PMI-RMP® Exam Prep: In-House Training This course is aimed at preparing the participant to pass the PMI-RMP® (Risk Management Professional) exam. The course will also provide practical tips and tools that can be used in any organization's project management risk practices. In this expanded session, you will also have time to practice your exam taking skills with coaching from a credentialed instructor. The course includes the tool RMP-IQ, with sample exam questions to practice for the exam and allow participants to see their knowledge level in the various domains. What You Will Learn At the end of this course, participants will be able to: Explain the value and benefits of the PMI-RMP® credential Perform a self-assessment of your knowledge and skills Prepare a study plan that will allow you to pass the exam Foundation Concepts The Risk Management Professional (PMI-RMP®) Exam PMI's Standard for Risk Management Portfolios, Programs and Projects Key risk definitions Risk management life cycle Levels of Risk Management Enterprise Risk Management Portfolio Risk Management Program Risk Management Project Risk Management Risk Strategy and Planning: Part 1 Task 1: Perform a preliminary document analysis Task 2: Assess project environment for threats and opportunities Task 3: Confirm risk thresholds based on risk appetites Risk Strategy and Planning: Part 2 Task 4: Establish risk management strategy Task 5: Document the risk management plan Task 6: Plan and lead risk management activities with stakeholders Agile, programs, and portfolio aspects of risk strategy and planning Risk Identification: Part 1 Objectivity and bias Task 1: Conduct risk identification exercises Risk Identification: Part 2 Task 2: Examine assumption and constraint analysis Task 3: Document risk triggers and thresholds based on context / environment Task 4: Develop risk register Agile, programs, and portfolio aspects of risk identification Risk Analysis: Part 1 Task 1: Perform qualitative analysis Risk analysis in an agile environment Risk Analysis: Part 2 Task 2: Perform quantitative analysis Task 3: Identify threats and opportunities Program and portfolio aspects of risk analysis Risk Response Task 1: Plan risk responses Agile, programs, and portfolio aspects of risk response planning Task 2: Implement risk responses Monitor and Close Risks: Part 1 Task 1: Gather and analyze performance data Monitor and Close Risks: Part 2 Task 2: Monitor residual and secondary risks Task 4: Monitor project risk levels Task 3: Provide information required to update relevant project documents Agile, programs, and portfolio aspects of monitoring and closing risks
RESILIA™ Foundation: In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls
Management of Risk (M_o_R®) Foundation: Virtual In-House Training This M_o_R® Foundation course prepares learners to demonstrate knowledge and comprehension of the four elements of the M_o_R framework: Principles, Approach, Processes, Embedding and Reviewing and how these elements support corporate governance. The M_o_R Foundation Course is also a prerequisite for the M_o_R Practitioner qualification. What you will Learn At the end of the M_o_R Foundation course, participants will gain competencies in and be able to: Describe the key characteristics of risk and the benefits of risk management List the eight M_o_R Principles List and describe the use of the key M_o_R Approach documents Create Probability and Impact scales Define and distinguish between risks and issues Create a Risk Register Create a Stakeholder map Identify the key roles in risk management Use the key techniques and describe specialisms in risk management Undertake the M_o_R Foundation examination Introduction Introduction to the M_o_R course What is a risk? What is risk management? Why is risk management so important? Basic risk definitions The development of knowledge about risk management Corporate governance and internal control Where and when should risk management be applied? M_o_R Principles The purpose of M_o_R principles Aligns with objectives Fits the context Engages stakeholders Provides clear guidance Informs decision-making Facilitates continual improvement Creates a supportive culture Achieves measurable value Risk management maturity models M_o_R Approach Relationship between the documents Risk management policy Risk management process guide Risk management strategy Risk register Issue register Risk response plan Risk improvement plan Risk communications plan M_o_R Process Common process barriers Identify contexts Identify the risks Assess estimate Assess evaluate Plan Implement Communication throughout the process M_o_R Perspectives Strategic perspective Program perspective Project perspective Operational perspective Risk Specialisms Business continuity management Incident and crisis management Health and Safety management Financial risk management Environmental risk management Reputational risk management Contract risk management
Management of Risk (M_o_R®) Practitioner: Virtual In-House Training The M_o_R® Practitioner course has been designed to provide learners with the opportunity to practice the practical application of the M_o_R method and covers the twelve M_o_R principles: Approach, Process and the basic techniques essential to managing risks using the M_o_R guidance. The purpose of the M_o_R Practitioner qualification is to confirm that the learner has achieved sufficient understanding of how to apply and tailor M_o_R in a scenario situation. What you will Learn At the end of the M_o_R Practitioner course, learners will gain competencies in: M_o_R framework (principles, approach based on risk documentation, process steps, and embedding and reviewing M_o_R principles Outline of M_o_R approach documents (including policy, process guide, and risk communications plan) Risk identification, assessment, and control Embedding and reviewing M_o_R M_o_R organizational perspectives (strategic, program, project, operational) Benefits The M_o_R Practitioner course offers a wide-ranging set of guidelines that will help in the