PRINCE2® (an acronym for PRojects INaControlled Environment series 2) is a de facto process-based method for effective project management. Used extensively by the UK Government, PRINCE2® is also widely recognised and used in the private sector, both in the UK and internationally. The PRINCE2® method is in the public domain, and offers non-proprietorial best practice guidance on project management.
Competition in the communications sector is complex and fast-changing. This presents both risks and opportunities to providers, as well as challenges for public authorities. Would you like to gain expert insights on the practical applications of competition law in the regulated telecoms industry? Then, this training is for you! Presented by experts through practical case examples, this online training will guide you through the latest competition law developments affecting the telecoms industry and give you a full overview of the role played by competiton law in shaping the telecoms market. Topics covered include: Relationship between competition law and sector-specific telecoms regulation Market definition Telecoms mergers Antitrust aspects of network co-operation Typical abuses of dominance in the telecoms sector Broadband state aid When: 17-19 September 2024 - 9 hours of interactive sessions spread over 3 days Where: Online, using Microsoft Teams Cannot make it to one of the sessions? All sessions will be recorded and made available to registered participants.
The IECB ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO 27001 During this training course, you will also gain a thorough understanding of the best practices of Information Security Management Systems to secure the organization`s sensitive information and improve the overall performance and effectiveness. About This Course After mastering all the necessary concepts of Information Security Management Systems, you can sit for the exam and gain the 'IECB Certified ISO/IEC 27001 Lead Implementer' credential. By holding an IECB Lead Implementer Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to implement ISO/IEC 27001 in an organization. This official IECB course is delivered in either our Live Online or Classroom format, as follows; Day 1: Introduction to ISO/IEC 27001 and initiation of an ISMS Day 2: Plan the implementation of an ISMS Day 3: Implementation of an ISMS Day 4: ISMS monitoring, measurement, continuous improvement and preparation for a certification audit, as well as the examination. Learning Objectives Acknowledge the correlation between ISO/IEC 27001, ISO 27002 and other standards and regulatory frameworks Master the concepts, approaches, methods and techniques used for the implementation and effective management of an ISMS Learn how to interpret the ISO/IEC 27001 requirements in the specific context of an organization Learn how to support an organization to effectively plan, implement, manage, monitor and maintain an ISMS Acquire the expertise to advise an organization in implementing Information Security Management System best practices The exam covers the following competency domains: Domain 1: Fundamental principles and concepts of an Information Security Management System (ISMS) Domain 2: Information Security Management System controls and best practices based on ISO/IEC 27002 Domain 3: Planning an ISMS implementation based on ISO/IEC 27001 Domain 4: Implementing an ISMS based on ISO/IEC 27001 Domain 5: Performance evaluation, monitoring and measurement of an ISMS based on ISO/IEC 27001 Domain 6: Continual improvement of an ISMS based on ISO/IEC 27001 Domain 7: Preparing for an ISMS certification audit Prerequisites A foundational understanding of ISO/IEC 27001 and knowledge of implementation principles. What's Included? Refreshments & Lunch (Classroom only) Course Slide Deck Official Study Materials CPD Certificate The Exam Who Should Attend? The course is suitable for any of the following roles; Security Analyst Network Administrator Data Architect Security Manager Our Guarantee We are an approved IECB Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras. The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training and exam retake offered Accreditation Assessment Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 12 question, essay type exam on Day 4 of the course. The overall passing score is 70%, to be achieved within the 240 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success. Provided by This course is Accredited by NACS and Administered by theIECB.
