Duration 1 Days 6 CPD hours This course is intended for This course is intended for IT Asset Managers and other professionals involved in Asset Management, strategic planning, security programs and those affected or influenced by ITAM and security initiatives. The mission of IAITAM?s CAMSE course is to maximize the contribution of IT Asset Management professionals to the information security and physical security of the organization by bridging the gap between ITAM and IT security processes while incorporating security strategies throughout the ITAM policies, processes and procedures so that ITAM enhances the security program and improves the applicable governance. This course includes the comprehensive online examination necessary for achieving CAMSE Certification. Course Outline Scope of IT Security & ITAM Threat Prevention vs. Threat Protection Decentralized vs. Centralized Security The IT Security Plan ITAM?s Role in Risk Management The 12 KPAs & Security Program Management & Security Communication & Education Management & Security Policy Management & Security Acquisition Management & Security Asset Identification Management & Security Disposal Management & Security Project Management & Security Documentation Management & Security Financial Management & Security Legislation Management & Security Compliance Management & Security Vendor Management & Security Assessing Asset Risk Level Program Issues by Asset Type ITAM Program Assessment for Security
Duration 5 Days 30 CPD hours This course is intended for Anyone whose position requires CCSP certificationIndividuals whose responsibilities involve procuring, securing, and managing cloud environments or purchased cloud services Overview In-depth coverage of the six domains required to pass the CCSP exam:Architectural concepts and design requirementsCloud data securityCloud platform and infrastructure securityCloud application securityOperationsLegal and compliance This course is the most comprehensive review of cloud security concepts and industry best practices covering the six domains of the CCSP Common Body of Knowledge (CBK). You will gain knowledge in identifying the types of controls necessary to administer various levels of confidentiality, integrity, and availability, with regard to securing data in the cloud. You will identify the virtual and physical components of the cloud infrastructure with regard to risk management analysis, including tools and techniques necessary for maintaining a secure cloud infrastructure. You will gain an understanding in cloud software assurance and validation, utilizing secure software, and the controls necessary for developing secure cloud environments. You will identify privacy issues and audit processes utilized within a cloud environment, including auditing controls, assurance issues, and the specific reporting attributes. Architectural Concepts and Design Requirements Cloud Data SecurityCloud Platform and Infrastucture Security Cloud Application SecurityOperations Legal and compliance
Duration 1 Days 6 CPD hours This course is intended for This class is intended for individuals with some level of experience overseeing, managing, or working on projects. Overview Project Management FrameworkInitiatingPlanningExecutingMonitoring and ControllingClosing This one-day course introduces the senior managers, department managers, and other key stakeholders to the principles and processes of project management. Project Management Framework What is a Project? What is Project Management? Role of a Project Manager Project, Program, and Portfolio Management Strategy, Portfolio, Program, and Project Management Organizational Goals Project Selection Criteria The Project Life Cycle Overview Case Study Selection Initiating Initiating Process Group Overview Develop Project Charter Identify Stakeholders Planning Planning Process Group Overview Develop Project Management Plan Collect Requirements Define Scope and Create WBS Determine Project ROI Schedule Processes Cost Management Processes Plan Quality Management Plan Human Resource Management Project Human Resource Difficulties Plan Communications Management Risk Management Activities Plan Procurement Management Executing Executing Process Group Overview Team Building Lessons Learned Monitoring & Controlling Monitoring and Controlling Process Group Overview Perform Integrated Change Control Monitoring and Controlling Processes Verify Scope Closing Closing Process Group Overview Close Project or Phase Close Procurements
Level 4 Endorsed Diploma - International Trade Qualification Complete all 15 modules and 3 assessments, from a choice of 7 to earn a Level 4 Diploma in International Trade.
Become an FSSC 22000 v6 Lead Auditor with our CQI and IRCA certified course. Gain the skills to lead food safety management audits and elevate your career. Enroll today!
