Safety & Security Training Courses

If you can't find what you want, Ask Us.

Refine Your Results


Filter by Category




Showing 1-20 of 68 results Sort by:


  • 1 Request Info

    Chicago Conference Safety, Health & Environment Management System through Standards & Practices

    A management system can be for one function, but more often than not, it incorporates many functions. Functions like accounting, engineering, banking, etc. have their own management systems, and the Safety, Health and Environmental, as well as Training and Security should have their own management system. This brings efficiency, consistency, cost effectiveness and timeliness to the entire process. In order to work effectively, Corporate sets and creates (with business asset) input, the various standards around the functions. The SH&E, plus training and security are the functions we will build the standards and practices around. There are 16 functions that cover the SHE & TS world. We build a standard and practice around all 16 functions. Supporting documents, associated programs, procedures or standard operating procedures (SOP) will be a part of the particular function being managed.
  • 2 Request Info

    Conference on Maritime Safety Course 7615 for Shipyard Employment at Washington, DC

    This training program provides basic safety and health information and education. The OSHA Outreach Training Program for the Maritime Industry provides training for workers and employers on the recognition, avoidance, abatement, and prevention of safety and health hazards in workplaces in the maritime industry, specifically shipbuilding, shipbreaking and ship repair. The U.S. Navy requires this training for all contractors who work aboard a ship, whether in dry dock or under way, including consultants. This course will help with Risk Management for all companies as well.
  • 3 Request Info

    Webinar on Making Sure Your OSHA Injury and Illness Recordkeeping Is Accurate Before the Annual Posting Requirement on February 1

    You will learn the OSHA recordkeeping analysis from the reporting of an injury or illness to the determination of whether the case is work-related or whether any of the nine exceptions provided by the OSHA recordkeeping regulations apply, to the determination of whether any of the five recording criteria have been met, and finally to entering the case accurately on the OSHA 300 Log and on the 300A annual summary. Price:$200.00. Contact info : OnlineCompliancePanel Phn. no. +1-510-857-5896 Fax-+1-510-509-9659 Event link
  • 4 Request Info

    Webinar on Designing Full Cyber Security Incident Response Team

    Attackers can hit anytime, hence, Computer Security Incident Response Team for a company, government agency or organization must be vigilant 24X7. Both reporting incidents and disseminating incident-related information correctly is a must. Many businesses have not provided adequate training and testing consideration to security issues. Testing helps to raise awareness and help respond to potential organized computer attacks. Gathering intelligence information from all sources is only one area to test. Price:$200.00. Contact info : OnlineCompliancePanel Phn. no. +1-510-857-5896 Fax-+1-510-509-9659 Event link
  • 5 Request Info

    Conference about Sample Size and Statistical Rationale for Medical Device Packaging Validations

    Overview: Compliance to ISO 11607, Parts 1 and 2 require that Packaging Validations include the development of a statistical rationale to support the testing conclusions of sterile barrier systems and packaging processes. Learn the basics of a process for developing a validation statistical rationale for packaging sterile barrier systems and processes. Areas Covered in the Session: Statistical Rationales-the importance and application of developing an appropriate sample size for testing Compliance and guidance for: Medical device sterile barrier systems
  • 6 Request Info

    Conference about Sterile Medical Packaging Design - 7 Essentials

    Overview: Individuals responsible for medical packaging system design and validation are required to provide a safe and effective packaging system that can deliver the enclosed product to the end-user without incurring defect or risk to patient safety. The scope of this webinar is to provide those responsible for medical device packaging system design with some key best practices and insights for the design and development of the medical packaging system, sterile barrier system. ISO 11607 part 1 will be the focus, ISO 11607 Part 2, equipment and process validation, will not be addressed. The following seven design essentials will be presented and the author will provide her perspective on how these seven essentials are key to success and efficient time to market for your medical device.
  • 7 Request Info

    San Francisco Conference on Cyber Security Incident Response Program (CSIRT) and Plans

