PIONEER TRAINING INSTITUTE

Size: px
Start display at page:

Download "PIONEER TRAINING INSTITUTE"

Transcription

1 PIONEER TRAINING INSTITUTE CENTRE FOR DISTANCE & ONLINE LEARNING DIPLOMA IN SECURITY MANAGEMENT OUTLINE

2 SECURITY MANAGEMENT STUDIES Pioneer Training Institute has specifically identified security management and criminal justice programs among its cluster of strategic studies to be offered through its new Distance Learning Arm. This is in view of a need to enhance the practice of criminology, forensic sciences, criminal psychology and other behavioral and social sciences in understanding criminal behaviors and dealing with the prevailing crime and security problems in the region. It has therefore developed a diploma programs in Security Management through which students can advance to Advanced Diplomas or Bachelors programs in Security Management, Criminal Justice Studies, and Economic Crimes Management etc. Security is defined as those means which serve to protect and preserve a society and allow for the conduct of activities within the organization or society without disruption. It consists of people, structures, systems and procedures. The need for security emanates from an aspect of fear which is a permanent feature in human behavior due to the criminality and anarchism prevalent in our societies. Security is a feature of human interactions from the individual right up to the global level. It is clear that the need for security training rests on our quest to increase security. This is intricately linked to the types of threats that prevail in a society. These could include threats to personal safety, personal property, organizational assets and communal interests. There is no doubt that the public order and security sectors are of vital importance in the region. The tragedy is that these sectors are dominated by poorly trained personnel. The best example of this is seen in most of our state s criminal justice systems and private security sectors where most of the personnel operate with just basic induction training. In the law enforcement sectors the emphasis has always been on physical drills, military discipline and shooting skills. There is a lack of analytic, investigative and forensic and security management skills essential in dealing with high tech crime and sophisticated criminal behaviors. Similarly, in private security industry the traditional rungu welding guard is of no practical use under the changing crime and security scenario. The industry is now seeing need for training in modern security management skills, techniques and technology. It is in view of the above that the Pioneer Training Institute is rolling out a professional security management training course with flexible delivery modes. Special attention has been devoted to the preparation of this curriculum to ensure that it contains all of the 2

3 required modules necessary in modern safety, crime prevention and security management. This will include the knowledge of information management technology, CCTV systems and other security technology and management skills. This course is intended to provide a comprehensive training pathway for public and private security personnel who undertake security work on a full or part time basis, and those who seek new careers or promotion in the field of security. The primary targets will thus include; police, prison, council inspectorate, military, intelligence and administration officers. Others are personnel from the private sectors such as; business enterprises, financial institutions, accounting and audit firms and security officers from private security, investigation firms and the banking sector. The courses are also very relevant to school leavers aspiring for careers in public and private security sectors. COURSE OBJECTIVES The main objective of this security management course is to provide comprehensive training in order to enhance professionalism and skills in public and private sector security management. Specific Objectives Learners will acquire knowledge, skills and attitudes on security management Learners will understand the administration of public safety and security organizations. Learners will understand their roles in an integrated public and private sector security system. Learners will establish a pool of knowledge that will lead to professionalism in the public and private security sectors. Learners will understand the role of legal, criminology and behavioral sciences knowledge in security practice. Learners will demonstrate the application of security management principles in crime prevention, safety and loss prevention TRAINING OUTCOMES Learners will benefit from the program in the following ways: Improved performance for public and private safety and security personnel. Enhanced professionalism An integration of public and private sector security. Expanded job market opportunities 3

4 Promotions Certification by Pioneer Training Institute Physical Security Professional (PSP) or Certified Investigator (PCI) certifications STRUCTURE OF THE PROGRAMME Modules: 12 Modules (36 credits) inclusive of Internship/Project Duration: 9/12 months Mode: Distance Learning/One day per week/ Evening classes (3 days per week) Core Modules 101 Introduction to Security Management 102 Introduction to Psychology And Crime 103 Criminology and Criminal Justice Systems 104 Crime Prevention 105 Legal Issues in Security Management 106 Principles of Management 107 Public Relations & Customer Care 108 Internship/Project Specialization Modules Option 1: Physical Security Management 109. Physical Security 110. Asset Protection 111. Security Technology 112. Risk Analysis & Loss Prevention Option 2: Institutional Security Management 113. Institutional Security Management 114. Access Control 115. Crisis & Emergency Management Option 3: Critical Infrastructure Security Management 117. Critical Infrastructure Security 118. Terrorism and Counter-Terrorism 119. Information Security management 4

