Course Information Designed to develop personal proficiency in audit planning, execution and reporting, this course is meticulously crafted to refine essential audit skill sets. Through immersive scenarios focused on on-site audit conduct (with an alternative Remote Auditing Course available), participants will engage deeply in the audit process. Extending Expertise: Applicable across all audit types, this course builds upon and enriches the foundational concepts taught in RQA's suite of research quality assurance courses. From 'Research Quality Assurance for Good Laboratory Practice' to 'Good Clinical Practice Auditing – Principles and Practice' and 'Good Manufacturing Practice for Investigational Medicinal Products,' this programme extends the scope of learning. Relevance and Value: Relevant to any area of regulated research and development, this course shines particularly in contexts mandating a quality system for audit. Participants with prior audit experience will gain maximum value from this course. Key Benefits: Enrich your skill set to: Navigate audit processes encompassing planning, execution, reporting, and follow-up Embrace a personalised approach fostering positive audit outcomes Analyse evidence and present cohesive audit findings Recognise the pivotal role of audits in driving continual improvement. Interactive Learning: Structured to foster dynamic engagement, this course encourages delegates to: Engage in discussions, idea development, and problem-solving Exchange invaluable information and experiences. Hands-On Experience: A highlight of this course is the series of practical workshops, where delegates work in small syndicate groups, applying the acquired skills from lectures into real-world scenarios. Tutors Tutors will be comprised of (click the photos for biographies): Andrew Waddell Founder Director, Tower Mains Ltd Rosemary Ichaba Senior QA Associate, Tower Mains Ltd Cate Ovington Director, The Knowlogy Group Ltd Jean McWilliam Associate Director, Alexion View pop up Programme Please note timings may be subject to alteration. Day 1 08:45 Registration 09:00 Welcome and Course Objectives 09:10 What is 'Audit'? Delegates explore the range of audits which they have experienced, define the purpose of each audit type and establish which of those audits are performed to meet regulatory requirements. 09:30 Audits and their Purpose The concepts of quality assurance, quality control, quality management and audit are discussed. 10:30 Break 10:45 Audit Planning The requirements for an effective audit programme and individual audit plans. 11:30 Workshop 1 - Getting the Audit Started Planning for the audit. 12:25 Workshop 1 - Feedback 12:45 Lunch 13:30 Workshop 2 - Getting the Audit Started Arranging the opening meeting. 13:50 Workshop 2 - Feedback Audit initiation. Review and discussion of the role of the opening meeting. 14:25 Auditing Techniques (1) - Data and Documentation Techniques for the conduct of data and report audits are investigated. 14:55 Break 15:10 Workshop 3 - Data and Documentation Audit Conducting an audit of a data package and supporting documentation. 17:15 Close of Day Day 2 09:00 Auditing Techniques (2) - The People Questioning techniques which get the required information from the auditee. 09:45 Live Audit Role Play Auditor and auditee behaviours are explored and strategies developed for successful audit interactions. 10:15 Break 10:35 Audit Closing Meeting An exploration of audit closing meetings. 11:00 Workshop 4 - Audit Observations and Preparing for the Closing Meeting Reviewing and categorising your observations and getting ready to present your case. 11:45 Workshop 4 - Feedback 12:30 Audit Reports The content and distribution of an effective audit report are investigated and the importance of effective written communication is discussed. 13:00 Lunch 13:45 Workshop 5 - Audit Reports and Follow-up Mechanisms for promoting effective corrective and preventive action. Critical review of an audit report example. 14:30 Workshop 5 - Feedback 14:55 Corrective and Preventive Action and Follow-up The auditor's role in monitoring responses to audit and the corrective and preventive actions promised is explored. 15:20 Panel Session An opportunity to get answers to outstanding questions. 15:30 Close of Course Extra Information Course material Course material will be available in PDF format for delegates attending this course. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course. The material will be emailed in advance of the course and RQA will not be providing any printed copies of the course notes during the training itself. Delegates wishing to have a hard copy of the notes should print these in advance to bring with them. Alternatively delegates are welcome to bring along their own portable devices to view the material during the training sessions. CPD Points 14 Points Development Level Develop
