• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

26 Educators providing Courses delivered Live Online

NetZealous LLC

netzealous llc

We are NetZealous, a Provider of Innovative Professional Trainings in these Diversified, Niche Areas: Regulatory Compliance Human Resources Healthcare IT Being innovators in providing professional trainings in these areas, we augment professionals’ careers. Our trainings help them grow in their chosen paths and enable them to scale new peaks. Our courses are designed to suit the latest requirements of the industry. These take professionals closer to their desired levels of excellence. We have a vast pick of clients that range from startups to mid-level companies to Fortune 500 companies. Our trainings and courses promote their professional development. NetZealous is a major partner in professionals’ career growth, much as they have been part of our growth. Our training services set new benchmarks, as a result of which our customers get customized, cost-effective, on-demand training solutions from us. Our trainings are effective and tailored to suit their exact needs, and are from Experts who are well-known in the industry. Our Modes of Professional Trainings The niche areas in which NetZealous offers professional trainings are imparted in a number of easy, cost-effective ways. These include: Web Seminars; In-Person, Live Seminars; In-House Consulting; Conferences; Learning Managements Systems, and Products What Makes us a Global Organization? Everything that makes an organization a truly global one, you will find in NetZealous: Our Experts are Chosen from Around the World; NetZealous Offers Trainings to Professionals and Organizations from at Least Four Continents; We Impart Knowledge of the Latest Regulations and Updates and Globally Accepted best Practices Our Seminars and Consulting Businesses are Held in Global Locations. At Present, We have Offices in the Following Locations: We have virtual offices in a number of other locations around the world. While our web seminars cuts across geographical borders; our seminars and in-house trainings are conducted at the client location.

The Education Partnership (Uk)

the education partnership (uk)

England

Welcome to The Education Partnership. Please take a look around our website and see what we can offer you. Bill is chairman of The Education Partnership, which has for the past twenty years provided a truly comprehensive range of governance and compliance expertise to schools, colleges, and outdoor education activity centres. He was previously a Head Teacher of all-age boarding and day schools in the maintained and independent sectors, including those for children with complex learning and behavioural needs. Bill works with proprietors and Head Teachers in preparation for and following up inspections by Ofsted (Education and Social Care) and ISI (Regulatory Compliance and Education Quality). His expertise in this area covers NMS, RSS, dual registration, initial registration, final registration and material change. Bill also works with schools judged as “inadequate” by Ofsted or “unsatisfactory” by ISI, helping them to achieve “good”, “outstanding” and “excellent” Ofsted or ISI outcomes. Bill is approached by an increasing number of proprietors, chairs of trustees and headteachers, who find themselves in challenging circumstances. This includes schools that have received a warning notice from the Department for Education due to their failure to meet the Independent School Standards Regulations (ISSR) and/or the National Minimum Standards (NMS) for boarding and residential special schools. Consistently, these schools see improvements at subsequent inspections. Currently, Bill is undertaking a longitudinal study of independent proprietorial schools, examining the governance implications of compliance and external inspection outcomes. To this end, we are looking for proprietorial schools in England for whom we could undertake a free of charge one-day compliance health check in return for participating in a confidential semi-structured interview on this subject at the end of the day. If you would be interested in taking up this offer, or would like a PDF of the second edition of this research, please contact billbrown@edpa.org.uk

