability, and longevity of your smart meters and equipment Gain valuable insights into power quality and harmonics Target Audience This course will greatly benefit the following groups but not limited to: Smart Grid managers and engineers Smart Meters managers and engineers Power plant managers Outage managers Maintenance and operations engineers Power regulatory personnel Transmission managers and engineers Distribution managers and engineers IT managers Renewable energy managers and engineers Course Level Basic or Foundation Intermediate Training Methods The training instructor relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all the topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught in their own organization. Course Duration: 4 days in total (28 hours). Training Schedule 0830 - Registration 0900 - Start of training 1030 - Morning Break 1045 - Training recommences 1230 - Lunch Break 1330 - Training recommences 1515 - Evening break 1530 - Training recommences 1700 - End of Training The maximum number of participants allowed for this training course is 25. This course is also available through our Virtual Instructor Led Training (VILT) format. Trainer Your expert course leader is a professional engineer with extensive experience in power system studies, substation design field-testing, and EHS programs settings for Mining and Electrical Utilities sectors. He was formally the Engineering Manager at GE Canada in Ontario. He received his M.Sc. in electrical engineering from the University of New Brunswick and his MBA from Laurier School of Business in Waterloo. He has managed and executed more than 150 engineering projects on substation design EMF audits and power system studies and analyses, EMF audits and grounding audits, for major electrical utilities, mines, oil and gas, data centers, industrial and commercial facilities in Canada and the U.S. He is a certified professional engineer in the provinces of Ontario and Alberta. He has various IEEE publications, has served as a technical reviewer for many IEEE journals in power systems and control systems, and is the chair of the Industry Application Chapter (IAS) for IEEE Toronto Section. He remains a very active member for the IEEE substation committee of IEEE Std. 81 ground testing (WGE6) and IEEE Std. 80 ground design (WGD7). A certified electrical safety trainer by GE Corporate and a Canadian Standard Association (CSA) committee member at the mining advisory panel for electrical safety, he also taught many technical courses all over Canada to industrial customers, electrical consultants as well as to electrical utilities customers. Highlighted Projects: Various Power System Studies for 345/230 kV Stations - Nova Scotia Power (EMERA) RF audits for Telecom tower and antennas - Cogeco/Rogers Mobile Power System analysis - Powell Canada Structural/Geotechnical Design and upgrades - Oakville Hydro Underground Cables testing and sizing - Plan Group Relay programming and design optimization - Cenovus Canada Different Arc Flash Analysis and BESS Design - SNC Lavalin Environmental site assessment (ESA) Phase I/II for multiple stations - Ontario Electromagnetic compatibility (EMC) assessment for Toronto LRT expansion - MOSAIC Battery energy storage system (BESS) installation at City of London - Siemens Canada EMF audits for 500 kV Transmission Lines - Hydro One EMF audits for 500 kV Transmission Lines - Hydro Quebec AC interference for 138 kV line modeling and mitigations - HBMS Mine POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Smart Metering & Power Quality Analytics
Delivered in Internationally or OnlineFlexible Dates
£2,683 to £3,120

Total H.248 for Engineers

5.0(3)

By Systems & Network Training

Total H.248 training course description A course focusing purely on the H.248 protocol. Anyone working through the ITU standards documents can testify to the need of a training course to explain how H.248 really works. This course already assumes knowledge of other VoIP protocols and starts by positioning H.248 in relation to the other protocols. The course then looks at H.248 architectures and concepts before analysing H.248 messages and call flows. What will you learn Describe what H.248 is Recognise where H.248 fits in relation to other VoIP protocols. Explain how H.248 works. Analyse H.248 packets Total H.248 training course details Who will benefit: Technical staff working with H.248 Prerequisites: Voice Over IP. Duration 2 days Total H.248 training course contents What is H.248? Review of VoIP protocols: RTP, RTCP, SIP, SDP, H.323. The PSTN and SS7. Where H.248 fits into the picture. H.248 history. MGCP. The IETF. Megaco. ITU standards. H.248v1, v2, v3. H.248 architectures Media Gateways, Media Gateway Controllers, Gateway Control functions, Signalling Gateways. Reference architectures: IMS/TISPAN: IBCF, IWF, I-BGF, SPDF. MSF: S-SBG-NC, D-SBG-NC. GSMA: IPX Proxy. Softswitches. H.248 concepts The connection model, terminations, streams, contexts. Termination properties: descriptors, context properties. Events, signals, packages. H.248 messages Protocol stack, UDP, TCP. Message structure. Transactions, actions, commands. Requests, replies, acknowledgements. Sample message flows. Binary encoding, ASN syntax, Text encoding. H.248 commands Termination manipulation: Add, Subtract, Move, Modify. Event reporting: Notify. Management: AuditCapability, AuditValue, ServiceChange. H.248 Descriptors What are descriptors? Relationship with messages and commands. Basic descriptors, Descriptors composed of other descriptors. The 19 descriptors. Defaults. H.248 Transactions Groups of commands, transaction Ids, relationship with actions and commands. Requests and replies. H.248 wrap up What is a package? Basic packages. H.248 security. H.248 - SIP interoperation. H.248 interoperation with other protocols.

