Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialist Anyone who builds and develops IT systems Overview Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to preempt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal The Principles of Privacy in Technology training is the how to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. The training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Technologist (CIPT) certification program. Fundamentals of information privacy Reviewing the modern history of privacy Foundational privacy concepts Data protection roles and fair information practices Exploring the impacts of privacy and data protection regulations on information management Privacy in the IT environment Compliance requirements IT risks Stakeholder privacy expectations Differentiating between privacy and security Core privacy concepts Foundational elements for embedding privacy in IT Common privacy principles Data protection by design and default Privacy considerations in the information life cycle Privacy considerations throughout the stages of the information life cycle Privacy in systems and applications Examining the risks inherent in the IT environment and options for addressing them Identity and access management Credit card information and processing Remote access BYOD and telecommuting Data encryption Additional privacy-enhancing technologies in the enterprise environment Privacy techniques Strengths and weaknesses of authentication techniques Using identifiers Privacy by design Online privacy issues Unique challenges that come from online privacy issues Laws and regulations Online threats Social media E-commerce Tracking technologies Web security protocols Technologies with privacy considerations Privacy considerations associated with a variety of technologies Cloud computing Wireless IDs Location-based services ?Smart? technologies Video/data/audio surveillance Biometric recognition
Course Information Join our comprehensive three-day programme designed as an invaluable external training opportunity for auditors, audit programme managers, and individuals subject to audits. This course is tailored to foster a deep understanding and cultivate essential skills for auditing the validation of computer systems intended for GxP environments (GLP, GCP, GMP, GDP, GPvP). Commencing with an overview of regulatory prerequisites and the system life cycle, the course swiftly transitions to focus on the pragmatic aspects of auditing computer system validation. Experience a blend of presentations, interactive discussions, and immersive practical workshops throughout the duration of the course. Delegates will benefit from practical examples of how to understand the framework of applicable regulations and guidance. Apply risk management techniques to audit planning Plan and conduct computerised system audits Assess system validation documentation to verify compliance Evaluate data integrity and security issues Prepare for regulatory inspection. The course is structured to encourage delegates to: Discuss and develop ideas Solve specific problems Understand the vulnerabilities of computerised systems Learn how to create a compliance checklist Link system development with good business practice. Is this course for you? Auditors Audit programme managers Individuals subject to audits. Tutors Tutors will be comprised of (click the photos for biographies): Nichola Stevens Director and Principal Consultant, Nuncius Compliance Solutions Ltd Barry McManus Consultancy Partner, Empowerment Quality Engineering Ltd Programme Please note timings may be subject to alteration. Day 1 09:00 Welcome and Introductions 09:45 Why We Validate and Regulatory Trends 10:30 Break 10:45 Audit Overview, High Level Process and Scheduling 11:30 System Lifecycle 12:30 Lunch 13:15 Exercise 1 - Audit Scheduling 14:45 Exercise 1 - Feedback 15:15 Break 15:30 Validation Deliverables 16:30 Risk Assessments 17:30 Close of Day 1 Day 2 09:00 Supplier Assessment 10:30 Break 10:45 Exercise 2 - Planning a Supplier Audit 12:00 Exercise 2 - Feedback 12:30 Lunch 13:15 Exercise 3 - Auditing a Computerised System Validation Package 15:30 Break 15:45 Exercise 3 - Feedback 16:30 Change Control 17:15 Close of Day Day 3 09:00 Infrastructure Qualification 09:45 Maintaining a Validated State - Operational Processes 11:00 Break 11:15 Exercise 4 - Auditing Systems in Operational Use 12:45 Lunch 13:30 Exercise 4 - Feedback 14:15 Exercise 5 - Auditing Trail Review 15:30 Break 15:45 Exercise 5 - Feedback 16:15 Course Objectives Summary and Any Additional Questions 16:45 Close of Course Extra Information Face-to-face course Course Material Course material will be available in PDF format for delegates attending this course. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course. The material will be emailed in advance of the course and RQA will not be providing any printed copies of the course notes during the training itself. Delegates wishing to have a hard copy of the notes should print these in advance to bring with them. Alternatively delegates are welcome to bring along their own portable devices to view the material during the training sessions. Remote course Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam. CPD Points 19 Points Development Level Develop
