• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

11 Business Continuity courses in Coventry

Management of Risk (M_o_R) Practitioner: In-House Training

By IIL Europe Ltd

Management of Risk (M_o_R®) Practitioner: In-House Training The M_o_R® Practitioner course has been designed to provide learners with the opportunity to practice the practical application of the M_o_R method and covers the twelve M_o_R principles: Approach, Process and the basic techniques essential to managing risks using the M_o_R guidance. The purpose of the M_o_R Practitioner qualification is to confirm that the learner has achieved sufficient understanding of how to apply and tailor M_o_R in a scenario situation. What you will Learn At the end of the M_o_R Practitioner course, learners will gain competencies in: M_o_R framework (principles, approach based on risk documentation, process steps, and embedding and reviewing M_o_R principles Outline of M_o_R approach documents (including policy, process guide, and risk communications plan) Risk identification, assessment, and control Embedding and reviewing M_o_R M_o_R organizational perspectives (strategic, program, project, operational) Benefits The M_o_R Practitioner course offers a wide-ranging set of guidelines that will help in the management of risk in a project or program environment. It will help prepare learners for the M_o_R Practitioner Exam. They will feel more confident in approaching risk management after attending the course and will be aware of the use of different techniques that can assist in this task, including: Improved basis for effective strategy formation Reduced time spent fire-fighting and fewer unwelcome surprises Increased likelihood of successful change initiative outcomes Closer internal focus on doing the right things properly Increase in efficient use of resources waste and fraud Better management of contingency resources M_o_R roles and responsibilities M_o_R health check M_o_R maturity model Risk specialisms (including business continuity management) Introduction Introduction to the course What is a risk? What is risk management? Why is risk management so important? Basic risk definitions The development of knowledge about risk management Corporate governance and internal control Where and when should risk management be applied? M_o_R Principles The purpose of M_o_R principles Aligns with objectives Fits the context Engages stakeholders Provides clear guidance Informs decision-making Facilitates continual improvement Creates a supportive culture Achieves measurable value Risk management maturity models M_o_R Approach Relationship between the documents Risk management policy Risk management process guide Risk management strategy Risk register Issue register Risk response plan Risk improvement plan Risk communications plan M_o_R Process Common process barriers Identify - contexts Identify - the risks Assess - estimate Assess - evaluate Plan Implement Communication throughout the process M_o_R Perspectives Strategic perspective Programme perspective Project perspective Operational perspective Risk Specialisms Business continuity management Incident and crisis management Health and Safety management Financial risk management Environmental risk management Reputational risk management Contract risk management

Management of Risk (M_o_R) Practitioner: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

Cloud deployment

5.0(3)

By Systems & Network Training

Cloud deployment training course description This course covers the important topics every cloud professional needs, including, configuration and deployment, security, maintenance, management, and troubleshooting. It covers all aspects of cloud computing infrastructure and administration, with a practical focus on real-world skills. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. Deploy and implement cloud solutions, manage the infrastructure, and monitor performance. You will also be able to install, configure, and manage virtual machines. What will you learn Cloud services, models, and characteristics. Virtualization components, installation, and configuration. Infrastructure configurations and optimization. Resource management and specific allocations. IT security concepts, tools, and best practices. Recovery, availability and continuity in the cloud. Cloud deployment training course details Who will benefit: IT professionals looking to deploy and implement cloud solutions, manage the infrastructure, and monitor performance, Install, configure, and manage virtual machines. Prerequisites: Introduction to virtualization. Duration 5 days Cloud deployment training course contents Preparing to Deploy Cloud Solutions Deploying a Pilot Project Testing Pilot Project Deployments Designing a Secure and Compliant Cloud Infrastructure Designing and Implementing a Secure Cloud Environment Planning Identity and Access Management for Cloud Deployments Determining CPU and Memory Sizing for Cloud Deployments Determining Storage Requirements for Cloud Deployments Analysing Workload Characteristics to Ensure Successful Migration Maintaining Cloud Systems Implementing Backup, Restore, Disaster Recovery, and Business Continuity Measures Analysing Cloud Systems for Performance Analysing Cloud Systems for Anomalies and Growth Forecasting Troubleshooting Deployment, Capacity, Automation, and Orchestration Issues Troubleshooting Connectivity Issues Troubleshooting Security Issues

