• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

92 Audit courses in Manchester

Inflation Derivatives & Index Linked Bonds

5.0(5)

By Finex Learning

Overview A 1-day course on inflation-linked bonds and derivatives, focusing on the UK market in particular. We examine how inflation is defined and quantified, the choice of index (RPI vs. CPI), and the most common cash flow structures for index-linked securities. We look in detail at Index-linked Gilts, distinguishing between the old-style and new-style quotation conventions, and how to calculate the implied breakeven rate. Corporate bond market in the UK, and in particular the role of LPI in driving pension fund activity. Inflation swaps and other derivatives, looking at the mechanics, applications and pricing of inflation swaps and caps/floors. The convexity adjustment for Y-o-Y swaps is derived intuitively. Who the course is for Front-office sales product control research Traders Risk managers Fund managers Project finance and structured finance practitioners Accountants, auditors, consultants Course Content To learn more about the day by day course content please request a brochure To learn more about schedule, pricing & delivery options, book a meeting with a course specialist now

Inflation Derivatives & Index Linked Bonds
Delivered in Internationally or OnlineFlexible Dates
Price on Enquiry

HACCP Documentation Services - Food Safety Consultants

By Kitchen Tonic Training Company and Food Safety Consultants

We write HACCP Plans and HACCP Documents

HACCP Documentation Services - Food Safety Consultants
Delivered In-PersonFlexible Dates
Price on Enquiry

Online Options

Show all 2209

BRCGS Sécurité des Denrées Alimentaires Issue 9 | Auditeur Principal (5 jours)

5.0(11)

By Ask Sonia Limited

Formation officielle Auditeur Principal (Lead Auditor) BRCGS Food v9 (Norme Mondiale pour la Sécurité des Denrées Alimentaires version 9) en français. Dispensée en ligne (Zoom) en direct par un partenaire de formation agréé BRCGS. Frais d'examen et de certificat inclus dans le prix.

BRCGS Sécurité des Denrées Alimentaires Issue 9 | Auditeur Principal (5 jours)
Delivered Online + more
£995

BRCGS Packaging Materials Issue 6 & Issue 7: Auditor Training (3 Days)

5.0(1)

By Ask Sonia Limited

Official BRCGS Packaging Auditor Issue 6 course. Delivered online (Zoom) by a live BRCGS Approved Training Partner. Exam and Certificate fee included in the price.

BRCGS Packaging Materials Issue 6 & Issue 7: Auditor Training (3 Days)
Delivered Online + more
£840

BRCGS Sécurité des Denrées Alimentaires Issue 9 | Exigences pour les Auditeurs (3 jours)

5.0(3)

By Ask Sonia Limited

Formation officielle BRCGS Food v9 (Norme Mondiale pour la Sécurité des Denrées Alimentaires version 9) pour les Auditeurs en français. Dispensée en ligne (Zoom) en direct par un partenaire de formation agréé BRCGS. Frais d'examen et de certificat inclus dans le prix.

BRCGS Sécurité des Denrées Alimentaires Issue 9 | Exigences pour les Auditeurs (3 jours)
Delivered Online + more
£810

BRCGS Packaging Materials Issue 6 & Issue 7: Sites Training (2 Days)

5.0(37)

By Ask Sonia Limited

Official BRCGS Packaging Sites Issue 6 course. Delivered online (Zoom) by a live BRCGS Approved Training Partner. Exam and Certificate fee included in the price.

BRCGS Packaging Materials Issue 6 & Issue 7: Sites Training (2 Days)
Delivered Online + more
£570

BRCGS Sécurité des Denrées Alimentaires Issue 9 | Exigences pour les Sites (2 jours)

5.0(37)

By Ask Sonia Limited

Formation officielle BRCGS Food v9 (Norme Mondiale pour la Sécurité des Denrées Alimentaires version 9) pour les sites en français. Dispensée en ligne (Zoom) en direct par un partenaire de formation agréé BRCGS. Frais d'examen et de certificat inclus dans le prix.

BRCGS Sécurité des Denrées Alimentaires Issue 9 | Exigences pour les Sites (2 jours)
Delivered Online + more
£595

DEI Masterclass - Bringing The DEI Playbook To Life!

By Starling

This one day masterclass is designed to provide a practical application of the content that is covered within The DEI Playbook and is aimed at anyone tasked with launching and implementing diversity and inclusion within their organisation.

