Earned Value Management: On-Demand: On-Demand Earned Value Management (EVM) incorporates a set of proven practices appropriate for project or program management methodologies. These include integration of program scope, schedule, and cost objectives, establishment of a baseline plan for accomplishment of program objectives and use of earned value techniques for performance measurement during the execution of a program. Earned Value Management (EVM) incorporates a set of proven practices appropriate for project or program management methodologies. These include integration of program scope, schedule, and cost objectives, establishment of a baseline plan for accomplishment of program objectives and use of earned value techniques for performance measurement during the execution of a program. EVM provides a solid platform for risk identification, corrective actions, and management re-planning as may be required over the life of a project or program. The course emphasis is on the latest EVM principles and concepts in accordance with changes and guidelines for Earned Value Management in The Guide to the Project Management Body of Knowledge (PMBOK® Guide) and The Practice Standard for Earned Value Management published by the Project Management Institute. What you Will Learn You'll learn how to: Develop a project baseline, using an effective WBS Record actual project performance Calculate EVM measures Evaluate project performance based on EVM measures Respond to project variances Integrate EVM and risk management Determine how EVM will add value to your organization Develop an EVM implementation plan for your organization Getting Started Introductions Course structure Course goals and objectives Expectations Foundation Concepts Introduction to Earned Value Management (EVM) Benefits of EVM EVM Process Overview Applications of EVM Creating a Work Breakdown Structure Reviewing WBS concepts Reviewing WBS development process (decomposition) Using a WBS to support EVM Building a Project Baseline Defining a project baseline Developing a project baseline Using a project baseline Recording Actuals Recording actuals overview Collecting data for actual project performance Determining earned value - various methods EVM Performance Measures Using current status measures Using forecasting measures Analyzing EVM measures EVM and Risk Management Integrating EVM and Risk Management Using EVM measures in the risk register Exploring how EVM can facilitate reserves management Drawing down contingency reserves Responding to Variances Introduction to variances Process for responding to variances Response options Reporting Project Performance EVM reporting overview Meeting EVM reporting needs Addressing EVM reporting challenges Implementing an EVMS Defining EVMS requirements EVM for Agile projects Tailoring the EVMS Summary and Next Steps Review of content Review of objectives / expectations Personal action plan
PRINCE2® (an acronym for PRojects INaControlled Environment series 2) is a de facto process-based method for effective project management. Used extensively by the UK Government, PRINCE2® is also widely recognised and used in the private sector, both in the UK and internationally. The PRINCE2® method is in the public domain, and offers non-proprietorial best practice guidance on project management.
Why Learn 3ds Max Basic to Advanced Training Course? Learn 3ds max design and animation with our comprehensive 3ds Max Basic to Advanced Training Course. Whether you're a beginner or an experienced user, this course is thoughtfully designed to elevate your skills. Course Link Duration: 40 hrs Method: 1-on-1, Personalized attention & Tailored content. Schedule: 1-on-1 training with flexible scheduling. Book a convenient hour, Mon to Sat, from 9 am to 7 pm. Course Details: Course Duration: 40 hours Course Syllabus: Part 1: Introduction to 3ds Max and Vray Familiarization with the 3ds Max Interface Configuring an efficient workspace in 3ds Max Seamless navigation within 3ds Max and Vray Understanding the power of Vray and its interface Part 2: 3D Modeling Precision crafting of fundamental shapes Mastering modifiers for advanced modeling Creating intricate 3D models using diverse techniques Learning the art of polygonal modeling Shaping both organic and inorganic models flawlessly Part 3: Texturing Applying and refining textures with expertise Grasping the essentials of UVW mapping Harnessing material editor to perfection Customizing materials with Vray materials Part 4: Lighting Discovering the magic of illumination Differentiating various light types Comprehending the subtleties of light properties Setting up captivating scenes with Vray