5 Option 4: Retail Security 120. Retail Security 109. Physical Security 115. Crisis & Emergency Management Option 7: International Security Management 121. International Security management 122. UN and International security agencies 123. Aviation security 118. Terrorism & Counter-Terrorism OPTIONS 6: Security Management in Banking 124. Forensic Accounting 125. Fraud investigation & Management 126. Computer/Cyber Crime OPTIONS 5: Security Management & Investigations 127. Criminal Investigation 125. Fraud investigation & Management 126. Computer/Cyber Crime 128. Interviewing and Interrogation Option 8 Security Management (Generic) Any four units from the above groups of specializations COURSE FEES FEES ITEM TOTAL FEES KSHS Admission Fees 3,000 Tuition Fees 4,000 per Module /48,000 Library Fees 3,000 Internal Examinations 500 per Module /6,000 TOTAL 60,000 Please note that registration for Physical Security Professional (PSP), Certified Investigator (PCI) or any other external certifications will be charged extra 5

NIGERIA SECURITY AND CIVIL DEFENCE CORPS INSTITUTE OF SECURITY OF NIGERIA

NIGERIA SECURITY AND CIVIL DEFENCE CORPS INSTITUTE OF SECURITY OF NIGERIA NIGERIA SECURITY AND CIVIL DEFENCE CORPS IN COLLABORATION WITH THE INSTITUTE OF SECURITY OF NIGERIA 2015/2016 ADMISSION INTO MANDATORY BASIC PROFESSIONAL CERTIFICATE COURSES FOR PRIVATE AND PUBLIC SECURITY

More information

Bachelor of Information Technology

Bachelor of Information Technology Higher Education Northern Sydney Institute Bachelor of Information Technology [ Network security ] www.nsi.tafensw.edu.au/itsecuritydegree Bachelor of Information Technology [ Network security ] Cybercrime

More information

Apprenticeships CYBER SECURITY ADVANCED TO TECHNICAL MODERN APPRENTICESHIP FROM NQ-LEVEL TO SKILLED SECURITY ENGINEER

Apprenticeships CYBER SECURITY ADVANCED TO TECHNICAL MODERN APPRENTICESHIP FROM NQ-LEVEL TO SKILLED SECURITY ENGINEER Apprenticeships CYBER SECURITY ADVANCED TO TECHNICAL MODERN APPRENTICESHIP FROM NQ-LEVEL TO SKILLED SECURITY ENGINEER WHY CHOOSE QA? There are lots of apprenticeship providers out there but we think we

More information

Blending Information Systems Security and Forensics Curricula

Blending Information Systems Security and Forensics Curricula Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2012 Proceedings Midwest (MWAIS) 5-2012 Blending Information Systems Security and Forensics Curricula Jason Ferguson Friends University,

More information

Short courses presented by the NWU Programme in Forensic Accountancy

Short courses presented by the NWU Programme in Forensic Accountancy Short courses presented by the NWU Programme in Forensic Accountancy Certificate in: Commercial Forensic Accounting Commercial Forensic Law Commercial Forensic Investigation Commercial Forensic Information

More information

GRADUATE CERTIFICATE IN MANAGEMENT SYSTEMS ADMINISTRATION

GRADUATE CERTIFICATE IN MANAGEMENT SYSTEMS ADMINISTRATION GRADUATE CERTIFICATE IN MANAGEMENT SYSTEMS ADMINISTRATION If you are looking to develop expertise in a specialized area and broaden your knowledge base, but time and cost limitations are interfering with

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Course information for Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank Course Design The Bachelor of Information Technology (Network Security) is a three-year

More information

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES Kristina Doda & Aleksandar Vanchoski Budapest, CEPOL conference 2017 New technologies - new social interactions and economic development - need

More information

Advanced Certificate for ECF on Anti-Money Laundering and Counter-Financing of Terrorism (AML / CFT)

Advanced Certificate for ECF on Anti-Money Laundering and Counter-Financing of Terrorism (AML / CFT) Advanced Certificate for ECF on Anti-Money Laundering and Counter-Financing of Terrorism (AML / CFT) # Professional Certificate for ECF on Anti-Money Laundering and Counter- Financing of Terrorism

More information

School of Engineering & Built Environment

School of Engineering & Built Environment School of Engineering & Built Environment BEng (Hons) in Digital Security, Forensics & Ethical Hacking Programme Specification Proforma (PSP) August 2015 P a g e 1 GLASGOW CALEDONIAN UNIVERSITY Programme

