Whether online or onsite, instructor-led live Corporate Compliance training courses illustrate the fundamentals and advanced topics of Corporate Compliance through interactive discussion and hands-on practice.
Corporate Compliance training is offered as either "online live training" or "onsite live training." Online live training (also known as "remote live training") is conducted using an interactive remote desktop. Onsite live Corporate Compliance training can be carried out locally on customer premises in Transylvania or in NobleProg corporate training centers in Transylvania.
NobleProg -- Your Local Training Provider
Brasov, Calea Bucuresti Street
NobleProg Brasov, 13 Calea Bucuresti Street Sacele, Brasov, romania, 505600
The hotel is situated at the city entrance, being the best conference and training location in Brasov. Three conference rooms can accommodate up to 170 guests and can be modified for the company needs. These training rooms are equipped with the all necessities of a good conference or training.
Salile de training sunt situate central în Sibiu, pe principalul bulevard. Clădirea hotelului care le gazduieste este de factură clasicistă si reprezinta un punct de referinta arhitecturala a orasului.
Turnul Sfatului, Galeria de Arta Contemporana, sau parcurile Corneliu Coposu si Astra se află în imediata apropiere.
Pentru a ajunge aici de la gara, puteti merge pe jos 20min sau cu autobuzul 5 circa 10min
Locuri de parcare găsiți în parcarea supravegheata, sau pe străzile alăturate.
Cluj-Napoca, Pitești Street
NobleProg Cluj-Napoca, Strada Pitești 19, Cluj-Napoca, romania, 400124
ClujHUB has more rooms for events and training sessions, which can host from 4 to 80 people. These areas can be setup up to fit the companies need. The location is great, 10 minutes walk from the historical city center.
This instructor-led, live training in Transylvania (online or onsite) is designed for advanced-level professionals who wish to gain a comprehensive understanding of fraud examination concepts and prepare for the Certified Fraud Examiner (CFE) exam.
Upon completing this training, participants will be able to:
Acquire comprehensive knowledge of fraud examination principles and processes.
Identify, investigate, and prevent various forms of financial fraud.
Understand the legal framework surrounding fraud, including its legal elements, applicable laws, and regulations.
Develop practical skills for conducting fraud investigations, such as evidence collection, interviewing techniques, and data analysis.
Design and implement effective fraud prevention and deterrence programs within organizations.
Gain the confidence and knowledge necessary to successfully pass the Certified Fraud Examiner (CFE) exam.
Open Source Software (OSS) Management refers to the systematic oversight of the entire lifecycle of open-source components within an organization, ensuring their secure, compliant, and efficient utilization.
Delivered as an instructor-led, live training session (available online or onsite), this program targets intermediate-level IT professionals seeking to implement best practices for managing open-source software in enterprise and government settings.
Upon completion of this training, participants will be able to:
Formulate effective OSS policies and establish robust governance frameworks.
Utilize SBOM and SCA tools to identify, track, and manage open-source dependencies.
Reduce risks linked to licensing issues and security vulnerabilities.
Accelerate OSS adoption while maximizing innovation and achieving cost savings.
Course Format
Interactive lectures and discussions.
Case studies and scenario-based exercises.
Practical demonstrations using OSS management tools.
Customization Options
This course can be customized to align with specific organizational OSS policies and toolchains. Please contact us to arrange.
This instructor-led live training in Transylvania (online or onsite) targets intermediate-level cybersecurity professionals who aim to enhance their grasp of GRC frameworks and apply them to ensure secure and compliant business operations.
By the conclusion of this training, participants will be able to:
Comprehend the fundamental elements of cybersecurity governance, risk, and compliance.
Perform risk assessments and formulate effective risk mitigation strategies.
Execute compliance measures and handle regulatory obligations.
Create and enforce security policies and procedures.
Basel III represents a global regulatory framework focused on bank capital adequacy, stress testing, and market liquidity risk. Initially established by the Basel Committee on Banking Supervision in 2010–11, the implementation timeline for these amendments was extended until March 31, 2019. The framework enhances bank capital requirements by boosting liquidity and reducing leverage.
Unlike Basel I and II, Basel III mandates distinct reserve levels for various deposit types and borrowings. Rather than replacing its predecessors, it functions alongside Basel I and Basel II to create a more comprehensive regulatory environment.
Navigating this complex and evolving landscape can be challenging. Our course and training are designed to help you anticipate changes and understand their impact on your institution. As an accredited training partner of the Basel Certification Institute, we guarantee that our materials and training quality are current and highly effective.
Objectives:
Prepare participants for the Certified Basel Professional Examination.
Equip attendees with practical strategies and techniques for defining, measuring, analyzing, improving, and controlling operational risk within banking organizations.
Target Audience:
Board members with risk management responsibilities
Chief Risk Officers (CROs) and Heads of Risk Management
Members of Risk Management teams
Compliance, legal, and IT support staff
Equity and Credit Analysts
Portfolio Managers
Rating Agency Analysts
Overview:
Introduction to Basel norms and amendments to the Basel Accord (III)
Regulations covering market, credit, counterparty, and liquidity risk
Stress testing for various risk measures, including formulation and delivery methods
Potential effects of Basel III on the international banking industry, with practical application demonstrations
This intensive four-day training event (CGEIT preparation) serves as the ideal groundwork for exam day, designed to maximize your chances of passing the challenging CGEIT certification on your first try. The CGEIT designation is an internationally acclaimed symbol of excellence in IT governance, awarded by ISACA. It is specifically tailored for professionals tasked with managing IT governance or those holding significant advisory or assurance roles within the field. Earning CGEIT status will broaden your professional recognition in the job market and enhance your influence at the executive level.