lights Part 5: Animation Embarking on an animation adventure Expertly setting up keyframes and animation curves Infusing life into objects in a mesmerizing 3D space Elevating animations with Vray's prowess Part 6: Advanced Rendering with Vray Entering the realm of rendering excellence Mastering Vray Global Illumination for realism Optimizing visuals with Vray Physical Cameras Illuminating scenes with Vray HDRI Lighting Employing Vray Proxies and Render Elements for finesse Streamlining rendering workflow with Vray's techniques Part 7: Projects Showcasing skills through hands-on projects Crafting a captivating yet simple interior scene Designing an alluring exterior scene Taking on the challenge of a complex scene with multiple elements Course Requirements: A computer with 3ds Max and Vray installed (trial versions are available on Autodesk and Chaos Group websites) Basic knowledge of computer operations Enthusiasm for 3D modeling and animation Course Objectives: Upon completing the course, you will have mastered 3ds Max and Vray, enabling you to create photorealistic 3D scenes. The skills acquired will open doors to opportunities in the 3D modeling and animation industry, while also serving as a foundation for further honing your expertise. Course Overview: Photoshop Post-Production Delve into the world of Photoshop post-production through our comprehensive course. Learn essential photo editing techniques, including color correction, retouching, and compositing. Unleash your artistic potential by creating mesmerizing visual effects and stylizing your photos. Course Syllabus: Part 1: Introduction to Photoshop Post-Production Navigating the Photoshop Interface with ease Mastering the art of Layers and Layer Masks Embracing the power of Selections Understanding the basics of Color Correction Part 2: Retouching Techniques Unraveling common Retouching Tools and Techniques Removing blemishes, wrinkles, and unwanted elements Achieving remarkable results with Dodging and Burning Part 3: Compositing Embracing the art of Compositing Working seamlessly with Multiple Images Blending images flawlessly using Layer Masks Part 4: Visual Effects and Stylizing Techniques Crafting Special Effects with Layer Styles and Blending Modes Enhancing images with Filters Achieving mesmerizing effects with Color Grading and Adjustment Layers Part 5: Projects Applying your knowledge to hands-on projects Perfectly Retouching a portrait Creating an alluring composite image Fashioning a stylized masterpiece Course Requirements: A computer with Photoshop installed (trial version available on Adobe website) Basic knowledge of computer operations Passion for photo editing and manipulation
We're passionate about equipping churches to respond to domestic abuse. Our Domestic Abuse Awareness course will help you explore key questions around the issue of domestic abuse, like how to recognise the signs of domestic abuse, why domestic abuse happens, and how to start supporting survivors.
Duration 4 Days 24 CPD hours This course is intended for The information protection administrator translates an organization?s risk and compliance requirements into technical implementation. They are responsible for implementing and managing solutions for content classification, data loss prevention (DLP), information protection, data lifecycle management, records management, privacy, risk, and compliance. They also work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization's risk reduction and compliance goals. This role assists workload administrators, business application owners, human resources departments, and legal stakeholders to implement technology solutions that support the necessary policies and controls. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400). Prerequisites Foundational knowledge of Microsoft security and compliance technologies. Basic knowledge of information protection concepts. Understanding of cloud computing concepts. Understanding of Microsoft 365 products and services. 