***24 Hour Limited Time Flash Sale*** QLS Endorsed AML, Financial Investigator and Internal Audit Admission Gifts FREE PDF & Hard Copy Certificate| PDF Transcripts| FREE Student ID| Assessment| Lifetime Access| Enrolment Letter Dive into the world of financial knowledge with our all-encompassing bundle, "QLS Endorsed AML, Financial Investigator and Internal Audit." This remarkable bundle incorporates not one, not two, but three QLS-endorsed courses designed to provide you with comprehensive theoretical knowledge in Anti-Money Laundering, Financial Investigation, and Internal Audit Skills. But we don't stop there! Included in your purchase are five additional CPD QS accredited courses, each offering valuable insight into areas such as Financial Analysis, Fraud Detection, Financial Reporting, Bookkeeping & Accounting, and Payroll Management. The uniqueness of this bundle lies in its quality and breadth of learning. Each course is tailored to enhance your understanding of critical financial concepts and their application in real-world scenarios. Remember, you'll receive a hardcopy certificate upon completion of the QLS-endorsed courses - a valuable testament to your acquired knowledge. Embark on this journey towards becoming an influential figure in the financial sector, all from the comfort of your home. Our "QLS Endorsed AML, Financial Investigator and Internal Audit" bundle is your passport to financial proficiency! Key Features of the QLS Endorsed AML, Financial Investigator and Internal Audit Bundle: 3 QLS-Endorsed Courses: We proudly offer 3 QLS-endorsed courses within our QLS Endorsed AML, Financial Investigator and Internal Audit bundle, providing you with industry-recognized qualifications. Plus, you'll receive a free hardcopy certificate for each of these courses. QLS Course 01: Anti-Money Laundering (AML) Training QLS Course 02: Finance: Financial Investigator QLS Course 03: Internal Audit Skills Diploma Level 5 5 CPD QS Accredited Courses: Additionally, our bundle includes 5 relevant CPD QS accredited courses, ensuring that you stay up-to-date with the latest industry standards and practices. Course 01: Financial Analysis Course 02: Financial Statements Fraud Detection Training Course 03: Financial Reporting Course 04: Bookkeeping & Accounting Course 05: Payroll Management Course In Addition, you'll get Five Career Boosting Courses absolutely FREE with this Bundle. Course 01: Professional CV Writing Course 02: Job Search Skills Course 03: Self-Esteem & Confidence Building Course 04: Professional Diploma in Stress Management Course 05: Complete Communication Skills Master Class Convenient Online Learning: Our QLS Endorsed AML, Financial Investigator and Internal Audit courses are accessible online, allowing you to learn at your own pace and from the comfort of your own home. Learning Outcomes: Develop a comprehensive understanding of Anti-Money Laundering processes. Acquire deep insights into the intricacies of financial investigation. Master the skills of internal auditing at a diploma level. Analyze financial scenarios with proficiency and precision. Understand the key aspects of financial fraud detection. Develop an understanding of bookkeeping, accounting, and payroll management. Gain a robust foundation in financial reporting. Venture into the theoretical realm of finance with our "QLS Endorsed AML, Financial Investigator and Internal Audit" bundle. With eight rigorously curated courses, this bundle is designed to develop your understanding of financial investigations, anti-money laundering, internal audit skills, and other significant financial areas. The courses are intended to illuminate complex financial concepts, ensuring a broad knowledge base for learners. Upon completion, you'll be armed with a multitude of financial insights, ready to navigate the sophisticated world of finance. From deciphering financial analysis to managing payroll, this bundle aims to establish you as a well-rounded finance professional. CPD 250 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Individuals aspiring to gain theoretical knowledge in finance. Professionals seeking to enhance their understanding of financial investigation and anti-money laundering. Those interested in understanding the nuances of internal auditing. Anyone aiming to develop a comprehensive understanding of bookkeeping, accounting, and payroll management. Career path AML Analyst: £30,000 - £45,000. Financial Investigator: £35,000 - £55,000. Internal Auditor: £30,000 - £50,000. Financial Analyst: £30,000 - £55,000. Fraud Detection Analyst: £35,000 - £60,000. Payroll Manager: £30,000 - £50,000. Certificates Digital certificate Digital certificate - Included Hard copy certificate Hard copy