management of risk in a project or program environment. It will help prepare learners for the M_o_R Practitioner Exam. They will feel more confident in approaching risk management after attending the course and will be aware of the use of different techniques that can assist in this task, including: Improved basis for effective strategy formation Reduced time spent fire-fighting and fewer unwelcome surprises Increased likelihood of successful change initiative outcomes Closer internal focus on doing the right things properly Increase in efficient use of resources waste and fraud Better management of contingency resources M_o_R roles and responsibilities M_o_R health check M_o_R maturity model Risk specialisms (including business continuity management) Introduction Introduction to the course What is a risk? What is risk management? Why is risk management so important? Basic risk definitions The development of knowledge about risk management Corporate governance and internal control Where and when should risk management be applied? M_o_R Principles The purpose of M_o_R principles Aligns with objectives Fits the context Engages stakeholders Provides clear guidance Informs decision-making Facilitates continual improvement Creates a supportive culture Achieves measurable value Risk management maturity models M_o_R Approach Relationship between the documents Risk management policy Risk management process guide Risk management strategy Risk register Issue register Risk response plan Risk improvement plan Risk communications plan M_o_R Process Common process barriers Identify - contexts Identify - the risks Assess - estimate Assess - evaluate Plan Implement Communication throughout the process M_o_R Perspectives Strategic perspective Programme perspective Project perspective Operational perspective Risk Specialisms Business continuity management Incident and crisis management Health and Safety management Financial risk management Environmental risk management Reputational risk management Contract risk management
PMI-RMP® Exam Prep: Virtual In-House Training This course is aimed at preparing the participant to pass the PMI-RMP® (Risk Management Professional) exam. The course will also provide practical tips and tools that can be used in any organization's project management risk practices. In this expanded session, you will also have time to practice your exam taking skills with coaching from a credentialed instructor. The course includes the tool RMP-IQ, with sample exam questions to practice for the exam and allow participants to see their knowledge level in the various domains. What You Will Learn At the end of this course, participants will be able to: Explain the value and benefits of the PMI-RMP® credential Perform a self-assessment of your knowledge and skills Prepare a study plan that will allow you to pass the exam Foundation Concepts The Risk Management Professional (PMI-RMP®) Exam PMI's Standard for Risk Management Portfolios, Programs and Projects Key risk definitions Risk management life cycle Levels of Risk Management Enterprise Risk Management Portfolio Risk Management Program Risk Management Project Risk Management Risk Strategy and Planning: Part 1 Task 1: Perform a preliminary document analysis Task 2: Assess project environment for threats and opportunities Task 3: Confirm risk thresholds based on risk appetites Risk Strategy and Planning: Part 2 Task 4: Establish risk management strategy Task 5: Document the risk management plan Task 6: Plan and lead risk management activities with stakeholders Agile, programs, and portfolio aspects of risk strategy and planning Risk Identification: Part 1 Objectivity and bias Task 1: Conduct risk identification exercises Risk Identification: Part 2 Task 2: Examine assumption and constraint analysis Task 3: Document risk triggers and thresholds based on context / environment Task 4: Develop risk register Agile, programs, and portfolio aspects of risk identification Risk Analysis: Part 1 Task 1: Perform qualitative analysis Risk analysis in an agile environment Risk Analysis: Part 2 Task 2: Perform quantitative analysis Task 3: Identify threats and opportunities Program and portfolio aspects of risk analysis Risk Response Task 1: Plan risk responses Agile, programs, and portfolio aspects of risk response planning Task 2: Implement risk responses Monitor and Close Risks: Part 1 Task 1: Gather and analyze performance data Monitor and Close Risks: Part 2 Task 2: Monitor residual and secondary risks Task 4: Monitor project risk levels Task 3: Provide information required to update relevant project documents Agile, programs, and portfolio aspects of monitoring and closing risks
RESILIA™ Foundation: Virtual In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls
Better Business Cases™ Practitioner: In-House Training: In-House Training Better Business Cases™ is based on the Five Case Model - which is the UK government's best practice approach to structuring spending proposals and making effective business decisions. Using this best-practice approach will allow organizations to reduce unnecessary spending and improve the decision-making process which gives you a greater chance of securing necessary funding and support for initiatives. The goal of the practitioner course is to develop a candidate's ability to deliver a comprehensive business case, through encouraging expanded knowledge to guide the practical application of theoretical foundations. Upon the completion of this Practitioner course, a candidate will be able to start applying the model to a real business case development project. What You Will Learn At the end of this program, you will be able to: Develop the lifecycle of a business case and to establish the relationships between the five cases Apply the steps in the business case development framework, in order to support the production of a business case, using the Five Case Model, for a given scenario Overview of Better Business Cases Alignment with the strategic planning process Importance of the Business Case using the Five Case Model