Online Skills Training

online skills training

London

At the heart of Online Skills Training (OST), we provide digital solutions for learning providers and businesses to increase the awareness of online learning for employees and learners/ students. We are proud of the milestones and achievements we’ve reached in the last three years and now have introduced a solution for learning providers and businesses to transform from classroom to online. We understand the importance of providing online learning solutions for our partners and encouraging learners with greater interactive experiences using technology — AI & VR. We have bridged the gap between technology and learning in traditional construction courses by creating opportunities for our partners and their learners with a successful online learning solution model. We’ve been developing courses in construction for over 10 years with an initiative to explore the latest methods in technology. Our passion for technology and construction has strengthen our delivery of our products and services — now we’re in a position to offer businesses and learning providers an opportunity to bring their business online. An online learning solution for our partners will enable them to achieve national or global access, improve client service through greater flexibility, increased productivity, saving on costs (hiring classrooms, materials, etc) and opportunities to manage the business from anywhere in the world. Partners will also benefit from digitalisation of business operations, greater resource management, employee empowerment, greater customer/ client insights, better customer experience and creation of digital products and services. Adopting a new online learning solution transforms our partners business and opens the door to future online solutions for the business to adopt Online Skills Training is a learning solution developed for the construction industry and beyond that is focused on enabling tradesmen to gain better results using less time and effort. Our completely online courses, not only provide training but also offer online, invigilated assessments that confirm to international proctoring standards. Our Team Our team is strengthen by support from a range of extensively qualified people with expert knowledge in delivering construction health & safety modules. Graham McEwing Graham McEwing has gained extensive knowledge throughout his working life within a number of areas from 2005 to the present day. During this time he works with a range of training providers and helps learners achieve their apprenticeships and functional skills within a wide range of course subjects. Currently his key focus would be within the Construction sector and currently provide Level 1 – Health & Safety courses. Kate Blye Kate Blye has achieved significant success with helping learners predominantly working within the construction industry. Kate worked as an Inspector for HSE for 9 years, and has an in depth understanding both of health and safety and of the construction process. She recognises that the practical skills required for construction work aren't always suited to a classroom situation and is passionate about making her training accessible to everyone. Ryan Lee Ryan Lee provides excellent support across many training areas but concentrates on the construction sector when delivering the Level 1 - Health & Safety in a Construction Environment course for OST. Other activities include tutoring for traineeships and apprenticeships. Ryan is passionate about delivering courses and upholding regulatory compliance. Our mission To bring technology to the centre of certificated learning within the construction industry To promote the use of technology in the Up Skilling of people at all levels within construction To lead the way, in bridging the gap between technology and learning within construction. Contact us If you have a course you currently offer in the classroom that you would like to do online, we can work with you to develop an online equivalent. We are solution and results focused.

