Find a course

Find the best courses in your region.

Catalogue 225 Courses found

List of sub-fields

Course list

3 days (24 hours)
At the end of this training, the participants will be able to:

  • Explain the security discipline of digital forensics from a vendor-neutral perspective.
  • Acquire necessary hands-on experience with various forensic investigation techniques.
  • Demonstrate how to use standard forensic tools necessary to successfully carry out a computer forensic investigation.
  • Explain the methodological approach to computer forensics presented by CIH, including searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence.
  • Describe IoT Forensics.
  • Master tools and techniques to ensure security across various cloud platforms.
  • Demonstrate proficiency in handling and responding to various security incidents such as network security incidents, malicious code incidents, and insider attack threats.
ECC ECSS-001

At the end of this course, participants should be able to:

  • Explain Data Analysis Fundamentals.
  • Apply Basic Statistical Analysis.
  • Master Data Cleaning and Transformation.
  • Develop Data Visualization Skills.
  • Acquire R Programming Proficiency.
  • Enhance Problem-Solving Abilities in Data Analysis.
  • Foster Collaboration and Presentation Skills.
 
EV8 TECH-017
At the end of the training, participants should be able to:

  • Build and Implement Privacy Solutions.
  • Manage the data lifecycle and advise technologists on privacy compliance.
  •  Implement privacy by design which results in privacy technology platforms and products that build trust and advance data privacy.
  • Ensure that privacy solutions match the organization's risk appetite and mitigate risks of noncompliance.
  • Improve the end user experience while preserving privacy and retaining trust.
ISC CRISC 002
At the end of this training, participants should be able to:

  • Demonstrate expertise in risk management by analyzing strategies to enhance business resilience, deliver stakeholder value, and optimize risk management across the enterprise.
  • Gain hands-on experience with risk identification, assessment, and evaluation.
  • Understand and apply the practical applications of information systems related to organizational risk management.
  • Analyze and apply principles of risk monitoring.
  • Understand IS control design and implementation.
  • Gain knowledge about IS control monitoring and maintenance.
ISC CRISC 0001
At the end of this training, participants should be able to:

  • Define, establish, and manage a framework for the governance of enterprise IT.
  • Enable and support the achievement of enterprise objectives.
  • Demonstrate the ability to manage IT-enabled investments to deliver optimized business benefits.
  • Understand the roles and responsibilities of various focus areas of IT governance.
  • Analyze and develop an IT governance strategy for the processing of every type of information.
  • Gain in-depth knowledge of different methods for recording and monitoring IT resources.
ISC CGEIT-001
At the end of the training, participants should be able to:
  • Understand the culture, regulations, and structure involved in enterprise governance, as well as enabling you to analyze, plan, and develop information security strategies.
  • Demonstrate proficiency in analyzing risk, controlling, and measuring it, and put controls in place to minimize it.
  • Manage, design, and assess enterprise information security programs.
  • Analyze and apply incident response and business continuity principles.
ISA CISM-001
At the end of the training, participants should be able to:

  • Understand the culture, regulations, and structure involved in enterprise governance, as well as enabling you to analyze, plan, and develop information security strategies.
  • Analyze risk, control, and measure it, and put controls in place to minimize it.
  • Manage, design, and assess enterprise information security programs.
  • Demonstrate proficiency in incident response and business continuity.
  • Manage equipment and perform risk assessment.
ISA CISA-001
3 days (24 hours)
At the end of this training, participants should be able to:

  • Understand the COBIT framework and its role in aligning IT goals with strategic business objectives.
  • Analyze the principles of COBIT 2019 and apply them to establish, enhance, and maintain a system for effective governance and management of enterprise information technology.
  • Understand the value derived from IT, necessary resources, and potential risks in the process of building a mature relationship between the business and IT.
  • Gain knowledge about the governance system and its components.
  • Design a tailored governance system.
  • Understand the governance and management objectives of COBIT 2019.
  • Demonstrate the ability to implement the COBIT 2019 framework.
  • Manage the performance of the COBIT 2019 framework.
ISC C19-001
At the end of the training, participants should be able to:

  • Understand fundamental audit concepts.
  • Demonstrate the ability to objectively conduct an audit.
  • Understand the practical application of audit principles.
  • Gain knowledge of IT audit terminology, concepts, general practices and applications of audit principles.
  • Understand the principles and practical application of conducting IT audits.
ISC CRISC 001

At the end of the training, participants should be able to:

  • Understand core security concepts and design principles to create a robust security posture within the software development lifecycle (SDLC).
  • Define and integrate software security requirements while ensuring compliance with relevant regulations and data classification standards.
  • Develop competence in threat modeling and defining security architecture to mitigate potential risks in software design.
  • Devise a comprehensive security testing strategy, including the development of security test cases and analysis of test results for impact.
  • Manage secure software lifecycle management by incorporating security in configuration, defining security roadmaps, and promoting a security culture.
  • Ensure secure software deployment, operations, maintenance, and disposal adhering to best practices.
  • Understand the implications of supply chain risks and learn strategies for secure software acquisition.
  • Develop and apply a security-focused strategy for working with suppliers and third-party providers to maintain software security.
  • Foster continuous improvement in security practices within software development and implement integrated risk management strategies.
ISC CCSP-005
Items per page :