Have you ever pondered over the intricacies of HR management and how an HR audit can revolutionise a business? How does the UK law govern the dynamics of employment, and how can compliance be ensured? Dive deep into these questions and more with our exclusive HR Audit (HR Management & Internal Audit) bundle dedicated to HR Management and Internal Audit. Within this comprehensive HR Audit (HR Management & Internal Audit) compilation, you'll embark on a thorough exploration of the nuances of the HR realm, ranging from the core competencies of HR Audit and Management, the delicate art of Employee Hiring and Termination, to mastering Performance Management at an advanced level. Get to grips with the complexities of Payroll Management, the intricacies of UK Employment Law, the precision needed for Internal Audit Skills, and the paramount importance of Compliance Management. The eight courses included in the bundle are: Course 01: Certificate in HR Audit Course 02: Internal Audit Skills Course 03: HR Management Course Course 04: Employee Hiring and Termination Training Course 05: Performance Management Level 3 Course 06: Payroll Management Course Course 07: UK Employment Law Course 08: Compliance Management Learning Outcomes: Understand the fundamental principles and methodologies of HR audit and its significance in the organisational structure. Acquire knowledge about the complete HR management lifecycle from recruitment to termination. Navigate UK Employment Law, ensuring adherence and compliance in every decision. Develop strategies for effective performance management, fostering productivity and growth. Master the elements of payroll management, guaranteeing accurate and timely compensations. Recognise the vital role of compliance in safeguarding the organisation's integrity and reputation. Certificate in HR Audit: Dive deep into the principles and methodologies specific to HR audits, offering insights to assess and boost organisational efficiency. Internal Audit Skills: Gain a comprehensive understanding of systematic evaluations, ensuring the organisation meets its objectives. HR Management Course: Explore the multifaceted world of HR, from recruitment strategies to fostering employee wellbeing. Employee Hiring and Termination Training: Master the crucial stages of the employee lifecycle, ensuring both entry and exit processes are seamless and effective. Performance Management Level 3: Delve deeper into systems and strategies designed to optimise employee output and foster continuous growth. Payroll Management Course: Understand the complexities of compensation, ensuring accurate, efficient, and compliant payroll processes. UK Employment Law: Navigate the intricate legal landscape of UK employment, ensuring every decision is in line with current regulations. Compliance Management: Recognise and master the strategies to ensure your organisation always meets the necessary standards and regulations. CPD 80 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The target audience for the course is: HR professionals aspiring to upskill and expand their domain knowledge. Business owners aiming to streamline their HR and audit processes. Management students and graduates eyeing a career in this sector. Legal professionals looking to understand UK Employment Law in depth. Compliance officers are keen on integrating audits into their protocols. Requirements Without any formal requirements, you can delightfully enrol in this course. Career path This course will help you to pursue a range of career paths, such as: HR Auditor - £28K to £45K/year. HR Manager - £35K to £55K/year. Payroll Specialist - £25K to £38K/year. Employment Law Consultant - £40K to £60K/year. Performance Management Analyst - £30K to £48K/year. Compliance Officer - £30K to £52K/year. Certificates CPD Certificate Of Completion Digital certificate - Included 8 Digital Certificates Are Included With This Bundle CPD Quality Standard Hardcopy Certificate (FREE UK Delivery) Hard copy certificate - £9.99 Hardcopy Transcript - £9.99