certificate - Included
ð Elevate Your Workplace Safety with 'Safety Audits Training' Course! ð Are you ready to take your organization's safety standards to the next level? Introducing our comprehensive 'Safety Audits Training' course designed to empower your team with the knowledge and skills needed to conduct effective safety audits and foster a culture of continuous improvement. ð Module 1: Introduction to Safety Audits Planning and Preparation Lay a strong foundation by understanding the principles of safety audits. Learn to plan and prepare for safety audits with precision. Acquire insights into industry best practices for pre-audit assessments. ð Module 2: Data Collection Assessment and Implementation of Corrective Actions Dive into the crucial aspects of data collection during safety audits. Master the art of assessing collected data and implementing corrective actions. Ensure a proactive approach to addressing potential safety hazards. ð£ Module 3: Auditing the Effectiveness of Communicating and Driving Organizational Improvements Explore the significance of effective communication in safety audits. Understand how to assess and drive improvements in organizational safety culture. Develop strategies for fostering a safety-conscious work environment. ð Module 4: Continuous Improvement Technology in Safety Audits Embrace cutting-edge technology for continuous improvement in safety audits. Discover tools and techniques that enhance the efficiency of safety audits. Stay ahead of the curve by integrating technology into your safety protocols. ð¥ Module 5: Monitoring Leadership and Commitment in Safety Excellence Evaluate the role of leadership in promoting a culture of safety. Learn how to monitor and assess the commitment of organizational leaders. Cultivate a strong commitment to safety excellence from top to bottom. ð Module 6: Conducting Effective Safety Audits and Conclusion Put everything into practice with hands-on guidance on conducting safety audits. Learn the art of providing constructive feedback and recommendations. Conclude the course with a comprehensive understanding of safety audit methodologies. ð Key Benefits: Empower your team with the skills to ensure a safe working environment. Enhance organizational safety culture and employee well-being. Improve compliance with safety regulations and industry standards. Drive continuous improvement through effective safety audits. Stay at the forefront of safety technology and best practices. ð Who Should Attend: Safety Officers and Managers HR Professionals Operations and Facilities Managers Anyone responsible for workplace safety Invest in the future of your organization by enrolling your team in the 'Safety Audits Training' course today. Elevate safety, foster a culture of continuous improvement, and ensure a workplace that prioritizes the well-being of every employee. Act now to secure a safer tomorrow! ð⨠Course Curriculum Module 1- Introduction to Safety Audits Planning and Preparation Introduction to Safety Audits Planning and Preparation 00:00 Module 2- Data Collection Assessment and Implementation of Corrective Actions Data Collection Assessment and Implementation of Corrective Actions 00:00 Module 3- Auditing the Effectiveness of Communicating and Driving Organizational Improvements Auditing the Effectiveness of Communicating and Driving Organizational Improvements 00:00 Module 4- Continuous Improvement Technology in Safety Audits Continuous Improvement Technology in Safety Audits 00:00 Module 5- Monitoring Leadership and Commitment in Safety Excellence Monitoring Leadership and Commitment in Safety Excellence 00:00 Module 6- Conducting Effective Safety Audits and Conclusion Conducting Effective Safety Audits and Conclusion 00:00
Description: The 70-744 - Securing Windows Server 2016 (MCSE) course explains how to secure Windows Server 2016 environments. It covers methods and technologies for hardening server environments and securing virtual machine infrastructures using Shielded and encryption-supported virtual machines and Guarded Fabric. After completing the course, you will be able to manage the of Active Directory and Identity infrastructures. You will able to handle privileged identities using Just in Time (JIT), and Just Enough Administration (JEA) approaches, as well as implement Privileged Access Workstations (PAWs) and secure servers using the Local Administrator Password Solution (LAPS). The course will also help you to use threat detection solutions such as auditing access, implementing Advanced Threat Analytics (ATA), deploying Operations Management Suite (OMS) solutions, and identifying solutions for specific workloads. Finally, the purpose of the course is to prepare you for the exam Securing Windows Server 2016 ( MCSE). Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? 70-744 - Securing Windows Server 2016 (MCSE) is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our 70-744 - Securing Windows Server 2016 (MCSE) is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Introduction to Attacks, Breaches, and Detection Understanding Types of Attacks FREE 00:33:00 Detecting Security Breaches 00:06:00 Using Sysinternals Tools 00:30:00 Protecting Users and Workstations User Rights and Privileges 01:28:00 Working with Computer and Service Accounts 00:19:00 Protecting User Credentials 00:20:00 Using Privileged Access Workstations 00:12:00 Managing Administrative Access Understanding and Deploying JEA 00:32:00 Using Enhanced Security Administrative Environments (ESAE) Forests 00:12:00 Using Microsoft Identity Manager 00:08:00 Using JIT Administration and PAM 00:16:00 Configuring Anti-Malware and Patch Management Configuring and Managing Windows Defender 00:18:00 Restricting Software 00:28:00 Using Device Guard 00:12:00 Patch Management with WSUS 00:29:00 Auditing and Advanced Threat Analytics Configuring Auditing for Windows Server 2016 00:21:00 Advanced Auditing and Management 00:42:00 Deploying and Configuring ATA 00:15:00 Deploying and Configuring Operations Management Suite 00:07:00 Securing the Infrastructure Secure the Virtualization Infrastructure 00:15:00 Deploying Security Baselines 00:20:00 Deploying Nano Server 00:08:00 Configuring Data Protection Planning and Implementing File Encryption 00:29:00 Planning and Implementing BitLocker 00:32:00 Advanced File Server Management Using File Server Resource Manager 00:58:00 Implementing Classification and File Management Tasks 00:16:00 Working with Dynamic Access Control 00:39:00 Securing the Network Infrastructure Using the Windows Firewall with Advanced Security 00:33:00 Datacenter Firewall 00:08:00 Utilizing IP Security 00:29:00 Configuring Advanced DNS Settings 00:42:00 Monitoring Network Traffic 00:09:00 Securing SMB Traffic 00:07:00 Mock Exam Mock Exam- 70-744 - Securing Windows Server 2016 (MCSE) 00:20:00 Final Exam Final Exam- 70-744 - Securing Windows Server 2016 (MCSE) 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Step into the dynamic and ever-evolving world of ICT with our ICT: Information and Communication Technology course. This isn't just a course; it's a gateway to understanding the vast and intricate universe of information management. The journey begins with an Introduction to Information Management, where you'll be greeted not just with concepts and theories, but with the real-life applications and significance of efficiently managing information. This module sets the tone for a deeper understanding of the critical role information plays in today's digital world. As you progress, delve into the strategic aspects of information management with Module 02, where crafting a robust Information Management Strategy is more than learning-it's about envisioning and shaping the future of information flow in organizations. The course takes you through the technicalities and intricacies of Databases and Information Management, followed by an exploration of Management Information Systems (MIS), where you learn to merge technology with business acumen. Your learning journey also encompasses Auditing Information Systems, ensuring not just the efficiency but also the security and integrity of information. The course culminates with an important discussion on Ethical and Social Issues and Data Protection, equipping you with the knowledge to navigate the complex moral landscape of the digital age. By the end of this course, you'll be more than just knowledgeable; you'll be a responsible and forward-thinking custodian of information in the digital era. Learning Outcomes Gain a foundational understanding of information management in the ICT sector. Develop strategies for effective information management within organizations. Learn about the design and implementation of databases and information systems. Understand the principles of auditing information systems for efficiency and security. Acquire knowledge about the ethical, social, and legal aspects of information technology. Why choose this ICT: Information and Communication Technology course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this ICT: Information and Communication Technology course for? Aspiring ICT professionals seeking foundational knowledge in information management. Business managers and administrators aiming to implement effective ICT strategies. Data management officers and system auditors. Students and academics interested in the field of information technology. Professionals in any field