Safety & Security Training Courses

If you can't find what you want, Ask Us.

Refine Your Results


Filter by Category




Showing 1-20 of 62 results Sort by:


  • 1 Request Info

    San Francisco Conference on Cyber Security Incident Response Program (CSIRT) and Plans

    Cyber Security Incident Response Program is a must for any organization using the Internet. It must be robust yet flexible. Unfortunately in spite of all of the Cyber Events, many companies are taking a long time to respond. Teams must be trained and have written procedures. Time is critical in responding to an incident. Every incident costs the organization, money and reputation.
  • 2 Request Info

    UDI Program Implementation

    UDI Program Implementation Location: Attend Live Webinar Dates: 12-Nov-2015: 1:00 PM EST Duration: 90 Mins Speaker:Dev Raheja Dev Raheja, MS,CSP, is an international Risk Management and Quality Assurance consultant for Healthcare,medical device, and aerospace industry for over 25 years. He applies evidence base safety techniques from a variety of industries to healthcare. Course Outline: Introduction to UDI UDI program requirements UDI implementation steps Three major tasks in implementation Key Roles in UDI Implementation UDI issuing agencies Creating device ID Creating production ID The UDI Record UDI on Labels, Labeling and Packaging Role of GUDID Thank you & Regards, Sean Sharpe, Training Manager, Call us at this Toll Free number: +1-866-978-0800
  • 3 Request Info

    The 11 Must-have Documents of Software Verification and Validation

    The 11 Must-have Documents of Software Verification and Validation Location: Attend Live Webinar Dates: 04-Nov-2015: 1:00 PM EST Duration: 60 Mins Speaker: John E. Lincoln John E. Lincoln, is Principal of J. E. Lincoln and Associates, a consulting company with over 29 years experience in U.S. FDA-regulated industries. John has worked with companies from start-up to Fortune 100, in the U.S., Mexico, Canada, France, Germany, Sweden, China and Taiwan. Course Outline: Verification or Validation -- FDA Expectations The Project Validation Plan An FDA-accepted Documentation "Model" Product and Process / Test / Facilities / Equipment Software V&V When and How to Use DQ, IQ, OQ, PQ (or their equivalents) The FDA’s 11 Key V&V Documentation Elements “White Box” and “Black Box” Validations GAMP / Other Considerations Thank you & Regards, Sean Sharpe, Training Manager, Call us at this Toll Free number: +1-866-978-0800
  • 4 Request Info

    OHSAS 18001 – Occupational Health and Safety Management Systems – Lead Auditor Training in Dubai

    Lead Auditor is a platform that offers premium lead auditor courses, training and seminars to prepare students for various international certifications. we are located in Dubai and Qatar. BS OHSAS 18001:2007 Lead Auditor course in Dubai & Qatar is intended for Occupational Health and Safety (OHSAS) professionals intending to showcase their competence in Health and Safety Audits. OHSAS Lead Auditor course is also suitable for manager, supervisor, engineer or technician, involved in facility operation in compliance with OH&S regulations. The advantages of the OHSAS 18001:2007 Lead Auditor Course Once you become a certified OHSAS lead auditor you have the abilities to: Audit the processes and management system effectively Design the process and a procedure or a clause audit Prepare and plan audits in a risk-based manner Chose, lead and evaluate an audit team performances
  • 5 Request Info

    Webinar no Detecting and Preventing Embezzlement in Your Organization

    Course Objective: This course will highlight several types of embezzlement, how it can be committed and by whom. It will enable participants to identify: • The step-by-step process for identifying embezzlement risks • Fraud indicators • Evidence to substantiate suspicions of actual embezzlement • Methods to eliminate control weaknesses that allow these crimes to flourish The course will also instruct attendees on recommending a better anti-embezzlement management structure to prevent embezzlement and implement strong internal controls. Course Outline: • Understand the common and less-common types of embezzlement—at both the employee and management levels • Identify specific embezzlement scenarios and schemes threatening the organization
  • 6 Request Info

    Seminar on Safety Analysis of Complex Systems

    In evaluating complex systems the interactions and interfaces involving: the human, software, firmware, hardware, and environmental elements require consideration From a safety perspective these elements should be analyzed with specific safety analytical techniques, (software, hardware, human, and environmental hazard analyses methods), which are suited for each of the specific elements. However, there are system risks to consider; a system accident may be comprised of initiating, contributory, and primary hazards; which are the result of adverse interactions between the human, software, firmware, hardware, and/or environment. How does the analyst conduct an integrated hazard analysis and risk assessment to address these adverse interactions and interfaces of all the elements of a complex system?
  • 7 Request Info

    HIPAA Privacy Security - Time to GetSerious

    I have conducted over 400 risk assessments for business associates and covered entities alike as well as worked directly with the Federal government in terms of auditing. This seminar will go into great detail about what is going on in the HIPAA Security/ Privacy world. I will discuss why the government is all of a sudden going full bore in demanding compliance. You will learn risk factors to avoid, best practices you should be doing, and how to be proactive in your efforts. In addition we are going to be discussing the methods in which patients can now sue under HIPAA and the steps they may be taking for civil remedy. On top of that what your practice or business needs to do so you can avoid the situation all together.
  • 8 Request Info

