Course Manager Training Management System

Course Manager is a cloud-hosted software solution purpose built to reduce training administration, streamline the booking process and automate manual tasks including communications, evaluation, reporting and invoicing, improving business efficiency. We provide implementation, system training, Support Helpdesk and a dedicated Customer Success Manager for system usage optimisation.


  • Management and scheduling of multiple course types (SCORM 1.2/2004 compliant)
  • Resource management and allocation including trainer management
  • Online booking and payment with optional website integration
  • Real time reporting which can be exported, shared and scheduled
  • Online personalised user portals
  • CRM and marketing functions including Outlook integration
  • Automated, triggered email and SMS communications
  • Finance and invoicing functions, including Sage and Xero integration
  • Fully branded document generation (e.g. certificates, joining instructions)
  • A powerful workflow engine to automate actions and tasks


  • Reduced costs through system automation and streamlined processes
  • 24/7 access for customers to book courses online
  • Improved customer service through information access, reduced errors and communication
  • Allows confident decision making due to accurate easily accessible data
  • Re-allocate admininstration resource to expand your business
  • Fast return on investment
  • Saves time by removing duplication and giving instant information access
  • Improves professional image with branded documentation and online user portals
  • Future proof system which is updated every 2 weeks
  • Reduced IT resources with a cloud based hosted system


£7000 to £100000 per instance

  • Free trial available

Service documents

G-Cloud 9



Andrew Flook

0845 543 0229

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Hybrid cloud
Service constraints We recommend only use of any browser released or updated within the last five years.
System requirements
  • Internet access
  • Use of any modern browser (last 5 years)

User support

User support
Email or online ticketing support Email or online ticketing
Support response times We will respond within two hours during business hours (Monday to Friday 9am to 5pm)
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels All customers receive the same level, which includes unlimited telephone support (Monday to Friday 9am to 5pm), in-built system help and how-to guides and access to an online helpdesk through which customers are able to view the status of any outstanding queries. All customers are also allocated a Customer Success Manager who will liaise to ensure ongoing satisfaction and capture product improvement suggestions.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started We offer all our customers a full implementation package. This package will contain the following activities:

• Project kick off meeting
• Walk-through the “Planning Your Journey Guide”
• Pre System Build Consultation
• Data Build
• Pre-Training Consultation
• Formal training – this can either be onsite, webinar or a combination
• Training follow up actions
• Weekly project teleconference
• Project administration work
• Project closure meeting.

The exact number of hours provided by accessplanit will depend upon the package purchased, and ranges from 55 hours support to 80 hours.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction As part of our standard agreement we will provide a backup of the customer database. Alternatively the customer may prefer to export their data into csv or excel using inbuilt system tools.
End-of-contract process Once the contract has ended we will provide a copy of the most recently backed up version of the database to the customer within 30 days upon request.
Should the customer request that we provide the data in any other specific format then we may be able to accommodate this at an additional cost.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Our system is built in a responsive design which means it will dynamically resize to fit the screen of any device it's being used on. For example, the main menu will be hidden on a small display and accessed by clicking a menu icon.
Accessibility standards None or don’t know
Description of accessibility Our software meets accessibility criteria in a number of ways, including:
You do not need to use a mouse to use the system – all areas can be selected and navigated via use of a keyboard
The system is cross browser compatible
The system tends to be text object based rather than logo or image based
The system has no moving or blinking objects
Accessibility testing We have had clients successfully use the software on screen readers (e.g. Dragon Naturally Speaking).
What users can and can't do using the API We provide two course related APIs which have been designed to make it easy for our customers to pull course related information into their corporate websites, usually for the purpose of allowing real-time integrated online booking and payment.
We can provide full API documentation upon request.
API documentation Yes
API documentation formats PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Buyers are able to customise certain areas of the system themselves, including dashboards, reports, workflows, tasks and more.
Most customisation can be done via an administration area which is only accessible with users who have full administration access.


Independence of resources As part of the pre-sales process we will ask a series of questions to determine if the customer would require anything beyond the standard, shared hosting that most customers are given. If so, we can provide quotations for custom hosting packages.


Service usage metrics Yes
Metrics types We track any information created, updated or deleted in the system. This includes a log of who made the change, when and what the change was. Customers are given access to these audit logs.
We also keep email and SMS logs, including clicks, opens, bounces.
Reporting types
  • Real-time dashboards
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Users can export data through any datagrid in the system (note that all key modules have associated datagrids). You can choose to filter this information and choose what fields to include in the export. Alternatively, you can use a database reporting tool to create custom exports across any data.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats PDF
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network We also support SFTP for file transfers.

Availability and resilience

Availability and resilience
Guaranteed availability Should the system availability fall below 99.5% in any month then the customer is entitled to apply for Service Credits. These credits will increase depending on the level of downtime experienced. See our full Terms and Conditions for more information.
Approach to resilience Accessplanit software applications are hosted in UK based purpose-built data centres. Access is limited to security-cleared personnel which is enforced by CCTV monitoring and access control systems, ensuring a safe and secure environment. Servers are monitored 24 x 7 with onsite technical engineers available. In the event of a mains failure, an advanced uninterruptible power supply (UPS) system provides power to all dedicated servers, while diesel generators are also available which are capable of running the data centre indefinitely.
Outage reporting We use a service that sends an email and triggers a notification through a mobile phone application should any customer system be unresponsive for over five minutes.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Other user authentication Users can be authenticated through ADFS or through SAML.
Access restrictions in management interfaces and support channels Our product has it's own role based security model. All users by default only get the lowest level of access, whereby they are extremely limited in what data they get access to (just their own). For users to be able to see management interfaces they will have be granted a higher access level.
Access restriction testing frequency At least every 6 months
Management access authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 BSI
ISO/IEC 27001 accreditation date 16/12/2016
What the ISO/IEC 27001 doesn’t cover All processes are covered.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Accessplanit adheres to all policies and processes as specified by ISO 27001 information security management. Processes are regularly audited and breaches of the policies and processes are treated as a disciplinary offence.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Any product changes have to go through a formal product suggestion and/or change request process which will assess their suitably and benefit to the wider accessplanit community.

We have a developer "code review process" ensuring that all developers are working to best practice.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Potential threats are identified through event logging, whereby we monitor server activity.
Priority patches are assessed and deployed when necessary, this could be multiple times per day if required.
We have team members specifically tasked with following the latest security news.
Protective monitoring type Supplier-defined controls
Protective monitoring approach All staff are responsible for reporting suspected information security incidents. Monitoring measures are also in place including regular virus and malware scans on all business critical assets.
Compromises are defined in order of criticality: low, medium and high. They are responded to in-line with this categorisation.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach We have a pre-defined Information Security Incident Procedure in place, which forms part of our IS policy.
All staff are responsible for reporting suspected information security incidents. Incidents are reported to the Technical Director. There is a hierarchy defined if the Technical Director is unavailable.
Incident reports and subsequent actions are logged within the accessplanit Continuous Improvement system. Copies are provided to all members of the Information Security Committee.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No


Price £7000 to £100000 per instance
Discount for educational organisations No
Free trial available Yes
Description of free trial We can provide a trial environment which allows users to explore the core system modules. Trial access is usually provided for 14 days unless otherwise agreed.


Pricing document View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