• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

14 CIA courses in Manchester delivered Live Online

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Certified Information Systems Auditor (CISA)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security. Overview Upon successful completion of this course, students will be able to: - implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices. - evaluate an organizations structure, policies, accountability, mechanisms, and monitoring practices. - evaluate information systems acquisition, development, and implementation. - evaluate the information systems operations, maintenance, and support of an organization; and evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained. - define the protection policies used to promote the confidentiality, integrity, and availability of information assets. In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives. 1 - THE PROCESS OF AUDITING INFORMATION SYSTEMS * ISACA Information Systems Auditing Standards and Guidelines * Fundamental Business Processes * Develop and Implement an Information Systems Audit Strategy * Plan an Audit * Conduct an Audit * The Evidence Life Cycle * Communicate Issues, Risks, and Audit Results * Support the Implementation of Risk Management and Control Practices 2 - IT GOVERNANCE AND MANAGEMENT * Evaluate the Effectiveness of IT Governance * Evaluate the IT Organizational Structure and HR Management * Evaluate the IT Strategy and Direction * Evaluate IT Policies, Standards, and Procedures * Evaluate the Effectiveness of Quality Management Systems * Evaluate IT Management and Monitoring of Controls * IT Resource Investment, Use, and Allocation Practices * Evaluate IT Contracting Strategies and Policies * Evaluate Risk Management Practices * Performance Monitoring and Assurance Practices * Evaluate the Organizations Business Continuity Plan 3 - INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT, AND IMPLEMENTATION * Evaluate the Business Case for Change * Evaluate Project Management Frameworks and Governance Practices * Development Life Cycle Management * Perform Periodic Project Reviews * Evaluate Control Mechanisms for Systems * Evaluate Development and Testing Processes * Evaluate Implementation Readiness * Evaluate a System Migration * Perform a Post-Implementation System Review 4 - INFORMATION SYSTEMS OPERATIONS, MAINTENANCE, AND SUPPORT * Perform Periodic System Reviews * Evaluate Service Level Management Practices * Evaluate Third-Party Management Practices * Evaluate Operations and End User Management Practices * Evaluate the Maintenance Process * Evaluate Data Administration Practices * Evaluate the Use of Capacity and Performance Monitoring Methods * Evaluate Change, Configuration, and Release Management Practices * Evaluate Problem and Incident Management Practices * Evaluate the Adequacy of Backup and Restore Provisions 5 - PROTECTION OF INFORMATION ASSETS * Information Security Design * Encryption Basics * Evaluate the Functionality of the IT Infrastructure * Evaluate Network Infrastructure Security * Evaluate the Design, Implementation, and Monitoring of Logical Access Controls * Risks and Controls of Virtualization * Evaluate the Design, Implementation, and Monitoring of Data Classification Process * Evaluate the Design, Implementation, and Monitoring of Physical Access Controls * Evaluate the Design, Implementation, and Monitoring of Environmental Controls

Certified Information Systems Auditor (CISA)
Delivered Online6 days, Aug 12th, 13:00 + 1 more
£3250

