Our Financial Compliance and Legal Aid Payments Course provides a brief overview of historical changes and the current regulations. The course will cover what VAT regulations and the SRA Accounts Rules say on legal aid payments and will provide practical advice and tips on how to account for these payments so you adhere to the rules and regulations of the profession. Target Audience This online course is suitable for those in the legal profession who oversees, or is responsible for or involved in accounting for legal aid funds, including, costs lawyers, legal cashiers, COFA, those supporting the COFA, account managers, etc. Resources An information pack including the course slides will be provided to all delegates after the course, which may be useful for ongoing reference. Please note a recording of the course will not be made available. Speaker Sarah Charlton, Consultant, DG Legal Sarah has a BSc (Hons) in Applied Accounting and is a Fellow member of the Association of Chartered and Certified Accountants. Her career spans over 35 years working within the legal sector, fulfilling roles from COFA through to CEO. During her career she has worked with a number of legal regulators, professional bodies and government organisations. Sarah has been a member of the Institute of Legal Finance and Management throughout her career, qualifying as a Fellow member in 2005. Sarah also served as chairperson between 2010-2012 and continues to serve as an Executive Council Member.
This session will combine knowledge as well as practical interactive scenarios to work through to assist delegates in evaluating themselves to identify areas they might need to improve on. The course will cover: The purpose of the role (reminder) How the role has evolved What lessons can be gained so far How do you create a culture of compliance What good systems, policies and procedures look like Easy tips on what, where and how you should be looking Target Audience This online course is suitable for those new to the COFA role, those supporting the COFA and for those that would like a refresher of the role and their responsibilities. Resources An information pack including the course slides, scenarios and suggested answers will be provided to all delegates, which may be useful for ongoing reference. Please note a recording of the course will not be made available. Speaker Sarah Charlton, Consultant, DG Legal Sarah has a BSc (Hons) in Applied Accounting and is a Fellow member of the Association of Chartered and Certified Accountants. Her career spans over 35 years working within the legal sector, fulfilling roles from COFA through to CEO. During her career she has worked with a number of legal regulators, professional bodies and government organisations. Sarah has been a member of the Institute of Legal Finance and Management throughout her career, qualifying as a Fellow member in 2005. Sarah also served as chairperson between 2010-2012 and continues to serve as an Executive Council Member.
Duration 5 Days 30 CPD hours This course is intended for This course is targeted toward an IT Professional that has the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. Students should have a minimum of 10 years experience including at least 5 years of hands-on technical security experience. Overview Upon successful completion of this course, students will be able to: Identify enterprise security fundamentals. Apply enterprise security technology solutions. Implement security design and solutions. Manage risk, policies and procedures within an enterprise. Integrate security solutions within an enterprise. Conduct security research and analysis. In this course, students will examine advanced security concepts, principles, and implementations that pertain to enterprise level security. Prerequisites CompTIA Cybersecurity Analyst (CySA+) Certification 1 - Enterprise Security Architecture The Basics of Enterprise Security The Enterprise Structure Enterprise Security Requirements 2 - Enterprise Security Technology Common Network Security Components and Technologies Communications and Collaboration Security Cryptographic Tools and Techniques Advanced Authentication 3 - Enterprise Resource Technology Enterprise Storage Security Issues Distributed, Shared, and Virtualized Computing Cloud Computing and Security 4 - Security Design and Solutions Network Security Design Conduct a Security Assessment Host Security 5 - Application Security Design Application Security Basics Web Application Security 6 - Managing Risk, Security Policies, and Security Procedures Analyze Security Risk Implement Risk Mitigation Strategies and Controls Implement Enterprise-Level Security Policies and Procedures Prepare for Incident Response and Recovery 7 - Enterprise Security Integration The Technology Life Cycle Inter-Organizational Change Integrate Enterprise Disciplines to Achieve Secure Solutions 8 - Security Research and Analysis Perform an Industry Trends and Impact Analysis Perform an Enterprise Security Analysis
Hiring the right staff is one of the most important management and HR skills and it is critical to get it right. This course is designed for managers and HR specialists who either want to improve their interviewing skills or who are just now starting a recruitment role in the organisation.