Cloud deployment
Delivered in Internationally or OnlineFlexible Dates
£2,797

Security+

5.0(3)

By Systems & Network Training

Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in Internationally or OnlineFlexible Dates
£2,797

Management of Risk (M_o_R) Foundation: In-House Training

By IIL Europe Ltd

Management of Risk (M_o_R®) Foundation: In-House Training This M_o_R® Foundation course prepares learners to demonstrate knowledge and comprehension of the four elements of the M_o_R framework: Principles, Approach, Processes, Embedding and Reviewing and how these elements support corporate governance. The M_o_R Foundation Course is also a prerequisite for the M_o_R Practitioner qualification. What you will Learn At the end of the M_o_R Foundation course, participants will gain competencies in and be able to: Describe the key characteristics of risk and the benefits of risk management List the eight M_o_R Principles List and describe the use of the key M_o_R Approach documents Create Probability and Impact scales Define and distinguish between risks and issues Create a Risk Register Create a Stakeholder map Identify the key roles in risk management Use the key techniques and describe specialisms in risk management Undertake the M_o_R Foundation examination Introduction Introduction to the M_o_R course What is a risk? What is risk management? Why is risk management so important? Basic risk definitions The development of knowledge about risk management Corporate governance and internal control Where and when should risk management be applied? M_o_R Principles The purpose of M_o_R principles Aligns with objectives Fits the context Engages stakeholders Provides clear guidance Informs decision-making Facilitates continual improvement Creates a supportive culture Achieves measurable value Risk management maturity models M_o_R Approach Relationship between the documents Risk management policy Risk management process guide Risk management strategy Risk register Issue register Risk response plan Risk improvement plan Risk communications plan M_o_R Process Common process barriers Identify contexts Identify the risks Assess estimate Assess evaluate Plan Implement Communication throughout the process M_o_R Perspectives Strategic perspective Program perspective Project perspective Operational perspective Risk Specialisms Business continuity management Incident and crisis management Health and Safety management Financial risk management Environmental risk management Reputational risk management Contract risk management

Management of Risk (M_o_R) Foundation: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