Certified TIA-942 Internal Auditor (CTIA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audiences for this course are quality directors and quality assurance managers, managers responsible for the governance of an enterprise and management of its risks, technical experts, project managers and consultants, internal auditors, compliance officers and virtually anybody involved in ANSI/TIA-942 compliance certification related projects either from an end-user or vendor perspective. Participants must hold a valid CTDC certificate in order to be able to register for the CTIA class. Overview After completion of the course the participant will be able to: 1. Prepare the organisation for an audit according to ANSI/TIA-942 including preparation of the required documents, resource planning and management of the audit process itself 2. Conduct an internal audit according to ANSI/TIA-942 following ISO-19011 guidelines 3. Facilitate and support the external audit to ANSI/TIA-942 4. Manage the post-audit process with respect to CAR (Corrective Action Reports), gap closing and _nal certification 5. Facilitate surveillance and recertification audits This intensive course builds further on the technical understanding of the standard acquired in the CTDC© (Certified TIA-942 Design Consultant) course. FUNDAMENTAL CONCEPTS AND PROCESS OF AN INTERNAL AUDIT * Terms and de_nitions * Difference between an internal and external auditor * Audit principles * Auditor competency requirements MANAGING AN AUDIT PROGRAMME * Establishing the audit objectives * Establishing the audit programme PLANNING THE AUDIT * Planning the schedule * Resource planning * Tools/equipment required * Document requirements * - Design documents * - Process documents * - Declarations CONDUCTING THE AUDIT * Conducting an opening meeting * Conducting the audit * Interviews * Document review * Facility review * Typical non-conformities * - Architectura * - Electrica * - Mechanical * - Telecommunications * Preparing the audit conclusions * Conducting the closing meeting PREPARING AND DISTRIBUTING THE AUDIT REPORT * Audit report requirements * Classification of non-conformities * Typical format of an audit report FOLLOWING UP ON THE AUDIT * The CAR ? Corrective Action Report * Evaluation of the Corrective Action Report REQUESTING A FORMAL EXTERNAL AUDIT ISSUING A CONFORMITY CERTIFICATE * Requirements of the certificate * Registration of the certificate SURVEILLANCE AUDITS RECERTIFICATION AUDITS EXAM: CERTIFIED TIA-942 INTERNAL AUDITOR) * Actual course outline may vary depending on offering center. Contact your sales representative for more information. ADDITIONAL COURSE DETAILS: Nexus Humans Certified TIA-942 Internal Auditor (CTIA) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified TIA-942 Internal Auditor (CTIA) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified TIA-942 Internal Auditor (CTIA)
Delivered Online3 days, Sept 19th, 07:00
£1500

Certificate in Company Law (CCL)

By EMG Associates UK Limited

CERTIFICATE IN COMPANY LAW (CCL) WHY ATTEND This course is designed for professionals seeking a comprehensive understanding of legal matters affecting companies in the GCC.  The course covers the fundamental principles of company law, including the strategic selection and establishment of different types of companies, as well as the management and dissolution of companies throughout their life cycle. Additionally, participants gain valuable insights into legal issues specific to family businesses in the GCC and learn how to effectively address them in practice. COURSE METHODOLOGY In this interactive training course participants will frequently work in pairs as well as in larger groups to complete exercises as well as regional and international case studies. COURSE OBJECTIVES By the end of the course, participants will be able to: * Apply legal rules and principles to specific commercial situations through consideration of relevant company law * Increase profitability within their organization by selecting the best company type and by adopting the best legal practices in management * Recognize the rules that govern family businesses and how they affect the continuation and success of the business * Understand the reasons for company termination and dissolution and the legal issues in this regard TARGET AUDIENCE This course is suitable for lawyers, company managers, management teams, business and law students and those who are interested to know more about company law and its implications. It also benefits directors and executives who have direct responsibility for legal decisions within the organization. In addition, in-house council new to the region, and those working within a legal department, find this course highly beneficial. TARGET COMPETENCIES * General principles of company law * Company management * Corporate governance * Problem solving NOTE The Dubai Government Legal Affairs Department has introduced a Continuing Legal Professional Development (CLPD) programme to legal consultants authorised to practise through a licensed firm in the Emirate of Dubai. We are proud to announce that the Dubai Government Legal Affairs Department has accredited EMG Associates as a CLPD provider. In addition, all our legal programmes have been approved. This PLUS Specialty Training legal course qualifies for 4 elective CLPD points. * Types of companies and company formation * Types of companies * Memorandum of Association (MoA) and the Articles of Association (AoA) related principles * Alteration of clauses of the MoA and AoA * Partnership and its formation * Limited Liability Company (LLC) and its formation * Public Shareholding Company and its formation * Overview of other types of companies * Choosing between various types of companies * Company management and shareholders rights and duties * Roles and types of directors * Powers, duties and liabilities of directors * Appointment and retirement * Resignation and vacation of office * Independent director * Meeting of board of directors * Auditors: appointment, removal, powers and duties * Corporate governance * Family businesses in the GCC and shareholders' liability issues * UAE law of family companies * The provisions related to family businesses in the new Saudi company law * Legal organization of family businesses in the GCC * Strategies for survival and growth within family businesses * Company management and shareholders' liability * General principles of corporate liability * Liability of directors and Key Managerial Persons (KMP) * Liability of shareholders * Termination and dissolution of companies * Winding up of companies * Liquidator * Authorities * Striking off name * Insolvency and bankruptcy * Restructuring and re-organization * Mergers and amalgamation * Acquisition and take-over

