Wolfpack Cyber Academy Training Catalogue

Size: px
Start display at page:

Download "Wolfpack Cyber Academy Training Catalogue"

Transcription

1 Wolfpack Cyber Academy Training Catalogue IT GOVERNANCE I INFORMATION RISK I CYBERSECURITY I PRIVACY I FOUNDATION I INTERMEDIATE I ADVANCED 2017 WOLF PACK

2 Contents About Wolfpack Information Risk 3 Proposed Approach 3 Security Baseline Training 5 CompTIA Security+ 7 CompTIA CASP Certified Cyber Security First Responder 10 CISM (Certified Information Security Manager) 13 COBIT 5 Foundation 15 About Wolfpack Information Risk: Wolfpack Information Risk assists clients in managing their IT Governance, Information, Cyber security and Privacy programmes more efficiently. We help to predict the Cyber threats that affect particular industries. Wolfpack offers a range of assessments to determine where organisations have gaps in their people, process and technology areas. Our specialist staff utilise the latest research, threat intelligence, high-impact training, awareness, monitoring and advisory solutions, to address these gaps. We have a strong sense of community and a genuine interest in making a difference in the fight against cybercrime. With this aim in mind, we strive to drive strategic collaborative initiatives on the African continent. ISO Foundation 17 ISO Lead Implementer 1 ISO Lead Auditor 20 ISO 221 BCM Foundation 23 ISO 221 BCM Lead Implementer 24 ISO 221 BCM Lead Auditor 26 ISO Risk Foundation 29 ISO Risk Manager ISO Risk Assessment Techniques 32 ISO IT Risk Foundation 34 ISO IT Risk Manager 35 MONITOR TRAINING & AWARENESS THREAT & VULNERABILITY MANAGEMENT INFORMATION RISK ASSESSMENT & CYBER RISK ANALYSIS THREAT INTELLIGENCE REMEDIATION, SIMULATED ATTACKS & INCIDENT RESPONSE ADVISORY ASSESS ISO Lead Incident Response 37 PECB Certified Lead Pen Test Professional 39 Graduate Development IMPROVE PECB Certified Lead Privacy Implementer 40 2 Wolfpack Cyber Academy Wolfpack Cyber Academy 3

3 Wolfpack Cyber Academy Pricing Schedule 2017 Duration Price (ex Vat) Exams 2 Days Wolfpack Security Baseline Training R Days CompTIA Security+ R R Days CompTIA CASP R R Days Certified Cyber Security First Responder R $ 0.00 Security Baseline Training The purpose of the Wolfpack Cyber Academy Security Baseline Training is to provide students with a clear understanding of different security domains. Domains covered in this course are based on a consolidation of information and cyber security areas, derived from the Certified Information Systems Security Professional (CISSP) and the International Organisation for Standards (ISO) 27001/2:2013 domains. 4 Days CISM Exam Prep R $ Days COBIT 5 Foundation R R Days ISO Foundation R Days ISO Lead Implementer R days R Days ISO Lead Auditor R Days ISO 221 BCM Foundation R Days ISO 221 BCM Lead Implementer R Days ISO 221 BCM Lead Auditor R Days ISO Risk Foundation R Days ISO Risk Manager R Days ISO IT Risk Foundation R Days ISO IT Risk Manager R Days ISO Lead Incident Response R Days PECB Lead Pen Test Professional R Days PECB Certified Lead Privacy Implementer R Format This is a paper based course. No hardware and software will be required during the course. Modules Cyber Security Governance and Risk Management. Legal Regulations and Compliance. Incident Management, Business Continuity and Disaster Recovery Planning. Asset Management. Human Resource and Supplier Security. Physical (Environmental) Security. Security Architecture and Design. Access Control. Operations Security. Cryptography. Software Development and Application Software Security. Telecommunications and Network Security. 4 Wolfpack Cyber Academy Wolfpack Cyber Academy 5