LPG Production, Storage, Transfer & Safety

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course This interactive training course and workshop session is developed to provide a catalyst for transformation of the legacy systems and adapting to the upcoming trends in the near future in the LPG supply chain. The course curriculum is based on overcoming the challenges of cost and quality enhancement. Both challenges encompass critical review of each aspect from production to transportation with safety of operations and zero loss of energy, thereby enhancing revenue. Training Objectives This course is developed to meet the needs LPG producers, Gas Tankers and Terminals operators, and fraternity of stakeholders, with the following underlying objectives: Conduct assessment of current standards and management systems in context of market forces and economics of demand and supply; Explore impact of emerging markets and user segments of LPG transiting from oil or electricity use; Identify avenues in need of production process review for enhancing the quality in terms of energy content of LPG; Evaluate current and future trends in LPG transportation and the influence of regulatory regimes and incentive schemes, for investment in Storage Terminals and distribution networks; Identify the operations and protocols to be adaptable for compliance with new regulations and trends; Establish transportation and distribution cost control mechanism at optimum level; and Develop guidelines and SOPs for contamination free transfer, loading and discharging of LPG Tankers. Target Audience This is a 'must attend' course if you are a: LPG Gas Producer Process Specialist Buyer Trader LPG Tanker Owner Charterer, and Management personnel holding responsible positions such as Director, General Manager, Commercial Manager, Business Development Manager, Legal Counsel, Post-Fixtures Manager, Fleet Manager, Marine & Technical Superintendent, Senior Engineer or Middle Level Manager as part of succession planning. Training Methods The course will be delivered in 3 full-day sessions comprising 8 hours per day. Course Duration: 3 full-day sessions, 8 hours per session (24 hours in total). Trainer Principal Management Consultant FAIADR, FACICA, FHKIoD, M.S.I.D, Member, AIPN LL.M. (IP Laws), M. Sc. (Maritime Studies) M, Tech (Knowledge Engineering), MBA First Class CoC (DOT, UK), B. E. (Elect)   Your expert course leader, during the last 45 year period, has worked and consulted in the industry verticals encompassing: Marine, Shipping & Transport, Technology, Oil & Gas Exploration & Production, Petrochemical Process Plants and Power Plant Construction Projects, Logistics & Warehousing, Offshore, Oil & Gas Pipelines, Infrastructure Development Projects (Construction, Ports, Offshore Supply Bases, Oil & Gas Terminals and Airports etcetera), EPCIC Contracts, and Shipyards, in South East Asia, Africa, Middle East, Americas and Europe. He is a Principal Management Consultant in a consulting company in Hong Kong and Singapore, specializing in the fields of corporate management consultancy, international contracts reviews and alternative dispute resolutions services. He has been frequently engaged for assignments like due diligence, acquisitions, and mergers. The assignments often involved resolving various operational issues, contracts reviews, cost controls, project management matters and enhancement of international procurement and Supply Chain Management systems. He continues to be actively engaged in advisory services for Remuneration, Audit and Risk Management Committees of public companies as well as MNCs. He has developed a special initiative for conducting audits of ERM Systems (Enterprise Risk Management) and valuation of intangible properties involving proprietary processes (IP), licensed production and intellectual property rights. He graduated with a Bachelor's degree in Electrical Engineering, MBA in General Management, Master of Technology in Knowledge Engineering, Master of Science in Maritime Studies and LL.M. (IP Law). He also holds professional qualifications in arbitration, contracts laws, and marine engineering, including the Chief Engineer's First-Class Certificate of Competency (DOT, UK). He has been Associate, SIM University (SUSS) Singapore and taught on subjects including Business Continuity Planning and Risk Management. He has served as Director and member of Board of Management, Governance Councils and Risk Management Committees of international organizations. He is admitted to various professional institutions as: 'Fellow', Australian Centre for International Commercial Arbitration (FACICA); Asian Institute of ADR (FAIADR), Malaysia; Hong Kong Institute of Directors (FHKIoD), Member, Singapore Institute of Directors (M.S.I.D.), and Member, Association of International Petroleum Negotiators (AIPN) USA. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

LPG Production, Storage, Transfer & Safety
Delivered in Internationally or OnlineFlexible Dates
£2,407 to £2,799

Crisis Management and Business Continuity

5.0(10)

By GBA Corporate

Overview This will include lectures, a detailed simulation exercise, and group discussions. Delegates will recognize the elements where their organizations may have the skills and resources to manage a crisis, but the course will help identify where specialist external support may also be required. The course is designed to provide a balanced view of how best to manage specific crisis issues while simultaneously minimizing any negative impact on ongoing business operations. Delegates will develop a list of subjects to address upon returning to their sponsoring organization

Crisis Management and Business Continuity
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Certified Business Analysis Professional (CBAP) Boot Camp: In-House Training