Certificate in Company Law (CCL)
Delivered Online
Dates arranged on request
£4212

Certificate in Business and Commercial Law (CBCL)

By EMG Associates UK Limited

CERTIFICATE IN BUSINESS AND COMMERCIAL LAW (CBCL) WHY ATTEND This course is designed for professionals with little or no prior legal background but who are required to make organizational decisions involving legal matters. It will provide participants with the fundamental principles of commercial law, including commercial contracts and negotiation, sale of goods, intellectual property rights and employee relations.  It also covers all the legal aspects of setting up a business, running a business and closing a business Participants will gain an in-depth understanding of international commercial law with emphasis on the common law system. Participants will have the opportunity to learn and analyze key legal issues regarding contracts and the business as a whole which they are likely to encounter within their organization.  COURSE METHODOLOGY In this interactive training course participants will frequently work in pairs as well as in larger groups to complete exercises as well as regional and international case studies. COURSE OBJECTIVES By the end of the course, participants will be able to: * Apply legal rules and principles to specific commercial situations through consideration of relevant case law * Negotiate commercial contracts complying with commercial and legal requirements * Increase profitability within their organization by selecting appropriate methods of distribution of goods * Recognize and analyze how intellectual property rights affect their organization * Evaluate and modify organizational employment practices complying with labor law requirements TARGET AUDIENCE This course is suitable for those with little or no formal training in commercial law yet would be required to understand the fundamentals of commercial law as it may directly impact their work. It will particularly benefit directors and executives who have direct responsibility for legal decisions within the organization. In-house council new to the region, and those working within a legal department, will also find this course highly beneficial. TARGET COMPETENCIES * Drafting Contracts * Contract Negotiation * Understanding Commercial Terms * Understanding Employment Law * Implementing Organizational Employment Practices * Understanding Intellectual Property * Understanding corporate restructuring * Understanding the effect of breach of commercial contract terms NOTE The Dubai Government Legal Affairs Department has introduced a Continuing Legal Professional Development (CLPD) programme to legal consultants authorised to practise through a licensed firm in the Emirate of Dubai. We are proud to announce that the Dubai Government Legal Affairs Department has accredited EMG Associates as a CLPD provider. In addition, all our legal programmes have been approved. This PLUS Specialty Training Legal course qualifies for 4 elective CLPD points. * Overview of commercial & business law * Areas of commercial and business law * Types of commercial contracts * Commercial contracts in the civil law and common law systems * Sources of English law * Civil law v Common law * Civil law in the GCC * Formalities for a binding contract * Elements required for an enforceable contract * Rules for contract interpretation * implied terms v express terms * identifying risks and how to minimise risks * Structure of a commercial contract * Preliminary documents in international transactions * Memorandum of Understanding/ Heads of Terms. Are they legally binding? * Commercial implications * Boilerplate/ miscellaneous provisions- the important but forgotten clauses- beware! * Force majeure v Frustration * Notices * Set off * No waiver * Entire Agreement/ non- reliance clause * Times is of the essence * Assignment v Novation * Governing law * Common mistakes in choice of law * Jurisdiction clause * Exclusive v Non-exclusive * Factors in deciding the jurisdiction clause * International dispute resolution * Litigation * Importance of Alternative Dispute Resolution (ADR) * Arbitration * Mediations * Conciliation * Negotiation * Remedies for breach of contract * Damages * Specific performance * Injunctions * Advantages and disadvantages of different business forms * Types of business vehicles * Sole trader * Partnerships * Limited Liability Partnerships * Companies * Cross Border Transactions * Distributorship * Agency * Joint Venture * Acquisitions * Share purchase v Business purchase * Apportioning risks and liabilities through warranties and indemnities * Negotiating warranties and indemnities * Corporate insolvency * Tests identifying insolvency          * Consequence for directors who fail to react to insolvency * Types of insolvency * Administration * Receivership * Creditor Voluntary Liquidation * Compulsory Liquidation * Commercial Tort * Tort of negligence * Defamation * Libel * Slander * Recent case law on defamation * Managing risk * Prevention is better than cure: Effective risk management * Intellectual Property Rights management * Types of Intellectual Property   * copyright * trademark * patent * design rights * confidential information * Assignment v Granting a license * The law of passing off * Intellectual Property in the GCC * Employment law issues in the common law systems and the GCC * Types of employment contracts * Grounds for dismissal * Wrongful dismissal * Redundancy * Unfair dismissal * Commercial real estate in the GCC * Leasehold * Freehold

