• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

8234 Compliance courses

CILT PSV Transport Manager Refresher / OLAT 2 Day Course Online & In-person - April 2025

By Total Compliance

Operator License Awareness, OLAT, TM Refresher Course

CILT PSV Transport Manager Refresher / OLAT 2 Day Course Online & In-person - April 2025
Delivered Online & In-PersonFlexible Dates
£360

CILT PSV Transport Manager Refresher / OLAT 2 Day Course Online & In-person - June 2025

By Total Compliance

Operator License Awareness, OLAT, TM Refresher Course

CILT PSV Transport Manager Refresher / OLAT 2 Day Course Online & In-person - June 2025
Delivered Online & In-PersonFlexible Dates
£360

CILT PSV Transport Manager Refresher / OLAT 2 Day Course Online & In-person - July 2025

By Total Compliance

Operator License Awareness, OLAT, TM Refresher Course

CILT PSV Transport Manager Refresher / OLAT 2 Day Course Online & In-person - July 2025
Delivered Online & In-PersonFlexible Dates
£360

AML Suspicious Activity Reports and Suspicious Transaction Reports (SAR/STRs)

5.0(4)

By LGCA | London Governance and Compliance Academy

This self-paced, online course provides an overview of AML, the measures needed for efficient AML controls, Suspicious Transaction Monitoring, and Suspicious Activity Reporting (SAR) to help delegates understand their obligations to report suspicious activity, when to report suspicious activity, and how to report better quality SARs. Description Financial crime encompasses many threats to organizations and financial institutions. It has become a major risk in terms of reputation, integrity, and compliance for the financial community at large. Organizations must be able to mitigate risks by having an Anti-Money Laundering (AML) compliance programme in place, one that can effectively identify and report suspicious activities (SAR). This course will give you a comprehensive overview of everything that is relevant in terms of AML and suspicious activity reports. The course covers several important issues, including: • Definitions and legal framework of anti-money laundering and combating terrorism financing • Offences in the financial markets designated as money laundering offences • Reasons for the deficiency in financial market governance • Measures needed for efficient anti-money laundering controls (essential control features to minimize ML/TF in financial markets) • Suspicious Activity Report (SARs) and how these are related to money laundering prevention • Defining and identifying several types of suspicious activity and relevant reporting obligations • Who reports on money laundering trends • International regulatory/legal requirements related to SARs • Common indicators of suspicious transactions • Examples of red flag indicators • Case studies and examples Training Duration This course may take up to four (4) hours to complete. However, actual study time differs as each learner uses their own training pace. Participants This course is ideal for anyone wishing to acquire and demonstrate specialized knowledge in AML compliance and SARs. It is also suitable for professionals pursuing regulatory CPD in Financial Regulation. • MLCO • Governance Officer • Compliance Manager • Front line staff • Asset/wealth managers • AML officer • Risk Manager • Audit Executive • Internal Auditor • Corporate Counsel Training Method The course is offered fully online using a self-paced approach. The learning units consist of reading material. Learners may start, stop and resume their training at any time. At the end of the session, participants take a quiz to complete their learning unit and earn a Certificate of Attendance once all quizzes have been passed successfully. Accreditation and CPD Recognition This programme has been developed by the European Institute of Management & finance (EIMF), a leading and recognised training institution. The syllabus is verified by external subject matter experts and may be accredited by financial regulators, and general financial training accreditation bodies, such as CISI, ICA, and ACAMS for 4 CPD Units. Eligibility criteria and CPD Units are verified directly by your association or other bodies in which you hold membership. Registration and Access To register to this course, click on the Get this course button to pay online and receive your access instantly. If you are purchasing this course on behalf of others, please be advised that you will need to create or use their personal profile before finalising your payment. If you wish to receive an invoice instead of paying online, please contact us at info@lgca.uk. Access to the course is valid for 180 days.

AML Suspicious Activity Reports and Suspicious Transaction Reports (SAR/STRs)
Delivered Online On Demand
£76

