KPMG LLP

Systems Training - Simulations and Resources

The KLA (KPMG Learning Academy) offers systems training for bespoke and off-the-shelf systems. We work collaboratively with systems and process SMEs to create best practice training scripts to develop simulations in multiple playback modes, including video and audio content, to cater for all learning styles and organisational requirements.

Features

  • Training scripts developed in collaboration with SMEs
  • Role-based approach
  • See, Try and Test playback modes
  • Use of multi-media including audio, video and animation
  • Simulated processes mirror actual daily tasks
  • Assessment mode to test learners’ capability
  • Relevant, concise processes aligned with core tasks
  • Printable job aids included to support key processes

Benefits

  • Training based on market-leading expertise and know-how
  • Role-based training relevant to daily tasks completed by learners
  • All learning styles catered for using multiple playback modes
  • Rapid adoption due to engaging, immersive simulations.
  • Learners practice role-specific scenarios in a simulated environment
  • Assurance of proficiency provided before users go live
  • Decrease time-to-proficiency – support real change
  • Learners supported on-the-job by reference material

Pricing

£790 to £2930 per person per day

Service documents

G-Cloud 9

261737629108113

KPMG LLP

KPMG G-Cloud Team

2073115767

uk-g-cloud@kpmg.co.uk

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to This service is often provided as an extension to implementation of Learning Management Systems (LMS); hosting digital learning content and learning consultancy services.
Cloud deployment model Public cloud
Service constraints We will require reasonable access to key stakeholders.
We will require reasonable access to relevant documents and data.
We will agree cyber and physical security measures prior to commencement.
We will agree specific requirements for access to premises and client equipment prior to commencement.
We will agree access to client’s 3rd parties where required prior to commencement.
System requirements
  • Learning management system (LMS) that hosts Scorm 1.2 compliant content
  • Organisation's learners have access to the Learning Management System (LMS)

User support

User support
Email or online ticketing support Email or online ticketing
Support response times If KPMG is hosting, Standard Service Level Agreemenets (SLAs) exist, however, specific SLAs can be agreed and set up depending on specific client circumstances.
User can manage status and priority of support tickets No
Phone support No
Web chat support No
Onsite support No
Support levels N/A
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Consulting service to enable clients to load content onto their LMS. If KPMG hosted, change management services and learner communications will be agreed with the client as part of the project.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction This can be provided in various formats to the client.
End-of-contract process If client hosted, the client determines how the modules are utilised within the organisation and whether to extend the licence period with KPMG.
If KPMG hosted, typically, a final report is issued in accordance with a schedule.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Content that is built with responsive design will re-size and potentially present different aspects depending on which device the content is accessed on.
Accessibility standards WCAG 2.0 AAA
Accessibility testing The digital learning modules are developed to comply with WCAG 2.0 standards.
API No
Customisation available Yes
Description of customisation Clients can have the modules customised by KPMG to incorporate client specific branding, case studies and content where appropriate.

Scaling

Scaling
Independence of resources Service Level Agreements (SLAs) relating to up-time of Learning Management System (LMS) if KPMG is hosting.

Analytics

Analytics
Service usage metrics Yes
Metrics types Where hosted, various reports can be provided depending on the digital learning content. Typically, reports include access data, completion reports, and test results.
Reporting types Regular reports

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest Other
Other data at rest protection approach N/A
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach If client hosted, they already have access to the data. If KPMG hosted, we can provide in a final report. Typically, monthly reports are provided throughout the course of the contract.
Data export formats Other
Other data export formats
  • If client hosted it will depend on the client's LMS
  • Reports provided in PDF if KPMG are hosting
Data import formats
  • CSV
  • Other
Other data import formats
  • If KPMG hosted, data is uploaded via CVS
  • If client hosted, KPMG provided files in Scorm 1.2 format

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Other
Other protection between networks N/A. Modules sit either on client LMS or KPMG LMS
Data protection within supplier network Other
Other protection within supplier network N/A

Availability and resilience

Availability and resilience
Guaranteed availability N/a
Approach to resilience N/a
Outage reporting N/a

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Other
Other user authentication Client LMS hosting will have their own authentification
Access restrictions in management interfaces and support channels Access is restricted typically by user unique sign on details and via a specified format of password. User profiles are also typically utilised to restrict access to applicable content.
Access restriction testing frequency At least every 6 months
Management access authentication 2-factor authentication

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation No
Security governance approach N/A
Information security policies and processes N/A

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach N/A
Vulnerability management type Undisclosed
Vulnerability management approach N/A
Protective monitoring type Supplier-defined controls
Protective monitoring approach N/A
Incident management type Supplier-defined controls
Incident management approach N/A

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £790 to £2930 per person per day
Discount for educational organisations No
Free trial available No

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Terms and conditions document View uploaded document
Return to top ↑