Description: A certificate in Information technology from an internationally recognized institution will increase your career opportunity very much. The Certified Information Systems Professional - Complete Video Training course provides you extensive lessons about the Information System field. Divided into four parts, the course teaches you how to be a certified auditor, security manager, security officer and security professional. Certified Information Systems Auditor (CISA) section illustrates you the process of auditing information systems while the Certified Information Security Manager (CISM) part deals with the information security issues. Here, you will learn the system of information security program development, incident management, and risk management. Next, Certified Information Systems Security Officer (CISSO) course teaches how to be an excellent information system security officer by utilising the information system in the security field. Finally, the Certified Information Systems Security Professional (CISSP) section shows you the path for becoming a security professional by focusing the security issues such as asset security, communication and network security, security operations, etc. In short, the bundle video course will help you to achieve certification in above four fields and helps you to know the practical knowledge about Information System. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Information Systems Professional - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Information Systems Professional - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. The Process of Auditing Information Systems Management of the Audit Function FREE 00:20:00 ISACA IT Audit and Assurance Standards and Guidelines 01:16:00 Risk Analysis 00:21:00 Internal Controls 00:17:00 Performing An IS Audit 01:07:00 Control Self-Assessment 00:09:00 The Evolving IS Audit Process 00:12:00 Governance and Management of IT Corporate Governance 00:06:00 IT Governance 00:02:00 IT Monitoring and Assurance Practices for Board and Senior Management 00:40:00 Information Systems Strategy 00:05:00 Maturity and Process Improvement Models 00:01:00 IT Investment and Allocation Practices 00:05:00 Policies and Procedures 00:17:00 Risk Management 00:31:00 IS Management Practices 00:50:00 IS Organizational Structure and Responsibilities 00:17:00 Auditing IT Governance Structure and Implementation 00:06:00 Business Continuity Planning 00:37:00 Information Systems Acquisition, Development and Implementation Business Realization 01:21:00 Project Management Structure 00:08:00 Project Management Practices 00:18:00 Business Application Development 00:42:00 Business Application Systems 00:38:00 Alternative Forms of Software Project Organization 00:03:00 Alternative Development Methods 00:10:00 Infrastructure Development/Acquisition Practices 00:09:00 Information Systems Maintenance Practices 00:09:00 System Development Tools And Productivity Aids 00:05:00 Business Process Reengineering And Process Change Projects 00:08:00 Application Controls 00:07:00 Auditing Application Controls 00:14:00 Auditing Systems Development, Acquisition And Maintenance 00:08:00 Information Systems Operations, Maintenance and Support Information Systems Operations 00:19:00 Information Systems Hardware 00:13:00 IS Architecture and Software 00:39:00 Network Infrastructure 01:16:00 Disaster Recovery Planning 00:19:00 Protection of Information Assets Importance Of Information Security 00:43:00 Logical Access 00:37:00 Network Infrastructure Security 00:39:00 Auditing Information Security Management Framework 00:03:00 Auditing Network Infrastructure Security 00:13:00 Environmental Exposures and Controls 00:02:00 Physical Access Exposures and Controls 00:05:00 Mobile Computing 00:05:00 Information Security Governance Information Security Governance Overview FREE 00:25:00 Effective Information Security Governance 00:24:00 Information Security Concepts and Technologies 00:20:00 Information Security Manager 00:09:00 Scope and Charter of Information Security Governance 00:10:00 Information Security Governance Metrics 00:23:00 Information Security Strategy Overview 00:02:00 Creating Information Security Strategy 00:36:00 Determining Current State Of Security 00:06:00 Information Security Strategy Development 00:10:00 Strategy Resources 00:40:00 Strategy Constraints 00:07:00 Action Plan to Implement Strategy 00:20:00 Information Risk Management Risk Management Overview 00:16:00 Good Information Security Risk Management 00:15:00 Information Security Risk Management Concepts 00:13:00 Implementing Risk Management 00:17:00 Risk Assessment 00:39:00 Controls Countermeasures 00:23:00 Recovery Time Objectives 00:18:00 Risk Monitoring and Communication 00:04:00 Information Security Program Development Development of Information Security Program 00:11:00 Information Security Program Objectives 00:09:00 Information Security Program Development Concepts 00:14:00 Scope and Charter of Information Security Program Development 00:22:00 Information Security Management