Choosing Your Courses
|
|
- Elaine Stokes
- 5 years ago
- Views:
Transcription
1 Expert Training
2 Choosing Your Courses Management Courses Focused on providing essential insight into the management of your organisation and the impact of regulation, technology, projects and processes on how you operate. IT Courses Core skills training across a range of disciplines hardware, software, operating systems, security, and infrastructure protection. MANAGEMENT COURSES IT COURSES Investigation Courses Providing tools, methodologies and support in developing appropriate advanced investigation techniques and using appropriate investigation tools. INVESTIGATION COURSES Network Courses All aspects of IT networking hardware, software, security and management of assets across a digital network within an organisation and in the cloud. NETWORK COURSES
3 Cyber Security Courses Learn the skills and methods required to make cyber security practitioners operate more effectively and respond to critical threats. Software Courses CYBER SECURITY COURSES Learning the correct and proper use of software products, application of specialist software to operational scenarios. Focused on software tools from a variety of vendors. SOFTWARE COURSES Compliance Courses COMPLIANCE COURSES Focused on different regulatory and compliance regimes from GDPR to ISO standards. Training on knowledge, awareness, methods, standards and reporting. Choosing Your Discipline Whether you are looking to develop your career in IT, Forensic Investigations, Cyber Security or another discipline, IntaForensics have made it simple to choose the right course for you. Use our handy guide to get a glance of what each course covers. IT Networks Security Investigations Management Compliance Software Course Complexity All IntaForensics courses are based on a 5 tier difficulty scale. This is a top level difficulty classification. We always recommend you read course requirements before booking a course at IntaForensics. Beginner Foundation Intermediate Advanced Expert
4 Choose IT Core IT skills are in short supply across the world. IntaForensics are an Authorised Training Partner for the global IT industry association and provider of the leading internationally recognised certification programmes covering core IT skills from foundation level up to Master/Expert level. IT Fundamentals A+ Network+ Project+ Linux+ CSA+ Security+ Boost your career earnings potential and increase your chances of being hired by demonstrating you possess core IT skills with certifications from. Research suggests consistently that professionals with independent, vendor neutral certifications attract higher salaries, and secure roles more quickly than those who do not hold such certifications. 92% of employers said IT certified individuals receive higher starting salaries than those without HR Perceptions of IT Training & Certification Study
5 Choose Cyber Security Almost daily, people read about severe risks posed to and attacks committed against IT systems. Recent large scale attacks have hit the headlines for their colossal impact on individuals, public and private sector organisations and even the UK Government. The threat landscape is constantly evolving and needs constant vigilance to stay one step ahead. Practitioner training and exposure is critical. CSCU A+ Network+ Security+ Project+ Project+ C Certified Certified Ethical Defender HTM E Ethical Hacker C Certified Certified Network Defender N D Defender Network CSA+ CSA+ There s little doubt that cybersecurity has become a critical topic not just for IT, but for business in general and society as a whole. Today s digital organisations are driven by new technology and dependent on orderly data. Everyday life increasingly depends on a connected infrastructure. The risks posed by cybersecurity attacks are monumental. With new security breaches and hacks happening every day, it s more important than ever for organisations to secure their networks and information. While security analyst is one of the fastest-growing jobs ever tracked by the U.S. Bureau of Labor Statistics, there are a range of other opportunities as well for people who can proactively analyse network and user behaviour to identify and mitigate threats before they occur. And security skills don t just apply to security specialists all IT pros should make infrastructure and data security part of their everyday job.
6 Choose Networks Organisational focus on cyber defence is more important than ever as cyber breaches have a far greater financial impact and can cause broad reputational damage. Despite best efforts to prevent breaches, many organizations are still being compromised. Therefore organizations must have, as part of their defence mechanisms, trained network engineers who are focused on protecting, detecting, and responding to the threats on their networks. Network+ Security+ C Certified N D Defender Network Linux+ Certified Network Defender Network administrators spend a lot of time within network environments, and are familiar with network components, traffic, performance and utilisation, network topology, location of each system, security policy, etc. So, organisations can be much better in defending themselves from vicious attacks if the IT and network administrators are equipped with adequate network security skills. A Network administrator can play a significant role in network defence and become first line of defence for any organisation. The 2017 Robert Half Salary Survey indicates average salary ranges for Network Engineers between 38,000 and 54,000 and for more senior Infrastructure Managers between 50,250 and 75,500.
7 Choose Investigations Since 2006, IntaForensics have been delivering high quality digital investigations to law enforcement and industry. Throughout this time, we have seen the cyber security and investigations marketplace change significantly and there is a greater need for certification than ever before. The cyber security sector is at its broadest with a varying spectrum of disciplines. TM C HFI Computer Hacking Forensic INVESTIGATOR Dark Web Training CHFI CAST 612 IntaForensics Dark Web CSA+ CSA+ The need for certification is greater than it has ever been. Candidates wanting to stand out in the crowd have the ability to strengthen their core skills and invest in a deeper knowledge of expertise, making them a valuable commodity in the industry. Choose Compliance Regulatory requirements are commonplace in today s workplace. Whether it be quality or security standards, or industry specific standards such as ISO The General Data Protection Regulations (GDPR) will bring a robust regulatory framework which will impact business significantly. Is your company ready? ISO Internal Auditing Training CIPP-E ISO Training CIPT CIPM Our range of audit, awareness and implementation training is the cornerstone for effective quality and regulation in your organisation. Are you ready to arm yourself with the skillset to manage regulation effectively? Book Now.