Duration 4 Days 24 CPD hours This course is intended for This course assumes the student has successfully taken and passed the NCSF Foundation 2.0 course based on the NIST Cybersecurity Framework version 1.1, release April 2018. Following the course introduction, the course provides an introduction to the intersection between digital transformation and cybersecurity, which is followed by an overview of the threat landscape. Following an approach to the implementation of cybersecurity controls, the course delves into an organizational approach to cybersecurity that starts governance, management, and a supportive culture,Finally, the course provides additional guidance for the cybersecurity practitioner to determine the current state, the desired state, and a plan to close the gap - and to do this over and over again to inculcate it into organizational DNA. Overview This course looks at the impact of digital transformation on cybersecurity risks, an understanding of the threat landscape, and an approach to the application of cybersecurity controls. It provides guidance for students on the best approach to design and build a comprehensive cybersecurity program. Executives are keenly aware of the risks but have limited knowledge on the best way to mitigate these risks. This course also enables our executives to answer the critical question - Are we secure? The class includes lectures, informative supplemental reference materials, quizzes, exercises, and formal examination. The exercises are a critical aspect of the course; do not skip them. Outcomes and benefits from this class is a practical approach that students can use to build and maintain comprehensive cybersecurity and cyber-risk management programs. This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSP) across an enterprise and its supply chain. Digital Transformation Explores what the Practitioner needs to know about the relationship between digital transformation and cybersecurity Explain how to determine the impact of cybersecurity on DX. Explain the relationships between culture and digital transformation from the perspective of a practitioner. Explain the delivery of value to stakeholders in a DX & cybersecurity environment. Illustrate the interdependent relationship between cybersecurity and DX. Threat Landscape The Practitioner needs to understand what threat actors do and their capabilities. Compare the evolving attack type impact to the threat environment. Apply knowledge about the threat landscape to maintain a readiness to respond. Develop a risk profile based on business impact analysis Establish the relationship between awareness and training in the continual improvement of cybersecurity posture. Develop and treat training & awareness as a critical aspect of deterrence Use knowledge about the threat landscape as a predicate to the adoption and adaptation of your cybersecurity posture. The Controls This chapter provides a sample set of controls based on an informative reference. Understand the purpose goals & objectives for each control. Characterize & explain the informative reference controls Discover how to apply the controls in an organizational context. Adopt & Adapt Adopt is a decision about governance; adapt is the set of management decisions that result from the decision to adopt. Distinguish Adopt, Adapt, Management & Governance. Develop an approach to adoption & adaptation. Distinguish & demonstrate the impact of organizational culture on developing cybersecurity as a capability. Develop an assessment approach to define current state. Adaptive Way of Working Threat actors are agile and highly adaptive. The cybersecurity Practitioner must develop the same capabilities Break down what constitutes an adaptive approach. Characterize & apply the need for crossfunctional teams. Recognize and prioritize the first steps (get started). Demonstrate & establish cybersecurity phases. Break down the impact of the flows. Rapid Adoption & Rapid Adaptation FastTrack FastTrack? is an approach to allow organizations to learn to adapt to an evolving threat landscape rapidly. Approach: Establish what it takes to adopt CS. Determine how that impacts management adaptation of CS. Determine how that impacts the capability to assess. CS Capability: Determine the gap between existing & needed capabilities. Establish what must be developed. Develop appropriate risk management profile. Discover how cybersecurity impacts people, practice & technology impacts organization. Differentiate CIS Implementation groups. Determine appropriate implementation group & approach. Develop appropriate phase approaches. CIIS Practice Cybersecurity is an ongoing game of cat and mouse. Organizations must learn how to inculcate cybersecurity improvement into their DNA. Break down & develop mechanisms for ongoing cybersecurity improvement that includes developing a learning organization. Illustrate an improvement plan based on the NIST 7-Step Approach. Illustrate an improvement plan based on the Improvement GPS Demonstrate understanding of Cybersecurity Maturity Model Certification Break down the balancing loop & how it fits into the escalation archetype Use the Fast Track? (improvement & implementation) cycles.
This one-day programme explores the role of intellectual property (IP) in relation to innovation and creativity. It examines the different forms as well as the key processes, together with some of the oddities and idiosyncrasies of the legal regime that protects IP. It delves into the various IP models you should be aware of as well as key IP facts and figures and current IP trends across the global economy. This session is designed to give you a deeper understanding of: The main forms of intellectual property The importance of IP - both to your organisation and to the wider economy The key processes in the creation, commercial exploitation, and legal protection of IP The different models for the use of IP Some more advanced concepts for reviewing, valuing and managing IP 1 Main forms of intellectual property (IP) Patents Trademarks Copyright Design Trade secrets 2 Global IP business context Global IP facts and figures Figures for key jurisdictions Analysis of a company using IP data IP trends Overview of the key entities in the IP sector 3 Key IP processes IP creation IP portfolio management IP enforcement IP exploitation IP risk management 4 IP models IP models explained IP licensing IP litigation 5 IP concepts The IP maturity ladder Relative IP value and risk Axis of control 6 IP as an asset class Costs Valuation Financial perspective
Our Legionella/Water Quality Risk Management – General Awareness course offers a basic introduction to Legionnaires' disease Management and Control.