MyT Automation

myt automation

Croydon

MyT Automation is a comprehensive Software as a Service (SaaS) platform designed to empower businesses, agencies, and entrepreneurs to deliver scalable and efficient solutions for marketing, sales, customer relationship management (CRM), and automation.  The platform consolidates a wide range of tools into a single, customisable system, enabling users to streamline operations, enhance client engagement, and drive revenue growth without the need for extensive development or technical expertise.  Below is a detailed overview of MyT Automation's capabilities, tailored for use by a chatbot or AI agent to communicate its features effectively.  Core Capabilities 1. Marketing Automation MyT Automation provides robust tools to automate and optimise marketing efforts, enabling businesses to engage customers efficiently across multiple channels. Email Marketing Automation:  Create, schedule, and send personalised email campaigns with drag-and-drop editors, pre-built templates, and automated sequences for lead nurturing, follow-ups, and customer retention.SMS Marketing: Send targeted text messages for promotions, reminders, or transactional updates, with support for automated SMS workflows. Social Media Management:  Schedule and publish posts across major social media platforms, with analytics to track engagement and performance. Lead Scoring and Segmentation:  Automatically score leads based on behaviour and demographics, allowing for precise audience segmentation and targeted campaigns. Campaign Analytics:  Access detailed reports on campaign performance, including open rates, click-through rates, and conversions, to optimise marketing strategies. 2. Customer Relationship Management (CRM) The platform includes a powerful CRM system to manage client relationships, streamline sales processes, and enhance customer experiences. Contact Management:  Centralise customer data with detailed profiles, including interaction history, preferences, and purchase records. Pipeline Management:  Visualise and manage sales pipelines with customizable stages, automated deal tracking, and task assignments. Lead Capture and Nurturing:  Use forms, landing pages, and automated workflows to capture leads and guide them through the sales funnel. Appointment Scheduling:  Integrate calendar tools to automate booking, send reminders, and sync with platforms like Google Calendar. Unified Inbox:  Manage all client communications (email, SMS, social media) in a single dashboard for streamlined interactions. 3. Funnel and Website Building MyT Automation offers intuitive tools to create high-converting sales funnels and professional websites without coding expertise. Drag-and-Drop Builder:  Design landing pages, funnels, and full websites using customisable templates and a user-friendly interface. E-commerce Integration:  Build online stores with product management, payment gateways, and order tracking capabilities. SEO Optimisation:  Optimise websites for search engines with built-in tools for meta tags, keywords, and mobile responsiveness. A/B Testing:  Test different versions of pages or funnels to identify the highest-performing designs and content. 4. Conversational AI and Chatbots MyT Automation includes AI-powered chatbot capabilities to enhance customer support and lead generation. No-Code Chatbot Builder:  Create custom chatbots to automate customer interactions, answer FAQs, qualify leads, or book appointments. Multi-Channel Support:  Deploy chatbots on websites, social media, and messaging apps like WhatsApp or Facebook Messenger. Live Chat Handoff:  Seamlessly transition from automated chatbot responses to human agents when needed. Analytics and Insights:  Track chatbot performance, including engagement rates and conversion metrics, to refine conversational strategies. 5. Workflow Automation The platform automates repetitive tasks and workflows to save time and improve efficiency. Trigger-Based Actions:  Set up automated actions based on user behaviour, such as sending follow-up emails when a lead completes a form. Workflow Integrations:  Connect with external tools like CRMs, payment processors, and productivity apps via APIs or third-party integrations (e.g., Zapier). Task Automation:  Automate task assignments, reminders, and notifications to keep teams aligned and projects on track. Data Synchronisation:  Ensure real-time data updates across integrated systems for consistent and accurate information. 6. Analytics and Reporting MyT Automation provides advanced analytics to drive data-informed decisions and optimise performance. Custom Dashboards:  Build tailored dashboards to monitor key performance indicators (KPIs) like sales, conversions, and user engagement. Real-Time Reporting:  Access up-to-date insights on marketing, sales, and operational metrics. Predictive Analytics:  Leverage AI-driven insights to forecast trends, customer behaviour, and revenue potential. Funnel Analysis: Identify drop-off points in sales funnels to improve conversion rates. 7. E-commerce and Payment Processing MyT Automation supports businesses in creating and managing online stores with integrated payment solutions. Product Management:  Organise products, manage inventory, and set pricing from a single platform. Payment Gateways:  Integrate with popular payment processors like Stripe, PayPal, and Square for secure transactions. Subscription Billing:  Offer recurring revenue models with automated billing and subscription management. Order Tracking:  Monitor orders and provide customers with real-time updates on their purchases. 8. Security and Compliance The platform prioritises data security and regulatory compliance to protect businesses and their clients. Data Encryption:  Use AES 256-bit encryption for secure file storage and data transfer. Role-Based Access Controls:  Assign granular permissions to ensure data access is restricted to authorised users. Compliance Tools:  Support GDPR, CCPA, and other regulations with data anonymisation and privacy controls. Audit Trails:  Track changes and user actions for transparency and compliance. 9. Scalability and Integrations MyT Automation is designed to scale with your business and integrate seamlessly with existing systems. API Access: Connect with third-party tools and custom applications via robust APIs. Multi-Platform Support:  Deploy on web, mobile, or hybrid environments with flexible hosting options (cloud or on-premises). Extensibility:  Add plugins or extensions to enhance functionality based on specific business needs. Real-Time Data Sync:  Integrate with CRMs, marketing tools, and analytics platforms for a unified workflow. Use Cases  MyT Automation is versatile and caters to a wide range of industries and business types: Digital Agencies:  Deliver marketing, CRM, and automation services to clients with a professional platform. Entrepreneurs and Resellers:  Launch a micro-SaaS business targeting niche markets with a robust solution. E-commerce Businesses:  Build and manage online stores with integrated marketing and payment solutions. Consultants and Freelancers:  Streamline client management, project tracking, and reporting with a professional platform. Startups:  Scale operations quickly with a cost-effective, ready-to-use solution that supports growth. Benefits Speed to Market:  Launch services in days, not months, with pre-built tools and templates. Cost Efficiency:  Avoid the high costs of custom software development and maintenance. Streamlined Operations:  Consolidate marketing, sales, and customer management into a single platform. Recurring Revenue:  Offer subscription-based services to generate predictable income. Scalability:  Grow your business with a platform that adapts to increasing client demands and integrates with existing systems. Why Choose MyT Automation? MyT Automation is a powerful, all-in-one solution that combines marketing automation, CRM, website building, e-commerce, and conversational AI into a single platform. Its no-code interface, extensive customisation options, and robust integrations make it ideal for businesses looking to deliver high-value services.  With advanced analytics, security features, and scalability, MyT Automation empowers users to focus on growth, client satisfaction, and revenue generation while the platform handles the technical complexities.