8 Choose Management Everyone manages or participates in a project in their career. While not every individual is a project leader, companies increasingly require employees to understand project management skills. Rapid growth in demand for project management roles and the exceptional salary levels in the profession also make the project management profession highly desirable. Project+ Between 2010 and 2020 an estimated 15.7 million new project management jobs will be added globally, reaching an economic impact of over $18 trillion. Demand for project management professionals is not matched by availability of resources with relevant project management skills. This will create an unparalleled opportunity for discerning job seekers to build valuable project management skills. Choose Software Software is at the heart of any organisation and for forensic professionals, effective case management is essential to the running of any laboratory. With IntaForensics comprehensive Lima Forensic Case Management training, attendees will learn the most intricate features built to maximise your laboratories efficiency. Client Training (2 Days) Lima Client Training Forensic Case Management Administrator Training (1 Day) Lima Admin Training Forensic Case Management The Lima development team offer a bespoke training programmes for all Lima users taking them through step by step on all aspects of our Case Management software. Our training programs are carefully tailored to each individual installation as we want you to develop a true understanding of how each element of Lima can transform your case management process.
9 Starting Your Journey Assessing Your Experience Depending on the course you choose, different levels of recommended experience are required. Our course complexity indicators are a useful quick guide to the level if difficulty the courses may present. Our courses are labelled with content icons to give you a quick and easy insight into the areas they fit. Our training team can assist you with ensuring that the courses are the right fit for you, your current skill level and your organisational need. Review our Course Details pages or visit our website to see a more in-depth overview of each of the courses, where you will find more information on exam objectives and prerequisites. Free Skills Assessment Review Before booking your course, feel free to take advantage of our skills assessment review. Our training team will discuss your current profile and the content of your desired course and ensure that it is the best fit to you and your learning objectives. Call +44 (0) now! Payment Options Starting a new career or even making the next big jump shouldn t be held back by financial limitations, that s why IntaForensics are happy to provide our new Training Finance options. Subject to status, IntaForensics finance options are available for anyone wanting to create personal training bundles. Our training team can offer information and advice in creating the perfect comprehensive training package, tailored for you or your department. We are on hand to offer advice, whether it be to help in choosing the right course, or to discuss payment options. IntaForensics Training Passport The IntaForensics Training Passport provides a great opportunity to spread the cost of training, with some fantastic savings too. We are able to offer standard or bespoke training passports to individuals or organisations seeking certification. Want to know more? Call +44 (0) now! Rewarding You IntaForensics are pleased to offer an exclusive loyalty scheme for our customers. Each course or service purchased within IntaForensics allows you to build up credits to use against another training course or even another service. Our Reward Points apply across all of our products and services. Purchase CompTia training and you could apply points to Cyber Essentials. Purchase IAPP training, and you could be working towards one of our Award Winning Software products. The choice is yours. Get in touch for further information or login to our website by visiting www. intaforensics.com. You may even already have some credits to spend!
10 , a world leading tech association, is a thought leader and an action leader. From their new IT professional association to their leading certification programs, from their original research to their member communities and councils, their unparalleled programs set industry standards, foster skills development and generate knowledge and insight every day. IT Fundamentals The modern workplace is a rapidly changing environment, with tools, technology and processes that change continually. The most successful staff will be those who have the best understanding of the components they work with to achieve their mission. s IT Fundamentals programme is designed to cover a sound foundational knowledge of IT equipment, along with the basic elements of networking and secure computer systems practice. The course is aimed at ensuring you have more than one go to person within your team it will increase the knowledge and skills of your team regarding essential knowledge of IT and its use in your workplace. A+ The Held modern by over workplace 1 million IT is professionals a rapidly changing worldwide, environment, A+ with is tools, the most technology essential and IT processes certification that for establishing change continually. an IT career. The most If you re successful new to staff the IT will industry, be those this who will have help the you best put understanding your best foot forward. of the components And if you re they already work with an IT to professional, achieve their the mission. A+ certification validates your skills and can boost your career. s IT Fundamentals programme is designed to cover a sound foundational knowledge of IT equipment, A+ is the along preferred with the qualifying basic elements credential of networking for technical and support secure and computer IT operational systems practice. roles. A+ certified professionals identify issues and problem-solve more effectively than those without certification. In order to receive the A+ certification, candidates must pass The two exams: course is aimed at and ensuring you Successful have more candidates than one go will to have person the within knowledge your team required it will to Assemble increase the components knowledge based and skills on customer of your team requirements, regarding essential Install, configure knowledge and of IT maintain and its use devices, in your PCs workplace. and software for end users, understand the basics of networking and security, including forensics and much more. Network+ s Network+ provides the knowledge and skills to troubleshoot, configure and manage common wired and wireless network. Network+ will arm the student with a basic understanding of emerging technologies including unified communications, mobile, cloud and virtualisation technologies. Network+ knowledge and skills include: Establishing basic network design and connectivity Understanding and maintaining network documentation Identifying network limitations and weaknesses Implementing network security, standards and protocols recommends Network+ candidates have a A+ certification or equivalent knowledge, and at least 9-12 months of networking experience.
