Catalogue 225 Courses found
List of sub-fields
Course list
Reference | Course | Duration | Prices | |
---|---|---|---|---|
ECC ECSS-001 | Incident Respond - CIH | 3 days 24 hours |
||
EV8 TECH-017 | Introduction to Data Analysis & Visualization | 1 day 8 hours |
||
ISC CRISC 002 | ISACA Certified Data Privacy Solutions Engineer™ CDPSE® | 2 days 16 hours |
||
ISC CRISC 0001 | ISACA Certified in Risk and Information Systems Control® (CRISC®) | 4 days 32 hours |
||
ISC CGEIT-001 | ISACA Certified in the Governance of Enterprise IT® (CGEIT®) | 4 days 32 hours |
||
ISA CISM-001 | ISACA Certified Information Security Management (CISM) | 5 days 40 hours |
||
ISA CISA-001 | ISACA Certified Information Systems Auditor® (CISA®) | 5 days 40 hours |
||
ISC C19-001 | ISACA Cobit 19 foundation | 3 days 24 hours |
||
ISC CRISC 001 | ISACA IT Audit Fundamentals Certificate | 2 days 16 hours |
||
ISC CCSP-005 | ISC2 Certified Cloud Security Professional (CCSP) | 5 days 40 hours |
3 days (24 hours)
At the end of this training, the participants will be able to:
- Explain the security discipline of digital forensics from a vendor-neutral perspective.
- Acquire necessary hands-on experience with various forensic investigation techniques.
- Demonstrate how to use standard forensic tools necessary to successfully carry out a computer forensic investigation.
- Explain the methodological approach to computer forensics presented by CIH, including searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence.
- Describe IoT Forensics.
- Master tools and techniques to ensure security across various cloud platforms.
- Demonstrate proficiency in handling and responding to various security incidents such as network security incidents, malicious code incidents, and insider attack threats.
ECC ECSS-001
1 day (8 hours)
At the end of this course, participants should be able to:
- Explain Data Analysis Fundamentals.
- Apply Basic Statistical Analysis.
- Master Data Cleaning and Transformation.
- Develop Data Visualization Skills.
- Acquire R Programming Proficiency.
- Enhance Problem-Solving Abilities in Data Analysis.
- Foster Collaboration and Presentation Skills.
EV8 TECH-017
2 days (16 hours)
At the end of the training, participants should be able to:
- Build and Implement Privacy Solutions.
- Manage the data lifecycle and advise technologists on privacy compliance.
- Implement privacy by design which results in privacy technology platforms and products that build trust and advance data privacy.
- Ensure that privacy solutions match the organization's risk appetite and mitigate risks of noncompliance.
- Improve the end user experience while preserving privacy and retaining trust.
ISC CRISC 002
4 days (32 hours)
At the end of this training, participants should be able to:
- Demonstrate expertise in risk management by analyzing strategies to enhance business resilience, deliver stakeholder value, and optimize risk management across the enterprise.
- Gain hands-on experience with risk identification, assessment, and evaluation.
- Understand and apply the practical applications of information systems related to organizational risk management.
- Analyze and apply principles of risk monitoring.
- Understand IS control design and implementation.
- Gain knowledge about IS control monitoring and maintenance.
ISC CRISC 0001
4 days (32 hours)
At the end of this training, participants should be able to:
- Define, establish, and manage a framework for the governance of enterprise IT.
- Enable and support the achievement of enterprise objectives.
- Demonstrate the ability to manage IT-enabled investments to deliver optimized business benefits.
- Understand the roles and responsibilities of various focus areas of IT governance.
- Analyze and develop an IT governance strategy for the processing of every type of information.
- Gain in-depth knowledge of different methods for recording and monitoring IT resources.
ISC CGEIT-001
5 days (40 hours)
At the end of the training, participants should be able to:
- Understand the culture, regulations, and structure involved in enterprise governance, as well as enabling you to analyze, plan, and develop information security strategies.
- Demonstrate proficiency in analyzing risk, controlling, and measuring it, and put controls in place to minimize it.
- Manage, design, and assess enterprise information security programs.
- Analyze and apply incident response and business continuity principles.
ISA CISM-001
5 days (40 hours)
At the end of the training, participants should be able to:
- Understand the culture, regulations, and structure involved in enterprise governance, as well as enabling you to analyze, plan, and develop information security strategies.
- Analyze risk, control, and measure it, and put controls in place to minimize it.
- Manage, design, and assess enterprise information security programs.
- Demonstrate proficiency in incident response and business continuity.
- Manage equipment and perform risk assessment.
ISA CISA-001
3 days (24 hours)
At the end of this training, participants should be able to:
- Understand the COBIT framework and its role in aligning IT goals with strategic business objectives.
- Analyze the principles of COBIT 2019 and apply them to establish, enhance, and maintain a system for effective governance and management of enterprise information technology.
- Understand the value derived from IT, necessary resources, and potential risks in the process of building a mature relationship between the business and IT.
- Gain knowledge about the governance system and its components.
- Design a tailored governance system.
- Understand the governance and management objectives of COBIT 2019.
- Demonstrate the ability to implement the COBIT 2019 framework.
- Manage the performance of the COBIT 2019 framework.
ISC C19-001
2 days (16 hours)
At the end of the training, participants should be able to:
- Understand fundamental audit concepts.
- Demonstrate the ability to objectively conduct an audit.
- Understand the practical application of audit principles.
- Gain knowledge of IT audit terminology, concepts, general practices and applications of audit principles.
- Understand the principles and practical application of conducting IT audits.
ISC CRISC 001
5 days (40 hours)
At the end of the training, participants should be able to:
- Understand core security concepts and design principles to create a robust security posture within the software development lifecycle (SDLC).
- Define and integrate software security requirements while ensuring compliance with relevant regulations and data classification standards.
- Develop competence in threat modeling and defining security architecture to mitigate potential risks in software design.
- Devise a comprehensive security testing strategy, including the development of security test cases and analysis of test results for impact.
- Manage secure software lifecycle management by incorporating security in configuration, defining security roadmaps, and promoting a security culture.
- Ensure secure software deployment, operations, maintenance, and disposal adhering to best practices.
- Understand the implications of supply chain risks and learn strategies for secure software acquisition.
- Develop and apply a security-focused strategy for working with suppliers and third-party providers to maintain software security.
- Foster continuous improvement in security practices within software development and implement integrated risk management strategies.