Training:
Advanced Implementation Training Course: BCMS 22301
Course Name:
BCMS Slides including Exercises
BCMS 22301 standard
Certificate of course completion. (We will conduct a test at the end of training and all successful candidate will be issued this certificate)
Duration:
3 Days
Learning Outcomes:
By the end of the course you will be able to understand
Knowledge of the techniques & tools used for Business Continuity in an organization
Understand and prioritize the vulnerabilities and potential threats to an organization.
Understand what all a Business Continuity Policy should contain.
Identify and protect Business Critical Functions, building resilience and capability to continue operating during unexpected events.
Be able to protect and recover critical business and recover critical business systems during disruption.
Prepare for the unexpected effectively by maintaining ISO 22301 compliance.
WHO SHOULD ATTEND?
Health and safety managers
Internal auditors
Consultants
Environmental and quality managers interested in implementing OH& management systems
Course content And Structure:
Course starts at 9:00 A.M. and ends approximately at 6:00 P.M. The course includes a series of presentations, Examples, Exercises involving group activities, Brain Storming, Case Studies, Readings and Sharing of Practical Experiences. Maximum attendance: 20 Delegates.
Eligibility?:
Basic knowledge of BCMS 22301.
Course Facilitators:
All course facilitators are highly qualified and experienced both in training and assessment of Business Continuity Management Systems. We strongly believe that the experience in Business Continuity Management Assessment and Training skills is a right combination to deliver a practical training course. They are selected on their ability to make BSCIC courses both practical, enjoyable and interactive.
The key content include:
Scope, contents and requirement of ISO 22301
Understanding of Business Continuity Management best practice.
Designing, planning and implementing your own BCMS.
Creating Business Continuity Policies, objectives and processes.
Range of application for an ISMS
Performing an Information Security Internal Audit
Audit programming
Reporting the audit
Responsibilities of an auditor
Corrective action and follow-up
How To Apply?:
To apply for this course please obtain/download our Participant Nomination Form and mail to training1@aitf.co.in/training2@aitf.co.in. Please make advance payment* to reserve a seat in our course. For any cancellation please request at least 2 days in advance to the commencement of the course. Transfer of Nomination is acceptable.