Course Tag: advanced

ISO 27001 Lead Implementer

This five-day intensive course enables the participants to develop an expertise to support an organisation in implementing and managing an Information Security Management System (ISMS) as specified in ISO/IEC 27001:2013 – current version of the standard. Participants will also master the best practices for implementing information security controls from the eleven areas of ISO/IEC 27002:2013. …

ISO 27001 Lead Implementer Read More »

Certified Risk Information Systems Control (CRISC)

CRISC Training provides the delegates with adequate knowledge and understanding of relevant concepts and practices in information system risk and control management in alignment with Enterprise Risk Management strategy. Upon completion of CRISC training, delegates will be able to: Develop an IT risk management strategy in support of business objectives and in alignment with the …

Certified Risk Information Systems Control (CRISC) Read More »

Certified Information System Security Professional (CISSP)

The CISSP training provides the knowledge and skills required to effectively design, plan, deliver and manage the overall security posture of an organisation. The training is designed to also help delegates to review their knowledge and focus their study on areas that require more attention for their CISSP exam

Certified Information Security Manager (CISM)

CISM training provides delegates with the knowledge and skillset required to design, plan, implement and maintain an information security program to continually mitigate risks associated with information and information systems in an organisation. Upon completion of the training, delegates will be able to: Build on their basic understanding of information security; Acquire necessary knowledge, skills …

Certified Information Security Manager (CISM) Read More »

Certified Cloud Security Professional (CCSP)

The CCSP training is designed for experienced information security professionals and the credential is suitable for mid-level to advanced professionals involved with IT architecture, web and cloud security engineering, information security governance, risk and compliance and IT auditing. This training and credential are appropriate for those involved in the day-to-day responsibility to procure, secure and …

Certified Cloud Security Professional (CCSP) Read More »

Advance Threat Hunting

is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, …

Advance Threat Hunting Read More »

Advance Penetration Testing

is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, …

Advance Penetration Testing Read More »