• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

225 Investment courses in Wetherby delivered Live Online

Developing the Business Case: In-House Training

By IIL Europe Ltd

Developing the Business Case: In-House Training Business analysts must be able to create business case documents that highlight project benefits, costs, and risks. The business case is based on the real business need to be solved. These become parts of proposals, feasibility studies, and other decision support documents. This course teaches the purpose, structure, and content of a business case. It presents the basic techniques for determining financial ROI, non-tangible benefits, and the probability of meeting expectations. What you will Learn At the end of this program, you will be able to: Perform feasibility studies Justify the business investment to solve the business problem Prepare an effective business case document Plan and implement a business case approval process Foundation Concepts The role of the BA An introduction to the BABOK® Guide The business analyst and the product / project life cycle (PLC) The business case deliverable Introducing the Business Case Process The BA and strategy analysis The BA and the business case process (BCP) The BA during the business case process (BCP) The BA after the business case process (BCP) Importance of defining solution performance metrics Defining the Business Need Overview of defining the business need Business needs: problem / opportunity statement Product vision Objectives and constraints Exploring Business Case Solutions Overview of exploring solutions Solution identification for feasibility Solution definition for analysis Assessing project risks Justifying the Business Case Overview of justifying the business case Qualitative justification Quantitative justification Approving the Business Case Overview of business case approval Developing recommendations Preparing the decision package - documents Preparing the decision package - presentations

Developing the Business Case: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,495