– essential guidance for safe and effective remote working Join our expert tutors to discover how you can make online therapy work for your practice Accredited CPD Certificate: 4 hours Length: 9am – 1.15pm (BST) LIVE ONLINE – Specialist training in delivering effective therapy online or over the phone – Join Ros Townsend live online on Tuesday 11th June 24 for this jam-packed, informative session. You will receive your Zoom link the day before the event. NB. Spaces are limited and tend to go quickly. Register your interest here if you can’t make this date, and we’ll let you know when there’s another one. BONUS RECORDING – the training is recorded, in case of technical difficulties, so you will also get a recording for 2 weeks afterwards to maximise your learning. Delivering online therapy, or counselling clients on the phone, requires a particular set of skills and brings with it specific considerations. This live online workshop will help you gain confidence in working safely and ethically, examining the advantages, potential drawbacks and adjustments you need to make to work remotely successfully. There will be plenty of time for questions, and helpful discussions with your peers and experienced tutors. Why take this course Whether you are a new practitioner wanting to develop your online practice, or an experienced therapist who has decided to start offering services online or on the phone, this course will help you gain the skills and understanding you need to do so safely and effectively. Unlike other online courses, this practical live online CPD training gives you the opportunity to ask our experienced tutors questions about any aspects that concern you, as well as learning from their case histories about what has worked – and what hasn’t – for them. Covering essential areas such as managing client expectations, setting up a therapeutic online environment, risk management, and the use and adaptation of various skills and techniques for online or telephone work, this course gives you the essential information you need to deliver therapeutic interventions remotely. Both Jo Baker and Ros Townsend, the course tutors, have extensive experience of working with clients online, with Ros now running her entire therapy practice remotely. Jo works using a blended approach (combining face-to-face counselling and online psychotherapy), and both bring a wealth of practical tips, hands on experience and real-life examples to the training. During the day, there will be ample opportunity to discuss and share ideas with both tutors and peers, and to enter into both structured and more free-ranging discussions about both the benefits and potential difficulties that one might encounter when working therapeutically through remote mediums. What the training covers: The importance of aligning client and therapist expectations for online therapy, or therapy over the phone How to set-up successfully for work on the phone or online – including template agreements to use with your clients Managing your technology and ensuring good communication – key things to ascertain, plus troubleshooting tips What to do when the call won’t connect The importance of confidentiality and privacy – and the potential problems you need be aware of when working online Agreeing safe communication methods between sessions How to successfully manage dual therapy spaces The importance of setting and maintaining professional boundaries Discussion regarding what is / is not acceptable in a home therapy space How to manage transitions before and after the session – for clients and therapists The key differences between online and face to face therapy work How to adapt and work successfully with a range of key therapeutic skills – such as Guided Imagery and The Rewind technique Assessing suitability of client presentations – including guidance on cases that are not suitable for online therapy How to manage risk effectively in an online or telephone environment How to put in place effective contingency plans for when technology fails Developing flexibility: dealing with the unexpected – including what to do if a session is interrupted When to refer a client on The additional pressures and potential stressors of online and telephone working Working in a blended way – combining remote and face-to-face sessions Key differences for the client of receiving therapy online or over the telephone The particular considerations of working with a wider client group from different geographical locations The importance of self-care and self-awareness Insurance and GDPR considerations when delivering online therapy or counselling, or working via the phone The importance of appropriate supervision Course Programme The ‘Online and phone therapy training’ course starts at 9.00am and runs until 1.15pm. (BST). 9.00am Join the Zoom meeting 9.15am First session starts 11.00am Comfort break and discussion 11.30am Second session 1.15pm Day ends Who is this course suitable for? This course is designed for both trainee and fully-qualified therapists, psychotherapists and counsellors It is recommended to all HG practitioners by the Human Givens Institute – trainee HG Therapists are expected to take this training if they are considering working online. This course has been independently accredited by the internationally recognised CPD Standards Office for 4 hours of CPD training. On completion of this training you’ll receive CPD certificates from the College and the CPD Standards Office.