11 Security + Security+ is an international, vendor-neutral certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career. The new version has also been updated to reflect how cybersecurity jobs are becoming more specialized. As new skills (like security analytics) become more prevalent, skills covered in Security+ have become a baseline for all cybersecurity jobs. Because of this, the importance of and demand for Security+ has increased for a broader variety of job roles. Project+ Project+ certifies the knowledge and skills of professionals in project management. Project+ validates the ability to initiate, manage and support a project or business initiative. And it s not just for IT technicians; Project+ is designed for any individual who wants to validate project management experience. Project management skills are needed in almost every field and can separate you from the rest of the workforce. Project+ validates project management skills to employers, both inside and outside the IT profession. Even the smallest projects can benefit from project management processes. Linux+ Linux powers the internet and many corporate IT infrastructures, as well as providing the operating system which powers many essential IT security systems. This programme certifies foundational skills and knowledge of Linux system administration. With Linux being the central operating system for much of the world s IT infrastructure, Linux+ is an essential credential for individuals working in IT. This certification has been developed by in association with the LPI (Linux Professional Institute) covering the essentials of Linux and basic Linux system administration a sound and important starting point to understanding Linux. CSA+ Attacks on networks and systems are constantly evolving, and new methods are developed with alarming regularity. Attackers develop and learn new and effective methods to evade traditional signature-based solutions such as firewalls. An effective method of detecting and combatting such attacks is required, often based upon an analytics-based approach. The behavioural analytics skills covered by CSA+ identify and combat malware, and advanced persistent threats (APTs), resulting in enhanced threat visibility across a broad attack surface. CSA+ is for IT professionals looking to gain the following security analyst skills: Configure and use threat detection tools, perform data analysis amd interpret the results to identify vulnerabilities, threats and risks to an organisation.
12 International Council of E-Commerce Consultants, also known as EC-Council, is the world s largest cyber security technical certification body. They are proud to have trained and certified over 200,000 information security professionals globally that have influenced the cyber security mindset of countless organisations worldwide. C Certified HTM E Ethical Hacker Certified Ethical Hacker (CEH) Attacks on networks and systems are constantly evolving, and new methods are developed with alarming regularity. An effective method of combatting such attacks is required, and this often requires the defender to know how the attacker operates and the vulnerabilities they may attempt to take advantage of. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. C Certified N D Defender Network Certified Network Defender (CND) The Developed modern to workplace complement is the a rapidly existing changing Certified environment, Ethical Hacker with qualification, tools, technology the Certified and processes Network Defender that change programme continually. is a The vendor-neutral, most successful hands-on, staff will instructor-led be those who comprehensive have the best understanding network security of certification the components training they program. work with It is to a achieve skills-based, their mission. lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National s Initiative of IT Cybersecurity Fundamentals Education programme (NICE). is designed The course to cover has a sound also been foundational mapped knowledge to global of job IT roles equipment, and responsibilities along with the and basic the US elements Department of networking of Defense and (DoD) secure job computer roles for systems system/ practice. network administrators. The course is designed and developed after extensive market research and surveys. The course is aimed at ensuring you have more than one go to person within your team it will increase the knowledge and skills of your team regarding essential knowledge of IT and its use in your workplace. TM C HFI Computer Hacking Forensic INVESTIGATOR Computer Hacking Forensic Investigator (CHFI) Digital technologies are changing the face of business. As organisations rapidly embrace digital technologies such as cloud, mobile, big data and IOT, the context of digital forensics is more relevant than before. The growing number of cybercrimes has changed the role of forensics from DNA to Digital. CHFI v9 provides a detailed methodological approach to computer forensic and evidence analysis. It equips the students with the necessary skillset for identification of intruder s footprints and gathering necessary evidence for its prosecution. The certification can fortify the applied knowledge level of law enforcement personnel, system administrators, security officers, defence and military personnel, legal professionals, bankers, computer and network security professionals, and anyone who is concerned about the integrity of the network and digital investigations.