Certificate in Business and Commercial Law (CBCL)
Delivered Online
Dates arranged on request
£4212

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. SECURITY FUNDAMENTALS * Overview * The Growth of * Environments and Security * Our Motivation? * The Goal: Protecting Information! * CIA Triad in Detail * Approach Security Holistically * Security Definitions * Definitions Relationships * Method: Ping * The TCP/IP Stack * Which Services Use Which Ports? * TCP 3-Way Handshake * TCP Flags * Malware * Types of Malware * Types of Malware Cont... * Types of Viruses * More Malware: Spyware * Trojan Horses * Back Doors * DoS * DDoS * Packet Sniffers * Passive Sniffing * Active Sniffing * Firewalls, IDS and IPS * Firewall ? First * Line of Defense * IDS ? Second Line of Defense * IPS ? Last Line of Defense? * Firewalls * Firewall Types: * (1) Packet Filtering * Firewall Types: * (2) Proxy Firewalls * Firewall Types ? * Circuit-Level Proxy Firewall * Type of Circuit- * Level Proxy ? SOCKS * Firewall Types ? * Application-Layer Proxy * Firewall Types: (3) Stateful * Firewall Types: * (4) Dynamic Packet-Filtering * Firewall Types: * (5) Kernel Proxies * Firewall Placement * Firewall Architecture * Types ? Screened Host * Multi- or Dual-Homed * Screened Subnet * Wi-Fi Network Types * Wi-Fi Network Types * Widely Deployed Standards * Standards Comparison * 802.11n - MIMO * Overview of Database Server * Review ACCESS CONTROLS * Overview * Role of Access Control * Definitions * More Definitions * Categories of Access Controls * Physical Controls * Logical Controls * ?Soft? Controls * Security Roles * Steps to Granting Access * Access Criteria * Physical Access * Control Mechanisms * Biometric System Types * Synchronous Token * Asynchronous Token Device * Memory Cards * Smart Card * Cryptographic Keys * Logical Access Controls * OS Access Controls * Linux Access Controls * Accounts and Groups * Password & * Shadow File Formats * Accounts and Groups * Linux and UNIX Permissions * Set UID Programs * Trust Relationships * Review PROTOCOLS * Protocols Overview * OSI ? Application Layer * OSI ? Presentation Layer * OSI ? Session Layer * Transport Layer * OSI ? Network Layer * OSI ? Data Link * OSI ? Physical Layer * Protocols at * Each OSI Model Layer * TCP/IP Suite * Port and Protocol Relationship * Conceptual Use of Ports * UDP versus TCP * Protocols ? ARP * Protocols ? ICMP * Network Service ? DNS * SSH Security Protocol * SSH * Protocols ? SNMP * Protocols ? SMTP * Packet Sniffers * Example Packet Sniffers * Review CRYPTOGRAPHY * Overview * Introduction * Encryption * Cryptographic Definitions * Encryption Algorithm * Implementation * Symmetric Encryption * Symmetric Downfalls * Symmetric Algorithms * Crack Times * Asymmetric Encryption * Public Key * Cryptography Advantages * Asymmetric * Algorithm Disadvantages * Asymmetric * Algorithm Examples * Key Exchange * Symmetric versus Asymmetric * Using the * Algorithm Types Together * Instructor Demonstration * Hashing * Common Hash Algorithms * Birthday Attack * Example of a Birthday Attack * Generic Hash Demo * Instructor Demonstration * Security Issues in Hashing * Hash