Overview Gain core knowledge and experience to successfully implement and manage security programs in this official (ISC)2 CISSP course This course is the most comprehensive review of information security concepts and industry best practices, and covers the eight domains of the official CISSP CBK (Common Body of Knowledge). You will gain knowledge in information security [...]
CompTia® Security + Instructor-led Training 5 Days (with Exam) OVERVIEW: CompTIA® Security+® (Exam SY0-401) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ certification examination. In this course, you [...]
Overview This two-day course leads to the ISO/IEC27001 Practitioner certificate in IT Security Management. Candidates will be taken from foundational understanding through to getting a practical appreciation of how to the ISO/IEC27001 standard should apply to business issues and promote better alignment with organizational security objectives. ISO/IEC 27001:2013 defines the requirements for an ISMS, which [...]
Overview This two-day course leads to the ISO/IEC27001 Foundation certificate in IT Security Management. Candidates will be taken from foundational understanding through to getting a practical appreciation of how to the ISO/IEC27001 standard should apply to business issues and promote better alignment with organizational security objectives. ISO/IEC 27001:2013 defines the requirements for an ISMS, which [...]
Overview Gain core knowledge and experience to successfully implement and manage security programs in this official (ISC)2 CISSP course This course is the most comprehensive review of information security concepts and industry best practices, and covers the eight domains of the official CISSP CBK (Common Body of Knowledge). You will gain knowledge in information security [...]
Overview This is a 3-day class. In this course, students will establish processes to ensure that information security measures align with established business needs. [ucaddon_uc_super_clean_tabs heading_active="#ec1f35" uc_items_data="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" uc_fonts_data="JTdCJTIydWNfaXRlbXNfYXR0cmlidXRlX3RpdGxlJTIyJTNBJTdCJTIyZm9udC1mYW1pbHklMjIlM0ElMjJNb250c2VycmF0JTIyJTJDJTIyZm9udC13ZWlnaHQlMjIlM0ElMjJCb2xkJTIyJTJDJTIyZm9udC1zaXplJTIyJTNBJTIyMjBweCUyMiU3RCUyQyUyMnVjX2l0ZW1zX2F0dHJpYnV0ZV9jb250ZW50JTIyJTNBJTdCJTIyZm9udC1mYW1pbHklMjIlM0ElMjJMYXRvJTIyJTJDJTIyZm9udC13ZWlnaHQlMjIlM0ElMjJOb3JtYWwlMjIlMkMlMjJmb250LXNpemUlMjIlM0ElMjIxNXB4JTIyJTJDJTIybGluZS1oZWlnaHQlMjIlM0ElMjIxZW0lMjIlMkMlMjJjb2xvciUyMiUzQSUyMiUyMzYyNjI2MiUyMiU3RCU3RA=="]Course Outline 1 Information Security Governance Develop an Information Security Strategy Align Information Security Strategy with Corporate Governance Identify Legal and Regulatory Requirements Justify Investment in Information Security [...]
Overview During our 4-day ISACA CISA (Certified Information Systems Auditor) Certification Training Course the goal is to equip information professionals with the knowledge and technical skills for proficiency in IS audit, control and security skills. [ucaddon_uc_super_clean_tabs heading_active="#ec1f35" uc_init_settings="" uc_items_data="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" uc_fonts_data="JTdCJTIydWNfaXRlbXNfYXR0cmlidXRlX3RpdGxlJTIyJTNBJTdCJTIyZm9udC1mYW1pbHklMjIlM0ElMjJNb250c2VycmF0JTIyJTJDJTIyZm9udC13ZWlnaHQlMjIlM0ElMjJCb2xkJTIyJTJDJTIyZm9udC1zaXplJTIyJTNBJTIyMjBweCUyMiU3RCUyQyUyMnVjX2l0ZW1zX2F0dHJpYnV0ZV9jb250ZW50JTIyJTNBJTdCJTIyZm9udC1mYW1pbHklMjIlM0ElMjJMYXRvJTIyJTJDJTIyZm9udC13ZWlnaHQlMjIlM0ElMjJOb3JtYWwlMjIlMkMlMjJmb250LXNpemUlMjIlM0ElMjIxNXB4JTIyJTJDJTIybGluZS1oZWlnaHQlMjIlM0ElMjIxZW0lMjIlMkMlMjJjb2xvciUyMiUzQSUyMiUyMzYyNjI2MiUyMiU3RCU3RA=="]Course Outline IS Audit Process ISACA IS Auditing Standards, Guidelines and Procedures and Code of Professional [...]