    Decision Analysis in Support of Safety

    Basic decision analysis methods are discussed in a context of solving risk and operational-related problems associated with changes in systems, standards, and procedures. These basic methods can be further developed to incorporate other decision analysis techniques. Testing, analysis, simulation, and studies may be required within the analysis to provide the data and information needed to successfully complete some or all of the steps discussed. The modern manager needs to have knowledge of the tools and techniques of analyses associated with the planning, organizing, directing, coordinating, and controlling the safety management system. Such safety management systems must include concepts and processes that will enable sound risk-based decisions.
  • 9 Request Info

    Construction - Construction Hazards & Basics, for any Jobsite

    Real world examples of what to expect, and what to prepare for whenever possible. Not every organization is ready to avoid inspections or fines if they do not have senior staff in place, and/or if they have not been audited in the past. How to train staff to have the correct documentation in place. Ensure that the organization keeps documentation updated and realistic. If an employee is nervous and informs the inspector/auditor wrong information, a strong documentation system will support all of the proper steps that are in place.
  • 10 Request Info

    Laboratory Safety - Covering Issues such as Compressed Gases, Cryogenic Materials and Glassware, etc.

    Laboratories can be dangerous places, with a vast array of potential hazards available to cause harm. This webinar considers harm may be caused, as well as how people and organizations can be protected from that harm by the appropriate use of Control Measures arrived at through the process of Risk Assessment..
  • 11 Request Info

    Revisions to the Hazard Communication Standard

    This webinar will provide employers and employees with the new requirements for the Hazard Communication Standard, as well as the changes in the regulations, the way chemicals are classified, and what will be new for training and Safety Data Sheets.
  • 12 Request Info

    Fundamentals of Safety Analysis

    Initially to scope discussions of safety analysis, risk assessment and hazard control application consider how to efficiently apply resources to meet a primary objective: To assure that safety-related and security-related risks have been identified, eliminated, or controlled to acceptable levels; throughout the lifecycle of the design; addressing the lifecycle of the potential accident. It is then logical to concentrate resources to continue safety and risk assessment; aiming for encompassing analyses (or set of analyses), which also identifies decisions and errors that may present risks; ultimately applying hazard/threat control application. Judgment on descriptive detail is applicable to mitigation design; the nature, complexity, and detail description of risk controls; which become formal requirements. Further consider the hierarchy of hazard control application and the layering of risk controls.
  • 13 Request Info

    Construction Safety

    From crane rigging to power tool safety to fall protection, our Construction Safety Library is the go-to resource for all construction employees. Choose a course and start covering your safety bases!
  • 14 Request Info

    Safety for Campus Employees

    The Safety for Campus Employees Library includes easy-to-follow courses to keep you, your employees, and your student workers safe from potentially hazardous situations. Courses include campus and office safety, emergency-evacuation plans, fire prevention, HazCom training, lab safety, and much, much more. From avoiding bloodborne pathogens to new-employee safety orientation to responding to an active shooter on campus — we've got your training needs covered.
  • 15 Request Info

    Webinar: Learning the OSHA Recordkeeping Analysis by William Principe

    Who will Benefit: Anyone responsible for completing an OSHA 300 Log, including: HR Managers Safety Managers Facility Managers In-house Attorneys Risk Managers Business Owners Nurses Physicians
  • 16 Request Info

    OSHA Compliance Safety Training DVDs

    OSHA compliance safety training DVDs.
  • 17 Request Info

    MSHA Surface Miner Safety Training DVD

    MSHA Surface Miner Safety Training DVD - Part 46.
  • 18 Request Info

    Workplace Ergonomics: Injury Prevention Through Ergonomics

    The human body is a fragile system, and we put many demands on it every day. Activities like reaching to get supplies off of a shelf, sitting in front of a computer for hours every day, and moving heavy products around the shop can all take a toll on our bodies. In this two-day workshop, you will learn how to make your environment as ergonomic as possible in order to make daily tasks easier on your body and mind. At the end of this course, you will be able to: Define ergonomics and its related terms Identify where to get ergonomics information for your region Identify how ergonomics can be incorporated into your workplace Assess your environment for ergonomic hazards, create ways to resolve those issues, and plan for implementation Review and evaluate your ergonomic efforts Use change management techniques effectively Describe the basic principles of ergonomics Outline ergonomic practices for sitting, standing, lifting, carrying, pushing, and pulling and more!
  • 19 Request Info

    Safety in the Workplace

    Workplace accidents and injuries cost corporations millions of dollars and thousands of hours lost every year. They also have a profound, often lifelong impact on workers. Introducing a safety culture into your organization, where safety is valued as an integral part of the business’s operation, not only saves the business time and money, it also builds a committed, loyal, healthy workforce. This one-day workshop will give participants the foundation to start building your safety culture.
  • 20 Request Info

    Workplace Harassment: What It Is and What To Do About It

    In 2012 alone, the US Equal Employment Opportunity Commission ordered that $365,400,000 (that’s 365.4 million dollars!) be paid out for discrimination and harassment charges. No wonder companies are working to be more proactive in preventing harassment. But how do you prevent harassment from occurring? What sorts of policies should be in place? What should managers do to protect their employees? And if a complaint is filed, what will we do? All of these questions (and more!) will be answered in this two-day workshop.