More information

Building the Cybersecurity Workforce. November 2017

Building the Cybersecurity Workforce. November 2017 Building the Cybersecurity Workforce November 2017 Our Global Footprint Measuring Kaplan University s Educational Impact For every career path +1MM students annually served Facilities in 30+ countries

More information

UNIFORM STANDARDS FOR PLT COURSES AND PROVIDERS

UNIFORM STANDARDS FOR PLT COURSES AND PROVIDERS UNIFORM STANDARDS FOR PLT COURSES AND PROVIDERS July 2015 212001734.08 Contents 1. CORE STANDARDS FOR PLT COURSES 1 1.1 Fundamental requirement 1 1.2 Course objectives 1 1.3 Course content 1 1.4 Teaching

More information

College Catalog ERRATA Sheet

College Catalog ERRATA Sheet PAGE 133: The following College Credit Courses have been modified to reflect changes requested by the Florida Department of Veterans' Affairs-State Approving Agency for Veterans' Education and Training.

More information

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020.

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020. PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University

More information

PRIOR LEARNING ASSESSMENT AND RECOGNITION (PLAR)

PRIOR LEARNING ASSESSMENT AND RECOGNITION (PLAR) PRIOR LEARNING ASSESSMENT AND RECOGNITION (PLAR) 1. INTRODUCTION 1.1 Purpose of the Guidelines These guidelines have been developed by TVETA to guide TVET Providers on how to: (i) Prepare, plan, and implement

More information

THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA. CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.

THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA. CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr. THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.FFa) BROCHURE Contents INTRODUCTION... 3 THE IICFA... 4 Basic Entry qualifications...

More information

Biography and Curriculum Vitae of John C. Villines

Biography and Curriculum Vitae of John C. Villines Biography and Curriculum Vitae of John C. Villines John Villines has dedicated his adult life to security, investigations and crime prevention. He has maintained a company license (Security and Investigations)

More information

BTEC LEVEL 4 Higher National Certificate in Business

BTEC LEVEL 4 Higher National Certificate in Business BTEC LEVEL 4 Higher National Certificate in Business HNC Business (RQF programme) HNC Programme Specification 1. Qualification HNC 2. Programme Title Business 3. UCAS Code 4. Programme Type Full time 5.

More information

Programme Specification

Programme Specification Programme Specification BSc Honours Forensic Computing 1. Awarding institution Middlesex University 2. Teaching institution Middlesex University 3. Programme accredited by 4. Final qualification BSc Honours

More information

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The

More information

15412/16 RR/dk 1 DGD 1C

15412/16 RR/dk 1 DGD 1C Council of the European Union Brussels, 12 December 2016 (OR. en) 15412/16 ENFOPOL 484 ENV 791 ENFOCUSTOM 235 OUTCOME OF PROCEEDINGS From: General Secretariat of the Council On: 8 December 2016 To: Delegations

More information

GRADUATE CERTIFICATE IN BUSINESS CONTINUITY MANAGEMENT

GRADUATE CERTIFICATE IN BUSINESS CONTINUITY MANAGEMENT GRADUATE CERTIFICATE IN BUSINESS CONTINUITY MANAGEMENT If you are looking to develop expertise in a specialized area and broaden your knowledge base, but time and cost limitations are interfering with

More information

Donor Countries Security. Date

Donor Countries Security. Date SAINT LUCIA Last updated date: 8/14/2017 OAS Pillar Sub-Regional Access Control Technique Training Civil Aviation Officials and Law Enforcement Officials United States Link to web page Date 2/13/2017 to

More information

PECB UNIVERSITY PECB UNIVERSITY

PECB UNIVERSITY PECB UNIVERSITY PECB UNIVERSITY In today s dynamic world a degree with no specialization can hardly yield well-rounded qualifications and serve as a substantial baggage for climbing the career ladder. Taking control over

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Developed and Prepared by Institute for Digital Business Strategy (IDBS) Brackenfell, Cape Town South Africa

Developed and Prepared by Institute for Digital Business Strategy (IDBS) Brackenfell, Cape Town South Africa Certificate, Diploma and Online Digital Transformation Education covering Innovation, Opportunity Management, Systems Engineering, Management, Technology and Digital Analytics Developed and Prepared by

More information

GRADUATE CERTIFICATE IN INFORMATION SECURITY MANAGEMENT

GRADUATE CERTIFICATE IN INFORMATION SECURITY MANAGEMENT GRADUATE CERTIFICATE IN INFORMATION SECURITY MANAGEMENT If you are looking to develop expertise in a specialized area and broaden your knowledge base, but time and cost limitations are interfering with