looking to enhance their ICT skills for workplace efficiency. Career path Information Technology Manager: £30,000 - £55,000 Database Administrator: £25,000 - £50,000 Systems Analyst: £28,000 - £45,000 Data Protection Officer: £30,000 - £55,000 ICT Consultant: £35,000 - £60,000 Information Systems Auditor: £32,000 - £50,000 Prerequisites This ICT: Information and Communication Technology does not require you to have any prior qualifications or experience. You can just enrol and start learning.This ICT: Information and Communication Technology was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Module 01: Introduction to Information Management Introduction to Information Management 00:32:00 Module 02: Information Management Strategy Information Management Strategy 00:17:00 Module 03: Databases and Information Management Databases and Information Management 00:29:00 Module 04: Management Information Systems (MIS) Management Information Systems 00:16:00 Module 05: Auditing Information Systems Auditing Information Systems 00:16:00 Module 06: Ethical and Social Issues and Data Protection Ethical and Social Issues and Data Protection 00:27:00 Assignment Assignment - ICT: Information and Communication Technology 00:00:00
Description: A certificate in Information technology from an internationally recognized institution will increase your career opportunity very much. The Certified Information Systems Professional - Complete Video Training course provides you extensive lessons about the Information System field. Divided into four parts, the course teaches you how to be a certified auditor, security manager, security officer and security professional. Certified Information Systems Auditor (CISA) section illustrates you the process of auditing information systems while the Certified Information Security Manager (CISM) part deals with the information security issues. Here, you will learn the system of information security program development, incident management, and risk management. Next, Certified Information Systems Security Officer (CISSO) course teaches how to be an excellent information system security officer by utilising the information system in the security field. Finally, the Certified Information Systems Security Professional (CISSP) section shows you the path for becoming a security professional by focusing the security issues such as asset security, communication and network security, security operations, etc. In short, the bundle video course will help you to achieve certification in above four fields and helps you to know the practical knowledge about Information System. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Information Systems Professional - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Information Systems Professional - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. The Process of Auditing Information Systems Management of the Audit Function FREE 00:20:00 ISACA IT Audit and Assurance Standards and Guidelines 01:16:00 Risk Analysis 00:21:00 Internal Controls 00:17:00 Performing An IS Audit 01:07:00 Control Self-Assessment 00:09:00 The Evolving IS Audit Process 00:12:00 Governance and Management of IT Corporate Governance 00:06:00 IT Governance 00:02:00 IT Monitoring and Assurance Practices for Board and Senior Management 00:40:00 Information Systems Strategy 00:05:00 Maturity and Process Improvement Models 00:01:00 IT Investment and Allocation Practices 00:05:00 Policies and Procedures 00:17:00 Risk Management 00:31:00 IS Management Practices 00:50:00 IS Organizational Structure and Responsibilities 00:17:00 Auditing IT Governance Structure and Implementation 00:06:00 Business Continuity Planning 00:37:00 Information Systems Acquisition, Development and Implementation Business Realization 01:21:00 Project Management Structure 00:08:00 Project Management Practices 00:18:00 Business Application Development 00:42:00 Business Application Systems 00:38:00 Alternative Forms of Software Project Organization 00:03:00 Alternative Development Methods 00:10:00 Infrastructure Development/Acquisition Practices 00:09:00 Information Systems Maintenance Practices 00:09:00 System Development Tools And Productivity Aids 00:05:00 Business Process Reengineering And Process Change Projects 00:08:00 Application Controls 00:07:00 Auditing Application Controls 00:14:00 Auditing Systems Development, Acquisition And Maintenance 00:08:00 Information Systems Operations, Maintenance and Support Information Systems Operations 00:19:00 Information Systems Hardware 00:13:00 IS Architecture and Software 00:39:00 Network Infrastructure 01:16:00 Disaster Recovery Planning 00:19:00 Protection of Information Assets Importance Of Information Security 00:43:00 