Organizations are increasingly in need of a new set of skills and processes to ensure the security of information at a scale that will be required tomorrow. Achieving the C|CISO Certification will differentiate you from others in the competitive ranks of senior Information Security Professionals. C|CISO will provide your employers with the assurance that as a C|CISO executive leader, you possess the proven knowledge and experience to plan and oversee Information Security for the entire corporation.
Management Training catalog display
This course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in the organization; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and how you can approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.
Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security.
Get GDPR-ready – learn how the new regulation will affect your organisation. The one-day Certified EU General Data Protection Regulation Foundation (GDPR) Training Course provides a comprehensive introduction to the EU GDPR, and a practical understanding of the implications and legal requirements for organisations of any size. The course is a stepping stone to the certified GDPR Practitioner course.
Learn how to be GDPR compliant and fulfill the role of a DPO. The course focuses on the application of the Regulation, how the data protection principles work in practice, the policies and procedures necessary, and practical guidance on how to implement an effective privacy and information security compliance programme. This includes using a real-life case study to demonstrate best practices and methodologies, a data protection impact assessment (DPIA) tool to help assess and address privacy risks and a GDPR compliance gap assessment tool to help prepare a compliance plan.