13 Certified Secure Computer User Computer security involves a lot of moving parts firewalls, IPS and IDS systems, anti-virus software and a range of other technical solutions. The most often overlooked and most frequent source of breaches to computer security and data security are people. The simple solution to helping to tackle this is to ensure that your staff are trained to think Security when using computers, mobile devices and media. The CSCU training program aims at equipping computer users with the necessary knowledge and skills to protect their information assets. The program is designed to interactively teach them about the whole spectrum of information security threats they face ranging from identity theft and credit card fraud to their physical safety. The skills acquired during the course of this program will not only help the students to identify these threats but also to mitigate them effectively. Advanced Mobile Forensics and Security (CAST 612) Digital Mobile Forensics is fast becoming a lucrative and constantly evolving field, this is no surprise as the mobile phone industry has been witnessing some unimaginable growth, some experts say it may even replace the Computer for those only wishing to send and receive s. This growth has now presented new and growing career opportunities for interested practitioners in corporate, enforcement, and military settings. Mobile forensics is certainly here to stay as every mobile device is different and different results will occur based on that device requiring unique expertise. This course was put together focusing on what today s Mobile Forensics practitioner requires, some of the advanced areas this course will be covering are the intricacies of manual Acquisition (physical vs. logical) & advanced analysis using reverse engineering, understanding how the popular Mobile OSs are hardened to defend against common attacks and exploits. Stay Up-to-Date on the Latest IntaForensics Courses! IntaForensics Training is a continual developing platform, staying on top of the latest and greatest courses in IT, Cyber Security and Investigations. Sign up to our IntaForensics Training Newsletter to stay up to date on the latest courses available to you. Need to understand more? Contact our training team and we will help find the right courses for your development goals. Our expert team will assess your current position, skill level and your organisational need (if applicable). Don t hesitate, contact us now. training@intaforensics.com +44 (0) Want to stay up-to-date on the latest Digital Forensics, Cyber Security and IntaForensics news? Visit the IntaForensics website now!
14 The International Association of Privacy Professionals (IAPP) is a resource for professionals who want to develop and advance their careers by helping their organisations successfully manage these risks and protect their data. In fact, they re the world s largest and most comprehensive global information privacy community. The IAPP is the only place that brings together the people, tools and global information management practices you need to thrive in today s rapidly evolving information economy. Certified Information Privacy Professional (CIPP) The CIPP/E encompasses pan-european and national data protection laws, key privacy terminology and practical concepts concerning the protection of personal data and trans-border data flows. With the power of ANSI/ISO accreditation behind it, a CIPP/E credential elevates your professional profile by deepening your knowledge and improving your job effectiveness. IAPP constantly updates it s certification exams, textbooks and training to reflect the latest advances in privacy. The CIPP/E includes critical topics like the EU-U.S. Privacy Shield and the GDPR. Certified Information Privacy Technologist (CIPT) The CIPT credential shows you ve got the knowledge to build your organisation s privacy structures from the ground up. With regulators worldwide calling for tech professionals to factor data privacy into their products and services, the job market for privacy-trained IT pros has never been stronger. The IAPP s certifications in privacy and data protection law and practice have plugged thousands of professionals into the information economy. Now technology pros like you can take privacy knowledge and your career to a higher level. Certified Information Privacy Manager (CIPM) Every organization has data protection needs. Every day, we access, share and manage data across companies, continents and the globe. Knowing how to implement a privacy program is an invaluable skill that will help you protect your organization s data and take your career to the next level. Our Principles of Privacy Program Management training is the premier course on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a privacy team. The course is a how-to on implementing a privacy program frameworks, managing the privacy program operational lifecycle and structuring a knowledgeable, highperforming privacy team. Those taking this course will learn the skills to manage privacy in an organization through process and technology regardless of jurisdiction or industry.
15 The only way to deliver course content, is to truly understand its application in this world. Course Leaders are more than just trainers, they are practitioners. We believe being at the forefront of Cyber Security and Digital Forensic investigations is essential to truly understand course content and application. Therefore, our dedicated instructors are only led by Industry renowned Digital Forensic and Cyber Security experts. ISO Internal Auditor Training ISO Internal Auditing Training The IntaForensics ISO Internal Auditing course sets out to support organisations in awareness training, understanding and interpreting ISO accreditation. With the Forensic Science Regulator s deadline for ISO accreditation for digital forensics laboratories rapidly approaching, many organisations have found that they need to increase the capability and capacity of their internal audit team and programme. Ensuring that the internal audit process is well structured, organised and executed on a regular basis is a vital component for ensuring that the requirements to achieve ISO or accreditation are met. These policies and procedures which have been specified need to be implemented and consistently checked as a key control mechanism. Dark Web - Investigations Course Dark Web - Investigations The Dark Web many of us have heard of it. Many of us know some small elements about what it is. Most of us know that services and goods that are illegal are traded on the Dark Web, from illicit drugs, child pornography through to attacks on people and even murders. Clearly, there is a lot of criminal investigation which can and should be focused on the Dark Web. Our experienced trainer has conducted many investigations using information from the Dark Web, having worked extensively in law enforcement and the private sector (CEOP child protection and on drugs and organised crime investigations). IntaForensics have been a leading cyber security and investigations organisation providing digital forensics, cyber security, PCI compliance, Data Breach investigations and consultancy as well as delivering a world class premier software solution to clients across all sectors, globally for over 10 years. We operate our own services and run our own laboratories. Our clients include national and regional law enforcement agencies, FTSE 100 and FTSE 350 organisations, UK and non-uk Government agencies and many individuals. When you seek training come and learn with a team that has been doing the roles you aspire to and learn the skills you need from a team that practices what it preaches.