Collisions * MD5 Collision Creates * Rogue Certificate Authority * Hybrid Encryption * Digital Signatures * SSL/TLS * SSL Connection Setup * SSL Hybrid Encryption * SSH * IPSec - Network Layer Protection * IPSec * IPSec * Public Key Infrastructure * Quantum Cryptography * Attack Vectors * Network Attacks * More Attacks (Cryptanalysis) * Review WHY VULNERABILITY ASSESSMENTS? * Overview * What is a * Vulnerability Assessment? * Vulnerability Assessment * Benefits of a * Vulnerability Assessment * What are Vulnerabilities? * Security Vulnerability Life Cycle * Compliance and Project Scoping * The Project * Overview Statement * Project Overview Statement * Assessing Current * Network Concerns * Vulnerabilities in Networks * More Concerns * Network Vulnerability * Assessment Methodology * Network Vulnerability * Assessment Methodology * Phase I: Data Collection * Phase II: Interviews, Information Reviews, and Hands-On Investigation * Phase III: Analysis * Analysis cont. * Risk Management * Why Is Risk * Management Difficult? * Risk Analysis Objectives * Putting Together * the Team and Components * What Is the Value of an Asset? * Examples of Some Vulnerabilities that Are Not Always Obvious * Categorizing Risks * Some Examples * of Types of Losses * Different Approaches * to Analysis * Who Uses What? * Qualitative Analysis Steps * Quantitative Analysis * ALE Values Uses * ALE Example * ARO Values and Their Meaning * ALE Calculation * Can a Purely Quantitative Analysis Be Accomplished? * Comparing Cost and Benefit * Countermeasure Criteria * Calculating Cost/Benefit * Cost of a Countermeasure * Can You Get Rid of All Risk? * Management?s Response to Identified Risks * Liability of Actions * Policy Review * (Top-Down) Methodology * Definitions * Policy Types * Policies with Different Goals * Industry Best * Practice Standards * Components that Support the Security Policy * Policy Contents * When Critiquing a Policy * Technical (Bottom-Up) * Methodology * Review VULNERABILITY TOOLS OF THE TRADE * Vulnerability Scanners * Nessus * SAINT ? Sample Report * Tool: Retina * Qualys Guard * http://www.qualys.com/products/overview/ * Tool: LANguard * Microsoft Baseline Analyzer * MBSA Scan Report * Dealing with Assessment Results * Patch Management Options * Review OUTPUT ANALYSIS AND REPORTS * Overview * Staying Abreast: Security Alerts * Vulnerability Research Sites * Nessus * SAINT * SAINT Reports * GFI Languard * GFI Reports * MBSA * MBSA Reports * Review RECONNAISSANCE, ENUMERATION & SCANNING * Reconnaissance Overview * Step One in the * Hacking ?Life-Cycle? * What Information is * Gathered by the Hacker? * Passive vs. Active Reconnaissance * Footprinting Defined * Social Access * Social Engineering Techniques * Social Networking Sites * People Search Engines * Internet Archive: * The WayBack Machine * Footprinting Tools Overview * Maltego GUI * Johnny.Ihackstuff.com * Google (cont.) * Domain Name Registration * WHOIS Output * DNS Databases * Using Nslookup * Traceroute Operation * Web Server Info Tool: Netcraft * Introduction to Port Scanning * Which Services * use Which Ports? * Port Scan Tips * Port Scans Shou