    Cyber Security Incident Response Program is a must for any organization using the Internet. It must be robust yet flexible. Unfortunately in spite of all of the Cyber Events, many companies are taking a long time to respond. Teams must be trained and have written procedures. Time is critical in responding to an incident. Every incident costs the organization, money and reputation.
  • 8 Request Info

    UDI Program Implementation

    UDI Program Implementation Location: Attend Live Webinar Dates: 12-Nov-2015: 1:00 PM EST Duration: 90 Mins Speaker:Dev Raheja Dev Raheja, MS,CSP, is an international Risk Management and Quality Assurance consultant for Healthcare,medical device, and aerospace industry for over 25 years. He applies evidence base safety techniques from a variety of industries to healthcare. Course Outline: Introduction to UDI UDI program requirements UDI implementation steps Three major tasks in implementation Key Roles in UDI Implementation UDI issuing agencies Creating device ID Creating production ID The UDI Record UDI on Labels, Labeling and Packaging Role of GUDID Thank you & Regards, Sean Sharpe, Training Manager, Call us at this Toll Free number: +1-866-978-0800
  • 9 Request Info

    The 11 Must-have Documents of Software Verification and Validation

    The 11 Must-have Documents of Software Verification and Validation Location: Attend Live Webinar Dates: 04-Nov-2015: 1:00 PM EST Duration: 60 Mins Speaker: John E. Lincoln John E. Lincoln, is Principal of J. E. Lincoln and Associates, a consulting company with over 29 years experience in U.S. FDA-regulated industries. John has worked with companies from start-up to Fortune 100, in the U.S., Mexico, Canada, France, Germany, Sweden, China and Taiwan. Course Outline: Verification or Validation -- FDA Expectations The Project Validation Plan An FDA-accepted Documentation "Model" Product and Process / Test / Facilities / Equipment Software V&V When and How to Use DQ, IQ, OQ, PQ (or their equivalents) The FDA’s 11 Key V&V Documentation Elements “White Box” and “Black Box” Validations GAMP / Other Considerations Thank you & Regards, Sean Sharpe, Training Manager, Call us at this Toll Free number: +1-866-978-0800
  • 10 Request Info

    OHSAS 18001 – Occupational Health and Safety Management Systems – Lead Auditor Training in Dubai

    Lead Auditor is a platform that offers premium lead auditor courses, training and seminars to prepare students for various international certifications. we are located in Dubai and Qatar. BS OHSAS 18001:2007 Lead Auditor course in Dubai & Qatar is intended for Occupational Health and Safety (OHSAS) professionals intending to showcase their competence in Health and Safety Audits. OHSAS Lead Auditor course is also suitable for manager, supervisor, engineer or technician, involved in facility operation in compliance with OH&S regulations. The advantages of the OHSAS 18001:2007 Lead Auditor Course Once you become a certified OHSAS lead auditor you have the abilities to: Audit the processes and management system effectively Design the process and a procedure or a clause audit Prepare and plan audits in a risk-based manner Chose, lead and evaluate an audit team performances
  • 11 Request Info

    Webinar no Detecting and Preventing Embezzlement in Your Organization

    Course Objective: This course will highlight several types of embezzlement, how it can be committed and by whom. It will enable participants to identify: • The step-by-step process for identifying embezzlement risks • Fraud indicators • Evidence to substantiate suspicions of actual embezzlement • Methods to eliminate control weaknesses that allow these crimes to flourish The course will also instruct attendees on recommending a better anti-embezzlement management structure to prevent embezzlement and implement strong internal controls. Course Outline: • Understand the common and less-common types of embezzlement—at both the employee and management levels • Identify specific embezzlement scenarios and schemes threatening the organization
  • 12 Request Info