Courses matching "Regulatory Compliance"

Show all 27

Compliance Officer For Legal Practice (COLP) Course

By DG Legal

The COLP role goes beyond just ensuring your firm follows the rules in the SRA Standards and Regulations, it also comes with a personal accountability factor that demands your attention. Fear not! This 3 hour course will usher you through the intricacies of being a COLP, ensuring you not only meet but excel in your regulatory obligations.  The course will cover: Navigating the Regulatory Landscape: Understanding the Framework for COLPs Dive into the intricate regulatory framework that Compliance Officers for Legal Practice (COLPs) operate under. Shouldering the Responsibility: Unpacking the Duties of a COLP Explore the multifaceted responsibilities that come with the role of a COLP. Choosing the Right Leader: Identifying the Ideal COLP Candidate Learn the criteria for selecting the most suitable individual to take on the crucial role of COLP. Cracking the Codes: Key Elements of Codes and SRA Principles Delve into the essential components of the Codes and SRA Principles that form the backbone of legal compliance. Building a Robust Foundation: Understanding Compliance Systems for All Firms Explore the concept of compliance systems, what they entail, and why every firm should have one in place. Reporting Matters: Recognising 'Serious' Issues, SRA Enforcement Strategy, and Reporting Protocols Uncover the definition of 'serious' matters, grasp the SRA Enforcement Strategy, and gain practical insights on making effective reports to the SRA. Paper Trails Matter: Effective Record Keeping, Including Non-material Breaches Master the art of comprehensive record-keeping, including strategies for recording non-material breaches, and understand why it's integral to compliance. Personal Liability: Understanding and Mitigating Risks Navigate the landscape of personal liability for COLPs and develop strategies to mitigate associated risks. Staying Ahead: Keeping Abreast of Regulatory Changes and Guidance Develop effective strategies for staying up to date with dynamic regulatory changes and evolving guidance. Planning for Compliance: Crafting a Robust Strategy, Assessing Risk, and File Reviewing Formulate a comprehensive plan for tackling compliance, including risk assessment, maintaining risk registers, and implementing effective file reviewing. Across the Board: Legal and Regulatory Compliance Areas Every COLP Must Master Gain a high-level overview of crucial legal and regulatory compliance areas, including AML, transparency rules, and other pivotal aspects that demand the attention of all COLPs. Target Audience This online course is suitable for those new to the COLP role, or those supporting the COLP and for those that would like a refresher of the role and their responsibilities. Resources Comprehensive and up to date course notes will be provided to all delegates which may be useful for ongoing reference or cascade training. Please note a recording of the course will not be made available. Speaker Helen Torresi, Consultant, DG Legal Helen is a qualified solicitor with a diverse professional background spanning leadership roles in both the legal and tech/corporate sectors. Throughout her career, she has held key positions such as COLP, HOLP, MLCO, MLRO and DPO for law firms and various regulated businesses and services. Helen’s specialised areas encompass AML, complaint and firm negligence handling, DPA compliance, file review and auditing, law management, and operational effectiveness in law firms, particularly in conveyancing (CQS).

Compliance Officer For Legal Practice (COLP) Course
Delivered Online + more
£135 to £180

