QA Level 2 Award In Working At Height (RQF) Face to Face: Half-day course Virtual Classroom: Spread over 2 sessions of 2½ hr duration Raises awareness of safety considerations whilst working at height Teaches how to ensure a safe working environment Course Contents: Legislation, regulations, roles and responsibilities when working at height The consequences of non-compliance Safe working practices when working at height How to reduce the risks from:Weather conditionsWorking environmentsOthers working at heightFalling objectsFragile surfaces Importance of risk assessments Rescue plan requirements Selecting appropriate equipment Identifying safety precautions when using equipment Importance of Personal hygiene Reporting procedures when equipment is faulty Benefits of this course: 35 People died in 2017/18 due to falls from height There were also 43,000 non-fatal accidents due to falls from height These resulted in 80 major injuries And 230 over-3-day absences, costing employees and employers money Even just a height of less than 2 meters can result in serious, or even fatal, injuries The Work at Height Regulations 2005 require employers, and those in charge of any type of work at height activity to ensure that the work is properly planned, well supervised and carried out by competent people Employees who do this course will learn to have a greater awareness of the risks involved in working at height, and on how to best manage those risks, ensuring the safety of all concerned Accredited, Ofqual regulated qualification: This Health and Safety Training Course is a nationally recognised, Ofqual regulated qualification accredited by Qualsafe Awards.This means that you can be rest assured that your Health and Safety Certificate fulfils the legal requirements and is an excellent way to make sure you and your employees are trained in Health and Safety.The Ofqual Register number for this course is 603/2687/6
ADR
ADR
Financial reporting best practices involve adherence to accounting principles, regulatory requirements, and industry standards. CFOs should stay informed about evolving accounting standards and regulatory changes. Regularly review updates from regulatory bodies such as the Financial Reporting Council (FRC) and International Financial Reporting Standards (IFRS) to ensure compliance. Engage with industry associations and professional networks to stay abreast of best practices and emerging trends in financial reporting. By actively staying informed, CFOs can adapt their processes and policies to meet changing requirements. Regulatory compliance is a key aspect of financial reporting. How do CFOs navigate the landscape of regulatory requirements and ensure compliance within their organisations? Navigating the regulatory landscape requires a proactive and diligent approach. CFOs must develop a deep understanding of the relevant regulations, such as the Companies Act, UK GAAP, or IFRS, depending on the reporting framework. They collaborate with legal teams and auditors to interpret and apply the regulations correctly. Implementing strong internal controls, conducting regular compliance assessments, and engaging in external audits are essential steps to ensure compliance and mitigate potential risks. Compliance is an ongoing process. CFOs should establish a culture of compliance throughout the organization, emphasizing the importance of ethical practices, accuracy, and transparency in financial reporting. Training programs, internal communication, and regular compliance reviews help foster a compliance-conscious culture. By creating a framework that promotes adherence to regulations, CFOs establish a solid foundation for accurate and reliable financial reporting. https://www.fdcapital.co.uk/podcast/the-intricacies-of-financial-reporting-and-compliance-in-the-uk/ Tags Online Events Things To Do Online Online Seminars Online Business Seminars #financial #compliance #reporting #uk #intricacies
Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications. Overview Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment. Analyze data by using queries and reports. Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Intune. Deploy and manage the Configuration Manager client. Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering. Identify and configure the most appropriate method to distribute and manage content used for deployments. Distribute, deploy, and monitor applications for managed users and systems. Maintain software updates for PCs that Configuration Manager manages. Implement Endpoint Protection for managed PCs. Configure an operating-system deployment strategy by using Configuration Manager. Manage and maintain a Configuration Manager site. This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize Endpoint Protection, manage compliance, and create management queries and reports. Although this course and the associated labs are written for Microsoft Endpoint Configuration Manager and Windows 11, the skills taught will also be backwards compatible with previous editions of System Center Configuration Manager and Windows 10. Prerequisites Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing. Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management. Installation, configuration, and troubleshooting for Windows-based personal computers. Basic concepts of public key infrastructure (PKI) security. Basic understanding of scripting and Windows PowerShell syntax. Basic understanding of Windows Server roles and services. Basic understanding of the configuration options for iOS and Android Mobile device platforms. 1 - Managing computers and mobile devices in the enterprise Overview of systems management by using enterprise management solutions Overview of the Configuration Manager architecture Overview of the Configuration Manager administrative tools Tools for monitoring and troubleshooting a Configuration Manager site 2 - Analyzing data using queries, reports, and CMPivot Introduction to queries Configuring SQL Server Reporting Services Analyzing the real-time state of a device by using CMPivot 3 - Preparing the Configuration Manager management infrastructure Configuring site boundaries and boundary groups Configuring resource discovery Organizing resources using device and user collections 4 - Deploying and managing the Configuration Manager client Overview of the Configuration Manager client Deploying the Configuration Manager client Configuring and monitoring client status Managing client settings and performing management operations 5 - Managing inventory for PCs and applications Overview of inventory collection Configuring hardware and software inventory Managing inventory collection Configuring software metering Configuring and managing Asset Intelligence 6 - Distributing and managing content used for deployments Preparing the infrastructure for content management Distributing and managing content on distribution points 7 - Deploying and managing applications Overview of application management Creating applications Deploying applications Managing applications Deploying and managing Windows apps 8 - Maintaining software updates for managed PCs The software updates process Preparing a Configuration Manager site for software updates Managing software updates Configuring automatic deployment rules Monitoring and troubleshooting software updates Enabling third-party updates 9 - Implementing Defender Protection for managed PCs Overview of Endpoint Protection in Configuration Manager Configuring, deploying, and monitoring Endpoint Protection policies Configuring and deploying advanced threat policies 10 - Managing compliance and secure data access Overview of Compliance Settings Configuring compliance settings Viewing compliance results Managing resource and data access 11 - Managing operating system deployment An overview of operating system deployment Preparing a site for operating system deployment Deploying an operating system Managing Windows as a service 12 - Managing and maintaining a Configuration Manager site Configuring role-based administration Configuring Remote Tools Overview of Configuration Manager site maintenance and Management Insights Backing up and recovering a Configuration Manager site Updating the Configuration Manager infrastructure 13 - What?s new in Microsoft Endpoint Configuration Manager Whats new in Microsoft Endpoint Manager covering each semi annual release Additional course details: Nexus Humans 55348: Administering Microsoft Endpoint Configuration Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55348: Administering Microsoft Endpoint Configuration Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This self-paced, online course provides an overview of AML, the measures needed for efficient AML controls, Suspicious Transaction Monitoring, and Suspicious Activity Reporting (SAR) to help delegates understand their obligations to report suspicious activity, when to report suspicious activity, and how to report better quality SARs. Description Financial crime encompasses many threats to organizations and financial institutions. It has become a major risk in terms of reputation, integrity, and compliance for the financial community at large. Organizations must be able to mitigate risks by having an Anti-Money Laundering (AML) compliance programme in place, one that can effectively identify and report suspicious activities (SAR). This course will give you a comprehensive overview of everything that is relevant in terms of AML and suspicious activity reports. The course covers several important issues, including: • Definitions and legal framework of anti-money laundering and combating terrorism financing • Offences in the financial markets designated as money laundering offences • Reasons for the deficiency in financial market governance • Measures needed for efficient anti-money laundering controls (essential control features to minimize ML/TF in financial markets) • Suspicious Activity Report (SARs) and