My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
CAREER DEVELOPMENT SOLUTIONS dba NEW HORIZONS
Clerk
>
Contracts / Agreements
>
C
>
CAREER DEVELOPMENT SOLUTIONS dba NEW HORIZONS
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
9/12/2024 9:16:44 AM
Creation date
6/28/2023 3:46:48 PM
Metadata
Fields
Template:
Contracts
Company Name
CAREER DEVELOPMENT SOLUTIONS dba NEW HORIZONS
Contract #
A-2023-069-10
Agency
Community Development
Council Approval Date
5/2/2023
Expiration Date
6/30/2027
Insurance Exp Date
8/1/2024
Destruction Year
2032
Notes
For Insurance Exp. Date see Notice of Compliance
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
447
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
Sfud - n s wil le rr fo'apply--�projectrmana emeh p ocesses acknow"Iedgedrb the PrdjFegManag ent=institute m <br />Inc. (PMI)® to successfully plan and execute projects. <br />Acquired Skills <br />Obtain an understanding of how project management affects business, create a charter, identify stakeholders, <br />create a project management plan, create a schedule, create a budget, create a risk register, and create various <br />management plans. They will be able to analyze project risks, address project related procurement, execute the <br />plan, and monitor and control it as needed. They will know how to close the project, including project and contract <br />closeout. <br />Description <br />Principles of Privacy in the U.S. Private Sector covers U.S. privacy laws and regulations at federal and state levels, <br />including breach notification and limits on various private sectors. You'll leave with an understanding of the legal <br />requirements for the responsible handling and transfer of personal data within industry and workplaces, including <br />government access to private -sector data. <br />Acquired Skills <br />students know privacy laws and regulations and how to apply them, and that students know how to secure your <br />place in the information economy. When students earn a CIPP credential, it means they've gained a foundational <br />understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional <br />laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for <br />handling and transferring data and more. <br />Certified Information Systems Auditor (CISA) <br />Description <br />This course is designed to help candidates prepare for sitting the ISACA CISA certification examination. By taking <br />this course and obtaining CISA certification, your experience and skills in auditing and securing the organization's <br />information systems will be validated. Securing the organization's information is a critical business objective in <br />today's business environment. The information that an organization depends on to be successful can be at risk from <br />numerous sources. By effectively managing audit processes, controls, and other security aspects of the business, <br />you will greatly contribute to the overall security of the organization. <br />Acquired Skills <br />implement information systems audit services in accordance with information systems audit standards, guidelines, <br />and best practices. <br />evaluate an organizations structure, policies, accountability, mechanisms, and monitoring practices. <br />evaluate information systems acquisition, development, and implementation. <br />evaluate the information systems operations, maintenance, and support of an organization; and evaluate the <br />business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT <br />services are maintained. <br />define the protection policies used to promote the confidentiality, integrity, and availability of information assets. <br />Certified Information System Security Professional (CISSP) <br />Description <br />In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains <br />that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. <br />Acquired Skills <br />Earning the CISSP proves you have what it takes to effectively design, implement and manage a best -in -class <br />cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)' member, unlocking a <br />broad array of exclusive resources, educational tools, and peer -to -peer networking opportunities. <br />Change Management <br />Description <br />This workshop will give all participants an understanding of how change is implemented and some tools for <br />managing their reactions to change. <br />Acquired Skills <br />
The URL can be used to link to this page
Your browser does not support the video tag.