Framework 00:16:00 Information Security Framework Components 00:12:00 Information Security Program Resources 01:04:00 Implementing an Information Security Program 00:27:00 Information Infrastructure and Architecture 00:14:00 Information Security Program 00:14:00 Security Program Services and Operational Activities 00:45:00 Information Security Incident Management Incident Management Overview 00:28:00 Incident Response Procedures 00:29:00 Incident Management Organization 00:19:00 Incident Management Resources 00:36:00 Incident Management Objectives 00:14:00 Incident Management Metrics and Indicators 00:17:00 Current State of Incident Response Capability 00:11:00 Developing an Incident Response Plan 00:32:00 BCP DRP 00:36:00 Testing Response and Recovery Plans 00:10:00 Executing the Plan 00:27:00 Information Systems Security Officer Risk Management FREE 00:58:00 Security Management 00:58:00 Authentication 01:01:00 Access Control 01:20:00 Security Models 01:01:00 Operations Security 01:10:00 Symmetric Cryptography and Hashing 01:19:00 Asymmetric Cryptography and PKI 01:31:00 Network Connections 01:28:00 Network Protocols and Devices 01:31:00 Telephony, VPNs and Wireless 01:13:00 Security Architecture 01:02:00 Software Development Security 01:05:00 Database Security and System Development 01:00:00 Malware and Software Attacks 00:17:00 Business Continuity 00:44:00 Disaster Recovery 00:53:00 Incident Management, Law, and Ethics 01:06:00 Physical 00:38:00 Information Systems Security Professional Security and Risk Management FREE 00:24:00 Asset Security 00:12:00 Security Engineering 00:15:00 Communication and Network Security 00:10:00 Identity and Access Management 00:10:00 Security Assessment and Testing 00:12:00 Security Operations 00:36:00 Software Development Security 00:13:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
The classification society, which is a non-governmental organisation in the shipping industry establishes and maintains technical standards for construction and operation of marine vessels and offshore structures. The primary role of the society is to classify ships and validate that their design and calculations are in accordance with the published standards. It also carries out periodical survey of ships to ensure that they continue to meet the parameters of set standards. The society is also responsible for classification of all offshore structures including platforms and submarines. Flag states maintain a ship register in which all ships that sail under their flag need to be registered. Classification societies are licensed by flag states to survey and classify ships and issue certificates on their behalf. They classify and certify marine vessels and structures on the basis of their structure, design and safety standards. The primary task of classification society surveyors is to survey in order to maintain the standards of construction and condition of ships and machinery, which have been laid down by the society. The secondary function of class surveyors, where their society is approved by governments, is for their surveys to be used as a basis for the issue of statutory certificates relating to safety at sea. A classification society’s workforce comprises of Surveyors who are full time employees and are generally referred to as “Exclusive” surveyors; the ones employed on a part time basis are “Non-exclusive” surveyors. Although the classification societies started in 1760 with captains who will examine a ship, more specialization came and now there are in principle there three kind of surveyors whom are mainly marine professionals’ mariners, such as a qualified ship's deck officers, mechanical/electrical engineers, naval architects. In most cases you will find the navigational inspectors as the flag state inspectors and auditors. The classification society uses the mechanical/electrical inspectors. They will start in the engine room and will learn the hull part in their inspection career. The hull surveyors are in a perfect world only naval architects. The auditors in the classification society can have navigational background but normally the surveyor with experience will become auditor. Although you will think that every class surveyor is entitled to inspect everything, this is however not the case. It is the intention of this course to extend the student’s knowledge and understanding of the role, workings and requirements of a classification society and its interface with IMO when applying statutory regulations on behalf of flag administrations and qualify you as an expert in this field able to deal with port state control, flag administration and vetting officials.
Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners preparing for or who currently perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for those roles within federal contracting companies and private sector firms whose mission or strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD Information Network (DoDIN) operation and incident handling. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. Overview In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will: Assess cybersecurity risks to the organization. Analyze the threat landscape. Analyze various reconnaissance threats to computing and network environments. Analyze various attacks on computing and network environments. Analyze various post-attack techniques. Assess the organization's security posture through auditing, vulnerability management, and penetration testing. Collect cybersecurity intelligence from various network-based and host-based sources. Analyze log data to reveal evidence of threats and incidents. Perform active asset and network analysis to detect incidents. Respond to cybersecurity incidents using containment, mitigation, and recovery tactics. Investigate cybersecurity incidents using forensic analysis techniques. This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation. In addition, this course and subsequent certification (CFR-410) meet all requirements for personnel requiring DoD directive 8570.01-M position certification baselines: CSSP Analyst CSSP Infrastructure Support CSSP Incident Responder CSSP Auditor The course and certification also meet all criteria for the following Cybersecurity Maturity Model Certification (CMMC) domains: Incident Response (IR) Audit and Accountability (AU) Risk Management (RM) Lesson 1: Assessing Cybersecurity Risk Topic A: Identify the Importance of Risk Management Topic B: Assess Risk Topic C: Mitigate Risk Topic D: Integrate Documentation into Risk Management Lesson 2: Analyzing the Threat Landscape Topic A: Classify Threats Topic B: Analyze Trends Affecting Security Posture Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments Topic A: Implement Threat Modeling Topic B: Assess the Impact of Reconnaissance Topic C: Assess the Impact of Social Engineering Lesson 4: Analyzing Attacks on Computing and Network Environments Topic A: Assess the Impact of System Hacking Attacks Topic B: Assess the Impact of Web-Based Attacks Topic C: Assess the Impact of Malware Topic D: Assess the Impact of Hijacking and Impersonation Attacks Topic E: Assess the Impact of DoS Incidents Topic F: Assess the Impact of Threats to Mobile Security Topic G: Assess the Impact of Threats to Cloud Security Lesson 5: Analyzing Post-Attack Techniques Topic A: Assess Command and Control Techniques Topic B: Assess Persistence Techniques Topic C: Assess Lateral Movement and Pivoting Techniques Topic D: Assess Data Exfiltration Techniques Topic E: Assess Anti-Forensics Techniques Lesson 6: Assessing the Organization's Security Posture Topic A: Implement Cybersecurity Auditing Topic B: Implement a Vulnerability Management Plan Topic C: Assess Vulnerabilities Topic D: Conduct Penetration Testing Lesson 7: Collecting Cybersecurity Intelligence Topic A: Deploy a Security Intelligence Collection and Analysis Platform Topic B: Collect Data from Network-Based Intelligence Sources Topic C: Collect Data from Host-Based Intelligence Sources Lesson 8: Analyzing Log Data Topic A: Use Common Tools to Analyze Logs Topic B: Use SIEM Tools for Analysis Lesson 9: Performing Active Asset and Network Analysis Topic A: Analyze Incidents with Windows-Based Tools Topic B: Analyze Incidents with Linux-Based Tools Topic C: Analyze Indicators of Compromise Lesson 10: Responding to Cybersecurity Incidents Topic A: Deploy an Incident Handling and Response Architecture Topic B: Mitigate Incidents Topic C: Hand Over Incident Information to a Forensic Investigation Lesson 11: Investigating Cybersecurity Incidents Topic A: Apply a Forensic Investigation Plan Topic B: Securely Collect and Analyze Electronic Evidence Topic C: Follow Up on the Results of an Investigation Additional course details: Nexus Humans CertNexus Certified CyberSec First Responder (CFR-410) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified CyberSec First Responder (CFR-410) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Take your knowledge to the next level with EnergyEdge's course focusing on pipeline integrity management incorporating API 1160, 1173, and ASME B31.8S. Enroll now!
Course Information Join us for a two-day immersive course crafted to equip participants with an in-depth understanding of remote audit methodologies. Delve into the nuances between remote and face-to-face audits, dissecting their respective strengths and limitations. Through practical scenarios tailored for remote audit conduct, this course stands as an essential counterpart to our on-site audits course The Auditing Course. Who Should Attend: Applicable across various domains of regulated research and development, this course proves invaluable in contexts requiring a quality system for audit. Participants with firsthand audit experience stand to gain the most benefit from this programme. Expanding on Previous Learning: This course extends its relevance to all forms of audits and further amplifies concepts explored in RQA's suite of research quality assurance courses, including: 'Research Quality Assurance for Good Laboratory Practice,' 'Good Clinical Practice Auditing – Principles and Practice,' and 'Good Manufacturing Practice for