Duration 0.5 Days 3 CPD hours This course is intended for This course is designed for students who have experience using the Windows 10 operating system and need to start using the Windows 11 operating system. Overview In this course, you will use the new and updated features of Windows 11. You will: Navigate the Windows environment. Use apps available in Windows 11. Manage available apps. Configure Windows 11 settings. As an experienced Windows© 10 user, when you are ready to move to Windows 11, you might like some guidance in using the new and updated features. This course will help you identify and use those features efficiently and effectively. Navigating the Windows 11 Environment Topic A: Log in to Windows 11 Topic B: Use the Start Menu Topic C: Use the Taskbar Using Apps Topic A: Use Built-In Apps Topic B: Use the Updated File Explorer Managing Apps Topic A: Use Virtual Desktops Topic B: Obtain Apps from the Microsoft Store Configuring Windows 11 Settings Topic A: Use the Configuration Apps Topic B: Configure Accessibility Features
Duration 5 Days 30 CPD hours This course is intended for This is an intermediate course for z/OS system programmers, z/OS performance analysts, and z/OS performance administrators new to performance management for their z/OS system.Note: ES54 is intended for individuals new to WLM and the z/OS performance area Overview The objectives for this course are as follows:Describe a performance and tuning methodologyDevelop a systematic z/OS performance and tuning planDescribe the factors which could affect the performance of an z/OS systemUse the WLM ISPF applicationDescribe the components of a service definitionDefine workloads and service levels and classification rulesState which z/OS commands affect WLM operationIdentify the major WLM services for z/OS, including enclaves and application environments, and how they are used by DB2, WebSphere, and CICSAnalyze CPU performance when running in a shared LPAR environmentUtilize and monitor zIIP and zAAP specialty enginesMeasure and tune z/OS DASD, processor storage, and coupling facility configurationsExplain the functions and facilities of RMF and SMFAnalyze performance bottlenecks using RMFUse Workload License Charges (WLC), defined capacity and soft capping to manage software costsDescribe advanced z/OS environments that utilize Intelligent Resource Director (IRD), HiperDispatch, z/OSMF Workload Management, and I/O Priority ManagerUse the z/OSMF Workload Management (WLM) taskUse Performance Monitoring with z/OSMFModify a WLM service definition to meet the requirements for monitoring a specific system workloadCreate and customize Monitoring DesktopsReview any issues by using the Monitoring Desktops options displaysAssess the performance of the workloads running on the z/OS This course is designed for new performance analysts to learn to work with the Workload Manager (WLM) in goal mode. Learn concepts of WLM and performance management in the z/OS system using the WLM. Day 1 Welcome Unit 1 - Tuning methodology Unit 2 - Using SMF and RMF to monitor performance Lab 1 - Introduction to your system Lab 2 - Using RMF Monitor I and Monitor II Day 2 Unit 3 - Performance impacts when running in a shared LPAR environment Unit 4 - Basic system workload management (part 1) Lab 3 - Implementing a WLM environment on z/OS (part 1) Day 3 Unit 4 - Basic system workload management (part 2) Lab 3 - Implementing a WLM environment on z/OS (part 2) Day 4 Unit 5 - WLM commands, internals, and service Lab 4 - Using RMF Monitor III to solve performance problems Day 5 Unit 6 - z/OS DASD performance topics Unit 7 - Tuning processor storage Unit 8 - Miscellaneous performance topics Lab 5 - z/OSMF and performance management