ICA International Diploma in Governance, Risk and Compliance

By International Compliance Association

ICA International Diploma in Governance, Risk and Compliance New technologies are changing the role of a compliance professional. Fintech and Regtech are now embedded in compliance lexicon, but what do the terms mean, and what are the practical impacts, both positive and negative, that we need to understand and manage? The ICA International Diploma in Governance, Risk and Compliance helps you to answer these questions and apply the answers directly within your organisation. Gain a broad understanding of the regulatory environment as well as the specialist skills and knowledge to be able to identify and manage key regulatory risks today and in the future. Get to grips with the nuances of the regulatory environment and the impact to your organisation. Understand why promoting a positive compliance culture is not just good for compliance but good for business. Explore how to maximise the benefits of emerging technologies. Develop your inter-personal skills so you can be the best Compliance Manager. Learn from the experiences of compliance professionals from other firms and sectors and share ideas. This governance, risk and compliance course is awarded in association with Alliance Manchester Business School, the University of Manchester. Benefits of studying with ICA: Flexible learning solutions that are suited to you Our learner-centric approach means that you will gain relevant practical and academic skills and knowledge that can be used in your current role Improve your career options by undertaking a globally recognised qualification that hiring managers look for as part of their hiring criteria Many students have stated that they have received a promotion and/or pay rise as a direct result of gaining their qualification The qualifications ensure that you are enabled to develop strategies to help manage and prevent risk within your firm, thus making you an invaluable asset within the current climate Completion of this training course will provide participants with the following professional qualification: ICA Diploma in Governance, Risk and Compliance. In addition, participants will be entitled to use the following designation 'Dip (Comp).' These qualifications are awarded in association with Alliance Manchester Business School, the University of Manchester. What will you learn? Understanding governance, risk and regulatory compliance Why we need to understand the regulated environment Why are governance and culture essential for effective regulatory compliance risk management? The role of the compliance department and the compliance professional Risk management as the key to effective compliance Case Studies

ICA International Diploma in Governance, Risk and Compliance
Delivered OnlineFlexible Dates
£3,900

Elevate your expertise in LNG terminal operations safety through our classroom training course. Energyedge provides industry-leading expertise and guidance.

LNG Terminal Operations & Safety
Delivered in Internationally or OnlineFlexible Dates
£1,999 to £2,099

Assessing and Managing Cyber Security Risks for Essential Services Operators

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT) This 3 half-day Virtual Instructor Led Training (VILT) course will help participants grasp the idea of real-world risk management and how this relates to the cyber world. The VILT course will cover topics surrounding identifying cyber risks and vulnerabilities, guidance on applying administrative actions, and comprehensive solutions to ensure your organization is adequately secure and protected. The VILT course will guide participants on how to conduct a security risk assessment for their organization, and equip them with the skills to develop a risk compliance assessment plan as well as methods to develop risk management strategies which can improve their organization's security posture. The VILT course has at least a 30% hands-on approach through the use of Table Top Exercises. The VILT course will cover the following modules: Introduction to Risk Assessments (RA) Threat Actors and Their Motivations Threat and Risk Assessment Critical Controls Identification Maturity Assessment Treated Cyber Risk Profile Target Cyber Risk Profile and Strategy Target Audience The VILT course is intended for professionals responsible for organizational information and security system and those involved in operating and maintenance of critical information and IT network & sotware systems. Professionals who are designated as the Single Point of Accountability (SPoA) as well as system auditors will find this course useful. Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 3 half-day sessions comprising 4 hours per day, with 2 x 10 minutes break per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 3 half-day sessions, 4 hours per session (12 hours in total). This VILT course is delivered in partnership with ENGIE Laborelec. Trainer Your expert course leader is a is specialized in cybersecurity risk management. Before joining ENGIE, she worked for The National Cybersecurity Agency of France (ANSSI) based in Paris (France) and for Deloitte Belgium located in Zaventem (Belgium). She has been involved in cybersecurity projects focusing on the principle of protecting critical infrastructures. Her different experiences in Cyber Security, Anti-Money Laundering and Global Trade Compliance (including Export Control and Customs) gave her the opportunity to use methodologies tackling strategic, operational and financial control issues at all levels of an organization: people, business processes, IT applications and infrastructure, legal and regulatory compliance. She was an EBIOS Risk Manager (RM) trainer while she worked for the French government; EBIOS RM is the French method for assessing and treating digital risks. She also had the opportunity to represent France towards European institutions and other relevant stakeholders for topics related to cybersecurity risk management. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Assessing and Managing Cyber Security Risks for Essential Services Operators
Delivered in Internationally or OnlineFlexible Dates
£1,324 to £2,499