55133 PowerShell for System Center Configuration Manager Administrators

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for IT professionals who need to manage the day-to-day environment of an SCCM 2012 SP1 or newer environment. Knowledge of the workings of a standalone primary SCCM site and basic PowerShell experience is recommended. Overview Create additional site system roles on existing or new servers. Modify high level site settings. Create and modify Discovery Methods, Boundaries and Boundary Groups. Create Collections using any of the membership rules available. Delegate authority through Roles and Scopes. Install the Configuration Manager client, modify client settings and restrict access to site systems. Deploy software to clients. Deploy software updates to clients. Configure compliance settings targeted against collections. Modify settings that govern monitoring functions such as Alerts and Status Settings. Work with Task Sequences for Operating System Deployment. Write basic PowerShell scripts using cmdlets learned and scripting constructs to accomplish configuration tasks. This course provides students with the knowledge and skills needed to use PowerShell for System Center Configuration Manager (SCCM) administration. In this course, students learn how to access the PowerShell cmdlets included with SCCM 2012 R2 and use them to perform configuration tasks for a primary site. Individual cmdlets will be used in working with objects such as Boundaries, Boundary Groups, Collections, Software Deployment, Patching, Compliance Settings, OSD Task Sequences, and many others. Basic scripting will also be covered so that students can learn how to put PowerShell to use when working with large sets of objects. Prerequisites Basic Windows and Active Directory knowledge. Conceptual knowledge of Configuration Manager objects and how they interact. Basic experience performing configuration tasks in ECM using the graphical console. Experience working from a command prompt. Basic knowledge of the fundamentals of Windows PowerShell. 1 - REVIEW OF SYSTEM CENTER CONFIGURATION MANAGER CONCEPTS Architecture of an System Center 2012 Configuration Manager Installation Managing Assets Content Delivery and Management Security, Monitoring, and Remote Management 2 - MANAGING RESOURCES Implementing Discovery Organizing Resources with Collections Working with Boundaries 3 - WORKING WITH CLIENTS Installing the Configuration Manager Client Managing Client Settings Managing Client Operations Monitoring Client Status 4 - DISTRIBUTING SOFTWARE Configure the Software Distribution Components Working with Distribution Points Creating Content for Distribution Deploying Software Applications 5 - UPDATING SYSTEMS WITH WSUS AND SCCM Integrating Configuration Manager and WSUS Managing Updates through Software Update Groups Creating and Deploying Update Packages Working with Automatic Deployment Rules 6 - HOW POWERSHELL CAN MANAGE COMPLIANCE SETTINGS Creating Compliance Settings Objects Deploying and Monitor the Baseline 7 - CONFIGURING OPERATING SYSTEM DEPLOYMENT OBJECTS Preparing the OSD Environment Working with Task Sequences 8 - WORKING AT THE SITE LEVEL Modify the Site Adding Site System Roles Adding a Secondary Site 9 - SECURITY AND MONITORING Configuring Role Based Administration Implementing Endpoint Protection Configuring Monitoring Options 10 - USING POWERSHELL SCRIPTING TO AUTOMATE SCCM TASKS Review of Scripting Constructs Introduction to the Configuration Manager WMI Classes

55133 PowerShell for System Center Configuration Manager Administrators
Delivered OnlineFlexible Dates
£1,785

EC-Council Certified Chief Information Security Officer (C|CISO)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is designed for the aspiring or sitting upper-level manager striving to advance his or her career by learning to apply their existing deep technical knowledge to business problems. In this course, students will learn in-depth content in each of the 5 CCISO Domains Domain 01 - Governance Define, Implement, Manage, and Maintain an Information Security Governance Program Information Security Drivers Establishing an information security management structure Laws/Regulations/Standards as drivers of Organizational Policy/Standards/Procedures Managing an enterprise information security compliance program Risk Management Risk mitigation, risk treatment, and acceptable risk Risk management frameworks NIST Other Frameworks and Guidance (ISO 31000, TARA, OCTAVE, FAIR, COBIT, and ITIL) Risk management plan implementation Ongoing third-party risk management Risk management policies and processes Conclusion Domain 2 - Security Risk Management, Controls, & Audit Management INFORMATION SECURITY CONTROLS COMPLIANCE MANAGEMENT GUIDELINES, GOOD AND BEST PRACTICES AUDIT MANAGEMENT SUMMARY Domain 03 - Security Program Management and Operations PROGRAM MANAGEMENT OPERATIONS MANAGEMENT Summary Domain 04 - Information Security Core Concepts ACCESS CONTROL PHYSICAL SECURITY NETWORK SECURITY ENDPOINT PROTECTION APPLICATION SECURITY ENCRYPTION TECHNOLOGIES VIRTUALIZATION SECURITY CLOUD COMPUTING SECURITY TRANSFORMATIVE TECHNOLOGIES Summary Domain 05 - Strategic Planning, Finance, Procurement and Vendor Management STRATEGIC PLANNING Designing, Developing, and Maintaining an Enterprise Information Security Program Understanding the Enterprise Architecture (EA) FINANCE PROCUREMENT VENDOR MANAGEMENT Summary

EC-Council Certified Chief Information Security Officer (C|CISO)
Delivered OnlineFlexible Dates
£3,495

Certified Information Privacy Professional (CIPP/E)