Front-line communication plays a vital role in shaping the public perception of every organisation. This course is designed to help delegates organise their ideas and communicate clearly and effectively through email. By improving written communication skills, delegates will become more concise, communicate with conviction, and foster meaningful dialogue with their audience. These skills are essential for professionals who interact with the public, as improved communication leads to greater internal and external customer satisfaction. Delegates will learn how to: Write clearly and professionally, enhancing public perception of expertise Communicate more efficiently in writing, reducing wasted time and increasing profitability Craft concise, rapport-building messages for internal and external customers, fostering productivity and a positive workplace environment Topics Covered: Benefits of using email Determining the purpose of an email Steps to take before writing Inflection in written messages Effects of instant messaging and text messaging on communication Basic email structure and planning Writing effective subject lines Paragraph structure and organisation Including relevant details and summarising problems effectively Proper use of CC and BCC fields Why typing in all caps is considered shouting! Proofreading techniques This Email Etiquette course is a 90-minute interactive virtual session. Upon registration, delegates will receive online login instructions prior to the class date. This format allows delegates to enhance their skills conveniently from their home or office while improving their professional communication abilities.
This qualification is made up of one mandatory and one optional unit. There are 2 x 1 day workshops that will help develop knowledge of the principles, theories and practices in Learning and Development The course is aimed at practitioners such as tutors, trainers, assessors and quality assurers who want to develop their skills and knowledge in their own area of learning delivery. You will meet other practitioners who are responsible for process, people or practice within Learning and Development. You will get to share good practices and ideas for improvement and will be able to apply these in your workplace. You will be expected to carry out research, complete assignments and implement change in your organisation, with the mentoring support of our Learning Advisor.
Duration 5 Days 30 CPD hours This course is intended for The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to: Early-career IT professionals, IT managers, career changers, and career advancers Students and recent graduates Overview After completing this course, you will understand: Key concepts in cybersecurity, including information security and network security Information security threats, vulnerabilities, and attacks The different types of malware Identification, authentication, and authorization Network security controls Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management) Application security design and testing techniques Fundamentals of virtualization, cloud computing, and cloud security Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures Cryptography and public-key infrastructure Data security controls, data backup and retention methods, and data loss prevention techniques Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic The incident handling and response process Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation Concepts in business continuity and disaster recovery Risk management concepts, phases, and frameworks EC-Council?s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs. Course Outline Information Security Threats and Vulnerabilities Information Security Attacks Network Security Fundamentals Identification, Authentication, and Authorization Network Security Controls: Administrative Controls Network Security Controls: Physical Controls Network Security Controls: Technical Controls Network Security Assessment Techniques and Tools Application Security Virtualization and Cloud Computing Wireless Network Security Mobile Device Security Internet of Things (IoT) and Operational Technology (OT) Security Cryptography Data Security Network Troubleshooting Network Traffic Monitoring Network Log Monitoring and Analysis Incident Response Computer Forensics Business Continuity and Disaster Recovery Risk Management
LOOKING FOR: MG, ADULT FICTION Jo Williamson has been in publishing for over 25 years. Having worked in Children’s books PR for Dorling Kindersley, HarperCollins and Orion, she started as an agent with Antony Harwood in 2008. She feels very privileged being with authors at the very start of their publishing journey and enjoys close working relationships with all her clients. From editorial help, general advice on the publishing world, guiding careers long-term and general cheerleading, she feels she has the perfect job. Although nothing is off limits and she loves being surprised by submissions. In middle grade children's fiction, Jo is particularly looking for books with heart, epic adventures with voice-led characters, and younger funny fiction with series potential. In adult fiction, page-turning Commercial Women’s and Book Club fiction are right up Jo's street, including psychological suspense, thriller, cosy crime and books that don’t quite fit the mould. Above all, she wants stories that linger long after the final page has been read. Jo is not the right fit for police procedurals. Jo would like you to submit a covering letter, 1 page synopsis and the first 5,000 words of your manuscript in a single word document. (In addition to the paid sessions, Jo is kindly offering one free session for low income/underrepresented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Wednesday 16th April 2025