1 - Introduction to information protection and data lifecycle management in Microsoft Purview Know your data Protect your data Prevent data loss Govern your data 2 - Classify data for protection and governance Data classification overview Classify data using sensitive information types Classify data using trainable classifiers Review sensitive information and label usage Explore labeled and sensitive content Understand activities related to your data 3 - Create and manage sensitive information types Compare built-in versus custom sensitive information types Create and manage custom sensitive information types Describe custom sensitive information types with exact data match Implement document fingerprinting Create keyword dictionary 4 - Understand Microsoft 365 encryption Learn how Microsoft 365 data is encrypted at rest Understand service encryption in Microsoft Purview Explore customer key management using Customer Key Learn how data is encrypted in-transit 5 - Deploy Microsoft Purview Message Encryption Implement Microsoft Purview Message Encryption Implement Microsoft Purview Advanced Message Encryption Use Microsoft Purview Message Encryption templates in mail flow rules 6 - Protect information in Microsoft Purview Information protection overview Configure sensitivity labels Configure sensitivity label policies Configure auto-labeling policies Manage, monitor, and remediate information protection 7 - Apply and manage sensitivity labels Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites Plan on-premises labeling Configure on-premises labeling for the Unified Labeling Scanner Apply protections and restrictions to email and files Monitor label performance using label analytics 8 - Prevent data loss in Microsoft Purview Data loss prevention overview Identify content to protect Define policy settings for your DLP policy Test and create your DLP policy Prepare Endpoint DLP Manage DLP alerts in the Microsoft Purview compliance portal View data loss prevention reports Implement the Microsoft Purview Extension 9 - Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform Configure data loss prevention policies for Power Platform Integrate data loss prevention in Microsoft Defender for Cloud Apps Configure policies in Microsoft Defender for Cloud Apps Manage data loss prevention violations in Microsoft Defender for Cloud Apps 10 - Manage data loss prevention policies and reports in Microsoft 365 Configure data loss prevention for policy precedence Implement data loss prevention policies in test mode Explain data loss prevention reporting capabilities Manage permissions for data loss prevention reports Manage and respond to data loss prevention policy violations 11 - Manage the data lifecycle in Microsoft Purview Data Lifecycle Management overview Configure retention policies Configure retention labels Configure manual retention label policies Configure auto-apply retention label policies Import data for Data Lifecycle Management Manage, monitor, and remediate Data Lifecycle Management 12 - Manage data retention in Microsoft 365 workloads Explain retention in Exchange Online Explain retention in SharePoint Online and OneDrive Explain retention in Microsoft Yammer Activate archive mailboxes in Microsoft Exchange Apply mailbox holds in Microsoft Exchange Recover content in Microsoft Exchange 13 - Manage records in Microsoft Purview Records management overview Import a file plan Configure retention labels Configure event driven retention Manage, monitor, and remediate records 14 - Explore compliance in Microsoft 365 Plan for security and compliance in Microsoft 365 Plan your beginning compliance tasks in Microsoft Purview Manage your compliance requirements with Compliance Manager Examine the Compliance Manager dashboard Analyze the Microsoft Compliance score 15 - Search for content in the Microsoft Purview compliance portal Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 16 - Manage Microsoft Purview eDiscovery (Standard) Explore Microsoft Purview eDiscovery solutions Implement Microsoft Purview eDiscovery (Standard) Create eDiscovery holds Search for content in a case Export content from a case Close, reopen, and delete a case 17 - Manage Microsoft Purview eDiscovery (Premium) Explore Microsoft Purview eDiscovery (Premium) Implement Microsoft Purview eDiscovery (Premium) Create and manage an eDiscovery (Premium) case Manage custodians and non-custodial data sources Analyze case content 18 - Manage Microsoft Purview Audit (Standard) Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Search the audit log Export, configure, and view audit log records Use audit log searching to investigate common support issues 19 - Prepare Microsoft Purview Communication Compliance Plan for communication compliance Identify and resolve communication compliance workflow Case study--Configure an offensive language policy Investigate and remediate communication compliance alerts 20 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 21 - Implement Microsoft Purview Information Barriers Explore Microsoft Purview Information Barriers Configure information barriers in Microsoft Purview Examine information barriers in Microsoft Teams Examine information barriers in OneDrive Examine information barriers in SharePoint 22 - Manage regulatory and privacy requirements with Microsoft Priva Create and manage risk management policies Investigate and remediate risk management alerts Create rights requests Manage data estimate and retrieval for rights requests Review data from rights requests Get reports from rights requests 23 - Implement privileged access management Case study--Implementing privileged access management 24 - Manage Customer Lockbox Manage Customer Lockbox requests