16 The Lima development team offer a bespoke training programmes for all Lima users taking them through step by step on all aspects of our Case Management software. Our training programs are carefully tailored to each individual installation as we want you to develop a true understanding Lima ACCREDITED TRAINING PROVIDER of how each element of Lima can transform your case management process. IntaForensics offer onsite training programmes as well as public events that we host for all user clients. Forensic Case Management Client Training (2 Days) Lima Client Training (2 Days) Want to know more on how the Lima environment can optimise how you operate your case management? Then this course is perfect for you. This module aims to take the Client Users through the Lima environment in a step by step manner to include every aspect of the software in great detail. The course is specifically related to the configuration of the organisations local, end users will go through every functionality of using Lima as part of a simple digital forensic investigation. IntaForensics Lima Client public training course consists of two days of hands-on instructor led Lima Client training, with a Lima training expert. Hosted at our flagship Stafford Training facility, the 2 day course is open to all current and potential Lima Users. Lima Administrator Training (1 Day) Forensic Case Management Administrator Training (2 Days) Our team has designed this training package in order to give administrators the knowledge and confidence to effectively operate their own case management process through Lima Administrator software. In order for Lima to transform your case management strategy it is really important for users to understand the functions, processes and operations. This training module specifically covers support and interactions from our support team. Developed for almost 10 years, The entire Lima family has enabled forensic practices - regardless of size - to operate effectively through its comprehensive End-to-End Case Management system. Lima is simple to use and yet utilises a disciplined and exacting process for managing case work. Lima achieves full continuity of evidence during case work through contemporaneous notes, exhibit tracking and automatic full disclosure. Every Lima solution is ideal for meeting or working towards international quality and process standards.
17 Choose IntaForensics Training is a process that process needs a mixture of activities to get the most out of your learning. IntaForensics have worked with leading trainers and training certification providers to ensure that the mix of delivery methods will provide the optimal learning opportunity for attendees. IntaForensics Guarantee Tutor Support Exams Included Pre-Course Materials Career Advisors and Guidance Exam Retakes Included* Certified and Approved Materials Live Laboratories CertMaster Subscription *Select Courses Only Courses Only All of our courses share the following features: Experienced Instructors with practical experience in their field of instruction Practitioner panels and contributors supporting Instructors Live laboratories using real world equipment on site in the training facility Testing and practice examinations Pre- and Post- course support Certification examinations on site on conclusion of courses Free retake exams if your first attempt was not successful High Quality course binders and materials for reference post-course IntaForensics will provide all of the support, encouragement and advice you need for successful completion of each certification programme.
18 +44 (0)
CYBER SECURITY TRAINING
CYBER Security skills for the digital age. Cyber Crime has never been more predominant. The number of breaches is exponentially rising year on year leading to an ever increasing Cyber Security threat.
More informationFOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY
FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY The Foundation Certificate in Information Security (FCIS) course is designed to provide
More informationCertification and Career Guide
Certification and Career Guide CompTIA offers some of the most recognized entry-level certifications for IT professionals, including its A+, Network+ and Security+ certifications. This certification guide
More informationEU General Data Protection Regulation (GDPR) Achieving compliance
EU General Data Protection Regulation (GDPR) Achieving compliance GDPR enhancing data protection and privacy The new EU General Data Protection Regulation (GDPR) will apply across all EU member states,
More informationCYBER RESILIENCE & INCIDENT RESPONSE
CYBER RESILIENCE & INCIDENT RESPONSE www.nccgroup.trust Introduction The threat landscape has changed dramatically over the last decade. Once the biggest threats came from opportunist attacks and preventable
More informationA guide to CompTIA training and certification DDLS Australia Pty Ltd
A guide to CompTIA training and certification 1 DDLS DDLS is an accredited CompTIA training organisation, offering the courses needed to establish CompTIA A+, Linux+, Network+, and Security+. DDLS can
More informationSage Data Security Services Directory
Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time
More informationIntroducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security
Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And
More informationITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018
GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences
More informationDIGITAL TRUST Making digital work by making digital secure
Making digital work by making digital secure MARKET DRIVERS AND CHALLENGES THE ROLE OF IT SECURITY IN THE DIGITAL AGE 2 In today s digital age we see the impact of poor security controls everywhere. Bots
More informationCyberVista Certify cybervista.net
ONLINE CYBERSECURITY CERTIFICATION TRAINING CyberVista Certify ONLINE CYBERSECURITY CERTIFICATION TRAINING CyberVista Certify CyberVista offers the industry s most comprehensive cybersecurity training