Management of Portfolios (MoP®) Practitioner: Virtual In-House Training In this MoP® Practitioner course, participants will have sufficient knowledge and understanding of how to apply and tailor the MoP guidance and to analyze portfolio data, documentation, and roles in relation to a given situation. MoP helps organizations ensure if the investments are done in the right, change initiatives, and implementing them correctly. This is achieved by: Prioritizing the programs and projects in terms of their contribution to the organization's strategic objectives and overall level of risk Managing the programs and projects consistently to ensure efficient and effective delivery Maximizing the benefit by providing the greatest return from the investment made What you will Learn Define the business case to get senior management approval for portfolio management Plan the implementation of portfolio management Select and adapt MoP principles, practices, and techniques to suit different organizational environments Evaluate examples of MoP information including documents and role descriptions Analyze the solutions adopted in relation to a given scenario Introduction Overview MoP Portfolio Definition Portfolio Management Roles Portfolio Management Documents MoP Practitioner Assignments Portfolio Management Documents Portfolio Delivery How to Implement Practice Exam MoP Practitioner Exam (taken online, after the class has ended)
Management of Risk (M_o_R®) Foundation: Virtual In-House Training This M_o_R® Foundation course prepares learners to demonstrate knowledge and comprehension of the four elements of the M_o_R framework: Principles, Approach, Processes, Embedding and Reviewing and how these elements support corporate governance. The M_o_R Foundation Course is also a prerequisite for the M_o_R Practitioner qualification. What you will Learn At the end of the M_o_R Foundation course, participants will gain competencies in and be able to: Describe the key characteristics of risk and the benefits of risk management List the eight M_o_R Principles List and describe the use of the key M_o_R Approach documents Create Probability and Impact scales Define and distinguish between risks and issues Create a Risk Register Create a Stakeholder map Identify the key roles in risk management Use the key techniques and describe specialisms in risk management Undertake the M_o_R Foundation examination Introduction Introduction to the M_o_R course What is a risk? What is risk management? Why is risk management so important? Basic risk definitions The development of knowledge about risk management Corporate governance and internal control Where and when should risk management be applied? M_o_R Principles The purpose of M_o_R principles Aligns with objectives Fits the context Engages stakeholders Provides clear guidance Informs decision-making Facilitates continual improvement Creates a supportive culture Achieves measurable value Risk management maturity models M_o_R Approach Relationship between the documents Risk management policy Risk management process guide Risk management strategy Risk register Issue register Risk response plan Risk improvement plan Risk communications plan M_o_R Process Common process barriers Identify contexts Identify the risks Assess estimate Assess evaluate Plan Implement Communication throughout the process M_o_R Perspectives Strategic perspective Program perspective Project perspective Operational perspective Risk Specialisms Business continuity management Incident and crisis management Health and Safety management Financial risk management Environmental risk management Reputational risk management Contract risk management
LOOKING FOR: YA, NA, ADULT FICTION Helen Lane has been an established agent for several years, formerly with the Booker Albert Agency before joining the Ki Agency. She has a BSc in Environmental Science from the University of East Anglia and a postgrad qualification in Acoustics. She lives in London with her family and the world’s naughtiest cocker spaniel. Helen represents (Adult) Fantasy, Sci Fi, Horror, Romance, Action & Adventure, and Thrillers. She also represents select YA Fantasy, Horror, and Sci Fi. Her tastes do run towards the dark and she is slightly obsessed with monster stories in general (especially if they have giant sharks or squids). And stories set in extreme environments such as the arctic, jungle, caves, ocean, and mountains. But she DOES NOT want to read about affairs or abuse in any genre. (Her husband likes her to add here that this is nothing to do with him, she just doesn’t like sad stories). Her favourite authors are Mira Grant, Greig Beck, James Rollins, Matthew Reilly, Darcy Coates, Andy Weir, Clive Cussler, R F Kuang, Patricia Briggs, and Kelley Armstrong. Her comfort movies are: Jaws, Outbreak, The Cave, Sanctum, Scream, Buffy, Grey's Anatomy, Charmed, Vampire Diaries. You can find her on: Bluesky: @helenlane.bsky.social Instagram: hflane_agenting Helen would like you to submit a covering letter, 1 page synopsis and first three chapters (Max 5,000 words) of your manuscript in a single word document. (In addition to the paid sessions, Helen is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Tuesday 22nd July 2025