More information

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List

More information

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL WHY CHOOSE QA? There are lots of apprenticeship providers out there but we think we

More information

Accounting Ethics and Auditing

Accounting Ethics and Auditing Accounting Ethics and Auditing Only three percent of adults have career-boosting professional certifications you can be one of them. And you can earn while meeting Colorado CPA licensure requirements including

More information

High School Course Guide Business Management & Administration

High School Course Guide Business Management & Administration 88610 Business Computer Information Management I (R) 1 credit Gr: 9-12 Prerequisite: Touch Systems Data Entry Keyboarding Recommended Description: Students will gain the necessary skills to make a successful

More information

Legal, Ethical, and Professional Issues in Information Security

Legal, Ethical, and Professional Issues in Information Security Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN

More information

Updated Frequently Asked Questions (FAQ) on Revision of ZICA Accountancy Programme

Updated Frequently Asked Questions (FAQ) on Revision of ZICA Accountancy Programme Updated Frequently Asked Questions (FAQ) on Revision of ZICA Accountancy Programme 1. Question: Why has Institute revised the curriculum of the ZiCA Accountancy programme? Answer: In order to comply with

More information

Bachelor of Science Information Studies School of Information Program Summary

Bachelor of Science Information Studies School of Information Program Summary Bachelor of Science Information Studies School of Information Program Summary Students admitted to the program beginning the Summer 2011 semester follow the proposed catalog guidelines below. Program Pre-Requisites

More information

PROJECT MANAGEMENT PROFESSIONAL (PMP)

PROJECT MANAGEMENT PROFESSIONAL (PMP) PROJECT MANAGEMENT PROFESSIONAL (PMP) EXAM PREPARATION TRAINING WHAT IS PMP? Government, commercial and other organizations employ PMP certified project managers in an attempt to improve the success rate

More information

Globally recognised qualifications. Edexcel Business and Economics qualifications

Globally recognised qualifications. Edexcel Business and Economics qualifications Globally recognised qualifications Edexcel Business and Economics qualifications About Pearson At the core of everything we do is the desire to make a measurable impact on improving people s lives through

More information

DIPLOMA COURSE IN INTERNAL AUDIT

DIPLOMA COURSE IN INTERNAL AUDIT DIPLOMA COURSE IN INTERNAL AUDIT Course Objective: Internal Audit is an assurance and consulting service that reviews the efficiency and effectiveness of the internal control.. It assists management at

More information

SCHOOL OF SAFETY and SECURITY Bachelor of Policing Practice (BPP): NQF Level 7 NQF Level 7 3Year

SCHOOL OF SAFETY and SECURITY Bachelor of Policing Practice (BPP): NQF Level 7 NQF Level 7 3Year Bachelor of Policing Practice (BPP): NQF Level 7 NQF Level 7 3Year Bachelor of Policing Practices The BPP degree is applicable to members of the SAPS, traffic- and metropolitan law enforcement. The Bachelor:

More information

CERTIFICATION vs. CERTIFICATE

CERTIFICATION vs. CERTIFICATE CERTIFICATION vs. CERTIFICATE Certification Training Certificate Focus Assessing current knowledge and skills usually broad in scope Training individuals to achieve knowledge and skills (usually focused

More information

COMPUTER FORENSICS (CFRS)

COMPUTER FORENSICS (CFRS) Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics

More information

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY The Foundation Certificate in Information Security (FCIS) course is designed to provide

More information

See Course and Program Development Policy and Procedures Iwww.ubalt.edu/Provostl for instructions. C5)PROGRAM ACTIONS. Original Program ntle:

See Course and Program Development Policy and Procedures Iwww.ubalt.edu/Provostl for instructions. C5)PROGRAM ACTIONS. Original Program ntle: alb Document N: Course and Program Development: IMPACT AND APPROVAL SIGNATURES See Course and Program Development Policy and Procedures Iwww.ubalt.edu/Provostl for instructions. SCHOOL: o LAW OMSB o CAS

More information

Master of Business Administration Program and Master of Sciences Program in Strategic Information Technology Management (International Program)

Master of Business Administration Program and Master of Sciences Program in Strategic Information Technology Management (International Program) Naresuan University 263 Master of Business Administration Program and Master of Sciences Program in Strategic Management (International Program) Research Focus Strategic Management Knowledge Management