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More informationHelping shape your future
www.pwc.com/pwcacademyme Helping shape your future Project Management Professional (PMP ) PwC s Academy 2016-2017 Contents Welcome to PwC s Academy 1 About Project Management Professional (PMP ) 2 Getting
More informationE-guide Getting your CISSP Certification
Getting your CISSP Certification Intro to the 10 CISSP domains of the Common Body of Knowledge : The Security Professional (CISSP) is an information security certification that was developed by the International
More informationC T I A CERTIFIED THREAT INTELLIGENCE ANALYST. EC-Council PROGRAM BROCHURE. Certified Threat Intelligence Analyst 1. Certified
EC-Council C T Certified I A Threat Intelligence Analyst CERTIFIED THREAT INTELLIGENCE ANALYST PROGRAM BROCHURE 1 Predictive Capabilities for Proactive Defense! Cyber threat incidents have taken a drastic
More informationSecurity-as-a-Service: The Future of Security Management
Security-as-a-Service: The Future of Security Management EVERY SINGLE ATTACK THAT AN ORGANISATION EXPERIENCES IS EITHER ON AN ENDPOINT OR HEADING THERE 65% of CEOs say their risk management approach is
More informationCIPP/E CIPT. Data Protection Technologist (DPT) Training Bundle Official IAPP Training and Certification
CIPP/E CIPT Data Protection Technologist (DPT) Training Bundle Official IAPP Training and Certification The CIPP/E + CIPT credentials shows you ve got the knowledge to build your organization s privacy
More informationCertified Cyber Security Specialist
Certified Cyber Security Specialist Page 1 of 7 Why Attend This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cyber security to internal
More informationCompTIA Cybersecurity Analyst+
CompTIA Cybersecurity Analyst+ Course CT-04 Five days Instructor-Led, Hands-on Introduction This five-day, instructor-led course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity
More informationCyber Risks in the Boardroom Conference
Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks
More informationA guide to CompTIA training and certification DDLS Australia Pty Ltd
A guide to CompTIA training and certification 1 DDLS DDLS is an accredited CompTIA training organisation, offering the courses needed to establish CompTIA A+, Linux+, Network+, Security+ and CySA+. DDLS
More informationKey Findings from the Global State of Information Security Survey 2017 Indonesian Insights
www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.
More informationCERTIFICATION TRAINING - ISC2
MERIT CLASSES The Michigan Cyber Range features a cybersecurity education experience based upon the National Institute of Standards and Technology National Initiative for Cybersecurity Education (NICE).
More informationEC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1
EC-Council Certified Incident Handler v2 Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1 THE CRITICAL NATURE OF INCIDENT HANDLING READINESS An organized and
More informationIncident Response Services to Help You Prepare for and Quickly Respond to Security Incidents
Services to Help You Prepare for and Quickly Respond to Security Incidents The Challenge The threat landscape is always evolving and adversaries are getting harder to detect; and with that, cyber risk
More informationA new approach to Cyber Security
A new approach to Cyber Security Feel Free kpmg.ch We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward.
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationSecurity Awareness Training Courses
Security Awareness Training Courses Trusted Advisor for All Your Information Security Needs ZERODAYLAB Security Awareness Training Courses 75% of large organisations were subject to a staff-related security
More informationCyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS
Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Continual disclosed and reported
More informationPosition Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED
Position Description Computer Network Defence (CND) Analyst Position purpose: Directorate overview: The CND Analyst seeks to discover, analyse and report on sophisticated computer network exploitation
More informationBuilding the Cybersecurity Workforce. November 2017
Building the Cybersecurity Workforce November 2017 Our Global Footprint Measuring Kaplan University s Educational Impact For every career path +1MM students annually served Facilities in 30+ countries
More informationlocuz.com SOC Services
locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security
More informationE-guide CISSP Prep: 4 Steps to Achieve Your Certification
CISSP Prep: 4 Steps to Achieve Your Certification Practice for the exam and keep your skills sharp : Thank you for downloading our CISSP certification guide. Aside from this handy PDF, you can also access
More informationCYBER SOLUTIONS & THREAT INTELLIGENCE
CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world
More informationEC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led
EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,
More informationPONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY
PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on
More informationC HFI SCIENCE SECURING FORENSIC. Every crime leaves a trail of evidence. Computer Hacking Forensic Investigator v9 NETWORKS WITH.
Every crime leaves a trail of evidence TM C HFI Computer Hacking Forensic INVESTIGATOR SECURING NETWORKS WITH FORENSIC SCIENCE Computer Hacking Forensic Investigator v9 CHFI v9 01 @2017 EC-Council. All
More informationSchool of Engineering & Built Environment
School of Engineering & Built Environment BEng (Hons) in Digital Security, Forensics & Ethical Hacking Programme Specification Proforma (PSP) August 2015 P a g e 1 GLASGOW CALEDONIAN UNIVERSITY Programme
More informationC HFI SCIENCE SECURING FORENSIC. Every crime leaves a trail of evidence. Computer Hacking Forensic Investigator v9 NETWORKS WITH.