This training course aims to equip you with in-depth knowledge on ISO 9001 requirements, as well as the best practices and approaches used for the implementation and subsequent maintenance of a QMS. By attending this training course, you can help organizations utilize a structured and evidence-based approach for managing the quality of their products and services. Apart from this, you will also learn about the importance of customer focus and benefits of setting the foundations of an organizational culture which enables and supports quality. The training course is followed by a certification exam. If you pass, you can gain the "Certified ISO 9001 Lead Implementer' credential. This certificate validates your competence to implement a QMS based on the requirements of ISO 9001. About This Course Learning objectives By the end of this training course, the participant will be able to: Explain the fundamental concepts and principles of a quality management system (QMS) based on ISO 9001 Interpret the requirements of ISO 9001 for a QMS from the perspective of an implementer Initiate and plan the implementation of a QMS based on ISO 9001, by utilizing best practice Support an organization in operating, maintaining, and continually improving a QMS based on ISO 9001 Prepare an organization to undergo a third-party certification audit Educational approach This training course is learner-centred and contains: Theories, approaches, and best practices used in management system implementation, operation, maintenance, and continual improvement Theoretical basis supported by practical examples, throughout the four days of the training course Interaction between the trainers and participants by means of questions and discussions Essay-type homework exercises at the end of each day Quizzes with stand-alone items (after each section) and scenario-based quizzes (at the end of each day), intended to prepare the participants for the certification exam Accreditation Assessment The exam covers the following competency domains: Domain 1: Fundamental principles and concepts of a quality management system Domain 2: Initiation of a QMS implementation Domain 3: Planning of a QMS implementation based on ISO 9001 Domain 4: Implementation of a QMS based on ISO 9001 Domain 5: Monitoring and measurement of a QMS based on ISO 9001 Domain 6: Continual improvement of a QMS based on ISO 9001 Domain 7: Preparation for a QMS certification audit The exam itself is a 12 question, essay type format, to be completed within a 150 minute window. The exam pass mark is 70%. Exam results are provided within 24 hours. Our Guarantee We are an official IECB Training Provider If you fail an exam, you can try again for free If you feel you need additional training, you can train for free too Prerequisites The main requirements for participating in this training course are a basic knowledge of ISO management system standards, overall knowledge of ISO 9001, and the MS implementation principles. An understanding of ISO's quality management principles may also facilitate the learning process. What's Included? Official Study Guides 4 day's Instructor led training Exam fees Who Should Attend? The ISO 9001 Lead Implementer training course is intended for: Personnel responsible for maintaining and improving the quality of the products and services of the organization Personnel responsible for meeting customer requirements Consultants, advisors, professionals wishing to obtain in-depth knowledge of ISO 9001 requirements for a QMS Professionals wishing to acquaint themselves with best practice methodology for implementing a QMS Individuals responsible for maintaining the conformity of QMS to ISO 9001 requirements Members of QMS implementation and operation teams Individuals aspiring to pursue a career in quality management Provided by This course is Accredited by NACSand Administered by the IECB.
This training course is designed to help participants acquire the knowledge and skills needed to support an organization in effectively planning, implementing, managing, monitoring, and maintaining a cloud security program based on ISO/IEC 27017 and ISO/IEC 27018. It provides a comprehensive elaboration of cloud computing concepts and principles, cloud computing security risk management, cloud-specific controls, cloud security incident management, and cloud security testing. About This Course Learning objectives Gain a comprehensive understanding of the concepts, approaches, methods, and techniques used for the implementation and effective management of a cloud security program Acknowledge the correlation between ISO/IEC 27017, ISO/IEC 27018, and other standards and regulatory frameworks Gain the ability to interpret the guidelines of ISO/IEC 27017 and ISO/IEC 27018 in the specific context of an organization Develop the necessary knowledge and competence to support an organization in effectively planning, implementing, managing, monitoring, and maintaining a cloud security program Acquire the practical knowledge to advise an organization in managing a cloud security program by following best practices Course Agenda Day 1: Introduction to ISO/IEC 27017 and ISO/IEC 27018 and the initiation of a cloud security program Day 2: Cloud computing security risk management and cloud-specific controls Day 3: Documented information management and cloud security awareness and training Day 4: Cloud security incident management, testing, monitoring, and continual improvement; the examination Additional Information Certification fees are included in the exam price. An attendance record worth 31 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course. In case candidates fail the exam, they can retake it within 12 months of the initial attempt for free. Accreditation Prerequisites The main requirement for participating in this training course is having a fundamental understanding of ISO/IEC 27017 and ISO/IEC 27018 and a general knowledge of cloud computing concepts. Who Should Attend? Cloud security and information security professionals seeking to manage a cloud security program Managers or consultants seeking to master cloud security best practices Individuals responsible for maintaining and managing a cloud security program Technical experts seeking to enhance their cloud security knowledge Cloud security expert advisors What's Included? Delegates will be provided with; Course Slide deck Participant Guide Exam fees Our Guarantee We are an Accredited Training Provider of IECB. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras. The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam. Assessment The Certified Lead Cloud Security Manager exam meets the requirements of the National Accreditation Service's Examination and Certification Program (ECP). It covers the following competency domains: Domain 1: Fundamental principles and concepts of cloud computing Domain 2: Information security policy for cloud computing and documented information management Domain 3: Cloud computing security risk management Domain 4: Cloud-specific controls based on ISO/IEC 27017 and ISO/IEC 27018 and best practices Domain 5: Cloud security awareness, training, roles, and responsibilities Domain 6: Cloud security incident management Domain 7: Cloud security testing, monitoring, and continual improvement All delegates attending an official training course will be offered the opportunity to sit the associated examination. To pass the examination, a passing score of 70% must be obtained by answering 12 essay type questions covering the scope of the course materials. Successful examination candidates will be issued with a Certificate confirming a passing grade along with the relevant CPD certificate. Provided by This course is Accredited by NACS and Administered by the IECB
Delivered in either Live Online (4 days) or in our Classroom (5 days), the ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO 27001. During this training course, you will acquire the knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process. About This Course Based on practical exercises, you will be able to master audit techniques and become competent to manage an audit program, audit team, communication with customers, and conflict resolution. After acquiring the necessary expertise to perform this audit, you can sit for the exam and gain the "ISO/IEC 27001 Lead Auditor' credential. By holding this Lead Auditor Certificate, you will demonstrate that you have the capabilities and competencies to` audit organizations based on best practices. The training course is based on both theory and best practices used in ISMS audits Lecture sessions are illustrated with examples based on case studies Practical exercises are based on a case study which includes role playing and discussions Practice tests are similar to the Certification Exam The course is delivered both as a Live Online or Classroom environment, as follows; Day 1: Introduction to Information Security Management Systems (ISMS) and ISO/IEC 27001 Day 2: Audit principles, preparation and launching of an audit Day 3: On-site audit activities Day 4: Closing the audit and Examination Learning Objectives Understand the operations of an Information Security Management System based on ISO/IEC 27001 Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks Understand an auditor's role to: plan, lead and follow-up on a management system audit in accordance with ISO 19011 Learn how to lead an audit and audit team Learn how to interpret the requirements of ISO/IEC 27001 in the context of an ISMS audit Acquire the competencies of an auditor to: plan an audit, lead an audit, draft reports, and follow-up on an audit in compliance with ISO 19011 The exam covers the following competency domains: Domain 1: Fundamental principles and concepts of an Information Security Management System (ISMS) Domain 2: Information Security Management System controls and best practices based on ISO/IEC 27002 Domain 3: Planning an ISMS implementation based on ISO/IEC 27001 Domain 4: Implementing an ISMS based on ISO/IEC 27001 Domain 5: Performance evaluation, monitoring and measurement of an ISMS based on ISO/IEC 27001 Domain 6: Continual improvement of an ISMS based on ISO/IEC 27001 Domain 7: Preparing for an ISMS certification audit Prerequisites A foundational understanding of ISO/IEC 27001 and knowledge of audit principles. What's Included? Refreshments & Lunch (Classroom only) Course Slide Deck Official Study Materials CPD Certificate The Exam Who Should Attend? Auditors seeking to perform and lead Information Security Management System (ISMS) certification audits Managers or consultants seeking to master an Information Security Management System audit process Individuals responsible for maintaining conformance with Information Security Management System requirements Technical experts seeking to prepare for an Information Security Management System audit Expert advisors in Information Security Management Our Guarantee We are an approved IECB Training Partner for all of our courses. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras. The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training and exam retake offered Accreditation Assessment Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 12 question, essay type exam on Day 4 of the course. The overall passing score is 70%, to be achieved within the 240 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success. Provided by This course is Accredited by NACS and Administered by the IECB