Best Practice in Portfolio Management in Upstream Oil and Gas

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT) This 4 half-day Virtual Instructor Led Training (VILT) course presents the principles and best practices of portfolio management in the upstream (E&P) oil and gas industry. The VILT course is equally valuable for small independents, large integrated international companies and national oil companies. The VILT course consists of presentations, case studies, illustrative practical exercises and syndicate discussions. Particular emphasis is given to pragmatic portfolio management approaches and solutions which can be implemented swiftly without recourse to major investments in planning and portfolio management software. The VILT course will draw on examples from your expert course leader's 35+ years' experience in the oil and gas industry as an explorationist, upstream vice-president and management consultant. The VILT course handout will comprise softcopy slides used in the presentation and a softcopy workbook for the exercises. Participants will gain proficiency in portfolio management techniques, understand how and why to undertake this activity and be able to apply key concepts directly in the business of their teams / divisions. The VILT course will be presented over 4 half-days, using Microsoft Teams or Zoom and a proprietary set of VILT tools. Participants will be asked to complete a pre course questionnaire (PCQ) addressing their objectives and experience, and attend a session to familiarise themselves with VILT tools before course commencement.     Training Objectives To present the tools, concepts and principles of portfolio management To define the quantitative metrics which are used to describe projects in a portfolio To understand the benefits of portfolio management at different stages of the upstream business: in strategy development, opportunity screening, business development, drilling prospects, conducting appraisal of discoveries and developing fields To put portfolio management in the organisational context by describing the role of the portfolio management team and examining how value assurance (quality control) is best conducted on portfolio data for projects and assets To demonstrate how portfolio management contributes to improved business performance By the end of the VILT course, participants will understand: Key concepts and principles of portfolio management How to design a simple portfolio database and describe complex projects in a small number of objective metrics How to segment the portfolio into meaningful units How to use portfolio data in making business choices and decisions at the strategic and tactical levels The extent to which it is meaningful and reasonable to make comparisons across different portfolio segments How the portfolio management team can support the wider business in decision-making Target Audience This VILT course is specially designed for exploration and development geoscientists, E&P economists and finance staff, and E&P managers. Both technical and non-technical staff will benefit from the concepts presented. Companies are encouraged to send participants from different functions and seniority levels to gain great benefits especially those which would like to implement the concepts presented in this VILT course. Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 4 half-day sessions comprising 4 hours per day, with 2 breaks of 10 minutes per day. The VILT course will be presented in an interactive workshop format that allows for discussion. Course Duration: 4 half-day sessions, 4 hours per session (16 hours in total). Trainer Your expert course leader draws on more than 35 years of experience managing, reviewing and directing projects in all aspects of the exploration business: from exploration business development (new ventures), through prospect maturation and drilling, to the appraisal of discoveries. He has more than 30 years' experience with Shell International, followed by 10 years consulting to NOCs in Asia Pacific, Africa and South America and independent oil companies in the United Kingdom, continental Europe and North America. Other than delivering industry training, he has worked on projects for oil & gas companies of all sizes, including independents, national oil companies and (super)-majors, private equity firms, hedge funds and investment banks, and leading management consulting firms. He is an alumnus of Cambridge University. He has M.A and Ph.D. degrees in geology and is a Fellow of the Geological Society of London as well as a respected speaker on management panels at international conferences. Professional Experience Management consultancy & executive education: Advice to investment banks, businesses and major consulting firms. Specialist expertise in upstream oil & gas, with in depth experience in exploration strategy, portfolio valuation and risk assessment. Leadership: Managed and led teams and departments ranging from 3 - 60 in size. Provided technical leadership to a cadre of 800 explorationists in Shell worldwide. Member of the 12-person VP team leading global exploration in Shell, a $3 bln p.a. business and recognised as the most effective and successful among its industry peers. Accountability & decision-making: Accountable for bottom-line results: in a range of successful exploration ventures with budgets ranging from $10's million to $100's million. Made, or contributed to, complex business decisions / investments, taking into account strategic, technical, commercial, organisational and political considerations. Corporate governance: Served as non-executive director on the Boards of the South Rub al Khali Company (oversight of gas exploration studies and drilling in Saudi Arabia) and SEAPOS B.V. (exploration deep-water drilling and facilities management). Technical & operations: Skilled in exploration opportunity evaluation, the technical de risking of prospects, portfolio analysis and managing the interface between exploration and well engineering activities. Unparalleled knowledge of the oil and gas basins of the world, and of different operating regimes and contractual structures, ranging from Alaska, Gulf of Mexico and Brazil, through to the Middle East, former Soviet Union, Far East and Australia. Safety: Following an unsatisfactory audit, became accountable for safety performance in Shell's exploration new ventures. Through personal advocacy and leadership of a small team, delivered pragmatic and effective HSE systems, tools and staff training / engagement and a dramatically improved safety record. R&D: Experience in the 3 key roles in R&D: scientific researcher, research manager, and 'customer' for R&D products. After re-defining Shell's exploration R&D strategy, led the re-structuring of the R&D organization, its interface with 'the business' and approaches to deployment and commercialization. Strategy: Accomplished at formulating competitive strategies in business, R&D and technology deployment, translating them into actionable tactics and results. Defined the exploration strategy of PDO (a Shell subsidiary in Oman) and latterly of Shell's global exploration programme. Professional education, behavioural/motivational coaching: Experienced in organisational re-design, change management, leadership education and talent development. Commercial skills: Personally negotiated drilling compensation claims, educational contracts and E&P contracts, with values of $5 million to $100+ million. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Best Practice in Portfolio Management in Upstream Oil and Gas
Delivered in Internationally or OnlineFlexible Dates
£1,960 to £3,699