4 CompTIA Security + CompTIA CASP CompTIA Security + The CompTIA Security+ Certification is a vendor neutral credential. The CompTIA Security+ exam is an internationally recognised validation of foundation level security skills and knowledge. Organisations and security professionals around the globe make use of it. 5 days R of exam: The CompTIA Security+ exam certifies that the successful candidate has obtained the required knowledge and skills in order to identify risks and participate in risk mitigation activities, as well as provide infrastructure, application, information and operational security. In addition, the successful candidate will apply security controls to maintain confidentiality, integrity, and availability, identify appropriate technologies and products, troubleshoot security events and incidents, and operate with an awareness of applicable policies, laws, and regulations. The CompTIA Security+ exam is an internationally recognised validation of foundation-level security skills and knowledge. IT Security Professionals with: A minimum of 2 years experience in IT Administration with a focus on security. Day to day technical information security experience. Broad knowledge of security concerns and implementation. Network Security. Compliance and Operational Security. Threats and Vulnerabilities. Application, Data and Host Security. Access Control and Identity Management. Cryptography. 6 Wolfpack Cyber Academy Wolfpack Cyber Academy 7

5 CompTIA CASP The CASP exam is an internationally targeted validation of advanced-level security skills and knowledge. While there is no required prerequisite, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus at the enterprise level. Certified Cybersecurity First Responder 5 days R of exam: Successful candidates will gain the technical knowledge and skills required to conceptualise, engineer, integrate and implement secure solutions across complex environments. Candidates will apply critical thinking and judgment across a broad spectrum of security disciplines, propose and implement sustainable security solutions, map organisational strategies, translate business needs into security requirements, analyse risk impact and respond to security incidents. The CompTIA Advanced Security Practitioner (CASP) Certification is a vendorneutral credential. The CASP exam is an internationally targeted validation of advanced-level security skills and knowledge. IT Security Professionals who have: A minimum of 10 years of experience in IT administration. At least 5 years of hands-on technical security experience. Enterprise Security. Risk Management. Incident Response. Research and Analysis. Integration of Computing, Communications and Business Disciplines. Technical Integration of Enterprise Components. Wolfpack Cyber Academy Wolfpack Cyber Academy 9

6 Cyber Security First Responder Exam Specifications Certified Cyber Security First Responder introduces the strategies, frameworks, methodologies and tools, which are used to manage cybersecurity risks and identify various types of common threats. Delegates will learn to design and operate secure computing and networking environments, assess and audit the organisation s security, collect and analyse cybersecurity intelligence and handle incidents as they occur. The course also covers closely related information assurance topics, such as auditing and forensics in order to provide a sound basis for a comprehensive security based approach, aimed toward those on the front lines of defense Number if items: 126 Duration: 10 minutes Exam options: Online or in Person (Castle Worldwide) Item Formats: Multiple Choice / Multiple Response / True-False Prerequisites 5 days R of exam: $ 0 Two years work experience in computer network security technology or related field. Domains Assessing Information % of Examination Security Risk. Creating an Information Assurance Life cycle Process. Analysing Threats to Computing and Network Environments. Designing Secure Computing and Network Environments. Operating Secure Computing and Network Environments. Assessing the Security Posture Within a Risk Management Framework. Collecting Cybersecurity Intelligence Information. Analysing Cybersecurity Intelligence Information. Responding to Cybersecurity Incidents. Investigating Cybersecurity Incidents. Auditing Secure Computing and Network Environments. Cybersecurity Practitioners. Students preparing for the CyberSec First Responder: Threat Detection and Response (Exam CFR-101) certification examination. Students who are looking to fulfill DoD directive for information assurance (IA) training. Personnel performing IA functions, establishing IA policies and implementing security measures and procedures for the Department of Defence and affiliated information systems and networks. The ability to recognise information security vulnerabilities and threats in the context of risk management. Operate some of the common operating systems relevant to a computing environment at a foundation level. Primary knowledge of the concepts and operational framework relating to common assurance safeguards in computing environments. Operate some of the basic network environment concepts, such as routing and switching, at foundation level. Elemental knowledge of the concepts and operational framework relating to common assurance safeguards in network environments. You can obtain this level of skills and knowledge by taking the following Logical Operations courses CompTIA A+ : A Comprehensive Approach (Exams and ) CompTIA Network+ (Exam N10-005) CompTIA Security+ (Exam SY0-401) -specific Technical Requirements Assessing Information Security Risks. Creating an Information Assurance Life cycle Process. Analysing Threats to Computing and Network Environments. Designing Secure Computing and Network Environments. Operating Secure Computing and Network Environments. Assessing the Security Posture within a Risk Management Framework. Collecting Cybersecurity Intelligence Information. Analysing Cybersecurity Intelligence Information. Responding to Cybersecurity Incidents. Investigating Cybersecurity Incidents. Auditing Secure Computing and Network Environment. 10 Wolfpack Cyber Academy Wolfpack Cyber Academy 11

