Welcome to the Employee Induction Program
This course consists of 5 individual courses bundled together to be completed in a sequential order. These are:
- Employee Induction
- Security Awareness 2018
- Business Continuity Management Systems Course
- Information Security Management Systems Course
- Out of Office Procedure for AGS Employees
On completion you will receve your Employee Induction Certificate.
Enjoy, and welcome to Aspen Grove Solutions!
Course Progress
Course Content
Lessons
Status
1
Employee Induction
-
Welcome – Introduction
-
Welcome – Employee Welfare Policy
-
Welcome – Company Structure
-
Welcome – How To Raise an IT Support JIRA Ticket
-
Welcome – Sports and Social Club
-
Welcome – Open/Lock Up Procedure – Tralee Office
-
Welcome – Out Of Office Procedure
-
Welcome – EAP Gen Employee Booklet
-
Bamboo HR – Click Here To Open BambooHR
-
Bamboo HR – Team Member Overview
-
Bamboo HR – Updating Info
-
Bamboo HR – Dashboard Overview
-
Bamboo HR – Adding Emergency Contact
-
BambooHR – Documents Tab
-
Bamboo HR – Training
-
Bamboo HR – Skills
-
Bamboo HR – Requesting Time Off, Modify Time Off Request or Cancel Request
-
Aspen Grove Solutions Employee Handbook
-
Tralee Health and Safety – Welcome
-
Tralee Health and Safety – Health and Safety Statement
- Welcome – Introduction
- Welcome – Employee Welfare Policy
- Welcome – Company Structure
- Welcome – How To Raise an IT Support JIRA Ticket
- Welcome – Sports and Social Club
- Welcome – Open/Lock Up Procedure – Tralee Office
- Welcome – Out Of Office Procedure
- Welcome – EAP Gen Employee Booklet
- Bamboo HR – Click Here To Open BambooHR
- Bamboo HR – Team Member Overview
- Bamboo HR – Updating Info
- Bamboo HR – Dashboard Overview
- Bamboo HR – Adding Emergency Contact
- BambooHR – Documents Tab
- Bamboo HR – Training
- Bamboo HR – Skills
- Bamboo HR – Requesting Time Off, Modify Time Off Request or Cancel Request
- Aspen Grove Solutions Employee Handbook
- Tralee Health and Safety – Welcome
- Tralee Health and Safety – Health and Safety Statement
2
Business Continuity Management Systems Course
-
Purpose
-
Scope, Objective and Context
-
Approach to Risk and Policy
-
Procedures
-
Responsibilities and Interested Parties
-
The Business Continuity Plan
-
Business Continuity Strategy
-
Develop Business Resumption and Recovery Plans
-
Develop Resumption and Recovery Plans for People Assets, Facilities and Office Space
-
Testing & Exercises, and Corporate Communications
-
Training
-
BCP Maintenance and Management Reporting
- Purpose
- Scope, Objective and Context
- Approach to Risk and Policy
- Procedures
- Responsibilities and Interested Parties
- The Business Continuity Plan
- Business Continuity Strategy
- Develop Business Resumption and Recovery Plans
- Develop Resumption and Recovery Plans for People Assets, Facilities and Office Space
- Testing & Exercises, and Corporate Communications
- Training
- BCP Maintenance and Management Reporting
3
Information Security Management Systems Course
-
Information Security Policy – Executive Summary
-
Information Security Policy – Organizational Security – Management Commitment
-
Information Security Policy – Information Security Responsibilities
-
Information Security Policy – Third-Party Disclosures
-
Information Security Policy – Asset Management
-
Information Security Policy – Information Classification
-
Information Security Policy – Information Handling
-
Information Security Policy – Levels of Protection Needed
-
Information Security Policy – Human Resource Security
-
Information Security Policy – Physical and Environmental Security
-
Information Security Policy – Communication and Operations Management
-
Information Security Policy – Access Control
-
Information Security Policy – Systems Development and Maintenance
-
Information Security Policy – Information Security Management
-
Information Security Policy – Compliance
-
Mobile Device and Teleworking – Executive Summary
-
Mobile Device and Teleworking – Laptop Computers and Other Mobile Devices
-
Mobile Device and Teleworking – Tele-working
-
Mobile Device and Teleworking – Personal Computing Devices, Smart Phones, Mobile Devices
-
Social Media Policy – Overview
- Information Security Policy – Executive Summary
- Information Security Policy – Organizational Security – Management Commitment
- Information Security Policy – Information Security Responsibilities
- Information Security Policy – Third-Party Disclosures
- Information Security Policy – Asset Management
- Information Security Policy – Information Classification
- Information Security Policy – Information Handling
- Information Security Policy – Levels of Protection Needed
- Information Security Policy – Human Resource Security
- Information Security Policy – Physical and Environmental Security
- Information Security Policy – Communication and Operations Management
- Information Security Policy – Access Control
- Information Security Policy – Systems Development and Maintenance
- Information Security Policy – Information Security Management
- Information Security Policy – Compliance
- Mobile Device and Teleworking – Executive Summary
- Mobile Device and Teleworking – Laptop Computers and Other Mobile Devices
- Mobile Device and Teleworking – Tele-working
- Mobile Device and Teleworking – Personal Computing Devices, Smart Phones, Mobile Devices
- Social Media Policy – Overview