About this Training Course The drill string is the simplest piece of equipment in use on a drilling rig and at the same time, the most critical piece. We use the qualifier 'basic' because although 99% of the drill string comprises plain tubes that are just screwed together, the lowest section, just above the bit, can go to extreme loading and is fitted with highly sophisticated electronics packages providing both positional and lithological data as well as a steering system to drive and orient the bit. The principle tasks of the drill string are also deceptively simple. These are to: Convey each drill bit to the bottom of the hole and then to retrieve it when worn, Act as a conduit to convey drilling fluid at high pressure down to the bit and Transmit torque from surface to bit, occasionally in concert with a hydraulic motor to drive this bit. This 3 full-day course will cover in detail what it takes to decide on minimum drill string specifications, which are able to support the loads to which it will be subjected. In addition to the need to use a drill string with minimum strength requirements, we also need to ensure that we can prevent drill string failure. If the failure consists of a small split or leak of any kind, then the time involved may be little more than that required for a roundtrip to change the bit. If the string parts, then the recovery is likely to take a considerable amount of time. In a worst case scenario, the fish in the hole may prove impossible to retrieve, requiring a sidetrack. A less than optimal design of the string will reduce the efficiency of the operation and almost always leads to premature bit wear. This is particularly true when we are unable to measure and control the dynamics of the drill string as a whole and the bottomhole assembly in particular. Axial vibrations, torsional vibrations and lateral vibrations may take place in various degrees of severity. The behaviour of the drill string while operating under torsional vibrations is thought to be of great importance and may result in torsional buckling. This course will also cover the drilling optimization limiters, how to identify them and how to remove them. This is done by understanding the drill string dynamics - by operating under the most favourable conditions and by measuring the dynamics in the vicinity of the bit (or at the bit) in order to make timely adjustments. Training Objectives The course homes in what office staff needs to know and plan for and what field staff needs to know and implement. By the end of this course, participants will be familiar with: Critical dimensions of common drill pipe and weld-on tool joints and its relation to yield for calculation of tensile, torsional and burst resistance. Make-up torque of connections that relate to the tool joint dimensions and the torsional strength of that connection. Use of design factors and safety factors on tensile and torsional strength in relation to new and worn state. Conditions which could lead to drill pipe collapse. Situations where limitations on sinusoidal (snake) and helical buckling will apply and the influence of radial clearance and deviation. Failure of drill pipe (fatigue) and the circumstances under which these would occur (rotation across doglegs, pipe in compression etc). Mechanism under which hardbanding would induce casing wear and the methods applied to measure and prevent any significant wear. Drill pipe inspection methods we apply to identify early flaws/cracks/corrosion, to measure dimensions, to inspect tool joints etc. Common BHA components, including heavy wall drill pipe, their external/internal dimensions, connections (API, proprietary) and appearance (such as spiral). Significance of thread compounds to ensure the correct make-up torque is applied. Significance of drill string/BHA 'neutral point' in the context of drill string component failure. Basic design principles for a BHA make-up in a vertical, low/medium deviated and highly deviated well in terms of weight transfer and drag/torque. Stabilization principles for a pendulum (vertical), a stabilized (vertical or tangent), a build and a drop-off assembly. BHA design and stabilization in relation to mitigation/elimination of vibration and to the elimination of tension, torsion or fatigue failure. Matching bit aggressiveness, gauge length, BHA stabilization, steerability and Mechanical Specific Energy (MSE) to mitigate the severity of any vibration. Bit efficiency and reduction of wear by understanding mechanical and hydraulic limiters. How to perform a passive or active drill-off test. Importance of being conversant with API 7G RP and/or equivalent data books, to look up/check the recommended tensile/torque and other parameters for the drill string in use. Target Audience This course is intended for staff directly or indirectly involved in the delivery of challenging wells such as junior to senior well engineers, both in office-based planning and operations and field-based operator/contractor supervisory staff such as company men and toolpushers. Trainer Your expert course leader has over 45 years of experience in the Oil & Gas industry. During that time, he has worked exclusively in the well engineering domain. After being employed in 1974 by Shell, one of the major oil & gas producing operators, he worked as an apprentice on drilling rigs in the Netherlands. After a year, he was sent for his first international assignment to the Sultanate of Oman where he climbed up the career ladder from Assistant Driller, to Driller, to wellsite Petroleum Engineer and eventually on-site Drilling Supervisor, actively engaged in the drilling of development and exploration wells in almost every corner of this vast desert area. At that time, drilling techniques were fairly basic and safety was just a buzz word, but such a situation propels learning and the fruits of 'doing-the-basics' are still reaped today when standing in front of a class. After some seven years in the Middle East, a series of other international assignments followed in places like the United Kingdom, Indonesia, Turkey, Denmark, China, Malaysia, and Russia. Apart from on-site drilling supervisory jobs on various types