Certified Information Systems Auditor (CISA)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security. Overview Upon successful completion of this course, students will be able to: - implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices. - evaluate an organizations structure, policies, accountability, mechanisms, and monitoring practices. - evaluate information systems acquisition, development, and implementation. - evaluate the information systems operations, maintenance, and support of an organization; and evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained. - define the protection policies used to promote the confidentiality, integrity, and availability of information assets. In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives. 1 - The Process of Auditing Information Systems ISACA Information Systems Auditing Standards and Guidelines Fundamental Business Processes Develop and Implement an Information Systems Audit Strategy Plan an Audit Conduct an Audit The Evidence Life Cycle Communicate Issues, Risks, and Audit Results Support the Implementation of Risk Management and Control Practices 2 - IT Governance and Management Evaluate the Effectiveness of IT Governance Evaluate the IT Organizational Structure and HR Management Evaluate the IT Strategy and Direction Evaluate IT Policies, Standards, and Procedures Evaluate the Effectiveness of Quality Management Systems Evaluate IT Management and Monitoring of Controls IT Resource Investment, Use, and Allocation Practices Evaluate IT Contracting Strategies and Policies Evaluate Risk Management Practices Performance Monitoring and Assurance Practices Evaluate the Organizations Business Continuity Plan 3 - Information Systems Acquisition, Development, and Implementation Evaluate the Business Case for Change Evaluate Project Management Frameworks and Governance Practices Development Life Cycle Management Perform Periodic Project Reviews Evaluate Control Mechanisms for Systems Evaluate Development and Testing Processes Evaluate Implementation Readiness Evaluate a System Migration Perform a Post-Implementation System Review 4 - Information Systems Operations, Maintenance, and Support Perform Periodic System Reviews Evaluate Service Level Management Practices Evaluate Third-Party Management Practices Evaluate Operations and End User Management Practices Evaluate the Maintenance Process Evaluate Data Administration Practices Evaluate the Use of Capacity and Performance Monitoring Methods Evaluate Change, Configuration, and Release Management Practices Evaluate Problem and Incident Management Practices Evaluate the Adequacy of Backup and Restore Provisions 5 - Protection of Information Assets Information Security Design Encryption Basics Evaluate the Functionality of the IT Infrastructure Evaluate Network Infrastructure Security Evaluate the Design, Implementation, and Monitoring of Logical Access Controls Risks and Controls of Virtualization Evaluate the Design, Implementation, and Monitoring of Data Classification Process Evaluate the Design, Implementation, and Monitoring of Physical Access Controls Evaluate the Design, Implementation, and Monitoring of Environmental Controls

Certified Information Systems Auditor (CISA)
Delivered OnlineFlexible Dates
£3,250

Agile PM vs. Waterfall PM (Virtual)

By IIL Europe Ltd

Agile PM vs. Waterfall PM (Virtual) The concept of Agile project management refers to the use of a number of tools and techniques that are based on enabling project teams to deliver products to a predetermined and agreed timeline. The concept of Waterfall project management refers to the use of a number of tools and techniques that are based on enabling project teams to deliver products to a pre-determined and agreed specification. The selection of the most appropriate project management method has, historically, been a choice of 'either/or' when it comes to these two approaches. It is now becoming clear that for many projects, the selection of a single project management method does not satisfy the professionalism of the project team nor does it optimize the return on investment for the sponsoring organization. A radically different approach is needed. This course presents an approach to project management which capitalizes on the most appropriate elements of each method tailored to the specific project being undertaken. In this course, the Waterfall approach will be based on the PRINCE2 model. Each method will be presented to highlight its particular strategy and strengths. The course will then propose project scenarios which will require the project team to use a hybrid method which brings together aspects of both methods. The overall goal of the course is threefold: · To introduce the Waterfall approach to product development. · To introduce the Agile approach to product development. · To explore how a combination of both approaches can bring added value to the sponsoring organization and their customers.