More information

Response Security Coordinator - Arua

Response Security Coordinator - Arua Response Security Coordinator - Arua Location: [Africa] [Uganda] Town/City: Arua Category: Security Job Type: Fixed term, Full-time Position: Response Security Coordinator Report to: Response Director

More information

CIM LEVEL 6 DIPLOMA IN PROFESSIONAL MARKETING

CIM LEVEL 6 DIPLOMA IN PROFESSIONAL MARKETING CIM LEVEL 6 DIPLOMA IN PROFESSIONAL MARKETING QUALIFICATION OVERVIEW The aim of the CIM Level 6 Diploma in Professional Marketing is to provide the practising marketer with relevant, contemporary marketing

More information

CYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions. Regional Headquarters, The University of the West Indies, Mona

CYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions. Regional Headquarters, The University of the West Indies, Mona 2 nd National Conference on CYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions Regional Headquarters, The University of the West Indies, Mona November 20-21, 2014 Conference

More information

Joint ICTP-IAEA School of Nuclear Energy Management November 2012

Joint ICTP-IAEA School of Nuclear Energy Management November 2012 2374-20 Joint ICTP- School of Nuclear Energy Management 5-23 November 2012 Establishing National Nuclear Security Infrastructure (Module 9 Topics 3 & 4) EVANS Rhonda International Atomic Energy Agency,

More information

College Of. Technological Innovation

College Of. Technological Innovation College Of Technological Innovation Contact Us 00971-2-5993111 (Abu Dhabi) 00971-4-4021111 (Dubai) 00971-4-4021408 (College of Technological Innovation) @Zayed_U zayeduniversity ZayedU www.zu.ac.ae Introduction

More information

Physical security advisory services Securing your organisation s future

Physical security advisory services Securing your organisation s future Physical security advisory services Securing your organisation s future August 2018 KPMG.com/in Physical security threats on the rise In a dynamic geo-political, economic and social environment, businesses

More information

Work-ready skills in Business, Administration and IT

Work-ready skills in Business, Administration and IT Work-ready skills in Business, Administration and IT We believe in learning At the core of everything we do is the desire to make a measurable impact on improving people s lives through learning. Pearson

More information

THE SENSE PROGRAM SCHOOLS EXCELLING THROUGH NATIONAL SKILL STANDARDS EDUCATION

THE SENSE PROGRAM SCHOOLS EXCELLING THROUGH NATIONAL SKILL STANDARDS EDUCATION THE SENSE PROGRAM SCHOOLS EXCELLING THROUGH NATIONAL SKILL STANDARDS EDUCATION Welding Industry Careers Welder Materials Engineer Welding Engineer Robotics Technician Welding Technician Business Owner

More information

CIMA Training Information Pack

CIMA Training Information Pack Harley Reed CIMA Training Information Pack Updated June 2018 Contents Why study with Harley Reed 3 Introduction to the CIMA programme 4 Awards & Qualifications 5 Routes to full membership of CIMA 6 CIMA

More information

2/6/2014. Uncommon Times. The Impact on Students. ASBO International. SFO Certification: Creating Your Career Pathway

2/6/2014. Uncommon Times. The Impact on Students. ASBO International. SFO Certification: Creating Your Career Pathway SFO Certification: Creating Your Career Pathway Uncommon Times The worst economic meltdown since the Great Depression of the 1930s. Families and communities struggle with Job Loss Business Closures Education

More information

BSB51615 Diploma of Quality Auditing. Information Pack

BSB51615 Diploma of Quality Auditing. Information Pack BSB51615 Diploma of Quality Auditing Information Pack Confidently blast through your RTO audit! Become a skilled expert so you can be confident that you re always audit ready. Our BSB51615 Diploma of Quality

More information

Strategic threat advisory services

Strategic threat advisory services Strategic threat advisory services Preparing you to be secure Physical security threats most often come without warning. Today, every growing organisation needs to be ready to combat such risks to stay

More information

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec. National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec April 12, 2018 1 Introduction to NICE - The National Initiative for Cybersecurity

More information

CHARTERED BANKER The gold standard in banking qualification

CHARTERED BANKER The gold standard in banking qualification CHARTERED BANKER The gold standard in banking qualification Why Choose Chartered Banker? The gold standard in banking qualification Chartered Banker is the most prestigious and internationally recognised

More information

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. By Christopher Ganizani Banda ICT Development Manager Malawi Communications Regulatory Authority 24-26th July,2016 Khartoum,

More information

Skills Academy. Forensic Studies Courses

Skills Academy. Forensic Studies Courses Skills Academy Forensic Studies Courses www.skillsacademy.co.za Forensic Science Programmes Forensic Science Studies is for the person who wants to work in a laboratory or as a crime scene technician and

