If you can't find what you want, Ask Us.

Refine Your Results


Filter by Category




Showing 1-20 of 116 results Sort by:


  • 1 Request Info


    This course helps you prepare to respond to an active shooter situation. It begins by describing the typical character of active shooter incidents. It then explains how to determine the correct course of action in such a situation depending on the circumstances: escape, hiding in a secure location, or physically engaging with the shooter. The course then lays out the principles you should follow in relation to each of these options. Finally, you’ll also learn about what to expect and how to react when law enforcement arrives. This course was developed with subject matter support provided by Tactical Advantage Corp., a leader in personal protection training and personal safety.
  • 2 Request Info

    Applied Statistics for FDA Process Validation 2017

    In Guidance for Industry Process Validation: General Principle and Practices, process validation is defined as, ""...the collection and evaluation of data, from the process design stage through commercial production.." The guidance further delineates the 'process design stage through commercial production' into three distinct stages of the product lifecycle: Stage 1: Process Design: The commercial manufacturing process is defined during this stage based on knowledge gained through development and scale-up activities. Stage 2: Process Qualification: During this stage, the process design is evaluated to determine if the process is capable of reproducible commercial manufacturing. Read More :
  • 3 Request Info

    Applied Statistics for Scientists and Engineers 2017

    Throughout 21 CFR and guidance documents for the pharmaceutical, biopharmaceutical, and medical device industries, the application of statistical methods are specified for: setting validation criteria and specifications, performing measurement systems analysis (MSA), conducting stability analysis, using design of experiment (DOE) for process development and validation, developing process control charts, and determining process capability indices. Different statistical methods are required for each of these particular applications. Data and tolerance intervals are common tools used for setting acceptance criteria and specifications. Read More:
  • 4 Request Info

    Cyber Attacks, Beyond Disaster Recovery - 2017

    Overview: Cyber-attacks and breaches dominate the media and are a significant focus of the government. Businesses and financial institutions are faced with the grim reality that a cyber-attack is inevitable. It's not a matter of if an attack will occur, only when. Why should you Attend: A poor response is often more damaging that the cyber-attack itself. According to recent reports, cyber-attacks cost the average American business $15.4 million per year, double the global average of $7.7 million.
  • 5 Request Info

    Detecting, Controlling and Avoiding Fraud: AMA`s Forensic Accounting and Auditing Workshop

    Protect your company from massive losses and penalties resulting from accidental oversights or full-scale fraud! Build a solid foundation in fraud prevention, detection & deterrence with this comprehensive forensic auditing course.
  • 6 Request Info

    Developing Workplace Security ......

    MVP Seminars LLC, is a leading nationwide provider of business training seminars, consulting professionals & exceptional coaches, with quality academic backgrounds. Largest family operated seminar company in USA. Please call 510-558-3495.
  • 7 Request Info

    Fremont 2016 Webinar on How to do a Cyber Security Risk Assessment

    Overview: The best way forward is an efficient Incident Response Program that allows an organization to respond with speed and agility, while empowering businesses to maintain continuous operations. Such a solution also reduces revenue loss, reduces fines and lawsuits and protects brand reputation. Information Security, Governance & Risk, are all critical aspects of planning and execution of the Information Security Plan.
  • 8 Request Info

    HIPAA Privacy Security - Time to GetSerious

    I have conducted over 400 risk assessments for business associates and covered entities alike as well as worked directly with the Federal government in terms of auditing. This seminar will go into great detail about what is going on in the HIPAA Security/ Privacy world. I will discuss why the government is all of a sudden going full bore in demanding compliance. You will learn risk factors to avoid, best practices you should be doing, and how to be proactive in your efforts. In addition we are going to be discussing the methods in which patients can now sue under HIPAA and the steps they may be taking for civil remedy. On top of that what your practice or business needs to do so you can avoid the situation all together.
  • 9 Request Info

    Martial Arts & Self Defense Security ......

    MVP Seminars LLC, is a leading nationwide provider of business training seminars, consulting professionals & exceptional coaches, with quality academic backgrounds. Largest family operated seminar company in USA. Please call 510-558-3495.
  • 10 Request Info


    Whether it is a natural disaster that sweeps through your city or a computer virus that destroys vital electronic information, businesses need to be able to recover their services and operations as soon as possible if such a disaster does occur. A Business Continuity Program involves planning the recovery of operations when confronted with adverse events such as natural disasters, technological failures, human error, and terrorism. This course provides a basic understanding of the criteria for a comprehensive program that addresses business continuity in accordance with the National Fire Protection Association (NFPA) standard 1600, entitled Disaster/Emergency Management and Business Continuity Programs.
  • 11 Request Info