Duration 3 Days 18 CPD hours This foundational course to Citrix Workspace intelligence ushers you into the new generation of Citrix. You will discover how intelligent features help organize, guide, and automate the future of your work.You will gain an understanding of the fundamentals of web services, APIs, and systems integrations through building microapps designed to boost employee productivity and optimize the end user experience.Through this course, you will learn the fundamentals of Citrix Workspace intelligence features, web services, security considerations and API troubleshooting to help you successfully deploy intelligent workspace features in your environment. This foundational course to Citrix Workspace intelligence ushers you into the new generation of Citrix. You will discover how intelligent features help organize, guide, and automate the future of your work. You will gain an understanding of the fundamentals of web services, APIs, and systems integrations through building microapps designed to boost employee productivity and optimize the end user experience. Through this course, you will learn the fundamentals of Citrix Workspace intelligence features, web services, security considerations and API troubleshooting to help you successfully deploy intelligent workspace features in your environment.
Duration 5 Days 30 CPD hours This course is intended for Implementers and administrators who are new to IBM Spectrum Protect data management. Overview At the end of this course you should be able to: Describe the purpose of IBM Spectrum Protect Install and configure the IBM Spectrum Protect components Use the administrative and client interfaces Discuss storage methodology options and create storage pool Customize data movement and retention policies to meet business requirements Configure the IBM Spectrum Protect database and storage pools for protection Optimize client configuration Perform backup, restore, archive and retrieve operations Organize daily tasks required to protect the IBM Spectrum Protect environment Automate and monitor client and administrative tasks and events IBM Spectrum© Protect 8.1.6 is a data backup and recovery solution designed to help you manage your data retention, reduce the cost of storage, and provide appropriate recovery point objectives to meet any service level agreement. IBM Spectrum© Protect offers improved efficiency and flexibility using object-based data management and policy driven retention.This course will focus on implementation and basic administration of a IBM Spectrum© Protect environment. The hands-on lab exercises are performed on a Windows 2012 environment. The course materials include examples of AIX and Linux commands, when different from Windows. Components and conceptsInstallation and configurationInterfaces and monitoringStorage pools and devicesPolicy management, data movement, and explorationDatabase and storage pool managementClient configuration and managementClient data protectionDaily operations and maintenanceSchedules and reports Additional course details: Nexus Humans TS617 IBM Spectrum Protect - Implementation and Administration (v8.1.6) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TS617 IBM Spectrum Protect - Implementation and Administration (v8.1.6) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This intermediate course is for operations personnel and technical staff who are directly involved in the installation, operation, systems support, and software support of their System z mainframe environment. Overview Identify the zEnterprise 196 and 114, System z10, System z9, and zSeries servers Describe the major differences of the function and features between the System z servers Describe and explain the concept of logical partitioning Identify how various resources are assigned to LPARs during initialization Describe the functions provided by the HMC and SE This course teaches you navigation, operation, and recovery techniques for the Hardware Management Console (HMC) in the System z environment. Through lecture and hands-on exercises, you learn setup and operating procedures for the HMC, gain indepth problem determination skills, practice HMC operations, and utilize recovery capabilities provided by the System z servers. WelcomeUnit 1: IBM mainframe server hardware: Overview Unit 2: Using the HMC classic style user interface Unit 3: Using the HMC tree style user interfaceUnit 4: Using the HMC to monitor System z servers Supporting labsReviewUnit 5: Activation profiles and operational tasksUnit 6: Single object operation: CPC session Supporting labs