Logical Access 00:37:00 Network Infrastructure Security 00:39:00 Auditing Information Security Management Framework 00:03:00 Auditing Network Infrastructure Security 00:13:00 Environmental Exposures and Controls 00:02:00 Physical Access Exposures and Controls 00:05:00 Mobile Computing 00:05:00 Information Security Governance Information Security Governance Overview FREE 00:25:00 Effective Information Security Governance 00:24:00 Information Security Concepts and Technologies 00:20:00 Information Security Manager 00:09:00 Scope and Charter of Information Security Governance 00:10:00 Information Security Governance Metrics 00:23:00 Information Security Strategy Overview 00:02:00 Creating Information Security Strategy 00:36:00 Determining Current State Of Security 00:06:00 Information Security Strategy Development 00:10:00 Strategy Resources 00:40:00 Strategy Constraints 00:07:00 Action Plan to Implement Strategy 00:20:00 Information Risk Management Risk Management Overview 00:16:00 Good Information Security Risk Management 00:15:00 Information Security Risk Management Concepts 00:13:00 Implementing Risk Management 00:17:00 Risk Assessment 00:39:00 Controls Countermeasures 00:23:00 Recovery Time Objectives 00:18:00 Risk Monitoring and Communication 00:04:00 Information Security Program Development Development of Information Security Program 00:11:00 Information Security Program Objectives 00:09:00 Information Security Program Development Concepts 00:14:00 Scope and Charter of Information Security Program Development 00:22:00 Information Security Management Framework 00:16:00 Information Security Framework Components 00:12:00 Information Security Program Resources 01:04:00 Implementing an Information Security Program 00:27:00 Information Infrastructure and Architecture 00:14:00 Information Security Program 00:14:00 Security Program Services and Operational Activities 00:45:00 Information Security Incident Management Incident Management Overview 00:28:00 Incident Response Procedures 00:29:00 Incident Management Organization 00:19:00 Incident Management Resources 00:36:00 Incident Management Objectives 00:14:00 Incident Management Metrics and Indicators 00:17:00 Current State of Incident Response Capability 00:11:00 Developing an Incident Response Plan 00:32:00 BCP DRP 00:36:00 Testing Response and Recovery Plans 00:10:00 Executing the Plan 00:27:00 Information Systems Security Officer Risk Management FREE 00:58:00 Security Management 00:58:00 Authentication 01:01:00 Access Control 01:20:00 Security Models 01:01:00 Operations Security 01:10:00 Symmetric Cryptography and Hashing 01:19:00 Asymmetric Cryptography and PKI 01:31:00 Network Connections 01:28:00 Network Protocols and Devices 01:31:00 Telephony, VPNs and Wireless 01:13:00 Security Architecture 01:02:00 Software Development Security 01:05:00 Database Security and System Development 01:00:00 Malware and Software Attacks 00:17:00 Business Continuity 00:44:00 Disaster Recovery 00:53:00 Incident Management, Law, and Ethics 01:06:00 Physical 00:38:00 Information Systems Security Professional Security and Risk Management FREE 00:24:00 Asset Security 00:12:00 Security Engineering 00:15:00 Communication and Network Security 00:10:00 Identity and Access Management 00:10:00 Security Assessment and Testing 00:12:00 Security Operations 00:36:00 Software Development Security 00:13:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Gain an in-depth understanding of GDPR solutions and how they map to compliance requirements. Learn how to perform and lead Privacy Information Management System (PIMS) certification audits to ISO 19011 standards. Enhance your existing or learn with new skills in the field of Data Protection; Candidates deliver Assurance services to organisations by advising on conformance with PIMS requirements; Become a Technical expert on the preparation required for ISO 27701 Certification About This Course Learning outcomes Understand a Privacy Information Management System (PIMS) and its processes based on ISO/IEC 27701 Identify the relationship between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks Acquire the competences of the auditor's role in planning, leading, and following up on a management system audit in accordance with ISO 19011. Learn how to interpret the requirements of ISO/IEC 27701 in the context of a PIMS audit Course Overview Domain 1-The Process of Auditing Information Privacy Systems & Solutions Domain 2-Governance & Management of Information Privacy Technology Domain 3-Information Systems Acquisition, Development & Implementation Domain 4-Information Systems Operations, Maintenance & Service Management Domain 5-Protection of Personally Identifiable Information (PII) Assets