face to face training customised and bespoke. Online or Face to Face
This online course trains you as a Youth Mental Health First Aider (MHFAider®), giving you: An in-depth understanding of young people’s mental health and factors that affect wellbeing Practical skills to spot the triggers and signs of mental health issues Confidence to reassure and support a young person in distress Enhanced interpersonal skills such as non-judgemental listening Knowledge to help a young person recover their health by guiding them to further support – whether that’s through self-help sites, their place of learning, the NHS, or a mix – engaging with parents, carers and external agencies where appropriate Ability to support a young person with a long term mental health issue or disability to thrive Tools to look after your own mental wellbeing Format This is an online course delivered through the MHFA England Online Learning Hub Learning takes place through four live training sessions spread across one to two weeks, with self-learning activities in between. See course structure section below for more detail Each session is built around a Youth Mental Health First Aid action plan We limit numbers to 16 people per course so that the instructor can keep people safe and supported while they learn Course StructureSession 1: Introduction Individual learning (1 hour 15 minutes): Introduction to the Online Youth Mental Health First Aid course and the Online Learning Hub Activity 1: Why Youth Mental Health First Aid? Activity 2: What is ALGEE? Activity 3: What is mental health? Activity 4: Mental health and stigma Activity 5: Mental health quiz: Impact of mental health Activity 6: Risk and protective factors for mental health Activity 7: The Stress Container Live session (2 hours 35 minutes): Introduction to the course Outline of live session 1, the value of Youth Mental Health First Aid Introduce ALGEE Recap what mental health is Recap the Mental Health Continuum Stigma Recap why Youth Mental Health First Aid is important Recap risk and protective factors The Stress Container The Frame of Reference Session 2: Depression, Anxiety & Self-Care Individual learning (1 hour 15 minutes): Activity 8: Your Stress Container Activity 9: Your Frame of Reference Activity 10: What is depression? Activity 11: What is anxiety? Live session (2 hours 10 minutes): Introduction to live session 2 Recap of homework after live session 1 Recap depression Signs and symptoms of depression in a young person Recap anxiety Signs and symptoms of anxiety in a young person ALGEE for depression and anxiety in a young person ALGEE for depression and anxiety, action 1 ALGEE for depression and anxiety, action 2-5 Self-care and close Session 3: Suicide & PsychosisIndividual learning (1 hour 20 minutes) Activity 12: Adolescent brain development Activity 13: About suicide Activity 14: Suicide risk factors Activity 15: What is psychosis? Activity 16: Lived experience of psychosis Activity 17: ALGEE for psychosis Live session (2 hours 5 minutes) Introduction to live session 3 Recap suicide Explore the impact of suicidal feelings ALGEE for suicidal crisis Practice non-judgemental listening skills Recap psychosis Recap warning signs and symptoms of psychosis Recap ALGEE for psychosis Session 4: Self-harm, Recovery & Action PlanningIndividual learning (1 hour 35 minutes) Activity 18: What is self-harm? Activity 19: What are eating disorders? Activity 20: Resilience Workbook activity 7: My action plan for using Youth Mental Health First Aid (completed after live session) Live session (2 hours 25 minutes) Introduction to live session 4 Recap self-harm, the self-harm continuum Warning signs of self-harm in young people ALGEE for self-harm Recap eating disorders ALGEE for eating disorders Applying MHFA to family and carers; the Recovery Tree Evaluation forms and close