Better Business Cases Foundation: In-House Training

By IIL Europe Ltd

Better Business Cases™ Foundation: In-House Training: In-House Training Better Business Cases™ is based on the Five Case Model - which is the UK government's best practice approach to structuring spending proposals and making effective business decisions. Using this best practice approach will allow organizations to reduce unnecessary spending and improve the decision-making process which gives you a greater chance of securing necessary funding and support for initiatives. The goal of the foundation course is to enable participants to work effectively with a team to develop a strong business case in their work environment. What You Will Learn At the end of this program, you will be able to: Describe the philosophy and the underlying rationale of the Five Case Model Identify different types of business case, their purpose, who is responsible for them Recognize when the different types are required in the development of a spending proposal Develop the business case in relation to other recognized and recommended best practices for programme and project management Overview of the Five Case Model Five key components of a business case and the order in which they are presented Three key stages in the development of a spending proposal Definition of a programme / project and the key differences between programmes and projects Purpose of a Business Justification Case (BJC) and in what circumstances it should be considered Purpose of a Strategic Outline Case (SOC) Purpose of an Outline Business Case (OBC) Purpose of a Full Business Case (FBC) Relationship between policies, strategies, programmes, and projects and their deliverables Developing the Strategic Case Purpose and core content of a Strategic Case Purpose of SMART robust spending objectives and the key objectives for spend: economy, efficiency, effectiveness, re-procurement, and statutory or regulatory compliance Four main categories of benefits criteria and the parties involved in their development Three key categories of risk Purpose of identifying constraints and dependencies Difference between direct and indirect benefits Developing the Economic Case Purpose and core content of an Economic Case Purpose of critical success factors and the key critical success factors based upon the Five Case Model Purpose of the long list options and how to generate options and undertake SWOT analysis Minimum of four short-list options, how they are derived, and what they should include (Reference Project / Public Sector Comparator [PSC]) Difference between the preferred way forward and the preferred option Purpose, objectives, key participants, and outputs of Workshop Stage 2 - identifying and assessing the options Rules that should be followed for the treatment of costs and benefits Key differences between economic appraisals and financial appraisals Factors considered when selecting the preferred option Developing the Commercial Case Purpose and core content of a Commercial Case Guiding principles when apportioning risk between the contractual parties Purpose of payment mechanisms Purpose of Step 9 in the development framework: Contracting for the deal Developing the Financial Case Purpose and core content of a Financial Case The financial statements required for all projects The possible impacts to consider Developing the Management Case Purpose and core content of a Management Case Purpose of a programme / project management strategy, framework, and plan Purpose of a change management strategy, framework, and plan Purpose of a benefits realization strategy, framework, and register / plan Purpose of a risk management strategy, framework and register / plan Purpose of a post programme / project evaluation strategy, framework, and plan

Better Business Cases Foundation: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

Better Business Cases Foundation: Virtual In-House Training

By IIL Europe Ltd

Better Business Cases™ Foundation: Virtual In-House Training Better Business Cases™ is based on the Five Case Model - which is the UK government's best practice approach to structuring spending proposals and making effective business decisions. Using this best practice approach will allow organizations to reduce unnecessary spending and improve the decision-making process which gives you a greater chance of securing necessary funding and support for initiatives. The goal of the foundation course is to enable participants to work effectively with a team to develop a strong business case in their work environment. What You Will Learn At the end of this program, you will be able to: Describe the philosophy and the underlying rationale of the Five Case Model Identify different types of business case, their purpose, who is responsible for them Recognize when the different types are required in the development of a spending proposal Develop the business case in relation to other recognized and recommended best practices for programme and project management Overview of the Five Case Model Five key components of a business case and the order in which they are presented Three key stages in the development of a spending proposal Definition of a programme / project and the key differences between programmes and projects Purpose of a Business Justification Case (BJC) and in what circumstances it should be considered Purpose of a Strategic Outline Case (SOC) Purpose of an Outline Business Case (OBC) Purpose of a Full Business Case (FBC) Relationship between policies, strategies, programmes, and projects and their deliverables Developing the Strategic Case Purpose and core content of a Strategic Case Purpose of SMART robust spending objectives and the key objectives for spend: economy, efficiency, effectiveness, re-procurement, and statutory or regulatory compliance Four main categories of benefits criteria and the parties involved in their development Three key categories of risk Purpose of identifying constraints and dependencies Difference between direct and indirect benefits Developing the Economic Case Purpose and core content of an Economic Case Purpose of critical success factors and the key critical success factors based upon the Five Case Model Purpose of the long list options and how to generate options and undertake SWOT analysis Minimum of four short-list options, how they are derived, and what they should include (Reference Project / Public Sector Comparator [PSC]) Difference between the preferred way forward and the preferred option Purpose, objectives, key participants, and outputs of Workshop Stage 2 - identifying and assessing the options Rules that should be followed for the treatment of costs and benefits Key differences between economic appraisals and financial appraisals Factors considered when selecting the preferred option Developing the Commercial Case Purpose and core content of a Commercial Case Guiding principles when apportioning risk between the contractual parties Purpose of payment mechanisms Purpose of Step 9 in the development framework: Contracting for the deal Developing the Financial Case Purpose and core content of a Financial Case The financial statements required for all projects The possible impacts to consider Developing the Management Case Purpose and core content of a Management Case Purpose of a programme / project management strategy, framework, and plan Purpose of a change management strategy, framework, and plan Purpose of a benefits realization strategy, framework, and register / plan Purpose of a risk management strategy, framework and register / plan Purpose of a post programme / project evaluation strategy, framework, and plan