Overview of the Five Case Model Purpose of the key stages in the development of a spending proposal Purpose of a Business Justification Case Business Case Development Process Purpose of project / programme assurance and assurance reviews Responsibility for producing the Business Case Determining the Strategic Context and Undertaking the Strategic Assessment Scoping the Scheme and Preparing the Strategic Outline Case Planning the Scheme and Preparing the Outline Business Case Procuring the Solution and Preparing the Full Business Case Implementation and monitoring Evaluation and feedback Making the Case for Change Agree on the strategic context Determine spending objectives, existing arrangements, and business needs Determine potential business scope and key service requirements Determine benefits, risks, constraint, and dependencies Exploring the Preferred Way Forward Agree on critical success factors Determine long list options and SWOT analysis Recommend a preferred way forward Determining Potential Value for Money Revisit the short list Prepare the economic appraisal for short-listed options Undertake benefits appraisal Undertake risk appraisal Select preferred option and undertake sensitivity analysis Preparing for the Potential Deal Determine the procurement strategy Determine service streams and required outputs Outline potential risk apportionment Outline potential payment mechanisms Ascertain contractual issues and accountancy treatment Ascertaining Affordability and Funding Requirement Prepare the financial model Prepare the financial appraisals Planning for Successful Delivery Plan programme / project management Plan change and contract management Plan benefits realization Plan risk management Plan programme / project assurance and post project evaluation Procuring the Value for Money Solution Revisit the case for change Revisit the OBC options Detail procurement process and evaluation of best and final offers (BAFOs) Contracting for the Deal Set out the negotiated deal and contractual arrangements Set out the financial implications of the deal Ensuring Successful Delivery Finalize project management arrangements and plans Finalize change management arrangements and plans Finalize benefits realization arrangements and plans Finalize risk management arrangements and plans Finalize contract management arrangements and plans Finalize post-project evaluation arrangements and plans
Elevate your expertise in LNG terminal operations safety through our classroom training course. Energyedge provides industry-leading expertise and guidance.
Aligned with the AIGP certification program, AI Governance Professionalâ¯Training is for professionals tasked with implementing AI governance and risk management in their organizations. It provides baseline knowledge and strategies for responding to complex risks associated with the evolving AI landscape. This training meets the rapidly growing need for professionals who can develop, integrate and deploy trustworthy AI systems in line with emerging laws and policies. About This Course This training teaches critical artificial intelligence governance concepts that are also integral to the AIGP certification exam. While not purely a 'test prep' course, this training is appropriate for professionals who plan to certify, as well as for those who want to deepen their AI governance knowledge. Both the training and the exam are based on the same body of knowledge. Module 1: Foundations of artificial intelligence Defines AI and machine learning, presents an overview of the different types of AI systems and their use cases, and positions AI models in the broader socio-cultural context. Module 2: AI impacts on people and responsible AI principles Outlines the core risks and harms posed by AI systems, the characteristics of trustworthy AI systems, and the principles essential to responsible and ethical AI. Module 3: AI development life cycle Describes the AI development life cycle and the broad context in which AI risks are managed. Module 4: Implementing responsible AI governance and risk management Explains how major AI stakeholders collaborate in a layered approach to manage AI risks while acknowledging AI systems' potential societal benefits. Module 5: Implementing AI projects and systems Outlines mapping, planning and scoping AI projects, testing and validating AI systems during development, and managing and monitoring AI systems after deployment. Module 6: Current laws that apply to AI systems Surveys the existing laws that govern the use of AI, outlines key GDPR intersections, and provides awareness of liability reform. Module 7: Existing and emerging AI laws and standards Describes global AI-specific laws and the major frameworks and standards that exemplify how AI systems can be responsibly governed. Module 8: Ongoing AI issues and concerns Presents current discussions and ideas about AI governance, including awareness of legal issues, user concerns, and AI auditing and accountability issues. Accreditation The associated exam is accredited by the IAPP under its ANSI Accreditation Who Should Attend? Any professionals tasked with developing AI governance and risk management in their operations, and anyone pursuing IAPP Artificial Intelligence Governance Professional certification. Prerequisites A general understanding of AI, Corporate Governance, and Business value would be of benefit to participants. Assessment As with all IAPP exams, the AIGP is a 90 question, multiple choice exam to be completed within 150 minutes. Exams are hosted by Pearsonvue and can be taken either remotely, or via any one of hundreds of exam venues globally. A passing score is achieved at 70% Our Guarantee We are an approved IAPP training provider Exam pass guarantee, or retrain until you do, for free What's Included? Participant Guide Study Guide Practice Exam Exam voucher Breakfast, lunch, coffees and snacks (Classroom courses only) Certification Logo
Take your knowledge to the next level with EnergyEdge course on Layer of Protection Analysis (LOPA). Enroll now to advance your career.