-
All
-
Online
-
Filters
Quality Standards courses
- Course
- Distance Learning
...computer or to a network using public networks - and its implication for IT security. In this it introduces the different types of remote access including...
- Course
- Distance Learning
...and between organizations. Requirements have to be met to use networks securely. The area of remote access to a network requires specific measures...
- Course
- Online
...From October 2005, ISO 27001 has replaced BS7799-2:2002 as THE international information security management systems standard. From now on, ISO 27001...
- Course
- Distance Learning
...describes the relationship among them. It addresses possible ordering or intrusion detection tasks and related activities. It also provides a basis...
- Course
- Distance Learning
...aspects of operational systems not addressed in ISO/IEC 15408 evaluation. The principal extensions that are required address evaluation of the operational...
- Course
- Distance Learning
...both individuals and application systems. ISO/TS 22600-2 defines methods for managing authorisation and access control to data and/or functions...
- Course
- Distance Learning
...components of such a programme. The objectives of this technical report are: to define the information security management programme. to present programme policy...
- Course
- Distance Learning
...of an integrated process approach to effectively deliver managed services to meet business and customer requirements. For an organization to function effectively...
- Course
- Distance Learning
...processes within the scope of ISO/IEC 20000-1. It represents an industry consensus on guidance to auditors and offers assistance to service providers planning...
- Course
- Distance Learning
...and CD-ROM based versions of TickIT Guide 5.5. TickIT is a software development implementation of the ISO9001 standard. This guide provides the advice...
- Short course
- Chesterand2 other venues
- Walsall, Edinburgh
- 1 Day
...compliance audit requirements Managers and staff with responsibility for planning, performance and reporting of any form of environmental audit ranging...
- Course
- Online
- Different dates available
- 150h - 60 Days
...Safety, Environmental management system version 2018, then this course will be able to help you. Enrol today at Emagister.co.uk This course will help... Learn about: Evaluation Methods, Quality auditing, Quality Systems...
- Course
- Online
- Intermediate
- Different dates available
...change management, motivation and negotiation, and conflict and empowerment. This course explores the concepts of organizational design and leadership challenges... Learn about: Team Training, Strategic Plans, Project Management...
- Course
- City Of London
...group discussions, and hands-on exercises and activities. By the end of this training, participants will be able to: Identify the Requirements for a successful... Learn about: ISO 9001, Quality Training, Quality management...
- Course
- Inhouse in Sunderland
- Intermediate
- 2 Days
...You will learn how to bring the discipline and control necessary to your operations with strategies to recognize problems, allocate resources and evaluate... Learn about: Management Tools, QMS framework, Standard Requirements...
- Course
- Distance Learning
...exemplar PAM is derived from the Process Reference Model (PRM) defined in ISO/IEC 15288, associated with the process attributes defined in ISO/IEC 15504-2...
- Course
- Distance Learning
...Additionally, it defines the conditions under which such assessments are valid. ISO/IEC TR 15504-7:2008, organisational maturity is an expression of...
- Course
- Distance Learning
...ISO 27001 has replaced BS7799-2:2002 as THE international information security management systems standard. From now on, ISO 27001 (BS 7799-2:2005)...
- Course
- Online
...Publisher: IEC Format: Electronic Download .PDF (0.3MB) Licensing Terms : Purchase and Use of this Product is Subject to this EULA . Published...
- Course
- Distance Learning
...service and network managers. It is essential for any organization that is serious about information security to have a structured and planned approach...