By IIL Europe Ltd

Certified Business Analysis Professional™ (CBAP®) Boot Camp: In-House Training The course provides targeted exam preparation support for IIBA® Level 3 - CBAP® exam candidates, including both a BABOK® Guide Version 3.0 content review and exam preparation tutorial. The class is interactive, combining discussion, application of concepts, study tips, and a practice exam. Knowledge Check quizzes and self-assessments allow candidates to identify areas of weakness and create a custom study plan tailored to their individual needs as well as study aids to support their exam preparation after the course. The course materials include a copy of A Guide to the Business Analysis Body of Knowledge® (BABOK® Guide) Version 3.0. What you will Learn Upon completion, participants will be able to: Demonstrate familiarity with the structure and content of the IIBA® BABOK® Guide Improve their probability of passing the Level 3 - CBAP® Exam Identify their knowledge gaps through the use of module Knowledge Check quizzes Gauge their readiness for taking the exam by IIBA® BABOK® Guide Knowledge Are Foundation Concepts for IIBA® CBAP® Prep IIBA® - the Organization Business Analysis - the Profession Knowledge Check Terminology and Key Concepts IIBA®'s BABOK® Guide - the Standard Underlying Competencies BA Techniques Business Analysis Planning and Monitoring Knowledge Check Overview BAP&M Tasks BAP&M Techniques Elicitation and Collaboration Knowledge Check Overview E&C Tasks E&C Techniques Requirements Life Cycle Management Knowledge Check Overview RLCM Tasks RLCM Techniques Strategy Analysis Knowledge Check Overview SA Tasks SA Techniques Requirements Analysis and Design Definition Knowledge Check Overview RA&DD Tasks RA&DD Techniques Solution Evaluation Knowledge Check Overview SE Tasks SE Techniques Exam Preparation Practice Exam and debrief Exam Preparation Study Tips Manage Study Plan Exam Process Exam day

Certified Business Analysis Professional (CBAP) Boot Camp: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£2,495

RESILIA Foundation: In-House Training

By IIL Europe Ltd

RESILIA™ Foundation: In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls

RESILIA Foundation: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

Writing and Managing Requirements Documents: In-House Training

By IIL Europe Ltd

Writing and Managing Requirements Documents: In-House Training This course is part of IIL's Business Analysis Certificate Program (BACP), a program designed to help prepare individuals pass the IIBA™ Certification exam to become a Certified Business Analysis Professional (CBAP™). Learn more at www.iil.com/bacp. Once a business analyst has completed the information gathering and analysis to produce the solution to a business problem, the results must be documented for all stakeholders to see and understand. This course will enhance the skill set needed for writing and managing the complex readership that business analysts interact with on a day-to-day basis. What you will Learn Upon completion, participants will be able to: Write an understood requirements document that is approvable and acceptable Validate a requirements document Manage the changes to requirements documents through the SDLC Foundation Concepts The role of the business analyst An introduction to the BABOK® Guide The business analyst and the product/project life cycle The requirements documentation process Planning for Effective Requirements Documentation Overview of requirements planning Planning for validation Planning for verification: well-formed criteria Planning for verification: understood and usable criteria Writing Effective Requirements Documents Overview of writing requirements documents Using a standard structure / template Applying formatting techniques Meeting the challenge of writing non-functional requirements Baselining Requirements Documents Overview of the requirements baseline process Validation Verification Approval Managing Requirements Change through the Product Life Cycle Overview of requirements change management Establishing a formal change management process Tracing requirements through design and development (build, test, and implementation) Following through to post-implementation (transition and early production)

Writing and Managing Requirements Documents: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,495

Business Relationship Management Fundamentals: In-House Training

By IIL Europe Ltd

Business Relationship Management Fundamentals: In-House Training Business Relationship Management (BRM) Fundamentals introduces BRM as a capability, role, and discipline. What you will Learn Participants can expect an interactive and lively one-day session, with a high-level introduction to successfully navigate the complexity of BRM. Topics include: Defining BRM as a capability, role, and discipline Understanding what a BRM does and does not do Providing the language needed to change perceptions and perspectives Learn how the BRM discipline interacts with other disciplines (project management, architecture, Business Analysts, Business functions, strategy, etc.) inside an organization Basic introduction to the different frameworks, processes, and models to bring structure and guidance to BRM Introductions Why BRM? BRM defined BRM in action BRM value Reflection and next steps Resources

Business Relationship Management Fundamentals: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£795

Educators matching "Business Continuity"

Show all 3