Duration 2 Days 12 CPD hours This course is intended for This course can be valuable for anyone who needs to write basic SQL or Transact-SQL queries. This includes anyone working with data as a data analyst, a data engineer, a data scientist, a database administrator or a database developer. It can also be useful for others peripherally involved with data, or wanting to learn more about working with data such as solution architects, students and technology managers. This course will teach the basics of Microsoft's dialect of the standard SQL language: Transact-SQL. Topics include both querying and modifying data in relational databases that are hosted in Microsoft SQL Server-based database systems, including: Microsoft SQL Server, Azure SQL Database and, Azure Synapse Analytics. 1 - Introduction to Transact-SQL Work with schemas Explore the structure of SQL statements Examine the SELECT statement Work with data types Handle NULLs 2 - Sort and filter results in T-SQL Sort your results Limit the sorted results Page results Remove duplicates Filter data with predicates 3 - Combine multiple tables with JOINs in T-SQL Understand joins concepts and syntax Use inner joins Use outer joins Use cross joins Use self joins 4 - Write Subqueries in T-SQL Understand subqueries Use scalar or multi-valued subqueries Use self-contained or correlated subqueries 5 - Use built-in functions and GROUP BY in Transact-SQL Categorize built-in functions Use scalar functions Use ranking and rowset functions Use aggregate functions Summarize data with GROUP BY Filter groups with HAVING 6 - Modify data with T-SQL Insert data Generate automatic values Update data Delete data Merge data based on multiple tables Additional course details: Nexus Humans DP-080T00 Querying Data with Microsoft Transact-SQL training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP-080T00 Querying Data with Microsoft Transact-SQL course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for System administrators and operators who are operating in the AWS Cloud Informational technology workers who want to increase the system operations knowledge. Overview Identify the AWS services that support the different phases of Operational Excellence, an AWS Well-Architected Framework pillar Manage access to AWS resources using AWS accounts and organizations and AWS Identity and Access Management (IAM) Maintain an inventory of in-use AWS resources by using AWS services, such as AWS Systems Manager, AWS CloudTrail, and AWS Config Develop a resource deployment strategy using metadata tags, Amazon Machine Images (AMIs), and AWS Control Tower to deploy and maintain an AWS cloud environment Automate resource deployment by using AWS services, such as AWS CloudFormation and AWS Service Catalog Use AWS services to manage AWS resources through CloudOps lifecycle processes, such as deployments and patches Configure a highly available cloud environment that uses AWS services, such as Amazon Route 53 and Elastic Load Balancing, to route traffic for optimal latency and performance Configure AWS Auto Scaling and Amazon EC2 Auto Scaling to scale out your cloud environment based on demand Use Amazon CloudWatch and associated features, such as alarms, dashboards, and widgets, to monitor your cloud environment Manage permissions and track activity in your cloud environment by using AWS services, such as AWS CloudTrail and AWS Config Deploy your resources to an Amazon Virtual Private Cloud (Amazon VPC), establish necessary connectivity to your Amazon VPC, and protect your resources from disruptions of service State the purpose, benefits, and appropriate use cases for mountable storage in your AWS Cloud environment Explain the operational characteristics of object storage in the AWS Cloud, including Amazon Simple Storage Service (Amazon S3) and Amazon S3 Glacier Build a comprehensive cost model to help gather, optimize, and predict your cloud costs by using services such as AWS Cost Explorer and the AWS Cost & Usage Report This course teaches systems operators and anyone performing cloud operations functions how to manage and operate automatable and repeatable deployments of networks and systems on AWS. You will learn about cloud operations functions, such as installing, configuring, automating, monitoring, securing, maintaining, and troubleshooting these services, networks, and systems. The course also covers specific AWS features, tools, and best practices related to these functions. Prerequisites Successfully completed the AWS Technical Essentials course Background in either software development or systems administration Proficiency in maintaining operating systems at the command line, such as shell scripting in Linux environments or cmd/PowerShell in Windows Basic knowledge of networking protocols (TCP/IP, HTTP) 1 - Introduction to Cloud Operations on AWS What is Cloud Operations AWS Well-Architected Framework AWS Well-Architected Tool 2 - Access Management AWS Identity and Access Management (IAM) Resources, accounts, and AWS Organizations 3 - System Discovery Methods to interact with AWS services