More information

Spread your wings Professional qualifications and development at Deloitte. What impact will you make? careers.deloitte.com

Spread your wings Professional qualifications and development at Deloitte. What impact will you make? careers.deloitte.com Spread your wings Professional qualifications and development at Deloitte What impact will you make? careers.deloitte.com It s your future. How far will you take it? Do you want to make an impact in your

More information

MASTER OF INFORMATION TECHNOLOGY (Structure B)

MASTER OF INFORMATION TECHNOLOGY (Structure B) PROGRAM INFO The MIT (Master of Information Technology) program aims at providing Master s Degree holders with advanced knowledge and skills in dealing with an organization s computing requirements and

More information

European Risk Management Certification. Candidate Information Guide

European Risk Management Certification. Candidate Information Guide European Risk Management Certification Candidate Information Guide Presentation of FERMA Certification 3 Benefits 4 Eligibility criteria 5 Application and fees Examination details Syllabus: FERMA rimap

More information

COMPUTER HACKING Forensic Investigator

COMPUTER HACKING Forensic Investigator COMPUTER HACKING Forensic Investigator H.H. Sheik Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E www.ictd.ae ictd@ictd.ae Course Introduction: CHFIv8 presents a detailed methodological approach

More information

Disaster Recovery and Business Continuity Planning (Mile2)

Disaster Recovery and Business Continuity Planning (Mile2) Disaster Recovery and Business Continuity Planning (Mile2) Course Number: DRBCP Length: 4 Day(s) Certification Exam This course will help you prepare for the following exams: ABCP: Associate Business Continuity

More information

Title: EAL Level 2 Certificate in BusinessImprovement Techniques (QCF) At a glance. Level: Credit value: Guided learning hours: Minimum learner age:

Title: EAL Level 2 Certificate in BusinessImprovement Techniques (QCF) At a glance. Level: Credit value: Guided learning hours: Minimum learner age: Title: EAL Level 2 Certificate in BusinessImprovement Techniques (QCF) At a glance Qualification code: Level: Credit value: Guided learning hours: Minimum learner age: Registration end date: Certification

More information

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b) AGENDA ADDENDU TE REGULAR EETING OF TE AUDIT COITTEE COITTEE PUBLIC SESSION Tuesday, June 6, 2017 6:30 P.. Pages 13. Staff Reports 13.f Toronto Catholic District School Board's IT Strategic Review - Draft

More information

EDUCATOR. Certified. to know to become a. What you need. in Florida. General Certification. Requirements for. Individuals Applying

EDUCATOR. Certified. to know to become a. What you need. in Florida. General Certification. Requirements for. Individuals Applying What you need to know to become a Certified EDUCATOR in Florida General Certification Requirements for Individuals Applying for Initial Certification Beginning July 1, 2002 Bureau of Educator Certification

More information

Level 5 Diploma in Crime Prevention Designing Out Crime

Level 5 Diploma in Crime Prevention Designing Out Crime Level 5 Diploma in Crime Prevention Designing Out Crime Qualification Specification ProQual 2018 Contents Page Introduction 3 Qualification profile 3 Qualification structure 4 Centre requirements 4 Support

More information

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE PROJECT MANAGEMENT CERTIFICATE PROGRAM Further your career and gain an understanding of what it takes to lead a project to successful completion functional skills,

More information

WHO SHOULD ATTEND COURSE OUTLINE. Course Outline :: PROJECT MANAGEMENT PROFESSIONAL (PMP) EXAMINATION PREPARATORY COURSE::

WHO SHOULD ATTEND COURSE OUTLINE. Course Outline :: PROJECT MANAGEMENT PROFESSIONAL (PMP) EXAMINATION PREPARATORY COURSE:: Module Title Duration : PROJECT MANAGEMENT PROFESSIONAL (PMP) EXAMINATION PREPARATORY COURSE : 5 days INTRODUCTION The Project Management Professional (PMP ) is an acclaimed professional certification

More information

PROGRAMME SUMMARY You are required to take eight core modules in terms one and two as outlined in the module list.