7 CISM (Certified Information Security Manager) CISM Around the world, the demand for skilled information security management professionals is on the rise. CISM certification is the globally accepted standard of achievement in this area. This uniquely management-focused CISM certification ensures holders understand business, and know how to manage and adapt technology to their enterprise and industry. Since 2002, thousands of professionals worldwide have earned the industry-leading CISM to affirm both their high level of technical competence and qualifications for top-caliber leadership and management roles. 4 days R of exam: $ Outline Demonstrates your understanding of the relationship between an information security program and broader business goals and objectives. Distinguishes you as having not only information security expertise, but also knowledge and experience in the development and management of an information security program. Establishes you in an elite peer network. Is considered essential to ongoing education, career progression and value delivery to enterprises. ISACA certifications are globally accepted and recognised. Designed specifically for Information Security Professionals who are preparing to sit for the CISM exam, the course focuses on the four content areas of the Certified Information Security Manager (CISM) job practice: Information Security Governance. Risk Management and Compliance. Information Security Program Development and Management. Information Security Incident Management. Information Security Managers. Aspiring Information Security Managers. IS/IT Consultants. Chief Information Officers. 12 Wolfpack Cyber Academy Wolfpack Cyber Academy 13

8 COBIT 5 Foundation Cobit 5 Foundation This course exposes attendees to the integration of COBIT 5 with the KING III Code of Governance and other Best Practices, more specifically ISO 3500, ISO and ISO 20000/ ITIL. Cobit 5 Foundation forms a maturity model which will provide a wealth of insight and understanding on practical issues of IT Governance. The course on this page is offered by RMS Africa, an Affiliate of Quint Wellington Redwood, an Accredited Training Organisation of The APM Group Ltd. 3 days R of exam: R At the conclusion of the course the attendees will understand: The major drivers for the development of a framework. The business benefits of using COBIT 5. The COBIT 5 architecture. The IT management issues and challenges that affect enterprises. The 5 key principles of COBIT 5 for the governance and management of Enterprise IT. How COBIT 5 enables IT to be governed and managed in a holistic manner for the entire enterprise. The key concepts in a Process Capability Assessment. This is a paper based course. No hardware or software is required. The exam is written on the 3rd day and is included in the course price. The key features of COBIT 5. COBIT 5 Principles. COBIT 5 Enablers. Introduction to COBIT 5 Implementation. Chief Information Officers. Heads of Regulatory Compliance. Chief Technology Officers. Heads of Service Management. Chief Information Operational Security Officers. Managers. Information Aspiring Security Information Managers Security Risk Managers. and Compliance Officers. IT/Internal IS/IT Consultants. Auditors. IT Directors/Managers. Chief Information Officers. Business Continuity Managers. Heads of IT Governance. IT Consultants. Heads of Risk Management. 14 Wolfpack Cyber Academy Wolfpack Cyber Academy 15

9 PECB IS Foundation PECB ISO Lead Implementer PECB ISO Lead Auditor ISO Foundation This course enables the participants to learn about the best practices for implementing and managing an Information Security Management System (ISMS) as specified in ISO/IEC 27001, as well as the best practices for implementing the Information Security controls of the domains of the ISO/IEC days R of exam: $ 120 Understand the implementation of an Information Security Management System in accordance with ISO/IEC Understand the relationship between an Information Security Management System, including risk management, controls and compliance with the requirements of different stakeholders of the organisation. Know the concepts, approaches, standards, methods and techniques allowing to effectively manage an Information Security Management System. Acquire the necessary Knowledge to contribute in implementing an Information Security. Management System (ISMS) as specified in ISO/IEC This is a paper based course. Certification fees are included in the exam price. Fundamental Principles and Concepts of Information Security. Information Security Management System (ISMS). Members of an information security team. IT Professionals who would like to gain a comprehensive knowledge of the main processes of an Information Security Management System (ISMS). Staff involved in the implementation of the ISO/IEC standard. Technicians involved in operations related to an ISMS. Auditors. CxO and Senior Managers responsible for the IT governance and risk management of an enterprise. 16 Wolfpack Cyber Academy Wolfpack Cyber Academy 17