Course Agenda Day 1: Introduction to Privacy Information Management System (PIMS) and ISO/IEC 27701 Day 2: Audit principles, preparation, and launching of an audit Day 3: On-site audit activities and Closing the Audit Accreditation This course is Accredited by NAS and Administered by the IECB Assessment All candidates at official training courses will be tested throughout the course delivery, with quizzes and exercises. The final exam is a 10 question essay type exam, offered on the afternoon of the final day. This exam should be completed within 180 minutes. A passing score is achieved at 70%. Self-study candidates can purchase an exam voucher from our Store. Prerequisites None, but candidates would benefit from having a fundamental understanding of Audit principles What's Included? Comprehensive course materials totalling some 450 pages Case Study Exam fees Exam pass guarantee Who Should Attend? Auditors seeking to perform and lead Privacy Information Management System (PIMS) certification audits Managers or consultants seeking to master a PIMS audit process Individuals responsible for maintaining conformance with PIMS requirements Technical experts seeking to prepare for a PIMS audit Expert advisors in the protection of Personally Identifiable Information (PII)
Level 3 & 5 Endorsed Diploma | QLS Hard Copy Certificate Included | Plus 5 CPD Courses | Lifetime Access
The GDPR came into effect in May 2018. This legislation is designed to guide organisations in their obligations relative to the processing of personal and sensitive data. About This Course Organisations are required to comply with the GDPR regardless of their size of business. If you process 'personal data', there is a potential need to be compliant with the legislation. The scope of the GDPR considers how this information is collected, stored, used, transported, shared and disposed of. To ensure organisations' understand this obligation, this interactive one-day course considers both scoping and auditing of an organisations processing activities, as well as an understanding of compliance with GDPR. Learning Outcomes; GDPR - what is it and how does it apply to us? Personal and sensitive data Lawful basis for processing Consent and the GDPR The Data Protection Act 2018 Data Subject rights The role of the ICO Data breach or Incident? Privacy by Design and by default GDPR Audit checklist Prerequisites There are no prerequisites to attend this course, however all attendees are expected to have a basic understanding of the Data Protection principles. What's Included? Refreshments & Lunch (Classroom courses only) Course Slide Deck Quizzes Who Should Attend? The course is designed for any member of the organisation whose role includes processing personal data. Data Protection Officers, Information Security team members or Information Governance Leads who may also see benefit in attending. Accreditation Assessment There is no exam with this course but delegates do receive a Course Attendance Certificate and an 8 hour CPD Certificate. Provided by This course is Accredited by NACS and administered by the IECB
In an ever-evolving legal landscape, being a firm outside of the mandatory AML scope doesn't mean being out of the compliance conversation. This course is your guide to proactively managing risks, staying compliant, and ensuring your firm's resilience. Don't miss this opportunity to navigate the unique challenges faced by out-of-scope AML law firms. The course will cover: AML regulations Why are some firms (or departments) in or out of scope? MLROs AML basics CDD (ID elements) Responsibility of doing CDD Source of Funds / Source of Wealth Ongoing monitoring Reporting to the MLRO Target Audience The online course is suitable for staff of all levels, from support staff to senior partners of firms outside of the regulated sector. Resources Comprehensive and up to date course notes will be provided to all delegates which may be useful for ongoing reference or cascade training. Please note a recording of the course will not be made available. Speaker Helen Torresi, Consultant, DG Legal Helen is a qualified solicitor with a diverse professional background spanning leadership roles in both the legal and tech/corporate sectors. Throughout her career, she has held key positions such as COLP, HOLP, MLCO, MLRO and DPO for law firms and various regulated businesses and services. Helen’s specialised areas encompass AML, complaint and firm negligence handling, DPA compliance, file review and auditing, law management, and operational effectiveness in law firms, particularly in conveyancing (CQS).
10 QLS Endorsed Courses for Inventory Manager | 10 QLS Endorsed Certificates Included | Life Time Access | Tutor Support