how these are related to money laundering prevention • Defining and identifying several types of suspicious activity and relevant reporting obligations • Who reports on money laundering trends • International regulatory/legal requirements related to SARs • Common indicators of suspicious transactions • Examples of red flag indicators • Case studies and examples Training Duration This course may take up to four (4) hours to complete. However, actual study time differs as each learner uses their own training pace. Participants This course is ideal for anyone wishing to acquire and demonstrate specialized knowledge in AML compliance and SARs. It is also suitable for professionals pursuing regulatory CPD in Financial Regulation. • MLCO • Governance Officer • Compliance Manager • Front line staff • Asset/wealth managers • AML officer • Risk Manager • Audit Executive • Internal Auditor • Corporate Counsel Training Method The course is offered fully online using a self-paced approach. The learning units consist of reading material. Learners may start, stop and resume their training at any time. At the end of the session, participants take a quiz to complete their learning unit and earn a Certificate of Attendance once all quizzes have been passed successfully. Accreditation and CPD Recognition This programme has been developed by the European Institute of Management & finance (EIMF), a leading and recognised training institution. The syllabus is verified by external subject matter experts and may be accredited by financial regulators, and general financial training accreditation bodies, such as CISI, ICA, and ACAMS for 4 CPD Units. Eligibility criteria and CPD Units are verified directly by your association or other bodies in which you hold membership. Registration and Access To register to this course, click on the Get this course button to pay online and receive your access instantly. If you are purchasing this course on behalf of others, please be advised that you will need to create or use their personal profile before finalising your payment. If you wish to receive an invoice instead of paying online, please contact us at info@lgca.uk. Access to the course is valid for 180 days.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for IT professionals who need to manage the day-to-day environment of an SCCM 2012 SP1 or newer environment. Knowledge of the workings of a standalone primary SCCM site and basic PowerShell experience is recommended. Overview Create additional site system roles on existing or new servers. Modify high level site settings. Create and modify Discovery Methods, Boundaries and Boundary Groups. Create Collections using any of the membership rules available. Delegate authority through Roles and Scopes. Install the Configuration Manager client, modify client settings and restrict access to site systems. Deploy software to clients. Deploy software updates to clients. Configure compliance settings targeted against collections. Modify settings that govern monitoring functions such as Alerts and Status Settings. Work with Task Sequences for Operating System Deployment. Write basic PowerShell scripts using cmdlets learned and scripting constructs to accomplish configuration tasks. This course provides students with the knowledge and skills needed to use PowerShell for System Center Configuration Manager (SCCM) administration. In this course, students learn how to access the PowerShell cmdlets included with SCCM 2012 R2 and use them to perform configuration tasks for a primary site. Individual cmdlets will be used in working with objects such as Boundaries, Boundary Groups, Collections, Software Deployment, Patching, Compliance Settings, OSD Task Sequences, and many others. Basic scripting will also be covered so that students can learn how to put PowerShell to use when working with large sets of objects. Prerequisites Basic Windows and Active Directory knowledge. Conceptual knowledge of Configuration Manager objects and how they interact. Basic experience performing configuration tasks in ECM using the graphical console. Experience working from a command prompt. Basic knowledge of the fundamentals of Windows PowerShell. 1 - REVIEW OF SYSTEM CENTER CONFIGURATION MANAGER CONCEPTS Architecture of an System Center 2012 Configuration Manager Installation Managing Assets Content Delivery and Management Security, Monitoring, and Remote Management 2 - MANAGING RESOURCES Implementing Discovery Organizing Resources with Collections Working with Boundaries 3 - WORKING WITH CLIENTS Installing the Configuration Manager Client Managing Client Settings Managing Client Operations Monitoring Client Status 4 - DISTRIBUTING SOFTWARE Configure the Software Distribution Components Working with Distribution Points Creating Content for Distribution Deploying Software Applications 5 - UPDATING SYSTEMS WITH WSUS AND SCCM Integrating Configuration Manager and WSUS Managing Updates through Software Update Groups Creating and Deploying Update Packages Working with Automatic Deployment Rules 6 - HOW POWERSHELL CAN MANAGE COMPLIANCE SETTINGS Creating Compliance Settings Objects Deploying and Monitor the Baseline 7 - CONFIGURING OPERATING SYSTEM DEPLOYMENT OBJECTS Preparing the OSD Environment Working with Task Sequences 8 - WORKING AT THE SITE LEVEL Modify the Site Adding Site System Roles Adding a Secondary Site 9 - SECURITY AND MONITORING Configuring Role Based Administration Implementing Endpoint Protection Configuring Monitoring Options 10 - USING POWERSHELL SCRIPTING TO AUTOMATE SCCM TASKS Review of Scripting Constructs Introduction to the Configuration Manager WMI Classes