10 ISO Lead Implementer ISO Lead Implementer This five-day intensive course enables participants to develop the necessary expertise to support an organisation in implementing and managing an Information Security Management System (ISMS) based on ISO/IEC 27001:2013. Participants will gain a thorough understanding of best practices used to implement information security controls from all areas of ISO/IEC This training is consistent with the project management practices established in ISO This training is also fully compatible with ISO/IEC (Guidelines for the Implementation of an ISMS), ISO/IEC (Measurement of Information Security) and ISO/IEC (Risk Management in Information Security). 5 days R of exam: Understand the implementation of an Information Security Management System in accordance with ISO/IEC Gain a comprehensive understanding of the concepts, approaches, standards, methods and techniques required for the effective management of an Information Security Management System. Understand the relationship between the components of an Information Security Management System, including risk management, controls and compliance with the requirements of different stakeholders of the organisation. Acquire the necessary expertise to support an organisation in implementing, managing and maintaining an ISMS as specified in ISO/IEC Receive the necessary expertise to manage a team implementing ISO/IEC Develop the knowledge and skills required to advise organisation s on best practices in the management of information security. Improve the capacity for analysis and decision making in the context of information security management. Exam Duration: 10 minutes Certification Fees included in exam price This is a paper based course. Project Managers or Consultants wanting to prepare and to support an organisation in the implementation of an Information Security Management System (ISMS). ISO/IEC Auditors who wish to fully understand the Information Security Management System implementation process. CxO and Senior Managers responsible for the IT governance and risk management of an enterprise and the management of its risks. Members of an Information Security team. Expert Advisors in information technology. Technical Experts who would like to prepare for an information security function or for an ISMS project management function. Certification fees are included in the exam price. The PECB Certified ISO/IEC Lead Implementer exam fully meets the requirements of the PECB Examination and Certification Programme (ECP). The exam covers the following competence domains: Fundamental Principles and Concepts of Information Security. Information Security Control best practice based on ISO Planning an ISMS based on ISO/ IEC Implementing an ISMS based on ISO/IEC Performance Evaluation, Monitoring and Measurement of an ISMS based on ISO/IEC Continual Improvement of an ISMS based on ISO/IEC Preparing for an ISMS certification audit A certificate related to the selected credential, will be issued to participants who successfully pass the exam and comply with all the other requirements. 1 Wolfpack Cyber Academy Wolfpack Cyber Academy 19

11 ISO Lead Auditor ISO Lead Auditor This five-day intensive course enables participants to develop the necessary expertise to audit an Information Security Management System (ISMS), as well as to manage a team of auditors by applying widely recognised audit principles, procedures and techniques. During this training, the participant will acquire the necessary knowledge and skills to proficiently plan and perform internal and external audits in compliance with ISO Based on practical exercises, the participant will develop the skills (mastering audit techniques) and competencies (managing audit teams and audit program, communicating with customers, conflict resolution, etc.) necessary to efficiently conduct an audit. 5 days R of exam: Acquire the expertise to perform an ISO/IEC internal audit following ISO guidelines. Gain the expertise to perform an ISO/IEC certification audit following ISO guidelines and the specifications of ISO and ISO Receive the necessary expertise to manage an ISMS audit team. Understand the operation of an ISO/IEC conformant information security management. Understand the relationship between an Information Security Management System, including risk management, controls and compliance with the requirements of different stakeholders of the organisation. Improve the ability to analyse the internal and external environment of an organisation, its risk assessment and audit decision-making. Certification fees are included in the exam price. The PECB Certified ISO/IEC Lead Auditor exam fully meets the requirements of the PECB Examination and Certification Programme (ECP). The exam covers the following competence domains: Fundamental Principles and Concepts of Information Security. Information Security Management System (ISMS). Fundamental Audit Concepts and Principles. Preparation of an ISO/IEC audit. Conducting an audit. Closing an ISO/IEC audit. Managing an ISO/IEC audit program. A certificate will be issued to participants who successfully pass the exam and comply with all the other requirements related to the selected credential. After successfully completing the exam, participants can apply for the credentials of PECB Certified ISO/IEC Provisional Auditor, PECB Certified ISO/IEC Auditor or PECB Certified ISO/IEC Lead Auditor depending on their level of experience. Those credentials are available for internal and external auditors. Exam Duration: 10 minutes Certification Fees included in exam price. This is a paper based course. Internal Auditors. Auditors who would like to perform and lead Information Security Management System (ISMS) certification audits. Project Managers or consultants who want to master the Information Security Management System audit process. CxO and Senior Managers responsible for the IT governance of an enterprise and the management of its risks. Members of an Information security team. Expert Advisors in information technology. Technical Experts who would like to prepare for an Information security audit. 20 Wolfpack Cyber Academy Wolfpack Cyber Academy 21