Certified Professional Ethical Hacker
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certificate in Business and Commercial Law (CBCL) - Virtual Learning

By EMG Associates UK Limited

CERTIFICATE IN BUSINESS AND COMMERCIAL LAW (CBCL) - VIRTUAL LEARNING WHY ATTEND This course is designed for professionals with little or no prior legal background but who are required to make organizational decisions involving legal matters. It will provide participants with the fundamental principles of commercial law, including commercial contracts and negotiation, sale of goods, intellectual property rights and employee relations.  It also covers all the legal aspects of setting up a business, running a business and closing a business Participants will gain an in-depth understanding of international commercial law with emphasis on the common law system. Participants will have the opportunity to learn and analyze key legal issues regarding contracts and the business as a whole which they are likely to encounter within their organization.  COURSE METHODOLOGY In this interactive training course participants will frequently work in pairs as well as in larger groups to complete exercises as well as regional and international case studies. COURSE OBJECTIVES By the end of the course, participants will be able to: * Apply legal rules and principles to specific commercial situations through consideration of relevant case law * Negotiate commercial contracts complying with commercial and legal requirements * Increase profitability within their organization by selecting appropriate methods of distribution of goods * Recognize and analyze how intellectual property rights affect their organization * Evaluate and modify organizational employment practices complying with labor law requirements TARGET AUDIENCE This course is suitable for those with little or no formal training in commercial law yet would be required to understand the fundamentals of commercial law as it may directly impact their work. It will particularly benefit directors and executives who have direct responsibility for legal decisions within the organization. In-house council new to the region, and those working within a legal department, will also find this course highly beneficial. TARGET COMPETENCIES * Drafting Contracts * Contract Negotiation * Understanding Commercial Terms * Understanding Employment Law * Implementing Organizational Employment Practices * Understanding Intellectual Property * Understanding corporate restructuring * Understanding the effect of breach of commercial contract terms NOTE The Dubai Government Legal Affairs Department has introduced a Continuing Legal Professional Development (CLPD) programme to legal consultants authorised to practise through a licensed firm in the Emirate of Dubai. We are proud to announce that the Dubai Government Legal Affairs Department has accredited EMG Associates as a CLPD provider. In addition, all our legal programmes have been approved. This PLUS Specialty Training Legal course qualifies for 4 elective CLPD points. * Overview of commercial & business law * Areas of commercial and business law * Types of commercial contracts * Commercial contracts in the civil law and common law systems * Sources of English law * Civil law v Common law * Civil law in the GCC * Formalities for a binding contract * Elements required for an enforceable contract * Rules for contract interpretation * implied terms v express terms * identifying risks and how to minimise risks * Structure of a commercial contract * Preliminary documents in international transactions * Memorandum of Understanding/ Heads of Terms. Are they legally binding? * Commercial implications * Boilerplate/ miscellaneous provisions- the important but forgotten clauses- beware! * Force majeure v Frustration * Notices * Set off * No waiver * Entire Agreement/ non- reliance clause * Times is of the essence * Assignment v Novation * Governing law * Common mistakes in choice of law * Jurisdiction clause * Exclusive v Non-exclusive * Factors in deciding the jurisdiction clause * International dispute resolution * Litigation * Importance of Alternative Dispute Resolution (ADR) * Arbitration * Mediations * Conciliation * Negotiation * Remedies for breach of contract * Damages * Specific performance * Injunctions * Advantages and disadvantages of different business forms * Types of business vehicles * Sole trader * Partnerships * Limited Liability Partnerships * Companies * Cross Border Transactions * Distributorship * Agency * Joint Venture * Acquisitions * Share purchase v Business purchase * Apportioning risks and liabilities through warranties and indemnities * Negotiating warranties and indemnities * Corporate insolvency * Tests identifying insolvency          * Consequence for directors who fail to react to insolvency * Types of insolvency * Administration * Receivership * Creditor Voluntary Liquidation * Compulsory Liquidation * Commercial Tort * Tort of negligence * Defamation * Libel * Slander * Recent case law on defamation * Managing risk * Prevention is better than cure: Effective risk management * Intellectual Property Rights management * Types of Intellectual Property   * copyright * trademark * patent * design rights * confidential information * Assignment v Granting a license * The law of passing off * Intellectual Property in the GCC * Employment law issues in the common law systems and the GCC * Types of employment contracts * Grounds for dismissal * Wrongful dismissal * Redundancy * Unfair dismissal * Commercial real estate in the GCC * Leasehold * Freehold

Certificate in Business and Commercial Law (CBCL) - Virtual Learning
Delivered Online
Dates arranged on request
£2301

One of the keys to success today is our ability to effectively influence others.

Influencing Skills
Delivered in-person, on-request, onlineDelivered Online & In-Person in Loughborough
£378