By Training Centre

  The IAPP offers the most encompassing, up-to-date and sought-after global training and certification program for privacy and data protection. The Certified Information Privacy Professional (CIPP) helps organizations around the world bolster compliance and risk mitigation practices, and arms practitioners with the insight needed to add more value to their businesses. Skilled privacy pros are in high demand and IAPP certification is what employers want. When you earn an IAPP credential, you earn the right to be recognized as part of an elite group of knowledgeable, capable and dedicated privacy professionals. With the GDPR effective as of May 2018, among its mandates was the requirement to appoint knowledgeable DPOs (data protection officers) tasked with monitoring compliance, managing internal data protection activities, training data processing staff, conducting internal audits and more. There's a lot to know, there's a lot at stake and there's a lot of opportunity for privacy professionals with the right training and education. Achieving a CIPP/E credential shows you have the comprehensive GDPR knowledge, perspective and understanding to ensure compliance and data protection success in Europe-and to take advantage of the career opportunity this sweeping legislation represents. About This Course   Delivered in a Modular format, the course includes; Module 1: Data Protection Laws Introduces key European data protection laws and regulatory bodies, describing the evolution toward a Harmonised European Legislative Framework. Module 2: Personal Data Defines and differentiates between types of data-including personal, anonymous, pseudo-anonymous and special categories. Module 3: Controllers and Processors Describes the roles and relationships of controllers and processors. Module 4: Processing Personal Data Defines data processing and GDPR processing principles, Explains the application of the GDPR and outlines the legitimate bases for processing personal data. Module 5: Information provision Explains controller obligations for providing information about data processing activities to data subjects and Supervisory Authorities. Module 6: Data Subjects 'Rights Describes data subjects' rights, applications of rights and obligations controller and processor. Module 7: Security or Processing Discusses considerations and duties of controllers and processors for Ensuring security of personal data and providing notification of data breaches. Module 8: Accountability Investigates accountability requirements, data protection management systems, data protection impact assessments, privacy policies and the role of the data protection officer. Module 9: International Data Transfers Outlines options and obligations for transferring data outside the European Economic Area, Decisions adequacy and appropriateness safeguards and derogations. Module 10: Supervision and Enforcement Describes the role, powers and procedures or Supervisory Authorities; the composition and tasks of the European Data Protection Board; the role of the European Data Protection Supervisor; and remedies, liabilities and penalties for non-compliance. Module 11: Compliance Discusses the applications of European data protection law, legal bases and compliance requirements for processing personal data in practice, employers-including processing employee data, surveillance, direct marketing, Internet technology and communications and outsourcing. Prerequisites   There are no prerequisites for this course but candidates would benefit from reading the freely available materials found on the IAPP website. What's Included?   1 years membership of the IAPP  Breakfast, Lunch and refreshments (Classroom courses only) Official Study Guide (European Data Protection, Law & Practice)* Participant Guide* Official Exam Q&A* Official Practice Exam Official Practice Exam* The Exam Fees * In electronic format for Live Online and hard copy for Classroom delegates     Who Should Attend?   The CIPP/E is ideal for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration, including those in the following positions: Cybersecurity Analysts Data Analysts Security Administrators Aspiring Data Protection Officers Accreditation Our Guarantee   We are an approved IAPP Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.

Certified Information Privacy Professional (CIPP/E)
Delivered OnlineFlexible Dates
£1,395

Emergency Response for Care Homes

By Guardian Angels Training

The "Emergency Response for Care Homes" course is designed to provide care home staff with essential knowledge and skills to effectively respond to a wide range of emergency situations. This course aims to reinforce and update the participants' understanding of emergency protocols, procedures, and best practices, ensuring a safe and coordinated response in times of crisis.

Emergency Response for Care Homes
Delivered In-Person in InternationallyFlexible Dates
£1,175

Cognicert ISO 7101 Healthcare Quality Lead Auditor Course

5.0(1)

By Cognicert Limited

ISO 7101 Healthcare Quality Management System Lead Auditor Course provides participants with the knowledge and skills necessary to lead audits of quality management systems within healthcare organizations. This comprehensive training program covers the principles, processes, and practices of auditing healthcare quality management systems, focusing on key standards and regulations applicable to the healthcare industry.

Cognicert ISO 7101 Healthcare Quality Lead Auditor Course
Delivered Online
£500 to £900

FORS Virtual Reality - Safe Driving - Periodic 7 Hour CPC- Bristol - Sept 2025

By Total Compliance

Registration will begin at 7:30 AM. The training will begin promptly at 8:00 AM. Please plan your arrival accordingly to ensure you don't miss any important information. Equip your drivers with the skills to navigate urban roads safely with our innovative VR training course. This DVSA-approved, 7-hour course utilises virtual reality to create a fully immersive learning experience. Drivers will gain a firsthand perspective of the challenges faced by vulnerable road users, such as cyclists, in a safe and controlled environment. Benefits: Immersive Learning: Develop empathy and understanding of vulnerable road users through VR simulations. Accessible & Risk-Free: Learn defensive driving techniques without the need for on-road cycling experience. Consistent Quality: Get a standardised training experience unlike unpredictable real-world scenarios. Course Content: The Changing Urban Landscape Sharing the Road with Vulnerable Users Defensive Driving Techniques Driver Attitude and Perception Impact of Driver Fitness on Safety Hazard Recognition for Vulnerable Road Users Compliance and Recognition: This course meets the requirements of: Work Related Road Risk (WRRR) FORS Silver Level CLOCS Standard Invest in your drivers' safety and the safety of vulnerable road users. Enroll today! Please review our Terms and Conditions for more information.

FORS Virtual Reality - Safe Driving - Periodic 7 Hour CPC- Bristol - Sept 2025
Delivered In-Person in Bristol
£120