Total H.248 for Engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Power BI® - Business Data Analytics

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course  This 3 full-day training course will introduce participants to the Microsoft Power BI® software solution for extracting, manipulating, visualising and analysing data. This is a very practical, hands-on course that takes participants through a series of exercises which help users understand the Power BI® environment, how to use the key areas of functionality, and how to apply the tools it contains to design and produce analyses of their own data. The first two days focus on learning the key concepts and practising these using clean, simple datasets. The third day provides participants with the opportunity to apply what they've learned to their own data. This makes the course far more relevant and meaningful for them, it allows our facilitator to help them structure their data models, queries and DAX formulas correctly, and it allows our facilitator to help them solve any additional problems that may arise but which were not covered as part of the standard the course. In addition, at the end of the day, each participant walks away with something of real, practical use for their job role. Many previous participants have remarked that they obtained the most value from the course during the third day because otherwise, they wouldn't be able to do what they need to do. This is an introductory course and although it does not assume any prior experience with Power BI®, participants will gain much more from the course if they have at least used Power BI® a little prior to attending. Participants who have taught themselves Power BI® will also benefit from attending as the course will fill-in a number of gaps in their knowledge and will also extend what they know. A general understanding of databases, Excel formulas, and Excel Pivot Tables is useful though not essential. Comprehensive course notes, exercises and completed solutions are included. Microsoft® PowerBI® is a trademark of Microsoft Corporation in the United States and/or other countries. Training Objectives Upon completion of this training course, participants will be able to: Confidently use the Power BI® solution, including Power BI® Desktop, PowerBI®.com and the Power BI® Gateway Extract data from a variety of data sources and manipulate the data extracted so it is ready for analysis Combine data sources together and gain an introductory understanding of the M language Write formulas using the DAX language for generating custom columns, measures and tables Design reports and dashboards using a wide range of both built-in and custom visuals Publish reports and dashboards to PowerBI®.com Share reports and dashboards with others using PowerBI®.com Customize reports and dashboards so that different user groups automatically see their own personalized views Target Audience This training course is intended for: Financial Analysts Accountants Budgeting and planning specialists Treasury Risk Managers Strategic Planners This is an introductory course and although it does not assume any prior experience with Power BI®, participants will gain much more from the course if they have at least used Power BI® a little prior to attending. Participants who have taught themselves Power BI® will also benefit from attending as the course will fill-in a number of gaps in their knowledge and will also extend what they know. A general understanding of databases, Excel formulas, and Excel Pivot Tables is useful though not essential. Comprehensive course notes, exercises and completed solutions are included. Course Level Basic or Foundation Trainer Your expert course leader has a Masters (Applied Finance & Investment), B.Comm (Accounting & Information Systems), CISA, FAIM, F Fin and is a Microsoft Certified Excel Expert. He has over 20 years' experience in financial modelling, forecasting, valuation, model auditing, and management reporting for clients throughout the world. He is skilled in the development and maintenance of analytical tools and financial models for middle-market companies to large corporates, at all levels of complexity, in both domestic and international settings. He has trained delegates from a wide variety of Oil & Gas companies including Chevron, Woodside, BHP Billiton, Petronas, Carigali, Shell, Nippon, Eni, Pertamina, Inpex, and many more. He provides training in financial modelling for companies throughout the Asia, Oceania, Middle East and African regions. Before his current role, he spent 6 years working in the Corporate and IT Consulting divisions of a large, multinational Chartered Accounting firm. He is the author of a number of white papers on financial modelling on subjects such as Financial Modelling Best Practices and Financial Model Auditing. Highlights from his oil and gas experience include: Development of economic models to assist Decision Analysts modelling for a wide range of scenarios for multinational oil & gas assets. Auditing and further development of life of project models for Chevron's Strategic Planning Division analysing their North West Shelf assets. Development of business plan and budgeting models for multinational oil & gas assets. Development of cash flow and taxation models for a variety of oil gas companies. Consulting on Sarbanes Oxley spreadsheet remediation and risk assessment. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Power BI® - Business Data Analytics
Delivered in Internationally or OnlineFlexible Dates
£2,493 to £2,899
1...34567...9