Investigational Medicinal Products.' Benefits include improved: Understand the processes of planning, conducting, reporting and follow-up of audits Recognising the importance of personal approach in developing positive audit outcomes Ability to analyse evidence and present logical audit findings Appreciate the importance of audit in continuing improvement. This course is structured to encourage delegates to: Discuss and develop ideas Solve problems Exchange information. Tutors Tutors will be comprised of (click the photos for biographies): Andrew Waddell Founder Director, Tower Mains Ltd Rosemary Ichaba Senior QA Associate, Tower Mains Ltd Cate Ovington Director, The Knowlogy Group Ltd Jean McWilliam Associate Director, Alexion Programme Please note timings may be subject to alteration. Day 1 09:00 Course Registration 09:15 Welcome and Introductions 09:35 Introduction to Audits Delegates explore the range of audits which they have experienced, define the purpose of each audit type and establish which of those audits are performed to meet regulatory requirements. 10:05 Introduction to Remote Audits Presentation to introduce the major differences between face-to-face audits and remote audits. The major elements of audits will be examined to determine where there may be differences. 10:30 Break 10:45 Workshop 1 - Remote Audits This workshop will examine participants experience or understanding of the differences between face-to-face and remote audits. 11:15 Workshop 1 - Feedback 11:35 Audit Preparation The essential steps in preparation for audits will be discussed with emphasis on remote audits. 12:05 Workshop 2 - Remote Audit Preparation Factors relating to the preparation for remote audits will be considered in discussion groups. 12:35 Workshop 2 - Feedback 12:50 Lunch 13:30 Audit Logistics Preparation for the audit includes many arrangements other than the audit content. 14:00 Workshop 3 - Audit Logistics Delegates will discuss some of the issues that may occur during the set up and conduct of remote audits and how to resolve them. 14:30 Workshop 3 - Feedback 14:45 Break 15:00 The Opening Meeting Presentation regarding the importance and content of the opening meeting. 15:20 Workshop 4 - Opening Meeting Delegates will consider the practicalities of arranging and conducting an opening meeting. 15:45 Workshop 4 - Feedback 16:10 Audit Conduct Tools Practical advice on preparation of some of the tools that will be valuable in the conduct of audits. 16:40 Questions and Answers An overview of the first day and a chance to ask questions 17:00 Close of Day Day 2 09:00 Reflections on Day 1 Recap on the topics covered and a chance for delegates to raise points. 09:15 Gathering Evidence Presentation on challenges of gathering evidence and conducting interviews during remote audits. 09:45 Workshop 5 - Remote Interviews Scenarios of different remote interviews will be played and delegates assess the strengths and weaknesses of each approach. 10:15 Break 10:30 Creating Audit Findings Ideas regarding how to create good audit findings will be discussed during this short presentation. 10:50 Workshop 6 - Creating Audit Findings Delegates will be provided with examples of evidence from an audit. They will discuss these and create their audit findings for presentation at the closing meeting. 11:35 The Closing Meeting The content and conduct of the closing meeting will be discussed. 11:55 Workshop 7(a) - Preparing for the Closing Meeting The findings from workshop 6 will be reviewed and a Lead Auditor selected to provide feedback in workshop 7(b) 12:15 Workshop 7(b) - The Closing Meeting The Lead Auditor from each group will hold a meeting to present the results (role play). 12:45 Lunch 13:30 The Audit Report This presentation will cover not only the essential contents of the audit report but also how to write the report in a manner that will generate the most positive reaction. 14:00 Workshop 8 - The Audit Report Delegates will be provided with an audit report from an audit conducted remotely and will conduct a peer review of the report in their breakout groups. 15:00 Workshop 8 - Feedback 15:20 Break 15:35 Audit Closure Presentation on how to conclude the audit with reference to post-audit activities. 15:55 Open Forum 16:30 Close of Course Extra Information Course material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking You will need a stable internet connection, a microphone and a webcam.
The course approaches the audit process in the context of international standards and therefore, it is equally suitable for sea-going and office-based staff and its benefits are as following: Individuals will have a good understanding of the ISM Code, its importance, and their role within it, including ISM, ISO and MLC auditing requirements Individuals will be actively involved in the ongoing evaluation and development of a Company Safety, Environmental and Quality Management System Providing the Company and its auditors with the ability to establish the effectiveness of a Company Management System ahead of external verification by Administrations or Port State Control Delivered by experts with International safety and security management, compliance and verification experience in an engaging interactive style with a variety of security and safety related scenario case study workshops exercises during the training course
Enhance your knowledge of exploration and production accounting with EnergyEdge's course. Join our classroom training for expert guidance and industry-relevant skills. Enroll now!