Every crime leaves a trail of evidence TM C HFI Computer Hacking Forensic INVESTIGATOR SECURING NETWORKS WITH FORENSIC SCIENCE Computer Hacking Forensic Investigator v9 CHFI v9 01 @2017 EC-Council. All
More informationBHConsulting. Your trusted cybersecurity partner
Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised
More informationSECURITY SERVICES SECURITY
SECURITY SERVICES SECURITY SOLUTION SUMMARY Computacenter helps organisations safeguard data, simplify compliance and enable users with holistic security solutions With users, data and devices dispersed
More informationISACA MOSCOW CHAPTER Chapter meeting 22 September 2016
ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,
More informationCyber Security and Cyber Fraud
Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa
More informationWolfpack Cyber Academy Training Catalogue
Wolfpack Cyber Academy Training Catalogue IT GOVERNANCE I INFORMATION RISK I CYBERSECURITY I PRIVACY I FOUNDATION I INTERMEDIATE I ADVANCED 2017 WOLF PACK www.wolfpackrisk.com Contents About Wolfpack Information
More informationGlobal Security Consulting Services, compliancy and risk asessment services
Global Security Consulting Services, compliancy and risk asessment services Introduced by Nadine Dereza Presented by Suheil Shahryar Director of Global Security Consulting Today s Business Environment
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationACCA Certificate in Audit (RQF Level 4) Qualification specification
ACCA Certificate in Audit (RQF Level 4) Qualification specification ABOUT ACCA We re the world s most forward thinking professional accountancy body. We believe that accountancy is vital for economies
More informationCFE Exam Review Course
CFE Exam Review Course Leading Excellence in Banking BIBF plays a vital role in the training and development of human capital in the Kingdom of Bahrain. Our commitment to excellence has strengthened our
More informationCyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security
CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research
More informationFind out more about APM qualifications and keep up to date with the latest developments at apm.org.uk/apmqualifications
APM recognises the importance of keeping qualifications up to date and relevant, so they reflect the knowledge that you have, the work that you do and the skills that you have developed. Our APM Project
More informationTHE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION
BREACH & ATTACK SIMULATION THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION Cymulate s cyber simulation platform allows you to test your security assumptions, identify possible security gaps and receive
More informationAFC Compliance Careers
AFC Compliance Careers ACAMS Education Program Date : December 6 th 2017 Donna Bucci Ireland Account Manager ACAMS ACAMS is a global community ACAMS is the world s largest international membership organisation
More informationCyber Security School
Cyber Cyber Security School FUTURE PROOF Y SECURITY TALENT "The UK needs to tackle the systemic issues at the heart of the Cyber skills shortage..." National Cyber Security Strategy 2016-2021, HM Government
More informationStaffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today
Security Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today Staff Augmentation, Executive Staffing, Flex Staffing Achieving our main goal
More informationCYBERSECURITY NEXUSTM (CSX) The Premier Source For Cyber Security Knowledge and Expertise
CYBERSECURITY NEXUSTM (CSX) The Premier Source For Cyber Security Knowledge and Expertise In enterprise IT, there is a single point where everything that matters in information, technology and business
More informationData Sheet The PCI DSS
Data Sheet The PCI DSS Protect profits by managing payment card risk IT Governance is uniquely qualified to provide Payment Card Industry (PCI) services. Our leadership in cyber security and technical
More informationRSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE
WHITEPAPER RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE CONTENTS Executive Summary........................................ 3 Transforming How We Think About Security.......................... 4 Assessing
More informationto Enhance Your Cyber Security Needs
Our Service to Enhance Your Cyber Security Needs Since the business critical systems by its nature are ON all of the time and the increasingly connected world makes you open your organization to everything
More informationIncident Response Services
Services Enhanced with Supervised Machine Learning and Human Intelligence Empowering clients to stay one step ahead of the adversary. Secureworks helps clients enable intelligent actions to outsmart and
More informationBUILD YOUR CYBERSECURITY SKILLS WITH TRASYS INTERNATIONAL
BUILD YOUR CYBERSECURITY SKILLS WITH TRASYS INTERNATIONAL BECOME A PECB CERTIFIED ISO 27001 AUDITOR OR INSTRUCTOR Trasys International established a partnership with the Professional Evaluation and Certification
More informationGoogle Cloud & the General Data Protection Regulation (GDPR)
Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to
More informationINTELLIGENCE DRIVEN GRC FOR SECURITY
INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to
More informationSecurity in India: Enabling a New Connected Era
White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile
More informationSTAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response
STAY ONE STEP AHEAD OF THE CRIMINAL MIND F-Secure Rapid Detection & Response INTRO PROTECT YOUR BUSINESS AND ITS DATA AGAINST ADVANCED ATTACKS Effective pre-compromise threat prevention is the cornerstone
More informationContinuous protection to reduce risk and maintain production availability
Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading
More informationCareer Paths In Cybersecurity
Career Paths In Cybersecurity Introductions Rob Ashcraft Sr. Technical Advisor 26-yrs in Information Technology 14-yrs in Information Security Held positions as Technician, IT Management, IT Sales Double
More informationWhat Makes PMI Certifications Stand Apart?
