• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

41 Auditor courses in London

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Practical Approach to Auditing Systems and Processes

By Research Quality Association

COURSE INFORMATION Our extensively proven course delves into the essential stages of process and system auditing. Gain invaluable insights and direction in auditing systems and processes, spanning across global and local organisational levels. THIS COURSE WILL ASSIST DELEGATES WITH: * A practical approach for the development and conduct of process and system audits * An enhanced understanding of key system audit principles, preparation, design and conduct * Increased expertise, efficiency and confidence. THIS COURSE IS STRUCTURED TO ENCOURAGE DELEGATES TO: * Discuss and develop ideas * Solve specific problems * Share knowledge and experiences. BY THE END OF THE COURSE DELEGATES WILL BE BETTER ABLE TO: * Design and plan more effectively to achieve their process and systems audit objectives and add value to their organisation * Improve the effectiveness, focus and credibility of the audit programme * Understand the key system audit principles, preparation, design and conduct * Develop system audit tools to ensure more effective audit conduct and outcome * Create audit strategies utilising risk management principles * Prepare for inspections. -------------------------------------------------------------------------------- TUTORS Tutors will be comprised of (click the photos for biographies): ALLISON JACK Executive Director, Bristol Myers Squibb ROCIO CASTELLANOS Director, Pfizer Ltd GUY HOUBEN G(C)LP Auditor, Janssen Pharmaceutical Companies of Johnson & Johnson -------------------------------------------------------------------------------- PROGRAMME Please note timings may be subject to alteration. DAY 1 08:50 REGISTRATION 09:00 WELCOME AND INTRODUCTIONS, EXPECTATIONS/CHALLENGES/EXPERIENCES A discussion to explore the range of approaches to the conduct of systems audit. 09:30 INTRODUCING SYSTEMS AUDIT What is a system? Why conduct system audits? Advantages, disadvantages and challenges. 10:20 BREAK 10:35 SYSTEMS AUDIT DESIGN AND PLANNING Identifying the customer, setting objectives, development of the audit plan and audit tools, plans for the audit report. 12:00 DESIGNING SYSTEM AUDIT TOOLS 12:45 LUNCH 13:30 SYSTEM AUDIT PLAN - EXERCISE 14:00 INTRODUCTION TO CASE STUDIES The objectives of the case studies are defined and process and outputs described. 14:15 CASE STUDIES - SESSION 1 A first opportunity for work on case studies. Defining objectives and scope and understanding the requirements of the audit client. 15:00 BREAK 15:20 CASE STUDIES - SESSION 1 CONTINUED 16:30 CASE STUDIES - FEEDBACK 17:00 CLOSE OF DAY 1 DAY 2 09:00 SIMPLE SYSTEM AUDIT EXAMPLE - INTRODUCTION The objectives of the case studies are defined and process and outputs described. 09:10 CASE STUDIES - SESSION 2 - A SIMPLE SYSTEM AUDIT EXAMPLE An example of system audit applied to a simple system. 10:30 BREAK 10:45 A SIMPLE SYSTEM AUDIT EXAMPLE - CASE STUDY FEEDBACK 11:30 STRATEGY Audit programme planning. 12:15 LUNCH 13:00 CASE STUDIES - SESSION 3 Work on delegate's case studies. 14:30 BREAK 14:45 CASE STUDIES - SESSION 3 - FEEDBACK 15:15 CLOSING REMARKS 15:30 CLOSE OF COURSE -------------------------------------------------------------------------------- EXTRA INFORMATION Face-to-face course COURSE MATERIAL Course material will be available in PDF format for delegates attending this course. The advantages of this include: * Ability for delegates to keep material on a mobile device * Ability to review material at any time pre and post course * Environmental benefits – less paper being used per course. The material will be emailed in advance of the course and RQA will not be providing any printed copies of the course notes during the training itself. Delegates wishing to have a hard copy of the notes should print these in advance to bring with them. Alternatively delegates are welcome to bring along their own portable devices to view the material during the training sessions. Remote course COURSE MATERIAL This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. THE ADVANTAGES OF THIS INCLUDE: * Ability for delegates to keep material on a mobile device * Ability to review material at any time pre and post course * Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam.   CPD POINTS 14 Points   DEVELOPMENT LEVEL Develop