Better Business Cases Foundation: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,850

C)HISSP-Certified Health Information Systems Security Practitioner Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for IS Security Officers Privacy Officers Health IS Managers Risk Managers Information Security Managers Compliance and Privacy Officers Overview Upon completion, the student will be ready to take the Certified Healthcare Information Systems Security Practitioner exam by mile2. In addition, at the end of the CHISSP course, the student will be versed with best practices in the healthcare industry and will be able to establish a framework with current best practices in respects to privacy, regulation and risk management. The Certified Healthcare IS Security Practitioner, C)HISSP certification course covers the skills and knowledge to implement the best IT healthcare practices, as well as, regulatory compliance and standards in the healthcare industry. Because of growing industry regulations and privacy requirements in the healthcare industry, the C)HISSP was developed by Mile2. Graduates of this course have become vital in managing and protecting healthcare data and are tasked to protect patient information by implementing, managing, and assessing proper IT controls for patient health information integrity. Course Outline Intro to the Healthcare Industry Regulatory Environment Healthcare Privacy and Security Policies Information Governance Risk Management Third-Party Risk Management

C)HISSP-Certified Health Information Systems Security Practitioner Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

About this Virtual Instructor Led Training (VILT) The 5 half-day Piping Stress Engineering Virtual Instructor Led Training (VILT) course will systematically expose participants to: The theory and practice of piping stress engineering, with special reference to ASME B 31.1 and ASME B 31.3 Standards. The basic principles and theories of stress and strain and piping stress engineering, through a series of lessons, case study presentations, in-class examples, multiple-choice questions (MCQs) and mandatory exercises. Principal stresses and shear stresses which form the backbone of stress analysis of a material. Expressions for these quantities will be derived using vector algebra from fundamentals. Thermal stress-range, sustained and occasional stresses, code stress equations, allowable stresses, how to increase flexibility of a piping system, cold spring. The historical development of computational techniques from hand calculations in the 1950s to the present-day software. Training Objectives On completion of this VILT course, participants will be able to: Identify potential loads the piping systems and categorise the loads to primary and secondary. Determine stresses that develop in a pipe due to various types of loads and how to derive stress-load relationships, starting from scratch. Treat the primary and secondary stresses in piping system in line with the intent of ASME Standards B 31.1 and B 31.3 and understand how the two codes deal with flexibility of piping systems, concepts of self-springing and relaxation/shake down, displacement stress range and fatigue, what is meant by code compliance. Understand the principles of flexibility analysis, piping elements and their individual effects, flexibility factor, flexibility characteristic, bending of a curved beam and importance of virtual length of an elbow in the flexibility of a piping system. Learn stress intensification factors of bends, branch connections and flanges. Understand how the stresses in the material should be controlled for the safety of the piping system, the user and the environment. Examine how codes give guidance to determine allowable stresses, stress range reduction due to cyclic loading, and effects sustained loads have on fatigue life of piping. Confidently handle terminal forces and moments on equipment. Understand the supplementary engineering standards required to establish acceptance of the equipment terminal loads and what can be done when there are no engineering standard governing equipment terminal loads is available and learn the techniques of local stress analysis. Get a thorough understanding of the concepts and the rules established by the ASME B 31.1 and ASME B 31.3 Standards. Perform flange load analysis calculations based on Kellogg's Equivalent Pressure method & Nuclear Code method. Perform the same using a piping stress analysis software and check for flange stresses and leakage. Confidently undertake formal training of piping stress analysis using any commercial software, with a clear understanding of what happens within the software rather than a 'blind' software training and start the journey of becoming a specialist piping stress engineer.   