• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

7931 Compliance courses

Good Clinical Practices: A Practical Guide to GCP Compliance

By Xpert Learning

About Course Understand the Ethical and Regulatory Framework for Conducting Clinical Trials Course Description This comprehensive Good Clinical Practices (GCP) course provides a thorough understanding of the ethical and regulatory principles governing clinical trials. It delves into the International Council for Harmonisation of Technical Requirements for Pharmaceuticals for Human Use (ICH) guidelines, ensuring you grasp the essential standards for conducting clinical research. Course Objectives By the end of this course, you will be able to: Articulate the definition, purpose, and historical context of GCP. Explain the importance of GCP in protecting human subjects and ensuring data integrity. Identify key international organizations involved in establishing GCP standards. Apply ethical principles and informed consent procedures in clinical research. Understand the ICH E6(R2) guidelines on Integrated Addendum to Good Clinical Practice. Design and conduct clinical trials according to ICH E8 and E9 guidelines. Manage and report clinical trial data in compliance with ICH E6(R2) guidelines. Implement safety monitoring and adverse event reporting procedures as per ICH E6(R2) and E6(R3) guidelines. Navigate regulatory compliance and inspections related to clinical trials. Target Audience This course is designed for individuals who: Are interested in pursuing a career in clinical research or clinical trial management. Work in the pharmaceutical, biotechnology, or medical device industry. Seek to gain a comprehensive understanding of GCP principles and practices. Prerequisites No prior experience in clinical research is required. However, a basic understanding of research methodology and medical terminology is recommended. Please Note: This course is strictly theoretical and does not qualify participants for clinical practice in the industry. Additional training and certifications may be required for hands-on experience. What Will You Learn? Articulate the definition, purpose, and historical context of GCP. Explain the importance of GCP in protecting human subjects and ensuring data integrity. Identify key international organizations involved in establishing GCP standards. Apply ethical principles and informed consent procedures in clinical research. Understand the ICH E6(R2) guidelines on Integrated Addendum to Good Clinical Practice. Design and conduct clinical trials according to ICH E8 and E9 guidelines. Manage and report clinical trial data in compliance with ICH E6(R2) guidelines. Implement safety monitoring and adverse event reporting procedures as per ICH E6(R2) and E6(R3) guidelines. Navigate regulatory compliance and inspections related to clinical trials. Course Content Introduction to Good Clinical Practice (GCP) and ICH Guidelines Introduction to Good Clinical Practice (GCP) and ICH Guidelines Ethical Principles, Informed Consent, and ICH E6(R2) Ethical Principles, Informed Consent, and ICH E6(R2) Designing and Conducting Clinical Trials with ICH E8 and E9 Designing and Conducting Clinical Trials with ICH E8 and E9 Data Management and Reporting with ICH E6(R2) Data Management and Reporting with ICH E6(R2) Safety and Monitoring in Clinical Trials with ICH E6(R2) and E6(R3) Safety and Monitoring in Clinical Trials with ICH E6(R2) and E6(R3) Regulatory Compliance, Inspections, and ICH E6(R3) Regulatory Compliance, Inspections, and ICH E6(R3) A course by Xpert Learning RequirementsA basic understanding of research methodology and medical terminology is recommended. Audience Individuals who are interested in pursuing a career in clinical research or clinical trial management. Individuals who work in the pharmaceutical, biotechnology, or medical device industry. Individuals who seek to gain a comprehensive understanding of GCP principles and practices. Audience Individuals who are interested in pursuing a career in clinical research or clinical trial management. Individuals who work in the pharmaceutical, biotechnology, or medical device industry. Individuals who seek to gain a comprehensive understanding of GCP principles and practices.

Good Clinical Practices: A Practical Guide to GCP Compliance
Delivered Online On Demand
£9.99

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered OnlineFlexible Dates
£2,380

Real Estate Analyst (Investment Cash Flow Modelling in Excel)

4.3(5)

By Bayfield Training

The Real Estate Analyst course has been taught non-stop to global real estate firms over the last 25 years, and is without doubt the core financial modelling training in your career portfolio. Whether you have an upcoming financial modelling test for a new job or an APC exam, the Real Estate Analyst course is the choice for you.

Real Estate Analyst (Investment Cash Flow Modelling in Excel)
Delivered in person or Online + more
£1,750

Diabetes Awareness

5.0(50)

By Pochat Training

This Diabetes Awareness training covers key aspects of diabetes management, ensuring everyone understands the importance of blood sugar control and how to handle emergencies.

