Extending beyond the features and functions of cable avoidance tools, the course aims to provide delegates with an understanding in the essential elements that constitute a safe system of work and how to get the best results when scanning for buried utilities. The course intertwines theoretical and practical content aimed to engage participants throughout the day, facilitating open discussions on best practices and ways to improve existing processes in order to reduce utility damage and personal harm CITB grant may be available for organisations registered with the Construction Industry Training Board Book via our website @ https://www.vp-ess.com/training/utility-detection/utility-avoidance-including-use-of-cable-avoidance-tools/ or via email at: esstrainingsales@vpplc.com or phone on: 0800 000 346
Duration 3 Days 18 CPD hours This course is intended for This course is ideal for Professionals preparing to become CRISC certified. Risk practitioners Students or recent graduates Overview At course completions, students will understand the essential concepts in the 4 ISACA CRISC domains: Governance IT Risk Assessment Risk Response and Reporting Information Technology and Security This 3 Day CRISC course is geared towards preparing students to pass the ISACA Certified in Risk and Information Systems Control examination. The course covers all four of the CRISC domains, and each section corresponds directly to the CRISC job practice. CRISC validates your experience in building a well-defined, agile risk-management program, based on best practices to identify, analyze, evaluate, assess, prioritize and respond to risks. This enhances benefits realization and delivers optimal value to stakeholders. GOVERNANCE - a. Organizational Governance Organizational Strategy, Goals, and Objectives Organizational Structure, Roles, and Responsibilities Organizational Culture Policies and Standards Business Processes Organizational Assets GOVERNANCE - b. Risk Governance Enterprise Risk Management and Risk Management Framework Three Lines of Defense Risk Profile Risk Appetite and Risk Tolerance Legal, Regulatory, and Contractual Requirements Professional Ethics of Risk Management IT RISK ASSESSMENT - a. IT Risk Identification Risk Events (e.g., contributing conditions, loss result) Threat Modelling and Threat Landscape Vulnerability and Control Deficiency Analysis (e.g., root cause analysis) Risk Scenario Development IT RISK ASSESSMENT - b. IT Risk Analysis and Evaluation Risk Assessment Concepts, Standards, and Frameworks Risk Register Risk Analysis Methodologies Business Impact Analysis Inherent and Residual Risk RISK RESPONSE AND REPORTING - a. Risk Response Risk Treatment / Risk Response Options Risk and Control Ownership Third-Party Risk Management Issue, Finding, and Exception Management Management of Emerging Risk RISK RESPONSE AND REPORTING - b. Control Design and Implementation Control Types, Standards, and Frameworks Control Design, Selection, and Analysis Control Implementation Control Testing and Effectiveness Evaluation RISK RESPONSE AND REPORTING - c. Risk Monitoring and Reporting Risk Treatment Plans Data Collection, Aggregation, Analysis, and Validation Risk and Control Monitoring Techniques Risk and Control Reporting Techniques (heatmap, scorecards, dashboards) Key Performance Indicators Key Risk Indicators (KRIs) Key Control Indicators (KCIs) INFORMATION TECHNOLOGY AND SECURITY - a. Information Technology Principles Enterprise Architecture IT Operations Management (e.g., change management, IT assets, problems, incidents) Project Management Disaster Recovery Management (DRM) Data Lifecycle Management System Development Life Cycle (SDLC) Emerging Technologies INFORMATION TECHNOLOGY AND SECURITY - b. Information Security Principles Information Security Concepts, Frameworks, and Standards Information Security Awareness Training Business Continuity Management Data Privacy and Data Protection Principles
This course covers important solar-plus-storage design and installation requirements for the most recent iterations of the National Electrical Code (NEC 2017 and 2020). The course is intended for industry professionals who are already familiar with grid-interactive systems but want to understand NEC requirements specific to solar-plus-storage systems as demand for energy storage continues to rise. Introduction to interactive solar and solar+storage systems AC- and DC-coupled energy storage systems Introduction to PV and ESS NEC Articles NEC Article 690 (Sections: 690.12, 690.15, 690.55, 690.56, 690.71) NEC Article 706 NEC Article 705 (Sections: 705.1, 705.13, 705.2, 705.5, 705.6, 705.65, 705.7) NEC Article 480 and Article 710 Common design issues and wrap-up
On this course, we will use case studies to enhance the delegates understanding of Real Estate financial appraisals, and help them fully appreciate the theory behind the numbers.
Learn the essentials of software development. And increase your confidence when working with developers. Why take this course? Talk with confidence about web and internet technologies Build better relationships with developers on your team Create smarter designs with a deeper understanding of technical constraints Understand the concepts behind coding without needing to code Who is it for? All UX professionals Format Online, self-paced Duration 6 weeks (recommended) Commitment 3 hours per week What you’ll learn Over 6 weeks, you’ll learn about the key concepts and processes involved in software development. You'll understand how code works, so that you can collaborate more effectively with developers. Module 1 The software landscape Understand the relationship between hardware and software. Module 2 Layers of software Dig into each layer of the tech stack, from the front-end to the back-end. Module 3 Front-end technologies Get up to speed on the roles of HTML, CSS and Javascript. Module 4 Back-end technologies Explore the back-end, APIs and common programming languages. Module 5 How developers work Learn about common development workflows, from waterfall to agile. Module 6 Effective collaboration Get practical guidance on how to work well with development teams.
Email Marketing remains a cornerstone of digital communication, which when used effectively can elevate your brand, foster customer loyalty, and drive remarkable results.