P901 - Management and control of building hot and cold water services is there to provide background and an overview of the risk of Legionella infection and how it can be controlled in domestic type hot and cold water systems. (This course is also a pre-requirement before undertaking course P903 - Management and Control of Evaporative Cooling Systems and other High Risk Industrial Systems or P904 - Management and Control in Leisure, Display, Therapy and other Non-Industrial Systems.)
The main subject areas of the course are: Legislation and guidance for asbestos practitioners. The properties of asbestos and health effects of exposure to asbestos fibres. The types of asbestos and its uses in buildings. The types of asbestos surveys. The asbestos register, risk assessment and management plan. Asbestos remediation. The role of asbestos analysts and laboratory procedures.
Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialist Anyone who builds and develops IT systems Overview Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to preempt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal The Principles of Privacy in Technology training is the how to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. The training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Technologist (CIPT) certification program. Fundamentals of information privacy Reviewing the modern history of privacy Foundational privacy concepts Data protection roles and fair information practices Exploring the impacts of privacy and data protection regulations on information management Privacy in the IT environment Compliance requirements IT risks Stakeholder privacy expectations Differentiating between privacy and security Core privacy concepts Foundational elements for embedding privacy in IT Common privacy principles Data protection by design and default Privacy considerations in the information life cycle Privacy considerations throughout the stages of the information life cycle Privacy in systems and applications Examining the risks inherent in the IT environment and options for addressing them Identity and access management Credit card information and processing Remote access BYOD and telecommuting Data encryption Additional privacy-enhancing technologies in the enterprise environment Privacy techniques Strengths and weaknesses of authentication techniques Using identifiers Privacy by design Online privacy issues Unique challenges that come from online privacy issues Laws and regulations Online threats Social media E-commerce Tracking technologies Web security protocols Technologies with privacy considerations Privacy considerations associated with a variety of technologies Cloud computing Wireless IDs Location-based services ?Smart? technologies Video/data/audio surveillance Biometric recognition
Duration 4.375 Days 26.25 CPD hours This course is intended for CCISOs are certified in the knowledge of and experience in the following CISO Domains:Governance (Policy, Legal & Compliance)IS Management Controls and Auditing Management (Projects, Technology & Operations)Management ? Projects and OperationsInformation Security Core CompetenciesStrategic Planning & Finance Overview Please refer to Overview. The Certified CISO (C|CISO) course has certified leading information security professionals around the world and is the first of its kind training and certification program aimed at producing top-level Information Security Leaders. The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The program was developed by seasoned CISOs for current and aspiring CISOs. Governance Drivers that Influence Governance Corporate Governance Activities Information Security Governance Activities Governance and Ethical Decision Making Security Risk Management, Controls, and Audit Management Risk Management Audit Management Risk Treatment Risk Management Frameworks Risk Communication and Organizational Reporting Security Program Management and Operations Information Security Portfolio Management Information Security Program Management Information Security Project Management Security Operations Information Security Core Competencies Access Control Physical Security Network and Communications Security Threat and Vulnerability Management System and Application Security Encryption Concepts and Technology Strategic Planning, Financial Management, and Vendor Management Strategic Planning Financial Management Vendor Risk Management Additional course details: Nexus Humans EC-Council Certified CISO (C|CISO) w/exam training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified CISO (C|CISO) w/exam course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Course Overview This comprehensive Workplace Safety – Asbestos & COSHH Training course is designed to equip learners with essential knowledge of hazardous substances, safety regulations, and risk assessment procedures. It covers critical subjects such as asbestos awareness, COSHH regulations, fire safety, and chemical spill response, empowering individuals to uphold safety standards in any professional environment. Whether you're new to workplace safety or looking to reinforce your compliance knowledge, this course ensures you understand how to identify, report, and manage potential hazards in line with UK health and safety legislation. By completing this training, learners will gain the confidence to support a safer workplace, meet employer and legal requirements, and contribute to a healthier work culture across