DEI Masterclass - Bringing The DEI Playbook To Life!
Delivered in Nottingham + 1 more or Online + more
£495

Excel - Automating Excel with Macros and Analysis Tools

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for To ensure success, students should have completed Excel Essentials and Excel Functions Including Pivot Tables and Lookups or have the equivalent knowledge and experience. Overview Upon successful completion of this course, students will be able to enhance productivity and efficiency by streamlining workflow, collaborate with others, and audit and analyse data. This course is designed for students desiring to gain skills necessary to create macros, collaborate with others, audit and analyse data, incorporate multiple data sources, and import data. Working with Multiple Worksheets and Workbooks Working with Named Ranges Link Cells Across Worksheets and Workbooks Use 3D References to Calculate Across Worksheets Consolidate Data Use Formula Auditing and Error Checking Reveal Formulas Trace Cell Precedents and Dependents Locate Errors in Formulas Watch and Evaluate Formulas Reviewing and Protecting Workbooks Control Data Entry via Data Validation Protect Workbook Access Protect Worksheets and Cell Content Add and Edit Comments Prepare a Workbook for Distribution Modify Excel's Default Settings Using Macros to Automate Workbook Functionality Create Macros via Recording Run Macros via Buttons and Shortcuts Assign Macros to the Quick Access Toolbar and Ribbon Assign Macros to Objects View Macro Code Forecasting and Analysis Data Use Conditional Formatting to Highlight, Sort and Filter Key Data Advanced Conditional Formatting using Formulas Create Sparklines to Visualise Data Add Trendlines to Charts to Visualise and Forecast Trends Use Data Tables and Scenarios to Project Potential Outcomes Use Goal Seek to Calculate Outcomes Forecast Data Trends Using Solver

Excel - Automating Excel with Macros and Analysis Tools
Delivered Online
£197

Introduction to Good Manufacturing Practice

By Research Quality Association

Course Information This course offers foundational guidance and practical support tailored for individuals operating within Good Manufacturing Practice (GMP) frameworks. Explore the fundamental prerequisites of a pharmaceutical quality system (PQS) and delve into the application of quality risk management (QRM) principles, aligning with current regulations and guidance. Gain insights into pivotal aspects such as requirements, roles, and responsibilities, encompassing change control, document management, and key documentation essential for effective implementation of GMP with a focus on regulatory inspections and common findings. Is this course for you? Ideal for professionals engaged in GMP across various sectors, including: Research and Development (R&D) Contract Manufacturing Organisations Manufacturing Units Quality Control (QC) Laboratories Auditing Roles. What will you learn? Event objectives - by the end of the course, delegates shall: Have an awareness of the basic requirements of GMP Be aware of UK and EU GMP Rules and Guidance and relevant publications Understand the roles and responsibilities associated with GMP Be able to contribute to and maintain quality documentation Have a basic understanding of product lifecycle and manufacturing Understand the requirements of GMP in the QC laboratory context Have a basic understanding of risk management and mitigation principles Understand the need for quality systems and quality assurance activities Be aware of common regulatory findings. Learning outcomes: delegates will be able to: Implement their role within GMP with confidence and knowledge of the principle requirements Contribute effectively to the GMP quality system and their organisation’s compliance Comprehend where their organisation’s activities sit within the larger GMP arena Know where to seek further information within the published rules and guidance, UK Legislation, European Commission Directives, ICH Guidance and other relevant publications, as well as via the internet. Tutors Tutors will be comprised of (click the photos for biographies): Louise Handy Director, Handy Consulting Ltd Programme Please note timings may be subject to alteration. Day 1 09:30 Introductions and Scope of the Course Understand the group requirements and the tutor's background and experience. 09:45 Background and Regulatory Environment Setting the scene, understanding the context, key legislation. 10:30 Principles of GMP Key points and requirements. 11:15 Break 11:30 Personnel and Responsibilities Management and staff, duties and accountabilities. 12:00 Overview of GMP Manufacturing Basics of the product life cycle. 12:30 Lunch 13:15 Risk Management Workshop Practical exploration of risk and mitigation activities. 14:30 QC Laboratories Activities and practicalities. 15:15 Break 15:30 Compliance Quality Assurance and Self Inspection. 16:15 Question Time A chance for questions on the practicalities of GMP. 16:30 Close of Course Extra Information Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam. CPD Points 7 Points   Development Level Learn

Introduction to Good Manufacturing Practice
Delivered Online
£382 to £512

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online
£3,495

Internal Audit Skills

By Imperial Academy

Level 5 QLS Endorsed Course | CPD & CiQ Accredited | Audio Visual Training | Free PDF Certificate | Lifetime Access

Internal Audit Skills
Delivered Online On Demand
£100

Educators matching "Audit"

Show all 12