Agile PM vs. Waterfall PM (Virtual)
Delivered OnlineFlexible Dates
£850

Portfolio, Programs, & Project Offices Practitioner: In-House

By IIL Europe Ltd

Portfolio, Programme, and Project Offices (P3O®) Practitioner: In-House Training P3O® is the AXELOS standard for the design of decision-making processes regarding changes in organizations. P3O provides a guideline for the design of portfolio, programme, and project offices in organizations. The P3O Practitioner Course is an interactive learning experience. The P3O Practitioner-level content provides you with sufficient knowledge and understanding of the P3O guidance to design, implement, manage or work within any component office of a P3O model. It enables participants to successfully complete the associated P30 Practitioner exam and achieve the qualification. In this course, you will be prepared to successfully attempt the P3O Practitioner exam and learn how to implement or re-energize a P3O model in their own organization. What you will Learn At the end of the P3O Practitioner course, you will be able to: Define a business case to get senior management approval for P3O Build a right P3O model to adapt to the organization's needs, taking account of the organization's size and portfolio, programme and project management maturity Identify the elements, roles, and functions deployed in a generalized P3O model Use tools and techniques in running the P3O and advising those who shape the portfolio of programmes and projects Introduction to P3O What is the purpose of P3O? Definitions What are P3Os? Portfolio, programme, and project lifecycles Governance and the P3O Designing a P3O Model Factors that affect the design Design considerations What functions and services should the P3O offer? Roles and responsibilities Sizing and tailoring of the P3O model Why have a P3O? How a P3O adds value Maximizing that value Getting investment for the P3O Overcoming common barriers Timescales Why have a P3O (Extension)? The P3O Business Case The P3O Model Blueprint Vision Statement Demonstrating the Value KPIs The Benefits of Claimed Capabilities Benefit Realisation and Strategic Objectives Benefit Profile How to Implement or Re-Energize a P3O Implementation lifecycle for a permanent P3O Identify Define Deliver Close Implementation lifecycle for a temporary programme or project office Organizational context Definition and implementation Running Closing Recycling How to operate a P3O Overview of tools and techniques Benefits of using standard tools and techniques Critical success factors P3O tools P3O techniques

Portfolio, Programs, & Project Offices Practitioner: In-House
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

Developing the Business Case: Virtual In-House Training

By IIL Europe Ltd

Developing the Business Case: Virtual In-House Training Business analysts must be able to create business case documents that highlight project benefits, costs, and risks. The business case is based on the real business need to be solved. These become parts of proposals, feasibility studies, and other decision support documents. This course teaches the purpose, structure, and content of a business case. It presents the basic techniques for determining financial ROI, non-tangible benefits, and the probability of meeting expectations. What you will Learn At the end of this program, you will be able to: Perform feasibility studies Justify the business investment to solve the business problem Prepare an effective business case document Plan and implement a business case approval process Foundation Concepts The role of the BA An introduction to the BABOK® Guide The business analyst and the product / project life cycle (PLC) The business case deliverable Introducing the Business Case Process The BA and strategy analysis The BA and the business case process (BCP) The BA during the business case process (BCP) The BA after the business case process (BCP) Importance of defining solution performance metrics Defining the Business Need Overview of defining the business need Business needs: problem / opportunity statement Product vision Objectives and constraints Exploring Business Case Solutions Overview of exploring solutions Solution identification for feasibility Solution definition for analysis Assessing project risks Justifying the Business Case Overview of justifying the business case Qualitative justification Quantitative justification Approving the Business Case Overview of business case approval Developing recommendations Preparing the decision package - documents Preparing the decision package - presentations

Developing the Business Case: Virtual In-House Training
Delivered OnlineFlexible Dates
£850

Future proof you, your business, and its place on the planet

By Nina Dar

Learn how to create people and planet strategies that identify the lifecycles that exist within your business, and promote them widely, helping your business and the planet flourish.

Future proof you, your business, and its place on the planet
Delivered OnlineFlexible Dates
£300