The IAPP offers the most encompassing, up-to-date and sought-after global training and certification program for privacy and data protection. The Certified Information Privacy Professional (CIPP) helps organizations around the world bolster compliance and risk mitigation practices, and arms practitioners with the insight needed to add more value to their businesses. Skilled privacy pros are in high demand and IAPP certification is what employers want. When you earn an IAPP credential, you earn the right to be recognized as part of an elite group of knowledgeable, capable and dedicated privacy professionals. With the GDPR effective as of May 2018, among its mandates was the requirement to appoint knowledgeable DPOs (data protection officers) tasked with monitoring compliance, managing internal data protection activities, training data processing staff, conducting internal audits and more. There's a lot to know, there's a lot at stake and there's a lot of opportunity for privacy professionals with the right training and education. Achieving a CIPP/E credential shows you have the comprehensive GDPR knowledge, perspective and understanding to ensure compliance and data protection success in Europe-and to take advantage of the career opportunity this sweeping legislation represents. About This Course Delivered in a Modular format, the course includes; Module 1: Data Protection Laws Introduces key European data protection laws and regulatory bodies, describing the evolution toward a Harmonised European Legislative Framework. Module 2: Personal Data Defines and differentiates between types of data-including personal, anonymous, pseudo-anonymous and special categories. Module 3: Controllers and Processors Describes the roles and relationships of controllers and processors. Module 4: Processing Personal Data Defines data processing and GDPR processing principles, Explains the application of the GDPR and outlines the legitimate bases for processing personal data. Module 5: Information provision Explains controller obligations for providing information about data processing activities to data subjects and Supervisory Authorities. Module 6: Data Subjects 'Rights Describes data subjects' rights, applications of rights and obligations controller and processor. Module 7: Security or Processing Discusses considerations and duties of controllers and processors for Ensuring security of personal data and providing notification of data breaches. Module 8: Accountability Investigates accountability requirements, data protection management systems, data protection impact assessments, privacy policies and the role of the data protection officer. Module 9: International Data Transfers Outlines options and obligations for transferring data outside the European Economic Area, Decisions adequacy and appropriateness safeguards and derogations. Module 10: Supervision and Enforcement Describes the role, powers and procedures or Supervisory Authorities; the composition and tasks of the European Data Protection Board; the role of the European Data Protection Supervisor; and remedies, liabilities and penalties for non-compliance. Module 11: Compliance Discusses the applications of European data protection law, legal bases and compliance requirements for processing personal data in practice, employers-including processing employee data, surveillance, direct marketing, Internet technology and communications and outsourcing. Prerequisites There are no prerequisites for this course but candidates would benefit from reading the freely available materials found on the IAPP website. What's Included? 1 years membership of the IAPP Breakfast, Lunch and refreshments (Classroom courses only) Official Study Guide (European Data Protection, Law & Practice)* Participant Guide* Official Exam Q&A* Official Practice Exam Official Practice Exam* The Exam Fees * In electronic format for Live Online and hard copy for Classroom delegates Who Should Attend? The CIPP/E is ideal for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration, including those in the following positions: Cybersecurity Analysts Data Analysts Security Administrators Aspiring Data Protection Officers Accreditation Our Guarantee We are an approved IAPP Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras. The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.