Practical Approach to Auditing Systems and Processes
Delivered Online or in HayesTwo days, Nov 19th, 09:00
£851 to £1105

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

PENETRATION TESTING TRAINING COURSE DESCRIPTION An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. WHAT WILL YOU LEARN * Perform penetration tests. * Explain the technical workings of various penetration tests. * Produce reports on results of penetration tests. * Defend against hackers. PENETRATION TESTING TRAINING COURSE DETAILS * Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. * Prerequisites: IP Security IP VPNs * Duration 5 days PENETRATION TESTING TRAINING COURSE CONTENTS * Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. * Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering * Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. * Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. * Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. * Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. * Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. * Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. * DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. * SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. * Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. * Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. * Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

How to identify and mitigate procurement fraud and corruption - IN PERSON

By Global Risk Alliance Ltd

Our training programme will provide those involved at any stage of the process for procuring goods and/or services within their organisations with the knowledge and skillset to identify and mitigate the threat posed by the breadth and multi-layered complexity of procurement fraud and corruption.

How to identify and mitigate procurement fraud and corruption - IN PERSON
Delivered in-person, on-requestDelivered In-Person in Internationally
£5000 to £7000

Assessing and Managing Cyber Security Risks for Essential Services Operators

By Asia Edge

ABOUT THIS VIRTUAL INSTRUCTOR LED TRAINING (VILT) This 3 half-day Virtual Instructor Led Training (VILT) course will help participants grasp the idea of real-world risk management and how this relates to the cyber world. The VILT course will cover topics surrounding identifying cyber risks and vulnerabilities, guidance on applying administrative actions, and comprehensive solutions to ensure your organization is adequately secure and protected. The VILT course will guide participants on how to conduct a security risk assessment for their organization, and equip them with the skills to develop a risk compliance assessment plan as well as methods to develop risk management strategies which can improve their organization's security posture. The VILT course has at least a 30% hands-on approach through the use of Table Top Exercises. The VILT course will cover the following modules: 1. Introduction to Risk Assessments (RA) 2. Threat Actors and Their Motivations 3. Threat and Risk Assessment 4. Critical Controls Identification 5. Maturity Assessment 6. Treated Cyber Risk Profile 7. Target Cyber Risk Profile and Strategy Target Audience The VILT course is intended for professionals responsible for organizational information and security system and those involved in operating and maintenance of critical information and IT network & sotware systems. Professionals who are designated as the Single Point of Accountability (SPoA) as well as system auditors will find this course useful. Course Level * Basic or Foundation Training Methods The VILT course will be delivered online in 3 half-day sessions comprising 4 hours per day, with 2 x 10 minutes break per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 3 half-day sessions, 4 hours per session (12 hours in total). This VILT course is delivered in partnership with ENGIE Laborelec. Trainer Your expert course leader is a is specialized in cybersecurity risk management. Before joining ENGIE, she worked for The National Cybersecurity Agency of France (ANSSI) based in Paris (France) and for Deloitte Belgium located in Zaventem (Belgium). She has been involved in cybersecurity projects focusing on the principle of protecting critical infrastructures. Her different experiences in Cyber Security, Anti-Money Laundering and Global Trade Compliance (including Export Control and Customs) gave her the opportunity to use methodologies tackling strategic, operational and financial control issues at all levels of an organization: people, business processes, IT applications and infrastructure, legal and regulatory compliance. She was an EBIOS Risk Manager (RM) trainer while she worked for the French government; EBIOS RM is the French method for assessing and treating digital risks. She also had the opportunity to represent France towards European institutions and other relevant stakeholders for topics related to cybersecurity risk management. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Assessing and Managing Cyber Security Risks for Essential Services Operators
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1324 to £2499

IP security foundation for engineers

5.0(3)