What Makes PMI Certifications Stand Apart? Many certifications exist for managers that claim to offer practitioners and organizations a number of benefits. So, why are PMI certifications unique? PMI certifications
More informationwith Advanced Protection
with Advanced Email Protection OVERVIEW Today s sophisticated threats are changing. They re multiplying. They re morphing into new variants. And they re targeting people, not just technology. As organizations
More informationCLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS
CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS Introduction The world of cybersecurity is changing. As all aspects of our lives become increasingly connected, businesses have made
More informationSECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH
SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH 1 SECURITY+ VS GIAC GSEC Where does GSEC fit? 3 CompTIA Security+ and GIAC Security Essentials (GSEC) Feature CompTIA Security+
More informationTHE POWER OF TECH-SAVVY BOARDS:
THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES
More informationRISK MANAGEMENT Education and Certification
RISK MANAGEMENT Education and Certification aba.com/risked 1-800-BANKERS A new type of risk management professional is now in demand one that can demonstrate a thorough understanding of the complexities
More informationDrive Your Career Forward IIA Certifications and Qualifications
Drive Your Career Forward IIA Certifications and Qualifications Mapping Your Path for Growth Professional development is a journey. Demonstrating your knowledge, acumen, and leadership ability are key
More informationNCSF Foundation Certification
NCSF Foundation Certification Overview This ACQUIROS accredited training program is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity
More informationBULLETPROOF365 SECURING YOUR IT. Bulletproof365.com
BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT
More informationService. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution
Service SM Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Product Protecting sensitive data is critical to being
More informationGDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ
GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool Contact Ashley House, Ashley Road London N17 9LZ 0333 234 4288 info@networkiq.co.uk The General Data Privacy Regulation
More informationBHConsulting. Your trusted cybersecurity partner
Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised
More informationForensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services
Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic
More informationSECURING THE UK S DIGITAL PROSPERITY. Enabling the joint delivery of the National Cyber Security Strategy's objectives
SECURING THE UK S DIGITAL PROSPERITY Enabling the joint delivery of the National Cyber Security Strategy's objectives 02 November 2016 2 SECURING THE UK S DIGITAL PROSPERITY SECURING THE UK S DIGITAL PROSPERITY
More informationThe University of Queensland
UQ Cyber Security Strategy 2017-2020 NAME: UQ Cyber Security Strategy DATE: 21/07/2017 RELEASE:0.2 Final AUTHOR: OWNER: CLIENT: Marc Blum Chief Information Officer Strategic Information Technology Council
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationMapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective
Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better
More informationBULLETPROOF365 SECURING YOUR IT. Bulletproof365.com
BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT
More informationCIPP/G (Certified Information Privacy Professional US Government)
CIPP/G (Certified Information Privacy Professional US Government) Course Description (image) The Certified Information Privacy Professional/Government (CIPP/G) is the first publicly available privacy certification
More informationCOMPUTER FORENSICS (CFRS)
Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics
More informationInternationally Recognised Courses Affordable Courses Job Guarantee
Career prospects in Hardware & Networking courses in India. Nearly a decade ago, computer hardware and networking was not considered as a very lucrative career option in India but currently, IT, Computer
More informationSecurity in Today s Insecure World for SecureTokyo
Security in Today s Insecure World for SecureTokyo David Shearer (ISC) 2 Chief Executive Officer dshearer@isc2.org www.isc2.org I m Influenced by a Mission Driven Background U.S. Maritime Transportation
More informationChartered Membership: Professional Standards Framework
Chartered Membership: Professional Standards Framework Foreword The Chartered Institute of Architectural Technologists (CIAT) is the lead professional body for Architectural Technology and the UK Competent
More informationBoston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018
Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security BRANDEIS UNIVERSITY PROFESSOR ERICH SCHUMANN MAY 2018 1 Chinese military strategist Sun Tzu: Benchmark If you know your
More informationSpread your wings Professional qualifications and development at Deloitte. What impact will you make? careers.deloitte.com
Spread your wings Professional qualifications and development at Deloitte What impact will you make? careers.deloitte.com It s your future. How far will you take it? Do you want to make an impact in your
More informationBECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW
BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME AN ISACA MEMBER TODAY. Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential
More informationA Passage to Penetration Testing!
A Passage to Penetration Testing! EC-Council Cyber Research This paper is from EC-Council s site. Reposting is not permitted without express written permission. What Is Penetration Testing? A penetration
More informationApprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL
Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL WHY CHOOSE QA? There are lots of apprenticeship providers out there but we think we
More informationAwareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB
Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB 2 OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB In today s digital world, safeguarding data, intellectual property, financial
More informationMSc Digital Marketing
MSc Digital Marketing Become a Certified Digital Marketing Master 2 YEARS PART-TIME STUDY ONLINE www.springhouse.com 610-321-3500 info@springhouse.com Validated by the Industry Advisory Council. Including
More informationHow icims Supports. Your Readiness for the European Union General Data Protection Regulation
How icims Supports Your Readiness for the European Union General Data Protection Regulation The GDPR is the EU s next generation of data protection law. Aiming to strengthen the security and protection
More informationDrive Your Career Forward IIA Certifications and Qualifications
CCSA CRMA CFSA CGAP Don t miss out on the CIA Application Fee Waiver in August! More information is available on the back cover. Drive Your Career Forward IIA Certifications and Qualifications Mapping
More informationBRING EXPERT TRAINING TO YOUR WORKPLACE.
BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique
More information