Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Q-Pulse Champion - Admin

Professional

Course Details
Undertaking the Q-Pulse Champion User Administration Course will position you with the
skills to manage the basic requirements to run a fully functioning system.

The content of the course will include:

• Creating document types • Creating audit types


• Building document workflows • Creating audit number sequences
• Designing approval workflows • Understanding an audit lifecycle
• Creating document number sequences • Designing audit security settings
• Understanding the document lifecycle • Using audit messaging
• Designing document security settings
• Using document messaging
• Creating CAPA types • Creating supplier records
• Building CAPA workflows • Understanding supplier management
• Designing data capturing wizards lifecycle
• Creating CAPA number sequences • Designing supplier security settings
• Understanding the CAPA lifecycle • Using supplier messaging
• Creating robust managed list content for
analysis
• Analysing your data
• Designing CAPA security settings
• Using CAPA messaging

• Creating customer records • Creating asset records


• Understanding customer management • Designing asset activities
lifecycle • Understanding asset management lifecycle
• Designing customer security settings • Designing asset security settings
• Using customer messaging • Using asset messaging

• Creating persons’ records • Creating training records


• Adding training plans • Understanding training management
• Adding review records lifecycle
• Designing people security settings • Designing training security settings
• Using people messaging • Using training messaging
• Raising an occurrence • Building incident workflows
• Understanding occurrence management • Creating incident number sequences
lifecycle • Understanding the incident lifecycle
• Designing occurrence security settings • Creating robust classification list content for
• Using occurrence messaging analysis
• Creating occurrence numbering sequences • Analysing your data
• Design occurrence forms • Designing incident security settings
• Using incident messaging
• Performing risk assessments

You might also like