15 training courses found
This CISMP course is accredited by ISEB/BCS to provide CISMP training for this CISMP examination. The 5-day CISMP training at Net Security Training aims to provide IT professionals with the knowledge and understanding of the main principles required to be an effective member of an information security team where security responsibilities are an integral part of your day to day role.
Basel III Training Course Description: Our training follows closely the principles of sound practices of management and operational risk, as set down by the committee. Training Attendees will learn practical skills and solutions that will help them support the Basel III requirements, whilst implementing the solutions and skills learned within their organisation.
Overview: The EC-Council's NSA certification looks at network security from a defensive view. The NSA program is designed to provide fundamental skills needed to analyse the internal and external security threats against your network, and to help you develop the correct security posture that will protect your organisation.
CHFI Training Description: This Hacking Forensics Investigator course will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques.
Description: This class is intended as a hard core preparation for ISACA’s professional certification exam for the Certified Information Systems Auditor (CISA®). This course is not intended as a comprehensive IT auditing and assurance class covering non-exam related topics, however each of the 5 domains of the CISA® exam will be covered and the content is focused on concise exam preparation to give you all what you need for the exam and none of what you don’t need.
Description: The IA Architect is based on a set of skills defined by the Institute of Information Security Professionals (IISP) and the UK Government’s GCHQ department. The IA Architect, also referred to in industry as the Security Architect must be able to drive beneficial security change into an organisation through the development or review of security architectures so that they: Meet business requirements for security.
The Certified Information Systems Security Professional (CISSP) certification is a highly sought-after qualification by those making a career in IT security. Our CISSP Fast Track course is an intensive, in-depth, training program that has consistently achieved over 97% pass rates in the final CISSP examination.
Data Protection Training Description There is a need to provide adequate Data Protection training course on the Data Protection Act 1998 (DPA 1998) “the Act” and its implications for both organizations and individuals. There are important differences between the Act and its predecessor, the DPA | Data Protection Act 1984.
Description: Let us help you achieve the Certified Information Security Manager Accreditation! This course has been prepared specifically to cover all of ISACA’s exam objectives and more. We will give you everything you need to thoroughly prepare you for one of the toughest exams you will encounter.
Overview: This five-day intensive course enables participants to develop the necessary expertise to audit an Information Security Management System (ISMS) and to manage a team of auditors by applying widely recognized audit principles, procedures and techniques. During this training, the participant will acquire the necessary knowledge and skills to proficiently plan and perform internal and external audits in compliance with ISO the certification process according to ISO .
CCSK Traininge Description Cloud Computing Security Knowledge – Plus The CCSK- Plus class builds upon the CCSK Basic class with expanded material and extensive hands-on activities with a second day of training. Students will learn to apply their knowledge as they perform a series of exercises as they complete a scenario bringing a fictional organization securely into the cloud.
This is a 'Practitioner' course and leans heavily on practical exercises designed to reinforce the concepts being taught and to build the delegates confidence in implementing business continuity management. The course is also designed to encourage debate, and the sharing of knowledge and experience between students.
Description: The mark of excellence for a professional certification program is the value and recognition it bestows on the individual who achieves it. The Certified in Risk and Information Systems Control (CRISC) program, sponsored by ISACA, recognizes a wide range of professionals for their knowledge of enterprise risk and their ability to design, implement, monitor and maintain information systems (IS) controls to mitigate such risk.
Our Firewall and VPN Deployment and Implementation training course is for those IT professionals who want to master network security. In our course they will learn the best firewall practices to safeguard their networks.
Description: This 5-day course is designed for IT professionals who want to learn the fundamentals of network security. Our course offers practical training in areas such as TCP/IP for computer communications, types of attack, applied cryptography, multi-firewalls and intrusion detection systems, Internet and operating system security.