Objectives:
This seminar is structured to prepare delegates for the CGEIT examination by helping them expand their existing knowledge and understanding, ensuring they are well-equipped to pass the exam as outlined by ISACA.
Target Audience:
The course is intended for IT and business professionals with substantial experience in IT governance who are preparing to sit for the CGEIT exam.
This instructor-led, live training in Transylvania (online or onsite) is designed for compliance professionals in the payment sector who aim to develop, implement, and enforce a robust compliance program within their organizations.
Upon completion of this training, participants will be equipped to:
Comprehend the regulations established by government regulators for payment service providers.
Develop the internal policies and procedures necessary to meet regulatory requirements.
Establish a compliance program that aligns with applicable laws.
Ensure that all corporate processes and procedures adhere to the compliance framework.
Safeguard the company’s reputation while protecting it from legal liabilities.
This course offers an expert overview of the newly enacted Accessibility Law, providing developers with the practical skills needed to design, develop, and maintain fully accessible applications. Beginning with a contextual discussion on the law's importance and implications, the course rapidly transitions to hands-on coding practices, tools, and testing techniques to ensure compliance and inclusivity for users with disabilities.
This course aims to equip participants with a solid grasp of GRC processes and capabilities, along with the necessary skills to effectively integrate governance, performance management, risk management, internal control, and compliance initiatives.
Course Overview:
Key GRC terminology and definitions
Foundational principles of GRC
Core components, best practices, and activities
The relationship between GRC and related disciplines
This instructor-led, live training in Transylvania (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
Understand the key concepts of the HiTrust CSF (Common Security Framework).
Identify the HITRUST CSF administrative and security control domains.
Learn about the different types of HiTrust assessments and scoring.
Understand the certification process and requirements for HiTrust compliance.
Know the best practices and tips for adopting the HiTrust approach.
The landscape of information security threats and attacks is constantly evolving and becoming more sophisticated. The most effective defense strategy involves the proper implementation and management of information security controls and industry best practices. Furthermore, robust information security is a critical expectation and requirement for customers, legislators, and other stakeholders.
This training course is designed to equip participants with the skills needed to implement an Information Security Management System (ISMS) in accordance with ISO/IEC 27001. It aims to provide a thorough understanding of ISMS best practices and establish a framework for its ongoing management and enhancement.
Upon completing the training course, participants are eligible to sit for the exam. Successful candidates may apply for the “PECB Certified ISO/IEC 27001 Lead Implementer” credential, which validates their ability and practical knowledge to implement an ISMS aligned with ISO/IEC 27001 requirements.
Who Can Attend?
Project managers and consultants involved in or concerned with the implementation of an ISMS
Expert advisors aiming to master the implementation of an ISMS
Individuals responsible for ensuring conformity to information security requirements within an organization
Members of an ISMS implementation team
General information
Certification fees are included in the exam price
Training material containing over 450 pages of information and practical examples will be distributed
A participation certificate awarding 31 CPD (Continuing Professional Development) credits will be issued
In case of exam failure, you can retake the exam within 12 months free of charge
Educational approach
This training course contains essay-type exercises, multiple-choice quizzes, examples, and best practices used in the implementation of an ISMS.
The participants are encouraged to communicate with each other and engage in discussions when completing quizzes and exercises.
The exercises are based on a case study.
The structure of the quizzes is similar to that of the certification exam.
Learning objectives
This training course will help you:
Gain a comprehensive understanding of the concepts, approaches, methods, and techniques used for the implementation and effective management of an ISMS
Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
Understand the operation of an information security management system and its processes based on ISO/IEC 27001
Learn how to interpret and implement the requirements of ISO/IEC 27001 in the specific context of an organization
Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an ISMS
This instructor-led, live Payment Card Industry Professional training in Transylvania (online or onsite) offers a personal certification for industry professionals who want to showcase their expertise and comprehension of the PCI Data Security Standard (PCI DSS).
Upon completion of this training, participants will be able to:
Grasp the payment process and the PCI standards established to safeguard it.
Comprehend the roles and responsibilities of entities within the payment industry.
Gain deep insight into and understanding of the 12 PCI DSS requirements.
Demonstrate knowledge of PCI DSS and its application to organizations involved in the transaction process.
Read more...
Last Updated:
Testimonials (3)
learning about Basel
Daksha Vallabh - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Speed of response and communication
Bader Bin rubayan - Lean Business Services
Course - ISO/IEC 27001 Lead Implementer
Risk optimization is more clear than the other subjects
Munirah Alsahli - GOSI
Course - CGEIT – Certified in the Governance of Enterprise IT
Online Corporate Compliance training in Transylvania, Corporate Compliance training courses in Transylvania, Weekend Corporate Compliance courses in Transylvania, Evening Corporate Compliance training in Transylvania, Corporate Compliance instructor-led in Transylvania, Corporate Compliance coaching in Transylvania, Online Corporate Compliance training in Transylvania, Corporate Compliance classes in Transylvania, Corporate Compliance boot camp in Transylvania, Corporate Compliance instructor in Transylvania, Corporate Compliance instructor-led in Transylvania, Corporate Compliance on-site in Transylvania, Corporate Compliance private courses in Transylvania, Evening Corporate Compliance courses in Transylvania, Corporate Compliance trainer in Transylvania, Weekend Corporate Compliance training in Transylvania, Corporate Compliance one on one training in Transylvania