• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

36 Auditor courses in Liverpool

Pipeline Integrity Management - Incorporating API 1160 / 1173 and ASME B31.8S

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course This 3 full-day course provides a sound review of Pipeline Integrity Management strategies, in compliance with regulatory requirements, including self-assessment. The course is highly interactive and takes the form of lectures and case studies. On completion of the course, the participants will have a solid understanding of the procedures, strengths, limitations, and applicability of the main issues that comprise a Pipeline Integrity Management Program. The course incorporates API 1160 / 1173 and ASME B31.8S, and explains in detail the pipeline integrity requirements described in these standards. This course can also be offered through Virtual Instructor Led Training (VILT) format. Training Objectives Objectives of this course: Explore the latest techniques used to develop a comprehensive integrity management program covering both pipelines and their associated facilities Determine the necessary elements of such a program described in detail with examples of typical program content including an overarching view of where detailed risk analysis and defect assessment fits in the program Understand the scopes and contents of pipeline integrity standards i.e. API 1160 / 1173 and ASME B31.8S On completion of this course, the participants will be able to understand: Codes used in developing Integrity Management Plans, API 1160 / 1173 and ASME B31.8S, others The elements of an Integrity Management Plan Threat assessment Critical aspects of risk assessment Prevention and mitigation measures Characteristics and limitations of different inspection methods A risk-based approach to maintenance Target Audience The course is intended for supervisors, engineers and technicians responsible for ensuring the adequate protection of pipeline assets. In addition, maintenance planners, regulators and service providers to the pipeline industry will also benefit from attending this course. Course Level Basic or Foundation Trainer Your expert course leader is a Ph.D. Metallurgical Engineer with advanced expertise in asset integrity management of oil & gas production facilities, corrosion control, materials selection, chemical treatments, pipeline pigging, inspections, fitness-for-service evaluations, failure analysis and related consulting. He has 40 years of experience working for BP in Asia and South America, Amoco in the US, Intertek, and four years with Applus-Velosi in Southeast Asia. Practical Work Experience: AIM consultant with focus on Southeast Asia operations and clients Direct technical interface with clients on Velosi services Technical consultant for ongoing regional contracts and lead roles as auditor, instructor or facilitator Main clients have included the following organisations: BP and Vico Indonesia, Pertamina Offshore Northwest Java and West Madura Offshore (Indonesia), NCSP (Vietnam), ADCO-OPCO (Abu Dhabi), Thang Long (Vietnam), Exxon-Mobil (Malaysia) and Mubadala Petroleum (Indonesia). POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable

Pipeline Integrity Management - Incorporating API 1160 / 1173 and ASME B31.8S
Delivered in Internationally or OnlineFlexible Dates
£3,100

Strategic Internal Auditing

5.0(10)

By GBA Corporate

Overview An ineffective audit can mean severe consequences; resulting in process failure, customer dissatisfaction and regulatory noncompliance. Optimize your generic auditing skills with this Internal Auditing training course not aimed at any specific ISO management systems standard or Process. Boost your internal audit capabilities by gaining confidence in planning and performing an effective audit and reporting and taking corrective action where necessary. This course develops the necessary skills to assess and report on the conformance and implementation of processes based on management systems. You'll learn how to initiate an audit, prepare and conduct audit activities, compile and distribute audit reports and complete follow-up activities

Strategic Internal Auditing
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,779

Internal Auditing and Modern International Standards

5.0(10)

By GBA Corporate

Overview The development, monitoring, and continued improvement of a highly-integrated, internal audit function is essential for the continued financial success, stability, and growth of world-class business entities. A well-designed and effective internal audit system will provide verification and support that accounting and financial policies, procedures, and controls are working adequately and will spotlight any significant matters that need attention. 

Internal Auditing and Modern International Standards
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,779

Auditing and Internal Control

5.0(10)

By GBA Corporate

Overview Internal control, as defined by accounting and auditing, is a process for assuring an organization's objectives in operational effectiveness and efficiency, reliable financial reporting, and compliance with laws, regulations and policies. It is very important for the organisation to have a smooth flow of accounting as it plays a very important role in the development of the organisation. Financial Managers or any person who deals with Accounts need to see that the company accounts are very updated and are free from any risks that can become a problem during the time of Auditing.  This course will feed you with all the skills required to have a good Internal Management process it is important to analyse Risk Management to see if the process is working efficiently and measures the effectiveness of controls put in place to alleviate risks. 