of drilling rigs (such as helicopter rigs) and working environments (such as jungle and artic), he was also assigned to research, to projects and to the company's learning centre. In research, he was responsible for promoting directional drilling and surveying and advised on the first horizontal wells being drilled, in projects, he was responsible for a high pressure drilling campaign in Nigeria while in the learning centre, he looked after the development of new engineers joining the company after graduating from university. He was also involved in international well control certification and served as chairman for a period of three years. In the last years of his active career, he worked again in China as a staff development manager, a position he nurtured because he was able to pass on his knowledge to a vast number of new employees once again. After retiring in 2015, he has delivered well engineering related courses in Australia, Indonesia, Brunei, Malaysia, China, South Korea, Thailand, India, Dubai, Qatar, Kuwait, The Netherlands, and the United States. The training he provides includes well control to obtain certification in drilling and well intervention, extended reach drilling, high pressure-high temperature drilling, stuck pipe prevention and a number of other ad-hoc courses. He thoroughly enjoys training and is keen to continue taking classes as an instructor for some time to come. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Use Cases for Business Analysis: In-House Training The use case is a method for documenting the interactions between the user of a system and the system itself. Use cases have been in the software development lexicon for over twenty years, ever since it was introduced by Ivar Jacobson in the late 1980s. They were originally intended as aids to software design in object-oriented approaches. However, the method is now used throughout the Solution Development Life Cycle from elicitation through to specifying test cases, and is even applied to software development that is not object oriented. This course identifies how business analysts can apply use cases to the processes of defining the problem domain through elicitation, analyzing the problem, defining the solution, and confirming the validity and usability of the solution. What you will Learn You'll learn how to: Apply the use case method to define the problem domain and discover the conditions that need improvement in a business process Employ use cases in the analysis of requirements and information to create a solution to the business problem Translate use cases into requirements Getting Started Introductions Course structure Course goals and objectives Foundation Concepts Overview of use case modeling What is a use case model? The 'how and why' of use cases When to perform use case modeling Where use cases fit into the solution life cycle Use cases in the problem domain Use cases in the solution domain Use case strengths and weaknesses Use case variations Use case driven development Use case lexicon Use cases Actors and roles Associations Goals Boundaries Use cases though the life cycle Use cases in the life cycle Managing requirements with use cases The life cycle is use case driven Elicitation with Use Cases Overview of the basic mechanics and vocabulary of use cases Apply methods of use case elicitation to define the problem domain, or 'as is' process Use case diagrams Why diagram? Partitioning the domain Use case diagramming guidelines How to employ use case diagrams in elicitation Guidelines for use case elicitation sessions Eliciting the problem domain Use case descriptions Use case generic description template Alternative templates Elements Pre and post conditions Main Success Scenario The conversation Alternate paths Exception paths Writing good use case descriptions Eliciting the detailed workflow with use case descriptions Additional information about use cases Analyzing Requirements with Use Cases Use case analysis on existing requirements Confirming and validating requirements with use cases Confirming and validating information with use cases Defining the actors and use cases in a set of requirements Creating the scenarios Essential (requirements) use case Use case level of detail Use Case Analysis Techniques Generalization and Specialization When to use generalization or specialization Generalization and specialization of actors Generalization and specialization of use cases Examples Associating generalizations Subtleties and guidelines Use Case Extensions The <> association The <> association Applying the extensions Incorporating extension points into use case descriptions Why use these extensions? Extensions or separate use cases Guidelines for extensions Applying use case extensions Patterns and anomalies o Redundant actors Linking hierarchies Granularity issues Non-user interface use cases Quality considerations Use case modeling errors to avoid Evaluating use case descriptions Use case quality checklist Relationship between Use Cases and Business Requirements Creating a Requirements Specification from Use Cases Flowing the conversation into requirements Mapping to functional specifications Adding non-functional requirements Relating use cases to other artifacts Wire diagrams and user interface specifications Tying use cases to test cases and scenarios Project plans and project schedules Relationship between Use Cases and Functional Specifications System use cases Reviewing business use cases Balancing use cases Use case realizations Expanding and explaining complexity Activity diagrams State Machine diagrams Sequence diagrams Activity Diagrams Applying what we know Extension points Use case chaining Identifying decision points Use Case Good Practices The documentation trail for use cases Use case re-use Use case checklist Summary What did we learn, and how can we implement this in our work environment?