By Systems & Network Training

IP SECURITY TRAINING COURSE DESCRIPTION Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls. WHAT WILL YOU LEARN * Describe: Basic security attacks RADIUS SSL IPSec VPNs * Implement digital certificates * Deploy firewalls to protect Web servers and users. * Secure Web servers and clients. IP SECURITY TRAINING COURSE DETAILS * Who will benefit: Network administrators. Network operators. Security auditors * Prerequisites: TCP/IP foundation for engineers * Duration 2 days IP SECURITY TRAINING COURSE CONTENTS * TCP/IP review Brief overview of the relevant headers. Hands on Download software for course, use analyser to capture passwords on the wire. * Security review Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. * Security exploits The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death… keeping up to date with new threats. Hands on Use a port scanning tool, use a 'hacking' tool. * Firewalls Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses. Hands on Set up a firewall and prevent attacks. * NAT NAT and PAT, Why use NAT, NAT-ALG, RSIP. * Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Run a password-cracking program. * Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS. Hands on Using certificates. * Web client and server security Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts. Hands on Browser security. * VPNs and IPSec What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.

IP security foundation for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1497

Tripod Beta Practitioner - Bronze Level

By Asia Edge

ABOUT THIS VILT Tripod can be used in any area of business where the organisation has a management system in place to prevent unwanted events e.g., health, safety, environment, quality, security, productivity, project management, and many more Tripod Beta is one of several tools based on Tripod's fundamental principles. Tripod Beta is based on proven theories, man years of academic research, and testing in the workplace. The Swiss Cheese Model originated from this work. Features of the methodology are: 1) the Tripod Beta diagram; it provides an easy-to-read summary of the entire investigation on a single page, 2) it accommodates deficiencies in leadership and worker participation, 3) it accommodates deficiencies in human behaviour, and 4) it highlights missing controls (not just controls that failed). Quality throughout all aspects of Tripod is assured by the Stichting Tripod Foundation (STF) and the Energy Institute. The participants will gain a theoretical understanding of the Tripod Beta methodology and terminology. They will be able to read Tripod diagrams and reports, and be able to assist incident investigation/analysis as a team member.  This is the first step to becoming an accredited silver or gold practitioner. Tripod Beta Practitioner Accreditation is meant to build these skills, through a blend of support, coaching and assessments. Feedback is provided on Tripod incident investigation reports, giving the Practitioner the opportunity to hone their skills and become confident in their ability to use Tripod effectively. Training Objectives Upon completion of this course, participants will be able to: * Pass the Tripod Beta Practitioner (Bronze Level) exam * Act as a team member or Tripod facilitator on an incident investigation * Plan and schedule activities for an incident investigation * Focus line of enquiry during an investigation * Engage with the most relevant people at each stage of the investigation * Describe the incident causation paths in terms that align with their management system * Consider issues relating to leadership, worker participation and human behaviour * Assess the quality of an incident report * Apply the process to any type of unwanted event that should have been prevented by a management system e.g., health, safety, environment, financial, security, productivity, quality, project management etc. * Combine the findings from many incidents with data from other initiatives e.g., audits and inspections, to spot trends to prioritise actions and product a single improvement plan Target Audience The course is recommended for anyone who is expected to play a role in designing, reviewing, auditing, and following your organizations OH&S management system. Successful participants will be awarded the Stitching Tripod Foundation Tripod Beta Bronze certificate. The following oil & gas company personnel will benefit from the knowledge shared in this course: * CEO * Team Leaders * Legal, insurance and finance departments * Managers (Line and Function) * Maintenance Engineers * Quality Assurance Engineers * Process Engineers * Incident Investigators (Team member & Tripod facilitator) * Project Managers * System Custodians * Technical Authorities * Key Contractor's Management * Contract Managers/Holders * Safety Representatives * Risk Management Engineers * HSE Advisors * Supervisors * Auditors * Regulators Course Level * Basic or Foundation Trainer Your expert course leader has over 30 years of experience in construction, operations and maintenance with the upstream exploration and production sector. He joined Shell International E&P in 1971 and for 28 years worked in several locations around the world. Following the Piper Alpha incident he led Shell's two year, £10M major overhaul of their permit to work system. He first made use of the Tripod Beta principles during this period and since then he has delivered over 100 Tripod Beta courses in more than 25 locations around the world. He is a Chartered Engineer, a member of the Institution of Engineering and Technology and holds a postgraduate diploma from the University of Birmingham (UK). POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Tripod Beta Practitioner - Bronze Level
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£900 to £1699

An Understanding of Ear Anatomy and Otoscopy

By Guardian Angels Training

Gain comprehensive knowledge of ear anatomy and otoscopy with our course. Ideal for healthcare professionals, medical students, and audiologists.