PROGRAMME SUMMARY You are required to take eight core modules in terms one and two as outlined in the module list. PROGRAMME SPECIFICATION MSc Real Estate Investment KEY FACTS Programme name Real Estate Investment Award MSc School Cass Business School Department or equivalent Specialist Masters Programme Programme

More information

INSTITUTE OF INFORMATION TECHNOLOGY UNIVERSITY OF DHAKA

INSTITUTE OF INFORMATION TECHNOLOGY UNIVERSITY OF DHAKA INSTITUTE OF INFORMATION TECHNOLOGY UNIVERSITY OF DHAKA http://www.iit.du.ac.bd/ BACHELOR OF SCIENCE IN SOFTWARE ENGINEERING (BSSE) 1. Institute of Information Technology (IIT) Institute of Information

More information

CAPM TRAINING EXAM PREPARATION TRAINING

CAPM TRAINING EXAM PREPARATION TRAINING CAPM TRAINING EXAM PREPARATION TRAINING WHAT IS CAPM? PMI s Certified Associate in Project Management (CAPM) is a valuable entry-level certification for the individual who aspire to become project manager.

More information

PROGRAM SUMMARY OBJECTIVES RESULTS. Last updated date: 7/27/2017. Target Beneficiaries. Donor Security

PROGRAM SUMMARY OBJECTIVES RESULTS. Last updated date: 7/27/2017. Target Beneficiaries. Donor Security DOMINICA Last updated date: 7/27/2017 OAS Pillar National Cargo Workshop Civil Aviation Officials and Law Enforcement Officials United States Link web page 6/6/2016 6/10/2016 The CICTE Aviation Program

More information

Information Technology

Information Technology Courses - Victoria 2017 This document has been developed to assist students and parents in researching undergraduate information technology and computer science courses. It isn t an exhaustive list, and

More information

CURRICULUM The Architectural Technology and Construction. programme

CURRICULUM The Architectural Technology and Construction. programme CURRICULUM The Architectural Technology and Construction Management programme CONTENT 1 PROGRAMME STRUCTURE 5 2 CURRICULUM COMMON PART 7 2.1 Core areas in the study programme 7 2.1.1 General 7 2.1.2 Company

More information

Professional Training Course - Cybercrime Investigation Body of Knowledge -

Professional Training Course - Cybercrime Investigation Body of Knowledge - Overview The expanded use of the Internet has facilitated rapid advances in communications, systems control, and information sharing. Those advances have created enormous opportunities for society, commerce

More information

Pearson BTEC Level 5 Higher National Diploma in Engineering (Electrical and Electronic Engineering)

Pearson BTEC Level 5 Higher National Diploma in Engineering (Electrical and Electronic Engineering) Pearson BTEC Programme Pearson BTEC Level 5 Higher National Diploma in Engineering (Electrical and Electronic Engineering) Code: BHNDE5 Guided Learning Hours: 960 Hours Programme Structure: The Higher

More information

PROGRAMME SPECIFICATION

PROGRAMME SPECIFICATION PROGRAMME SPECIFICATION Bachelor of Science with Honours (SW) (Fnd) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool

More information

Launch of the Cybersecurity Fortification Initiative by the HKMA at Cyber Security Summit 2016

Launch of the Cybersecurity Fortification Initiative by the HKMA at Cyber Security Summit 2016 Launch of the Cybersecurity Fortification Initiative by the HKMA at Cyber Security Summit 2016 To further enhance the cyber resilience of the banking sector in Hong Kong, the Hong Kong Monetary Authority

More information

Assessment for all units is ongoing and continuous consisting of tests, assignments and reports. Most units have a final two-hour examination.

Assessment for all units is ongoing and continuous consisting of tests, assignments and reports. Most units have a final two-hour examination. Diploma of Computing Course Outline (T3, 2017) Campus Intake CRICOS Course Duration Teaching Methods Assessment Course Structure Units Melbourne Burwood Campus / Jakarta Campus, Indonesia March, June,

More information

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program Detroit Mercy s Master of Science in Information Assurance with a major in Cybersecurity is a multi-disciplinary 30-credit-hour graduate degree. It is designed to produce a comprehensively knowledgeable

More information

Full-Time: 4 Years, Sandwich Thick: 5 Years All LJMU programmes are delivered and assessed in English

Full-Time: 4 Years, Sandwich Thick: 5 Years All LJMU programmes are delivered and assessed in English PROGRAMME SPECIFICATION Bachelor of Science with Honours (SW) (Fnd) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool

More information

ASBO International. SFO Certification: Creating Your Career Pathway

ASBO International. SFO Certification: Creating Your Career Pathway SFO Certification: Creating Your Career Pathway Uncommon Times The worst economic meltdown since the Great Depression of the 1930s. Families and communities struggle with Job Loss Business Closures Education