12 PECB ISO 221 BCM Foundation PECB ISO 221 BCM Lead Implementer PECB ISO 221 BCM Lead Auditor ISO 221 BCM Foundation This course enables participants to learn about the best practices for implementing and managing a Business Continuity Management System (BCMS) as specified in ISO 221:2010, as well as the best practices for implementing the business continuity processes based on the ISO/PAS This training is fully compatible with BS (Business continuity management specification) and ISO (Guidelines for information and communication technology readiness for business continuity). 2 days R of exam: Understand the implementation of a Business Continuity Management System in accordance with ISO 221, ISO or BS Discern the relationship between a Business Continuity Management System and the requirements of different stakeholders within the organisation. This includes risk management, controls and compliance. Know the concepts, approaches, standards, methods and techniques allowing to effectively manage a Business Continuity Management System. Acquire the necessary expertise to contribute in implementing a Business Continuity Management System (BCMS) as specified in ISO221, ISO or BS Members of a business continuity team. IT Professionals who desire to gain a comprehensive knowledge of the main processes of a Business Continuity Management System (BCMS). Staff involved in the implementation of the ISO 221 standard. Technicians involved in operations related to a BCMS. Fundamental Principles and Concepts of Business Continuity. Business Continuity Management System (BCMS). This is a paper based course. 22 Wolfpack Cyber Academy Wolfpack Cyber Academy 23

13 ISO 221 BCM Lead Implementer ISO 221 BCM Lead Implementer This five-day intensive course enables participants to develop the necessary expertise to support an organisation in implementing and managing a Business Continuity Management System (BCMS) based on ISO 221:2010. Participants will also gain a thorough understanding of best practices used to implement business continuity processes from the ISO This training is consistent with the project management practices established in ISO (Quality Management Systems - Guidelines for Quality Management in Projects). It is fully compatible with BS (Business continuity management specification) and ISO (Guidelines for information and communication technology readiness for business continuity). 5 days R Understand the implementation of a Business Continuity Management System (BCMS) in accordance with ISO 221, ISO or BS Gain a comprehensive understanding of the concepts, approaches, standards, methods and techniques required for the effective management of a Business Continuity Management System. Grasp the relationship between the components of a Business Continuity Management System and the compliance with the requirements of different stakeholders within the organisation. of exam: Acquire the necessary expertise to manage a team, through implementing ISO221 or BS Develop the knowledge and skills required to advise organisations on best practices in the management of business continuity. Improve the capacity for analysis and decision making in the context of business continuity management. Obtain the necessary expertise to support an organisation in implementing, managing and maintaining a BCMS as specified in ISO221 or BS Certification fees are included in the exam price. The exam covers the following competence domains: Fundamental principles and concepts of business continuity. Business continuity Control Best Practice. Planning a BCMS based on ISO 221 Implementing a BCMS based on ISO 221. Performance evaluation, monitoring and measurement of a BCMS based on ISO 221. Continual improvement of a BCMS based on ISO 221. Preparing for a BCMS certification audit. Additional Information: This is a paper based course. No additional hardware or software will be required. The duration of the exam is three hours. For more information about exam, refer to PECB section on ISO 221 Lead Implementer Exam. A certificate will be issued to participants who successfully pass the exam and comply with all the other requirements related to the selected credential. Exam Duration: 10 minutes Certification Fees included in exam price This is a paper based course. Project Managers or Consultants who would like to prepare and to support an organisation in the implementation of a Business Continuity Management System (BCMS). Business Continuity Auditors who wish to fully understand the implementation of a Business Continuity Management System. Individuals responsible for the business continuity conformity in an organisation. Members of a business continuity team. Expert Advisors in business continuity. Members of an organisation who are preparing for a business continuity function or for a BCMS project management function. 24 Wolfpack Cyber Academy Wolfpack Cyber Academy 25

