-
All
-
Online
-
Filters
Security risk management courses
- Course
- Online
- Intermediate
- 5h - 1 Year
.... The course also covers planning safe movements, understanding hostile environments, maintaining client confidentiality, and responding appropriately to potential risks. Emphasis is placed on decision-making, observation, and maintaining safety without escalation. This online close protection training is ideal... Learn about: Security Awareness, IT risk, Security Management...
- Course
- Londonand9 other venues
- Wood Green, Croydon, Mitcham, Barking, Greenwich, North Acton, Elephant & Castle, Oxford, Rainham
- 02 Mar 2026
- 6 Days
...Level 2 Working as a Door Supervisor within the Private Security Industry with Physical Intervention Course is a nationally recognised qualification by SIA. Successful completion of this course enables a door supervisor to meet one of the requirements to apply for their licence. In order to obtain... Learn about: Conflict Management, Door Supervisor, Physical Intervention...
- Master
- Online
- Different dates available
- 2 Years
... Management, Beneficial Insects, Grain Storage and Management. Like the above entries, along with theoretical subjects, practical sessions involving... Learn about: IT Development, Oil and Gas Engineering, Safety in construction...
- Training
- Online
- Advanced
- 1 Day
... of every Covered Entity and Business Associate. But mandatory HIPAA Compliance Audits conducted by the Office for Civil Rights (OCR), the HIPAA enforcement arm of the U. S. Department of Health and Human Services (HHS), found 94% of Covered Entities failed the Risk Management Audit and 87% failed the... Learn about: Risk Analysis, Hipaa privacy rule, Hipaa privacy policy...
- Course
- Southampton
- Advanced
- 4 Days
... of a range of handcuffl restraint techniques. Examine the probable & less likely medical implications of all applied technique. Evaluate medical risk factors...
- Course
- Online
- Intermediate
- Different dates available
... and the rise of zero day attacks rose more than 125% from 2014. Our InfoSec Professional program focuses on training, certifying, and producing skilled cyber security professionals that meet and exceed industry needs. The program entails a highly interactive curriculum with an emphasis on hands on learning... Learn about: Network Training, IT risk, Network security...
-
Excellent - pretty relevant and good examples, very well structured.
← | →
- Course
- Singaporeand2 other venues
- New York, London
- 3 Days
...The overall goal of this three-day case study based course is to give participants a structured approach to the credit analysis of different types of NBFI; finance and leasing companies, securities companies (brokers and broker dealers), and investment funds and asset managers (funds and investment... Learn about: Financial Training...
...The overall goal of this three-day case study based course is to give participants a structured approach to the credit analysis of different types of NBFI; finance and leasing companies, securities companies (brokers and broker dealers), and investment funds and asset managers (funds and investment... Learn about: Financial Training...
-
Excellent - pretty relevant and good examples, very well structured.
← | →
- Training
- Online
- Intermediate
- Different dates available
...Furthermore, ISO 27001 is an information security standard, part of the ISO/IEC 27000 family of standards, of which the last version was published in 2013. There have been a few minor updates since then, mainly for the reason that it is constantly changing and first of all the reason was GDPR... Learn about: IT risk, ISO 27001, Security risks...
- Vocational qualification
- Online
- Different dates available
... deployment. 3.3 Explain technical challenges and risks for cloud computing and methods to mitigate them for. 3.4 Describe the impact of cloud computing... Learn about: IT Systems, Network Engineering, Data Protection...
- Course
- San Francisco (USA)
- Different dates available
... of money, selection, ranking criteria; Risk, uncertainty: types of risk, mathematical techniques, probabilistic models, uncertainty in economic analysis... Learn about: Accounting MBA, Conflict Management, IT risk...
- Training
- Online
- Advanced
- 1h - 1 Day
...Overview: Being in compliance with HIPAA involves not only ensuring you provide the appropriate patient rights and controls on your uses and disclosures of protected health information, but you also have the proper policies and procedures in place. A HIPAA Risk Management plan is your overall... Learn about: Hipaa security training online, HIPAA Policies and Procedures, HIPAA Requirement...
- Master
- Bangor
...The MA in Banking and Law is an interdisciplinary programme that will enable the student to study key legal and regulatory developments affecting the financial sector. This includes the regulation of financial services, security instruments, corporate finance, arbitration and other issues affecting... Learn about: Financial Services, Financial Training, World Trade Law...
- Training
- Inhouse
- 2 Days
...Attendees will be ABLE to: Understand 'reasonable force' Recognise the benefits of non-physical techniques Understand the law relating to Self Defence and Physical Intervention Perform a dynamic risk assessment Identify the importance of recording and debriefing Demonstrate effective physical...
- Course
- Online
- Advanced
- Different dates available
- 1 Year
...COURSE CURRICULUM Overview of Wireless Communications Identify the Importance of Risk Management Assess Risk Mitigate Risk Integrate Documentation... Learn about: Network Training, IT risk...
- Vocational qualification
- Fareham
- 4 Days
... conflict Maintaining space Defusing high risk conflict Resolving conflict Learning from conflict 2 consecutive weekends (4 days) of intensive tutoring...
-
The Course Tutor was an Ex Scots Guardsman who had 15 plus years experience and taught the course extremely well and imparted his skills and knowledge in a very professional manner.
← | →
- Course
- London
...Our Level 3 Course for Close Protection Officers gives you the qualification to work within the industry in the UK, however in reality offers so much more. This course is aimed at ex-Armed Force, Door Supervisors and Security Officers, as well as civilians wishing to enter the industry...
...Our Level 3 Course for Close Protection Officers gives you the qualification to work within the industry in the UK, however in reality offers so much more. This course is aimed at ex-Armed Force, Door Supervisors and Security Officers, as well as civilians wishing to enter the industry...
-
The Course Tutor was an Ex Scots Guardsman who had 15 plus years experience and taught the course extremely well and imparted his skills and knowledge in a very professional manner.
← | →
- Course
- San Francisco (USA)
- Different dates available
... a portfolio of assets; Decision making - investment criteria, negotiating transactions and managing risks; Asset trading; Value chain management; Reputation... Learn about: Oil Well, IT risk, Reputation Management...
- Course
- London
- Different dates available
...This course can be adapted to suit a particular audience and is ideal for lower risk businesses, in accordance with the Health and Safety (First Aid) Regulations. The course is run over one day and includes both theory and practical sessions, in a relaxed atmosphere, designed to boost a candidate's... Learn about: Emergency Care, IT risk, Training First Aid...
- Course
- Online
- Intermediate
- 9h - 1 Year
...The Bodyguard Training course provides a solid foundation in close protection principles, personal security awareness, and professional bodyguard responsibilities. Designed for learners seeking to enter or enhance their understanding of the private security sector, this course explores...
- Master
- Bangor
.... Three key themes are: identification and management of the trade off between risk and return; improvement of a bank’s value using market models... Learn about: International Banking, IT Law, Financial Training...
- Training
- Online
- Advanced
- 1 Day
... and texting into your organization in a compliant way. The process, including the use of information security risk analysis, will be explained, and the policies needed to support the process will be described. But the process must also include consideration of various patient access requirements in the HIPAA... Learn about: Health Information, Risk Analysis, HIPAA audit and enforcement activities...
- Course
- Inhouse
... and conflict management: Avoiding conflict and reducing risk Defusing conflict Resolving conflict Post incident considerations and learning from conflict...
- Course
- Inhouse
... and responsibilities of the close protection team. Introduction to the roles and responsibilities of the close protection operative Threat and risk assessment...