More information

MBA (Part Time) Batch Program Structure

MBA (Part Time) Batch Program Structure MBA (Part Time) 2019-21 Batch Program Structure MBA (Part Time) is a 30 months program conducted separately on Weekdays in the evening Monday to Friday and Weekends Saturdays & Sundays from morning to

More information

Master degree program Technical legislation, standardization and quality management

Master degree program Technical legislation, standardization and quality management The experience of the Technical University of Sofia in education about standardization Master degree program Technical legislation, standardization and quality management Opened in 2007 at the Faculty

More information

Opening Doors to Cyber and Homeland Security Careers

Opening Doors to Cyber and Homeland Security Careers Opening Doors to Cyber and Homeland Security Careers Opening Doors to Cyber and Homeland Security Careers Today s Presenters: Frederic Lemieux, Ph.D. Professor and Program Director, Cybersecurity Strategy

More information

Regional Security Coordinator

Regional Security Coordinator Regional Security Coordinator Location: [Africa] [Kenya] Town/City: Karen Category: Security Job Type: Fixed term, Full-time *National position based in the candidates home country in the East Africa Region

More information

University of Plymouth. BA (Hons) Accounting and Finance 0414

University of Plymouth. BA (Hons) Accounting and Finance 0414 University of Plymouth Faculty of Business Plymouth Business School Programme Specification BA (Hons) Accounting and Finance 0414 Final Approved Version August 2018 1. BA (Hons) Accounting and Finance

More information

Further Education and Training Certificate: Technical Support (NQF Level 4) SAQA ID: 78964

Further Education and Training Certificate: Technical Support (NQF Level 4) SAQA ID: 78964 Further Education and Training Certificate: Technical Support (NQF Level 4) MICT Seta Accredited Qualification SAQA ID: 78964 1. Further Education and Training Certificate: Technical Support (NQF Level

More information

Cyber Security Development. Ghana in Perspective

Cyber Security Development. Ghana in Perspective Cyber Security Development Ghana in Perspective GHANA S CYBER SECURITY JOURNEY NCSPS Development Establishment of CERT NCSPS Validation 2015 Adoption of NCSPS by Cabinet 2016 NCSTWG NCSIAC NCSPS Review

More information

New Zealand Certificate in Regulatory Compliance (Core Knowledge) (Level 3)

New Zealand Certificate in Regulatory Compliance (Core Knowledge) (Level 3) New Zealand Certificate in Regulatory Compliance (Core Knowledge) (Level 3) If your staff need to learn the basics about regulatory compliance in New Zealand, then this is the paper for them. This qualification

More information

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And

More information

(NVQ/QCF) Business and Administration Advanced Apprenticeship Level 3

(NVQ/QCF) Business and Administration Advanced Apprenticeship Level 3 (NVQ/QCF) Business and Administration Advanced Apprenticeship Level This qualification is aimed at those seeking work in administration and those already working in organisations who wish to develop their

More information

Department of Business Information Technology

Department of Business Information Technology Department of Business Information Technology 1 Department of Business Information Technology Chair Lorraine J. Willoughby Phone: 701-858-3314 Toll-Free: 1-800-777-0750, ext. 3308 Department Phone: 701-858-3308

More information

Batch Programme Structure

Batch Programme Structure 2019-20 Batch Programme Structure Executive PGDM is 15 months full-time Management Programme (generally known as Fast Track MBA), which is ideal for junior and middle level executives who need a management

More information

Strategic Security Analyst

Strategic Security Analyst Strategic Security Analyst Location: [North America] [United States] Town/City: Monrovia Category: Security Job Type: Fixed term, Full-time *Preferred location: USA, UK or Australia where WVI is registered*

More information

CCISO Blueprint v1. EC-Council

CCISO Blueprint v1. EC-Council CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance

More information

GRADUATE CURRICULUM COMMITTEE REPORT

GRADUATE CURRICULUM COMMITTEE REPORT GRADUATE CURRICULUM COMMITTEE REPORT Submitted to the Graduate Council November 15, 2016. For complete curriculum proposal information please see the University s Curriculum Proposal site: registrar.ilstu.edu/curriculumforms/

More information

Prof.Dr. Sotiraq Dhamo Doc. Julian Naqellari The University of Tirana Accounting Department

Prof.Dr. Sotiraq Dhamo Doc. Julian Naqellari The University of Tirana Accounting Department Prof.Dr. Sotiraq Dhamo Doc. Julian Naqellari The University of Tirana Accounting Department 1. Key stakeholders in A&A Education 2. Current Third Level Qualification: University of Tirana (as an example)

More information