14 ISO 221 BCM Lead Auditor ISO 221 BCM Lead Auditor This five-day intensive course enables participants to develop the necessary expertise to audit a Business Continuity Management System (BCMS) and to manage a team of auditors by applying widely recognised audit principles, procedures and techniques. During this training, the participant will acquire the necessary knowledge and skills to proficiently plan and perform internal and external audits in compliance with ISO the certification process according to Based on practical exercises, the participant will develop the skills and competencies necessary to efficiently conduct an audit. The skill set includes mastering audit techniques, managing audit teams and -programs, communicating with customers and conflict resolution. This training is compatible with BS audit (Business continuity management specification) and ISO (Guidelines for information and communication technology readiness for business continuity). 5 days R Gain the prowess to perform an ISO 221 or BS internal audit following ISO guidelines. Acquire the expertise to perform an ISO 221 or BS certification audit following ISO guidelines and the specifications of ISO Receive the expert skills necessary to manage a BCMS audit team. Understand the operation of the Business Continuity Management System in accordance with ISO221, ISO or BS of exam: Grasp the relationship between a Business Continuity Management System and the requirements of different stakeholders within the organisation. This includes risk management, compliance and controls. Improve the ability to analyse the internal and external environment of an organisation, risk assessment and audit decision-making in the context of a BCMS. Certification fees are included in the exam price. The exam covers the following competence domains: Fundamental Principles and Concepts of Business Continuity. Business Continuity Management System (BCMS). Fundamental Audit Concepts and Principles. Preparation of an ISO 221 audit. Conducting of an ISO 221 audit. Closing an ISO 221 audit. Managing an ISO 221 Audit Program. Additional Information The duration of the exam is 3 hours. This is a paper based course and no additional hardware or software is required. For more information about the exam, refer to PECB section on ISO 221 Lead Auditor Exam. A certificate will be issued to participants who successfully pass the exam and comply with all the other requirements related to the selected credential. Exam Duration: 10 minutes Certification Fees included in exam price This is a paper based course. Internal Auditors. Auditors who would like to perform and lead Business Continuity Management System (BCMS) certification audits. Project Managers or Consultants who desire to master the Business Continuity Management System audit process. Individuals responsible for the Business continuity conformity in an organisation. Members of a business continuity team. Expert Advisors in information technology. Technical Experts preparing for a Business continuity audit function. 26 Wolfpack Cyber Academy Wolfpack Cyber Academy 27

15 PECB ISO Risk Foundation PECB ISO Risk Manager ISO ISO Risk Risk Foundation Foundation This course enables participants to learn about the best practices in Risk Management as specified in ISO The participant will learn the essential concepts and processes that are considered most effective in risk management. This training will help participants understand an optimal risk assessment and manage risks promptly, through familiarising themselves with their life cycle. 2 days R of exam: Successful delegates will gain the following skill set: Understand Risk Management in accordance with ISO Grasp the relationship between the components of Risk Management and the compliance with the requirements of different stakeholders of an organisation. Know the concepts, approaches, standards, methods and techniques allowing to effectively manage risk. Acquire the necessary knowledge to contribute in managing risk as specified in ISO Delegates will complete a certification exam. Members of a Risk Management Team. Risk Managers. Project Managers. Professionals who would like to gain a comprehensive knowledge of the main concepts and processes in Risk Management. Auditors. Format This is a paper based course. No additional hardware or software will be required. 2 Wolfpack Cyber Academy Wolfpack Cyber Academy 29

16 ISO Risk Manager PECB ISO Risk Assessment Techniques In this two-day intensive course participants develop the competence to master a model for implementing risk management processes throughout their organisation, using the ISO 31000:2009 standard as a reference framework. Based on practical exercises, participants acquire the necessary knowledge and skills to perform an optimal risk assessment and manage risks in time by being familiar with their life cycle. During this training, we will present the ISO general risk management standard, the process model it recommends, and how companies may use the standard. This training is also fully compatible with IEC/ISO which supports ISO by providing guidance for risk assessment. 2 days R of exam: Discern the concepts, approaches, methods, tools and techniques which allow effective risk management according to ISO and IEC/ISO Understand the relationship between risk management and compliance with the requirements of different stakeholders of an organisation. Acquire the competence to implement, maintain and manage an ongoing risk management program according to ISO Gain the competence to effectively advise organisations on the best practices in risk management. This is a paper based course. No additional hardware or software will be required. Risk and Business Risk managers. Business Process Owners. Business Finance Managers. Regulatory Compliance Managers. Project Management. Individuals responsible for information security or conformity within an organisation. Fundamental Principles and Concepts in Risk Management. Risk Management, Assessment and Treatment Program. Risk Communication, Monitoring and Improvement. Wolfpack Cyber Academy Wolfpack Cyber Academy 31