PMI-ACP® Exam Prep: Virtual In-House Training This course builds on the candidates' practical experience of Agile in the workplace to equip them with the broad range of knowledge and skills required for the PMI® Agile Certification exam. It will follow the PMI® requirements and reference the suggested reading list, including the Agile Practice Guide, but will not be limited to those areas. Within the profession and discipline of project management, Agile continues to develop as a significant and important aspect of bringing change to an organization. Where the products of change must be delivered to the business 'on time,' Agile is often the chosen methodology. In addition to equipping candidates for the PMI® Agile Certification examination, this course will also support candidates in taking a more informed and effective role in Agile projects. It will also enable them to take a significant role in encouraging and enabling the organization to become or develop as an Agile environment. What you will Learn You will learn how to: Appreciate the wider aspects of Agile project management tools and techniques Integrate various disciplines within Agile Tailor / customize Agile to suit the needs of different projects Prepare yourself for the PMI® Agile Certification examination Getting Started Introductions Agenda Expectations Foundation Concepts Defining 'Traditional' Project Management Project management parameters The 'traditional' approach to the parameters Strengths and weaknesses of the traditional approach Defining 'Agile' Project Management Project management parameters revisited The 'agile' approach to the parameters Strengths and weaknesses of agile Managing projects with traditional and agile methods Can the two approaches co-exist? Leveraging the benefits of both methods Options for using both methods on a project Avoiding the elephant traps Key aspects of the PMI® Agile Certified Practitioner (PMI-ACP)® Handbook Overview Eligibility requirements Exam information Exam Blueprint Continuing certification requirements Key aspects of the PMI Agile Certification Examination Content Outline Introduction Agile exam content outline Tools and techniques Knowledge and skills Domains and tasks (not examined) An Introduction to Agile and Implementing Agile Definable work vs. high-uncertainty work Project factors that influence tailoring The Agile Manifesto and 12 Principles Agile mindset Agile domains and tasks Agile Tools and Techniques Related to PM 'Hard Skills' Planning, monitoring, and adapting The need for planning, monitoring, and adapting The Agile approach to planning and plans The Agile planning tools and techniques The Agile monitoring tools and techniques The Agile approach to adapting Product quality A definition of 'product quality' Setting the standard for product quality Agile tools and techniques for achieving product quality Risk management A definition of 'risk' What is 'at risk'? The acceptability of risks The Agile tools and techniques for managing risks Agile Tools and Techniques Related to PM 'Soft Skills' The difference between PM 'hard and soft' skills Communications The importance of communications Forms of agile communications Communications within the project Communications from the project Communications to the project Making communications the cultural norm Interpersonal Skills Defining and understanding management Defining and understanding leadership Defining and understanding servant leadership Delegating vs. empowering Playing to people's strengths Overcoming the roadblocks Core Agile Tools and Techniques The philosophy of core Agile tools and techniques Agile estimation Will traditional forms of estimating work for agile? The relationship between estimating and guessing The relationship between estimating and sizing The where, who, and how of agile estimating Agile analysis and design Product analysis and design from a user point of view Product analysis and design from a supplier point of view Product analysis and design from an agile project point of view Value-Based Agile Tools and Techniques The role of value-based tools and techniques in bridging traditional PM with Agile Value-based prioritization Value-based prioritization and agile projects Investment appraisal methods Regulatory driven Customer driven Ranking methods (MMF, MoSCoW) Metrics What should we measure / track? Methods of measuring / tracking Adding value with metrics Process Improvement Value-stream analysis Value-stream mapping Agile Knowledge and Skills Context of Agile Knowledge and Skills vis-Ã -vis Agile Tools and Techniques Agile Knowledge and Skills Process focused People focused Product focused Project focused Exam Preparation and Course Closure The application process - where are you now? The 'Exam-Focused Journal' - what you still have to do Further preparation - self-study schedule Exam topic review Practice exam Practice exam debrief Course closure