An Understanding of Ear Anatomy and Otoscopy
Delivered in-person, on-requestDelivered In-Person in Internationally
£875

An Understanding of Ear Assessment and Care Update (including Ear Irrigation)

By Guardian Angels Training

Enhance your ear assessment and care skills with our comprehensive course on ear irrigation. Gain practical knowledge and updated insights for optimal ear hygiene.

An Understanding of Ear Assessment and Care Update (including Ear Irrigation)
Delivered in-person, on-requestDelivered In-Person in Internationally
£875

Internal Audit Leadership Management

5.0(10)

By GBA Corporate

OVERVIEW -------------------------------------------------------------------------------- Internal auditing is an independent and objective activity to evaluate an organisation's internal operations. You'll learn how to initiate an audit, prepare and conduct audit activities, compile and distribute audit reports and complete follow-up activities. It is very important for the organisation to have a smooth flow of accounting as it plays a very important role in the development of the organisation. Financial Managers or any person who deals with Accounts need to see that the company accounts are very updated and are free from any risks that can become a problem during the time of Auditing.  Objectives   By the end of the course, participants will be able to: * Efficiently dealing with senior leaders with confidence  * Effective Contribution and Strategically Analysing and Auditing towards business success * Analysing and Evaluating as an effective internal audit leader * How to manage key relationships with the audit committee * Practical methods for managing the audit committee and senior management * Describing the significance to help maximize the contribution to their organization

Internal Audit Leadership Management
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
FREE

Selling with NLP (In-House)

By The In House Training Company

Take your sales people from average to high performance. Motivate and develop experienced sales professionals with some new insights and learning. Applying NLP principles, techniques and models, this workshop will introduce the core attitudes and behaviours that differentiate the excellent sales person from the average one. The programme will help participants: * Understand and adopt the mindset and beliefs needed for sales excellence * Build rapport and connect with buyers at a deeper and more personal level * Recognise some of the thinking and language patterns that make each individual unique * Ask powerful questions to further understand the unique world of the individual and how they make decisions * Apply tools and techniques to empathise with clients - seeing things from their perspectives * Tailor their sales approach to the individual buyer's style, and talk in their language * Influence with integrity and sell to organisations and individuals successfully 1 INTRODUCTION * Aims and objectives of the programme * Personal introductions and objectives * Workshop overview 2 AN INTRODUCTION TO NLP AND SALES EXCELLENCE WITH NLP * An overview of NLP and applying it to selling * The pillars of NLP * The NLP model of communication * The difference that makes the difference 3 BUILDING ENHANCED RAPPORT * Defining rapport and why it is important when selling * Going beyond the initial small talk * Building relationships with individual decision-makers * Matching and mirroring * Levels of rapport 4 UNDERSTANDING THE BUYER'S PERSONAL BUYING MAP * How we take in, filter and process information * How we judge others based on our own experiences of the world * The different ways in which we communicate when selling * Recognising and understanding the language and thinking patterns of others * Adapting your sales communication style to different buyers 5 MAKING SENSE OF THE BUYING PROCESS * How we filter information through our senses * Understanding how we see, hear and experience the world * Visual, auditory and kinaesthetic buyers * Listening for key insights * What different buyers want from you to help them to buy * Applying sensory awareness to the sales process 6 SUCCESSFUL SALES MINDSET * The connection between thoughts and actions * The sales beliefs of excellence * Identifying negative thoughts and beliefs that are holding you back * How to change your mindset * Adopting the sales beliefs of excellence 7 POWERFUL QUESTIONS * Reviewing and honing your questioning skills * Understanding the questions that great sales people ask * Avoiding assumptions * Clean language questions * Getting to the bottom of it - precision questions * Turbo-charging how you qualify 8 INFLUENCING WITH INTEGRITY * Understanding empathy * Stepping into the buyer's shoes * Speaking the buyer's language * Tailoring your sales approach to the individual * Match, pace, lead - how to take your buyer with you 9 PUTTING IT ALL TOGETHER * Personal learning summary and action plans

Selling with NLP (In-House)
Delivered in-person, on-request, onlineDelivered Online & In-Person in Harpenden
Price on Enquiry