17 ISO Risk Assessment Techniques Risk Management is return on investment. Organisations of all types and sizes face a range of risks that may affect the achievement of their objectives. The ISO/IEC Standard is a supporting standard for ISO Risk Management. It provides guidance on the selection and application of systematic techniques for Risk Assessment. In an intensive two-days course, participants will learn about 31 techniques in Risk Assessment such as: Checklists, Delphi-technique, SWIFT (structured what-if technique), Root Cause Analysis (RCA), Business Impact Analysis (BIA), FMEA and FMECA, HAZOP, HACCP, Layers of Protection Analysis (LOPA), Bow Tie Analysis, Markov, Monte-Carlo and Bayesian Analysis. The course combines all these techniques. It aims at demystifying the complexity of the various techniques that can be used by private and public organizations of any size, industry and sector. PECB ISO IT Risk Foundation PECB ISO IT Risk Manager 2 days R of exam: Understand the concepts, approaches, methods, tools and techniques, which allow for effective risk management according to ISO 31000and IEC/ISO Grasp the relationship between risk management and compliance with the requirements of different stakeholders within an organization. Gain the competence to implement, maintain and manage an ongoing risk management program according to ISO Acquire the acumen to effectively advise organizations on the best practices in risk management. This course is a must for Professionals in the field of Risk Assessment and valuable for everyone involved in decision-making. Information Certification fees are included in the exam price. A certificate will be issued to participants who successfully pass the exam and comply with all the other requirements related to the selected credential. This is a paper based course and no hardware or software is required. 32 Wolfpack Cyber Academy Wolfpack Cyber Academy 33

18 ISO IT Risk Foundation ISO IT Risk Manager This course enables participants to learn about the best practices in risk management based on ISO/IEC 27005, as well as understanding how different parts of a risk management program and the implementation stages of an optimal risk assessment are synchronised. This two-day intensive course develops the competence to master the basic risk management elements related to all assets of relevance for information security using the ISO/IEC 27005:2011 standard as a reference framework. Based on practical exercises and case studies, participants acquire the necessary knowledge and skills to perform an optimal information security risk assessment and manage risks promptly, by being familiar with their life cycle. During this training, we will also present other risk assessment methods such as OCTAVE, EBIOS, MEHARI and Harmonized TRA. 2 days R of exam: 2 days R of exam: Understand risk management approaches in accordance with ISO/IEC Know the concepts, approaches, standards, methods and techniques, which allow for effective risk management (based on ISO/IEC 27005). Additional information Certification fees are included in the exam price. This is a paper based course. No additional hardware or software is required. A certificate of PECB Certified ISO/IEC Foundation will be issued to participants who successfully passed the exam and comply with all the other requirements related to this credential. Members of an Information Security Team. IT Professionals who would like to gain a comprehensive knowledge of Risk Management within an organisation. Staff involved in the implementation of the ISO/IEC standard. CxO and Senior Managers responsible for the IT governance of an enterprise and the management of its risks. Fundamental Principles and Concepts of Risk Management in Information Security. Information Security Risk Management methods. The exam duration is one hour. Understand the concepts, approaches, methods and techniques, which allow for effective risk management according to ISO/ IEC Interpret the requirements of ISO/IEC on information security risk management. Discern the relationship between the information security risk management, the security controls. and the compliance with the requirements of different stakeholders of an organisation. Acquire the competence to implement, maintain and manage an ongoing information security risk management program according to ISO/IEC Gain the competence to effectively advise organisations on the best practices in information security risk management. Risk Managers. Members of the information security team. Individuals responsible for Information Security or Conformity within an organisation. Staff implementing or seeking to comply with ISO/IEC or involved in a Risk Management Program. IT Consultants. Format This is a paper based course. No additional hardware or software will be required. 34 Wolfpack Cyber Academy Wolfpack Cyber Academy 35