sectors such as construction, manufacturing, education, and care. This course is also valuable for those pursuing roles with responsibility for safety assessments or compliance monitoring within their organisation. Course Description The Workplace Safety – Asbestos & COSHH Training course offers in-depth guidance on handling hazardous materials and navigating high-risk scenarios. Topics include the dangers and regulations surrounding asbestos, COSHH assessments, confined space awareness, chemical spill response, and essential workplace first aid. Additionally, learners will study broader workplace health and safety practices, ensuring a well-rounded understanding of legislative duties, hazard control, and preventative measures. Throughout the course, learners will develop the ability to interpret health and safety protocols, implement best practices, and support regulatory compliance. The training is aligned with UK industry requirements, offering insights into effective safety planning and emergency procedures. This course suits both those with responsibilities in health and safety and those looking to improve their knowledge to support safe operational standards in various workplace settings. Course Modules: Module 01: Asbestos Awareness & Safety Module 02: COSHH Training for Assessors Module 03: Working in Confined Spaces Module 04: Chemical Spill Module 05: Spill Management Training Module 06: Fire Safety Module 07: Workplace Health and Safety Diploma Module 08: First Aid at Work (See full curriculum) Who is this course for? Individuals seeking to understand health and safety obligations in the workplace. Professionals aiming to improve compliance knowledge and safety awareness. Beginners with an interest in occupational health and safety practices. Supervisors, HR personnel, and compliance officers responsible for workplace risk. Career Path Health and Safety Officer Compliance Coordinator Site Supervisor Risk Assessor Facilities Manager Warehouse or Construction Safety Personnel HR and Operations Manager
This very practical one-day programme provides participants with the skills and knowledge required to be an effective member of the procurement team and to enable them to procure a wide range of resources for the organisation, in a compliant and cost-effective manner. It also empowers them to be able to collaborate with all key stakeholders. By the end of the programme participants will be able to: Understand the basic concepts of good procurement practice Apply a range of tools and techniques for developing scopes of work and specifications Apply various methods to select and evaluate suppliers Develop robust contract award strategies Appreciate the commercial importance of effective procurement and opportunities to reduce cost and add value Develop appropriate procurement strategies depending on risk and value Appreciate the legal aspects of procurement 1 Welcome Introductions Aims and objectives Plan for the day 2 The basics of procurement The concept of total cost of ownership v price The procurement cycle The roles of the customer and the contractor Impact upon profit 3 Specification process Importance of effective specifications Specification development process Types of specification Team approach Use of performance specifications Early supplier involvement (ESI) / early contractor involvement (ECI) 4 Quality Concepts and practices Defining 'fit for purpose' Conformance to requirements Compliance to standards Role of the supplier Quality assurance tools and techniques 5 Procurement methods RFP RFQ ITT Negotiated procurement Strategic partnerships Outsourcing 6 Tendering How to undertake a formal tendering process Business case to award Critical stages in the process Risks and benefits 7 Tender evaluation How to undertake a quotation analysis Tools of analysis Use of VFM models Role of the customer Comparisons around cost, quality, and delivery 8 Supplier selection and evaluation Developing critical selection criteria Using the 10Cs model Importance of effective selection process Weighting systems Importance of validity and evidence 9 Capital equipment procurement Life cycle cost issues Payback calculations Compatibility issues Maintenance and training issues After-sales support 10 Supplier relationships Corporate social responsibility issues Communication 360 feed-back Open and ethical Initial understanding Clear and fair terms and conditions 11 Close Review of key learning points Personal action planning
CPD Accredited, Interactive Short Course - 1.5 hr session - Learn from the comfort of your own home or workplace - Learn how to deal with wounds, burns, sprains & strains, and other injuries Course Contents: What is classed as Display Screen Equipment (DSE) Who is a DSE user Illnesses and Injuries caused by the incorrect use of DSE How to set up your workstation so as to avoid injuries and musculoskeletal disorders DSE Assessment Checklist Work routine and the importance of taking breaks Eyes and eyesight testing Identifying training needs Working from home and home working assessments Benefits of this Short Course: In 2018/2019, nearly half a million people suffered from work-related musculoskeletal disorders, most of them having suffered from this for a while Though 138,000 of them only started having problems this year These conditions can significantly affect a person's life, and limit their mobility and dexterity This leads to being forced to retire early from work, earn less and have less of a social life I enjoyed the minor injuries webinar as it refreshed my memory in these areas and gave me the confidence to deal with any of these now. The training was delivered with practical demonstrations and I enjoyed the chance to use my brain during the lockdown.DEBBIE GROSCH-SQUANCE