Diabetes Awareness
Delivered Online + more
£25

Conflict Management 1 Day Training in Warwick

By Mangates

Conflict Management 1 Day Training in Warwick

Conflict Management 1 Day Training in Warwick
Delivered In-Person + more
£595 to £795

ISO 14298:2021 Security Printing Management System Lead Auditor Course

5.0(1)

By Cognicert Limited

The "ISO 14298:2021 Lead Auditor Course" integrates the principles of ISO 14298:2021, the International Standard for Security Printing Management, with the methodologies outlined in ISO 19011:2018, the Guidelines for Auditing Management Systems. The course equips participants with the skills and knowledge required to lead security printing audits effectively, ensuring compliance with ISO 14298:2021, and applies the principles of ISO 17011:2017 for conformity assessment bodies. It covers audit planning, execution, and reporting while emphasizing risk management and continual improvement.

ISO 14298:2021 Security Printing Management System Lead Auditor Course
Delivered In-Person in London + more
£640 to £800

FORS Virtual Reality Safe Driving - Periodic 7 Hour CPC Course - Wakefield

By Total Compliance

Experience safer urban roads with our FORS Approved Virtual Reality Safe Urban Driving Training. Our immersive program empowers drivers to navigate bustling city streets alongside vulnerable road users, fostering a culture of road safety. With a seven-hour DCPC-approved course, participants gain valuable insights and skills for responsible driving. Invest in your drivers' safety and meet compliance requirements while protecting lives on the road. Elevate road safety with our innovative VR training. Learn more at www.totalcompliance.co.uk

FORS Virtual Reality Safe Driving - Periodic 7 Hour CPC Course  - Wakefield
Delivered In-Person in Wakefield + more
£120

FORS Virtual Reality Safe Driving - Periodic 7 Hour CPC Course - Wakefield - June 25

By Total Compliance

Experience safer urban roads with our FORS Approved Virtual Reality Safe Urban Driving Training. Our immersive program empowers drivers to navigate bustling city streets alongside vulnerable road users, fostering a culture of road safety. With a seven-hour DCPC-approved course, participants gain valuable insights and skills for responsible driving. Invest in your drivers' safety and meet compliance requirements while protecting lives on the road. Elevate road safety with our innovative VR training. Learn more at www.totalcompliance.co.uk

FORS Virtual Reality Safe Driving - Periodic 7 Hour CPC Course  - Wakefield - June 25
Delivered In-Person in Wakefield
£120

ICA Certificate in Managing Sanctions Risk

By International Compliance Association

ICA Certificate in Managing Sanctions Risk Sanctions can be complex, and dealing with sanctioned parties can be risky. National or international sanctions may be issued against individuals, entities, groups or nations; or even trading activities/particular sectors. Those bodies charged with enforcing sanctions compliance are particularly active at the moment, with multiple fines for firms in recent years stretching into billions of dollars. Suitable for those working in financial crime and regulatory compliance, this could help you: understand sanctions and the international context discover the screening systems and controls define a sanctions governance framework manage alert investigations learn the challenges of change and the cost of getting it wrong This course is awarded in association with Alliance Manchester Business School, the University of Manchester. There are many benefits of studying with ICA: Flexible learning solutions that are suited to you Our learner-centric approach means that you will gain relevant practical and academic skills and knowledge that can be used in your current role Improve your career options by undertaking a globally recognised qualification that hiring managers look for as part of their hiring criteria Many students have stated that they have received a promotion and/or pay rise as a direct result of gaining their qualification The qualifications ensure that you are enabled to develop strategies to help manage and prevent risk within your firm, thus making you an invaluable asset within the current climate Students who successfully complete the course will be awarded the ICA Certificate in Managing Sanctions Risk and will be entitled to use the designation- Spec.Cert(Sanctions) This qualification is awarded in association with Alliance Manchester Business School, the University of Manchester. This course provides Participants with a detailed understanding of the following topics: Understanding sanctions The international context Defining a sanctions governance framework Sanctions lists and screening Managing alert investigations The cost of getting it wrong The challenges of change

ICA Certificate in Managing Sanctions Risk
Delivered Online On Demand13 weeks
£675

Driver CPC - 1 Day Periodic 7 Hour Course/ Drivers Hours and Working Time and Tachograph - Grantham

By Total Compliance

Our "Driver Compliance and Wellbeing Training" module offers a holistic approach to driver development and safety. This combined training covers two crucial areas: Drivers' Hours and Working Time compliance Tachograph, as well as driver health and well-being. Drivers Hours and Working Time Training and Tachograph: Course introduction, objectives, and expectations. Understanding driving limits, breaks, and rest periods. Compliance with the Working Time (Road Transport) Directive. Legal responsibilities, record keeping, and enforcement of regulations. End-of-course review and feedback. Driver Health and Wellbeing Training Content: Exploring the link between health and work performance. Mental health awareness and fitness to drive. Making healthy dietary choices for drivers. This module is designed for professional drivers and transport operators looking to excel in both compliance and driver well-being. Join us to ensure safety, compliance, and improved productivity on the road. #DriverTraining #Compliance #Wellbeing #RoadSafety

Driver CPC - 1 Day Periodic 7 Hour Course/ Drivers Hours and Working Time and Tachograph - Grantham
Delivered In-PersonFlexible Dates
£68.75