Certified IT Asset Manager (CITAM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced IT Asset Managers Overview By attending this course the attendee will be able to Understand and utilize the dependencies, relationships and benefits of the KPAs found within an effective IT Asset Management Program specify and define the duties and responsibilities necessary to be an effective IT Asset Manager be able to obtain and display an understanding of the resources and commitment necessary to implement a fully functional IT Asset Management Program. Attendees will learn about the entire ITAM Program and take with them the foundation plan for starting or improving their organization?s ITAM Program. The intense three-day course with certification is packed full of information and real-world experiences designed to make your ITAM Program more effective and efficient, and the CITAM Certification will lend notable credibility to both you and your ITAM Program.This course addresses each of the Key Process Areas (KPAs) identified within the IBPL that, when combined, empowers an organization and maximizes the value of their IT assets. The course will also review the core processes that encompass the ITAM Program and the projects that will help an organization build a productive and profitable business unit.The course includes exam for CITAM certification. COURSE OUTLINE * IAITAM and the Mission * ITAM Code of Ethics * Defining Primary Roles in an ITAM Program * IAITAM?s 12 KPAs * Relationships, Dependencies, and Benefits * KPA Interdependencies * Roles and Responsibilities * Creating Dynamic Job Descriptions for ITAM Programs * The Role of a Program Manager * Project Management Relationship Triangle * Sample Projects by KPA * Prioritization and the ITAM Program * Lifecycle Management * Process Building Best Practices * Gaining Executive Buy-in * Business Case Template * Maturity Assessment * ITAM as a Core Business Function ADDITIONAL COURSE DETAILS: Nexus Humans Certified IT Asset Manager (CITAM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified IT Asset Manager (CITAM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified IT Asset Manager (CITAM)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certified IT Asset Disposal (CITAD)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for those responsible for ITAD programs and other IT professionals involved in Asset Management, resource budgeting, finance, software licensing, contract management and strategic planning. Overview Students will learn the best practices in an IT Asset Management Program and align those processes with their organizations' business practices. They will be able to manage overall ITAM programs and demonstrate in-depth knowledge, operational knowledge and competence in asset disposal and process development. The IAITAM Certified IT Asset Disposition (CITAD) course prepares individuals to manage the IT asset disposal process within an organization. Best practices in IT Asset Disposition (ITAD) are broken down from policy management, data security to chain of custody transitioning. Attendees whose job responsibilities include ITAD will take away the knowledge of how to avoid risk of data loss and public exposure that surround a breakdown in ITAD process management. ITAD best practices, financial return, data security global implications and the importance of vendor management are just a few of the topics incorporated in the CITAD course. This course exposes the attendee to numerous concepts for ITAM that are relevant for both direct application and as a means of discussion for those persons who will implement, manage and direct ITAM initiatives for their organizations. This course includes the exam for CITAD certification. COURSE OUTLINE * Disposition Overview * Disposition and ITAM * Organizational Goals for Disposition * ITAM Goals for Disposition * Governance of Electronic Disposal * Composition of E-Scrap * Waste Management Laws * Foundation for Disposal Management * Policy Topics Relevant to Disposition * Asset Standards Benefit Disposal * The Role of Automation * Data Security Governance * Working with Vendors * Selecting Vendors * Due Diligence * The Removal Process * Software During Disposition * Decision Factors for Retirement * The Disposition Processes * Financial Management & Measurement ADDITIONAL COURSE DETAILS: Nexus Humans Certified IT Asset Disposal (CITAD) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified IT Asset Disposal (CITAD) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified IT Asset Disposal (CITAD)
Delivered on-request, onlineDelivered Online
Price on Enquiry

ISACA CGEIT Training Boot Camp

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Risk professionals Business analysts Project managers Compliance professionals IT professionals Anyone whose work includes evaluating and mitigating risk Overview This boot camp prepares you to pass the ISACA CGEIT exam, which covers four domain areas designed to reflect the work performed by individuals who have a significant management, advisory or assurance role relating to the governance of IT. Domain 1: Governance of enterprise IT Domain 2: IT resources Domain 3: Benefits realization Domain 4: Risk optimization This CGEIT Boot Camp is designed for experienced IT governance personnel and those who have responsibilities for the stewardship of IT resources. You will learn how to effectively implement and manage governance across all areas of technology ? as well as align that technology with strategic enterprise goals. This training also explains the CGEIT examination process and helpsprepare you for your CGEIT exam by providing guidance and testing your exam readiness through sample questions. You?ll leave fully prepared to earn your CGEIT certification. COURSE OUTLINE * Domain 1: Governance of enterprise IT * Domain 2: IT resources * Domain 3: Benefits realization * Domain 4: Risk optimization

ISACA CGEIT Training Boot Camp
Delivered on-request, onlineDelivered Online
Price on Enquiry

Educators matching "CIA"

Show all 95