Being ISO 27701 Certified proves your Information Privacy Systems Audit experience, skills and knowledge, and demonstrates you are capable in the assessment of vulnerabilities, Compliance with GDPR and institutional controls within the enterprise. Gain an in-depth understanding of GDPR solutions and how they map to compliance requirements Learn how to perform and lead Privacy Information Management System (PIMS) certification audits to ISO 19011 standards Enhance your existing or learn with new skills in the field of Data Protection Candidates deliver Assurance services to organisations by advising on conformance with PIMS requirements Become a Technical expert on the preparation required for ISO 27701 Certification Understand a Privacy Information Management System (PIMS) and its processes based on ISO/IEC 27701 Identify the relationship between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks Acquire the competences of the auditor's role in planning, leading, and following up on a management system audit in accordance with ISO 19011. Learn how to interpret the requirements of ISO/IEC 27701 in the context of a PIMS audit About This Course ISO 27701 Internal Auditor Certification; Confirms your knowledge and experience Quantifies and markets your expertise Demonstrates that you have gained and maintained the level of knowledge required to meet the dynamic challenges of a modern enterprise Is globally recognized as the mark of excellence for the Information Privacy Audit professional Increases your value to your organization Gives you a competitive advantage over peers when seeking a new role Is administered by the International Examination & Certification Board (IECB), based in Estonia, and fully aligned to the ISO/IEC 17024:2012 standard (Conformity assessment - General requirements for bodies operating certification of persons) Certified Individuals: Are highly qualified, experienced professionals in the field of Data Protection Systems Audit Provide the enterprise with a Certification route for Information Privacy Assurance that is recognized by multinational clients, lending credibility to the enterprise Are excellent indicators of proficiency in control requirements creation and monitoring Demonstrate competence in five domains, including standards and practices; organization and management; processes; integrity, confidentiality and availability; and software development, acquisition and maintenance Demonstrate a commitment to providing the enterprise with trust in and value from your Privacy Compliance Framework Maintain ongoing professional development for successful on -the -job performance The below job practice is organized by domains. Each domain is covered in the course. Domain 1-The Process of Auditing Information Privacy Systems and Solutions Provide audit services in accordance with ISO 19011 audit standards to assist the organization in protecting and controlling information privacy systems. Domain 2 - Governance and Management of Information Privacy Technology Provide assurance that the necessary leadership and organizational structures and processes are in place to achieve objectives and to support the organization's strategy. Domain 3-Information Systems Acquisition, Development and Implementation Provide assurance that the practices for the acquisition, development, testing and implementation of information systems meet the organization's strategies and objectives. Domain 4-Information Systems Operations, Maintenance and Service Management Provide assurance that the processes for information systems operations, maintenance and service management meet the organization's strategies and objectives. Domain 5-Protection of Personally Identifiable Information (PII) Assets Provide assurance that the organization's policies, standards, procedures and controls ensure the confidentiality, integrity and availability of PII. Prerequisites A thorough understanding of current Data Protection legislation, Information Security & Risk Management knowledge as well as ISO 19011 Auditing Standards is required to successfully pass the examination. What's Included? Teas, Coffees, refreshments and a full Lunch* Course Slides Study Guide Exam Fees * For Classroom based Courses only Accreditation Who Should Attend? Auditors seeking to perform and lead Privacy Information Management System (PIMS) certification audits Managers or consultants seeking to master a PIMS audit process Individuals responsible for maintaining conformance with PIMS requirements Technical experts seeking to prepare for a PIMS audit Expert advisors in the protection of Personally Identifiable Information (PII) Assessment Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 12 question, essay type exam on Day 3 of the course. The overall passing score is 70%, to be achieved within the 150 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success. Our Guarantee We are an approved IECB Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras. The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and train for free. Provided by This course is Accredited by NACS and Administered by the IECB