Tools for automating resource discovery Inventory with AWS Systems Manager and AWS Config Hands-On Lab: Auditing AWS Resources with AWS Systems Manager and AWS Config 4 - Deploy and Update Resources Cloud Operations in deployments Tagging strategies Deployment using Amazon Machine Images (AMIs) Deployment using AWS Control Tower 5 - Automate Resource Deployment Deployment using AWS CloudFormation Deployment using AWS Service Catalog Hands-On Lab: Infrastructure as Code 6 - Manage Resources AWS Systems Manager Hands-On Lab: Operations as Code 7 - Configure Highly Available Systems Distributing traffic with Elastic Load Balancing Amazon Route 53 8 - Automate Scaling Scaling with AWS Auto Scaling Scaling with Spot Instances Managing licenses with AWS License Manager 9 - Monitor and Maintain System Health Monitoring and maintaining healthy workloads Monitoring AWS infrastructure Monitoring applications Hands-On Lab: Monitor Applications and Infrastructure 10 - Data Security and System Auditing Maintaining a strong identity and access foundation Implementing detection mechanisms Automating incident remediation 11 - Operate Secure and Resilient Networks Building a secure Amazon Virtual Private Cloud (Amazon VPC) Networking beyond the VPC 12 - Mountable Storage Configuring Amazon Elastic Block Store (Amazon EBS) Sizing Amazon EBS volumes for performance Using Amazon EBS snapshots Using Amazon Data Lifecycle Manager to manage your AWS resources Creating backup and data recovery plans Configuring shared file system storage Hands-On Lab: Automating with AWS Backup for Archiving and Recovery 13 - Object Storage Deploying Amazon Simple Storage Service (Amazon S3) Managing storage lifecycles on Amazon S3 14 - Cost Reporting, Alerts, and Optimization Gaining AWS cost awareness Using control mechanisms for cost management Optimizing your AWS spend and usage Hands-On Lab: Capstone lab for CloudOps Additional course details: Nexus Humans Cloud Operations on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cloud Operations on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Gain an in-depth understanding of GDPR solutions and how they map to compliance requirements. Learn how to perform and lead Privacy Information Management System (PIMS) certification audits to ISO 19011 standards. Enhance your existing or learn with new skills in the field of Data Protection; Candidates deliver Assurance services to organisations by advising on conformance with PIMS requirements; Become a Technical expert on the preparation required for ISO 27701 Certification About This Course Learning outcomes Understand a Privacy Information Management System (PIMS) and its processes based on ISO/IEC 27701 Identify the relationship between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks Acquire the competences of the auditor's role in planning, leading, and following up on a management system audit in accordance with ISO 19011. Learn how to interpret the requirements of ISO/IEC 27701 in the context of a PIMS audit Course Overview Domain 1-The Process of Auditing Information Privacy Systems & Solutions Domain 2-Governance & Management of Information Privacy Technology Domain 3-Information Systems Acquisition, Development & Implementation Domain 4-Information Systems Operations, Maintenance & Service Management Domain 5-Protection of Personally Identifiable Information (PII) Assets Course Agenda Day 1: Introduction to Privacy Information Management System (PIMS) and ISO/IEC 27701 Day 2: Audit principles, preparation, and launching of an audit Day 3: On-site audit activities and Closing the Audit Accreditation This course is Accredited by NAS and Administered by the IECB Assessment All candidates at official training courses will be tested throughout the course delivery, with quizzes and exercises. The final exam is a 10 question essay type exam, offered on the afternoon of the final day. This exam should be completed within 180 minutes. A passing score is achieved at 70%. Self-study candidates can purchase an exam voucher from our Store. Prerequisites None, but candidates would benefit from having a fundamental understanding of Audit principles What's Included? Comprehensive course materials totalling some 450 pages Case Study Exam fees Exam pass guarantee Who Should Attend? Auditors seeking to perform and lead Privacy Information Management System (PIMS) certification audits Managers or consultants seeking to master a PIMS audit process Individuals responsible for maintaining conformance with PIMS requirements Technical experts seeking to prepare for a PIMS audit Expert advisors in the protection of Personally Identifiable Information (PII)