    Seminar on Safety Analysis of Complex Systems

    In evaluating complex systems the interactions and interfaces involving: the human, software, firmware, hardware, and environmental elements require consideration From a safety perspective these elements should be analyzed with specific safety analytical techniques, (software, hardware, human, and environmental hazard analyses methods), which are suited for each of the specific elements. However, there are system risks to consider; a system accident may be comprised of initiating, contributory, and primary hazards; which are the result of adverse interactions between the human, software, firmware, hardware, and/or environment. How does the analyst conduct an integrated hazard analysis and risk assessment to address these adverse interactions and interfaces of all the elements of a complex system?
  • 13 Request Info

    HIPAA Privacy Security - Time to GetSerious

    I have conducted over 400 risk assessments for business associates and covered entities alike as well as worked directly with the Federal government in terms of auditing. This seminar will go into great detail about what is going on in the HIPAA Security/ Privacy world. I will discuss why the government is all of a sudden going full bore in demanding compliance. You will learn risk factors to avoid, best practices you should be doing, and how to be proactive in your efforts. In addition we are going to be discussing the methods in which patients can now sue under HIPAA and the steps they may be taking for civil remedy. On top of that what your practice or business needs to do so you can avoid the situation all together.
  • 14 Request Info

    Decision Analysis in Support of Safety

    Basic decision analysis methods are discussed in a context of solving risk and operational-related problems associated with changes in systems, standards, and procedures. These basic methods can be further developed to incorporate other decision analysis techniques. Testing, analysis, simulation, and studies may be required within the analysis to provide the data and information needed to successfully complete some or all of the steps discussed. The modern manager needs to have knowledge of the tools and techniques of analyses associated with the planning, organizing, directing, coordinating, and controlling the safety management system. Such safety management systems must include concepts and processes that will enable sound risk-based decisions.
  • 15 Request Info

    Construction - Construction Hazards & Basics, for any Jobsite

    Real world examples of what to expect, and what to prepare for whenever possible. Not every organization is ready to avoid inspections or fines if they do not have senior staff in place, and/or if they have not been audited in the past. How to train staff to have the correct documentation in place. Ensure that the organization keeps documentation updated and realistic. If an employee is nervous and informs the inspector/auditor wrong information, a strong documentation system will support all of the proper steps that are in place.
  • 16 Request Info

    Laboratory Safety - Covering Issues such as Compressed Gases, Cryogenic Materials and Glassware, etc.

    Laboratories can be dangerous places, with a vast array of potential hazards available to cause harm. This webinar considers harm may be caused, as well as how people and organizations can be protected from that harm by the appropriate use of Control Measures arrived at through the process of Risk Assessment..
  • 17 Request Info

    Revisions to the Hazard Communication Standard

    This webinar will provide employers and employees with the new requirements for the Hazard Communication Standard, as well as the changes in the regulations, the way chemicals are classified, and what will be new for training and Safety Data Sheets.
  • 18 Request Info

    Fundamentals of Safety Analysis

    Initially to scope discussions of safety analysis, risk assessment and hazard control application consider how to efficiently apply resources to meet a primary objective: To assure that safety-related and security-related risks have been identified, eliminated, or controlled to acceptable levels; throughout the lifecycle of the design; addressing the lifecycle of the potential accident. It is then logical to concentrate resources to continue safety and risk assessment; aiming for encompassing analyses (or set of analyses), which also identifies decisions and errors that may present risks; ultimately applying hazard/threat control application. Judgment on descriptive detail is applicable to mitigation design; the nature, complexity, and detail description of risk controls; which become formal requirements. Further consider the hierarchy of hazard control application and the layering of risk controls.
  • 19 Request Info

    Construction Safety

    From crane rigging to power tool safety to fall protection, our Construction Safety Library is the go-to resource for all construction employees. Choose a course and start covering your safety bases!
  • 20 Request Info

    Safety for Campus Employees

    The Safety for Campus Employees Library includes easy-to-follow courses to keep you, your employees, and your student workers safe from potentially hazardous situations. Courses include campus and office safety, emergency-evacuation plans, fire prevention, HazCom training, lab safety, and much, much more. From avoiding bloodborne pathogens to new-employee safety orientation to responding to an active shooter on campus — we've got your training needs covered.