Target Audience The VILT course is intended for: Recent mechanical engineering graduates who desire to get into the specialist discipline of Piping Stress Engineering. Junior mechanical, chemical, structural and project engineers in the industry who wish to understand the basics of Piping Stress Engineering. Engineers with some process plant experience who desire to progress into the much sought-after specialist disciplines of Piping Stress Engineering. Mechanical, process and structural engineers with some process plant experience who desire to upskill themselves with the knowledge in piping stress engineering and to become a Piping Stress Engineer. Any piping engineer with some pipe stressing experience in the industry who wish to understand the theory and practice of Piping Stress Engineering at a greater depth. A comprehensive set of course notes, practice exercises and multiple-choice questions (MCQs) are included. Participants will be given time to raise questions and participants will be assessed and graded based on responses to MCQs and mandatory exercises. A certificate will be issued to each participant and it will carry one of the three performance levels: Commendable, Merit or Satisfactory, depending on how the participant has performed in MCQs and mandatory exercises. Training Methods The VILT course will be delivered online in 5 half-day sessions comprising 4 hours per day, with 2 breaks of 10 minutes per day. Course Duration: 5 half-day sessions, 4 hours per session (20 hours in total). Trainer Your expert course leader is a fully qualified Chartered Professional Engineer with over 40 years of professional experience in Oil & Gas (onshore and offshore), Petrochemical and Mining industries in engineering, engineering/design management and quality technical management related to plant design and construction. At present, he is assisting a few Perth based oil & gas and mining companies in detail engineering, piping stress analysis, feasibility study and business development work related to plant design. He is a pioneer in piping stress engineering in Western Australia. His recent major accomplishments include the following roles and challenges: Quality Technical Support Manager of USD 54 billion (Gorgon LNG Project). This encompassed management of quality technical services connected with Welding, Welding Related Metallurgy, Non-Destructive Examination, Insulation /Refractory /Coating, AS2885 Pipelines Regulatory Compliance and Pressure Vessel Registration. Regional Piping Practice Lead and Lead Piping Engineer of Hatch Associates. In this role, he was responsible for providing discipline leadership to several mining projects for BHP Billiton (Ravensthorpe), ALCOA-Australia (Alumina), Maáden Saudi Arabia (Alumina), QSLIC China (Magnesium), COOEC China (O&G Gorgon). He was actively involved in the development of piping engineering practice in WA, including training and professional development of graduate, junior and senior engineers. This also includes the formation of the Piping Engineering Specialist Group. Lead Piping/Pipe Stress Engineer on ConocoPhillips' (COP) Bayu Undan Gas Recycle, Condensate production and processing platform. He was able to develop several novel design methodologies for the project and provided training to engineers on how to implement them. These methodologies were commended by COP and the underwriters of the project Lloyds Register of Shipping, UK. Creator of Piping Engineering Professional Course aimed at global engineering community. Professional Affiliations: Fellow, Institution of Mechanical Engineers, UK (IMechE) Fellow, Institution of Engineers, Australia (EA), National Register of Engineers (NER) Member American Society of Mechanical Engineers, USA (ASME) Honorary Life Member, Institution of Engineers, Sri Lanka (IESL)   POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Piping Stress Engineering
Delivered in Internationally or OnlineFlexible Dates
£1,430 to £2,699

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered OnlineFlexible Dates
£2,380

Coal Power Plant Life Cycle Management and Flexible Operations in Energy Transition - Decommissioning, Preservation, Repurposing and Recommissioning

By EnergyEdge - Training for a Sustainable Energy Future

Enhance your knowledge in coal power plant life cycle management and flexible operations with EnergyEdge. Learn about decommissioning, preservation, repurposing, and recommissioning.

Coal Power Plant Life Cycle Management and Flexible Operations in Energy Transition - Decommissioning, Preservation, Repurposing and Recommissioning
Delivered in Internationally or OnlineFlexible Dates
£2,599 to £2,699