Course Overview This course provides a comprehensive introduction to European Medical Device Regulations (EU MDR), offering learners essential knowledge on the regulatory framework that governs medical devices in the European market. It covers the key components of the EU MDR, ensuring compliance with industry standards and regulations, and highlights the importance of quality systems and reporting requirements. Through this course, learners will gain a solid understanding of how to navigate and implement these regulations in their professional practice. This course is ideal for individuals seeking to expand their expertise in medical device regulation and is invaluable for those aiming to work within the medical device industry in Europe. Course Description The "Essentials of European Medical Device Regulations" course delves into the critical aspects of the EU MDR, including its foundational components, regulatory compliance, and the reporting and identification requirements for medical devices. Learners will explore the essential guidelines for ensuring quality systems are in place to maintain product safety and regulatory compliance. With a focus on practical scenarios and real-world applications, this course equips learners with the necessary skills to interpret and implement these regulations effectively. The course is designed for professionals looking to enhance their understanding of medical device regulations within the European market, offering in-depth insights into the key elements of the EU MDR and its impact on the industry. Course Modules Module 01: Overview to European Regulations on Medical Devices Module 02: Essential Components of EU MDR Module 03: Reporting Requirements and Identification Module 04: Quality System in Medical Device Regulation (See full curriculum) Who is this course for? Individuals seeking to understand European medical device regulations. Professionals aiming to enhance their regulatory compliance expertise. Beginners with an interest in the medical device industry. Regulatory professionals in the healthcare and life sciences sector. Career Path Regulatory Affairs Specialist Compliance Manager in the medical device industry Quality Assurance Manager Medical Device Consultant European Market Access Manager
Duration 3 Days 18 CPD hours This course is intended for This course is recommended for technical professionals who perform advanced deployment configurations of Check Point products. Overview Provide an overview of the upgrade service and options available. Explain how to perform management upgrade and migration. Articulate the process using CPUSE features. Articulate the purpose and function of Management High Availability. Explain Primary vs Secondary, Active vs Standby and Synchronization. Explain disaster recovery steps in case the primary management server becomes unavailable. Provide overview of Central Deployment in SmartConsole. Articulate an understanding of Security Gateway cluster upgrade methods. Explain about Multi Version Cluster (MVC) upgrades. Discuss Gaia Commands and how they are used. Explain the main processes on s and s. Describe how to work with scripts and SmartTasks to configure automatic actions. Explain the Management Data Plane Separation (MDPS) Explain kernel operations and traffic flow Articulate Dynamic and Updatable Objects in Security Gateways Explain the policy installation flow and files used. Describe the use of policy installation history. Explain concurrent and accelerated install policy. Describe an overview of APIs and ways to use and authenticate. Explain how to make changes in GAIA and management configuration. Explain how to install policy using API. Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance. Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance. Articulate how utilizing multiple traffic queues can make traffic handling more efficient. Discuss Site-to-Site VPN basics, deployment and communities. Describe how to analyze and interpret VPN tunnel traffic. Explain Link Selection and ISP Redundancy options. Explain tunnel management features. Discuss Check Point Remote Access solutions and how they differ from each other. Describe how client security can be provided by Remote Access . Explain authentication methods including machine authentication. Explain Multiple Entry Point (MEP). Discuss the Mobile Access Software Blade and how it secures communication and data exchange during remote connections. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. Course Outline Prepare for a Security Management Server Upgrade Upgrade the Security Management Server Deploy a Secondary Security Management Server Configure a Distributed Log Server Upgrade a Security Gateway from SmartConsole Work with the Command Line Use Scripts and SmartTasks Configure Dynamic Objects Monitor Traffic Verify Policy Installation and Status Work with Gaia and Management APIs Work with Acceleration Features Configure a Locally Managed Site to Site VPN Configure a Site to Site VPN with an Interoperable Device Configure Remote Access VPN Configure Mobile Access VPN Configure a High Availability Cluster Work with ClusterXL Configure Policy Compliance Deploy SmartEvent