    Over the past decade, emergency management and business continuity planning have been recognized as necessary to continued operational success in both the public and private sectors. Key to this was the development and widespread use of the National Fire Protection Association (NFPA) Standard on Disaster/Emergency Management and Business Continuity Programs (NFPA 1600). The NFPA 1600 standard is a description of the basic criteria for a comprehensive program that addresses disaster recovery, emergency management, and business continuity. NFPA 1600 is considered by many to be an excellent benchmark for continuity and emergency planners in both the public and private sectors. The standard addresses methodologies for defining and identifying risks and vulnerabilities and provides planning guidelines that address stabilizing the restoration of the physical infrastructure, protecting the health and safety of personnel, and crisis communications procedures. This course will provide you with
  • 12 Request Info

    NIST Cybersecurity Framework For Computer Systems Validation

    Overview: Computer systems used in highly regulated companies include sensitive and valuable information. Some of this information includes valuable electronic submissions, clinical information, medical device design control records, legal information, and other such information. Recent events have highlighted sophisticated cybersecurity attacks everywhere including the White House.Corporations have been attacked at an alarming rate. What does this mean for computer systems validation?
  • 13 Request Info

    Preventing Liability: Staying Current on the New Harassment Case Law

    You have been in Human Resources or management for years. Your plate is full—too much to do and know in your increasingly stressful job. You are expected to stay current in discrimination and harassment case law for all the federal and state protected classes. Are you current? It seems like an unending responsibility. You remember hearing something in the news about a change in the pregnancy law, but can’t remember what it was. For more detail please click on this below link: Email: Toll Free: +1-844-746-4244 Tel: +1-516-900-5515 Fax: +1-516-900-5510
  • 14 Request Info

    Preventing Personal ID Theft & Security ......

    MVP Seminars LLC, is a leading nationwide provider of business training seminars, consulting professionals & exceptional coaches, with quality academic backgrounds. Largest family operated seminar company in USA. Please call 510-558-3495.
  • 15 Request Info

    Regulatory Filing Requirements and Compliance Processes for Medical Devices 2017

    Japan's classification system differs from that of the United States or European Union Medical devices are classified to Class I, II, III, or IV depending on their risk level Medical devices must also comply with Japanese Industrial Standards and these standards define industry-wide safety and performance requirements Strict new package insert requirements Change to MAH Licensing rules A new MAH License category for In Vitro Diagnostic (IVD) devices A new registration system for manufacturers A new QMS conformity assessment system
  • 16 Request Info

    Root Cause Failure Analysis

    Root Cause Failure Analysis Closed Loop Corrective Action will identity multiple roots and eliminate causes affecting internal, external customer satisfaction, eliminate cost, quality schedule, safety and security issues.
  • 17 Request Info

    San Francisco Conference on Cyber Security Incident Response Program (CSIRT) and Plans

    Cyber Security Incident Response Program is a must for any organization using the Internet. It must be robust yet flexible. Unfortunately in spite of all of the Cyber Events, many companies are taking a long time to respond. Teams must be trained and have written procedures. Time is critical in responding to an incident. Every incident costs the organization, money and reputation.
  • 18 Request Info

    San Francisco Conference on Cyber Security Incident Response Program (CSIRT) and Plans

    In this session you will learn: • Best practices and the standards that make up a great Cyber Incident Response Program • Learn what teams should be part of your CSIRT Team • Get insight into how to create CSIRT Playbooks and Management Plans • Learn how to conduct inexpensive tests of the CSIRT Teams and Programs • This program will help you determine your current Gaps and provide milestones for correcting the Gaps
  • 19 Request Info

    Spreadsheets for 21 CFR 11 Compliance 2018

    Spreadsheet Applications such as MS Excel are frequently used in 21 CFR 11 compliant environments, but they were not specifically designed for regulated environments and their development is not optimized for 21 CFR 11 compliance. However, the FDA expects that spreadsheets be compliant and lack of compliance can result in a warning letter. Consequently, validation of Excel Spreadsheet Applications is required as part of a 21 CFR 11 compliant environment.
  • 20 Request Info

    This course will provide an awareness-level orientation of basic workplace security fundamentals and appropriate actions for workers to take in the ev

    This course will help business travelers reduce the risks to their person and property while traveling for work. It provides guidelines on how to take precautionary and evasive measures to avoid becoming a victim of crime in various environments frequented by travelers, including airports, hotels, and driving in a car, and when out and about in a new location. It also provides advice on what a business traveler should do in the aftermath of a crime. This course was developed with subject matter provided by Eric L. Matson of Norsemen Training & Consulting Group, a global professional services company focusing on corporate, business and personal safety training.