Portfolio, Programs, & Project Offices Practitioner: Virtual In-House Training

By IIL Europe Ltd

Portfolio, Programs, & Project Offices Practitioner: Virtual In-House Training P3O® is the AXELOS standard for the design of decision-making processes regarding changes in organizations. P3O provides a guideline for the design of portfolio, programme, and project offices in organizations. The P3O Practitioner Course is an interactive learning experience. The P3O Practitioner-level content provides you with sufficient knowledge and understanding of the P3O guidance to design, implement, manage or work within any component office of a P3O model. It enables participants to successfully complete the associated P30 Practitioner exam and achieve the qualification. In this course, you will be prepared to successfully attempt the P3O Practitioner exam and learn how to implement or re-energize a P3O model in their own organization. What you will Learn At the end of the P3O Practitioner course, you will be able to: Define a business case to get senior management approval for P3O Build a right P3O model to adapt to the organization's needs, taking account of the organization's size and portfolio, programme and project management maturity Identify the elements, roles, and functions deployed in a generalized P3O model Use tools and techniques in running the P3O and advising those who shape the portfolio of programmes and projects Introduction to P3O What is the purpose of P3O? Definitions What are P3Os? Portfolio, programme, and project lifecycles Governance and the P3O Designing a P3O Model Factors that affect the design Design considerations What functions and services should the P3O offer? Roles and responsibilities Sizing and tailoring of the P3O model Why have a P3O? How a P3O adds value Maximizing that value Getting investment for the P3O Overcoming common barriers Timescales Why have a P3O (Extension)? The P3O Business Case The P3O Model Blueprint Vision Statement Demonstrating the Value KPIs The Benefits of Claimed Capabilities Benefit Realisation and Strategic Objectives Benefit Profile How to Implement or Re-Energize a P3O Implementation lifecycle for a permanent P3O Identify Define Deliver Close Implementation lifecycle for a temporary programme or project office Organizational context Definition and implementation Running Closing Recycling How to operate a P3O Overview of tools and techniques Benefits of using standard tools and techniques Critical success factors P3O tools P3O techniques

Portfolio, Programs, & Project Offices Practitioner: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,850

VC inside out

By VC Inside Out

VC funding, tech startups, tech valuation, valuation, fund raising, pitch deck, investor data room, cash flow and modeling, VC interviews, how to break into VC, VC funding, angel funding

VC inside out
Delivered OnlineFlexible Dates
£50 to £80

Certified Information Security Manager (CISM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification. Overview Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Identify and manage information security risks to achieve business objectives. Create a program to implement the information security strategy. Implement an information security program. Oversee and direct information security activities to execute the information security program. Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents. In this course, students will establish processes to ensure that information security measures align with established business needs. Prerequisites Information security governance Information risk management Information security program development Information security program management Incident management and response 1 - Information Security Governance Develop an Information Security Strategy Align Information Security Strategy with Corporate Governance Identify Legal and Regulatory Requirements Justify Investment in Information Security Identify Drivers Affecting the Organization Obtain Senior Management Commitment to Information Security Define Roles and Responsibilities for Information Security Establish Reporting and Communication Channels 2 - Information Risk Management Implement an Information Risk Assessment Process Determine Information Asset Classification and Ownership Conduct Ongoing Threat and Vulnerability Evaluations Conduct Periodic BIAs Identify and Evaluate Risk Mitigation Strategies Integrate Risk Management into Business Life Cycle Processes Report Changes in Information Risk 3 - Information Security Program Development Develop Plans to Implement an Information Security Strategy Security Technologies and Controls Specify Information Security Program Activities Coordinate Information Security Programs with Business Assurance Functions Identify Resources Needed for Information Security Program Implementation Develop Information Security Architectures Develop Information Security Policies Develop Information Security Awareness, Training, and Education Programs Develop Supporting Documentation for Information Security Policies 4 - Information Security Program Implementation Integrate Information Security Requirements into Organizational Processes Integrate Information Security Controls into Contracts Create Information Security Program Evaluation Metrics 5 - Information Security Program Management Manage Information Security Program Resources Enforce Policy and Standards Compliance Enforce Contractual Information Security Controls Enforce Information Security During Systems Development Maintain Information Security Within an Organization Provide Information Security Advice and Guidance Provide Information Security Awareness and Training Analyze the Effectiveness of Information Security Controls Resolve Noncompliance Issues 6 - Incident Management and Response Develop an Information Security Incident Response Plan Establish an Escalation Process Develop a Communication Process Integrate an IRP Develop IRTs Test an IRP Manage Responses to Information Security Incidents Perform an Information Security Incident Investigation Conduct Post-Incident Reviews

Certified Information Security Manager (CISM)
Delivered OnlineFlexible Dates
£1,995
1...45678...23