Auditing and Internal Control
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

FORENSIC ACCOUNTING AND AUDITING

5.0(10)

By GBA Corporate

Overview This training course will empower you to recognize the root causes of fraud and white-collar crime in the current economy, understand the categories of fraud, equip you with methodologies of fraud detection and prevention, and heighten your ability to detect potential fraudulent situations. In addition to the fundamentals of fraud investigation and detection in a digital environment; profit-loss evaluation, analysis of accounting books, legal concepts, and quantification of financial damages are also examined in this course

FORENSIC ACCOUNTING AND AUDITING
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,779

Certified Business Analysis Professional (CBAP) Boot Camp: In-House Training

By IIL Europe Ltd

Certified Business Analysis Professional™ (CBAP®) Boot Camp: In-House Training The course provides targeted exam preparation support for IIBA® Level 3 - CBAP® exam candidates, including both a BABOK® Guide Version 3.0 content review and exam preparation tutorial. The class is interactive, combining discussion, application of concepts, study tips, and a practice exam. Knowledge Check quizzes and self-assessments allow candidates to identify areas of weakness and create a custom study plan tailored to their individual needs as well as study aids to support their exam preparation after the course. The course materials include a copy of A Guide to the Business Analysis Body of Knowledge® (BABOK® Guide) Version 3.0. What you will Learn Upon completion, participants will be able to: Demonstrate familiarity with the structure and content of the IIBA® BABOK® Guide Improve their probability of passing the Level 3 - CBAP® Exam Identify their knowledge gaps through the use of module Knowledge Check quizzes Gauge their readiness for taking the exam by IIBA® BABOK® Guide Knowledge Are Foundation Concepts for IIBA® CBAP® Prep IIBA® - the Organization Business Analysis - the Profession Knowledge Check Terminology and Key Concepts IIBA®'s BABOK® Guide - the Standard Underlying Competencies BA Techniques Business Analysis Planning and Monitoring Knowledge Check Overview BAP&M Tasks BAP&M Techniques Elicitation and Collaboration Knowledge Check Overview E&C Tasks E&C Techniques Requirements Life Cycle Management Knowledge Check Overview RLCM Tasks RLCM Techniques Strategy Analysis Knowledge Check Overview SA Tasks SA Techniques Requirements Analysis and Design Definition Knowledge Check Overview RA&DD Tasks RA&DD Techniques Solution Evaluation Knowledge Check Overview SE Tasks SE Techniques Exam Preparation Practice Exam and debrief Exam Preparation Study Tips Manage Study Plan Exam Process Exam day

Certified Business Analysis Professional (CBAP) Boot Camp: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£2,495

Organisation Programme - Bribery and corruption risk assessment

By Global Risk Alliance Ltd

Our training programme will provide those involved at any stage of the process for procuring goods and/or services within their organisations with the knowledge and skillset to identify and mitigate the threat posed by the breadth and multi-layered complexity of procurement fraud, corruption and associated financial crime and money laundering.

Organisation Programme - Bribery and corruption risk assessment
Delivered In-Person in InternationallyFlexible Dates
£7,000 to £9,000

Organisation Programme - How to identify and mitigate procurement fraud and corruption

By Global Risk Alliance Ltd

Our training programme will provide those involved at any stage of the process for procuring goods and/or services within their organisations with the knowledge and skillset to identify and mitigate the threat posed by the breadth and multi-layered complexity of procurement fraud and corruption.

Organisation Programme - How to identify and mitigate procurement fraud and corruption
Delivered In-Person in InternationallyFlexible Dates
£7,000 to £9,000

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

Assessing and Managing Cyber Security Risks for Essential Services Operators

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT) This 3 half-day Virtual Instructor Led Training (VILT) course will help participants grasp the idea of real-world risk management and how this relates to the cyber world. The VILT course will cover topics surrounding identifying cyber risks and vulnerabilities, guidance on applying administrative actions, and comprehensive solutions to ensure your organization is adequately secure and protected. The VILT course will guide participants on how to conduct a security risk assessment for their organization, and equip them with the skills to develop a risk compliance assessment plan as well as methods to develop risk management strategies which can improve their organization's security posture. The VILT course has at least a 30% hands-on approach through the use of Table Top Exercises. The VILT course will cover the following modules: Introduction to Risk Assessments (RA) Threat Actors and Their Motivations Threat and Risk Assessment Critical Controls Identification Maturity Assessment Treated Cyber Risk Profile Target Cyber Risk Profile and Strategy Target Audience The VILT course is intended for professionals responsible for organizational information and security system and those involved in operating and maintenance of critical information and IT network & sotware systems. Professionals who are designated as the Single Point of Accountability (SPoA) as well as system auditors will find this course useful. Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 3 half-day sessions comprising 4 hours per day, with 2 x 10 minutes break per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 3 half-day sessions, 4 hours per session (12 hours in total). This VILT course is delivered in partnership with ENGIE Laborelec. Trainer Your expert course leader is a is specialized in cybersecurity risk management. Before joining ENGIE, she worked for The National Cybersecurity Agency of France (ANSSI) based in Paris (France) and for Deloitte Belgium located in Zaventem (Belgium). She has been involved in cybersecurity projects focusing on the principle of protecting critical infrastructures. Her different experiences in Cyber Security, Anti-Money Laundering and Global Trade Compliance (including Export Control and Customs) gave her the opportunity to use methodologies tackling strategic, operational and financial control issues at all levels of an organization: people, business processes, IT applications and infrastructure, legal and regulatory compliance. She was an EBIOS Risk Manager (RM) trainer while she worked for the French government; EBIOS RM is the French method for assessing and treating digital risks. She also had the opportunity to represent France towards European institutions and other relevant stakeholders for topics related to cybersecurity risk management. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Assessing and Managing Cyber Security Risks for Essential Services Operators
Delivered in Internationally or OnlineFlexible Dates
£1,324 to £2,499