19 PECB ISO Lead Incident Response ISO Lead Incident Response In this five-day intensive course participants develop the competence to master an implementation model for an incident management process throughout their organisation, using the ISO/IEC standard as a reference framework. Based on practical exercises, participants acquire the necessary knowledge and skills to manage information security incidents in time by being familiar with their life cycle. During this training, we will present the ISO/IEC information security incident management standard, a process model for designing and developing an organisational incident management process, as well as how companies may apply the standard. This training is also fully compatible with ISO/ IEC which supports ISO by providing guidance for incident management. 5 days R of exam: Grasp the concepts, approaches, methods, tools and techniques, which allow for effective information security incident management, according to ISO/IEC Understand, interpret and provide guidance on how to implement and manage incident management processes based on best practices of ISO/IEC and other relevant standards. Gain the proficiency to implement, maintain and manage an ongoing information security incident management program according to ISO/IEC Acquire the competence to effectively advise organisations on the best practices in information security management. Incident Managers. Business Process Owners. Information Security Risk Managers. Regulatory Compliance Managers. Members of Incident Response Team. Persons responsible for information security or conformity within an organisation. Additional Information Exam and certification fees are included in the training price. This is a paper based course. The exam duration is three hours. 36 Wolfpack Cyber Academy Wolfpack Cyber Academy 37

20 PECB Certified Lead Pen Test Professional PECB Certified Lead Pen Test Professional This five-day intensive course enables participants to develop the necessary expertise to lead a professional penetration test using a mix of practical techniques and management skills. The course has been designed by Industry experts with in-depth experience in the Penetration Testing fields. Unlike other certifications, this course focuses specifically on the knowledge and skills needed by a professional looking to lead or take part in a penetration test. We drill down into the latest technical knowledge, tools and techniques in key areas including Infrastructure, Web Application and Mobile security, as well as Social Engineering. In addition, the course focuses on how to practically apply what has been learned during current day-to-day penetration testing. 5 days R of exam: Be able to interpret and illustrate the main Penetration Testing Concepts and Principles. Understand the core technical knowledge needed to organize and carry out an effective set of tests. Learn how to effectively plan a penetration test and identify a scope which is suitable and risk appropriate. Master the practical hands on skills, as well as the relevant tools and techniques in order to conduct penetration testing effectively. Effectively manage the time and resources needed to scale a specific Penetration Test. Security Professionals who need to gain formal Penetration Testing skills. IT Staff enhancing their technical skills and knowledge. Auditors who would like to understand the Penetration Testing processes. IT and Risk Managers seeking a more detailed understanding of the appropriate and beneficial use of Penetration Tests. Incident Handlers and Business Continuity Professionals exploring the use of testing as part of their regimes. 3 Wolfpack Cyber Academy Wolfpack Cyber Academy 39

21 PECB Certified Lead Privacy Implementer PECB Lead Privacy Implementer This five-day intensive course enables participants to develop the necessary expertise to support an organization in implementing and managing a Privacy Framework based on ISO Participants will gain a thorough understanding of how to design, build and lead organizations privacy programs covering business processes, ICT systems and services, through the use of best practices. The training provides a privacy framework which specifies a common privacy terminology, defines the actors and their roles in processing personally identifiable information (PII), describes privacy safeguarding considerations and provides references to known privacy principles for information technology. Based on this knowledge delegates will have the skills to build privacy frameworks that allow their organisation to maintain compliance to the many privacy directives and laws worldwide. 5 days R of exam: Understand the core competences on the Privacy Framework. Gain a comprehensive understanding of the concepts, approaches, standards, methods and techniques required for the effective protection of personally identifiable information (PII). Define privacy safeguarding requirements related to PII. Understand the relationship between the components of Privacy Framework with existing security standards and various applicable laws. Acquire the necessary expertise in privacy governance and risk management compliance. Project Managers or Consultants. Security Auditors who would like to understand the privacy framework implementation processes. Experienced IT Security Manager professionals. Privacy Officers, Data Protection Officers and Compliance Professionals. Security Professionals with frontline experience. Information Security staff. Expert Advisors in Information technology. Legal Practitioners who would like to gain a deeper understanding. 40 Wolfpack Cyber Academy Wolfpack Cyber Academy 41

22 BE STRONG ENOUGH TO STAND ALONE BUT BE WISE ENOUGH TO STAND TOGETHER WHEN THE TIME COMES PROTECTION IN THE PACK

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY The Foundation Certificate in Information Security (FCIS) course is designed to provide

More information

Implementation of Business Continuity Management System (BCMS) based on ISO 22301:2012 requirements

Implementation of Business Continuity Management System (BCMS) based on ISO 22301:2012 requirements Implementation of Business Continuity Management System (BCMS) based on ISO 22301:2012 requirements Summary This five-day intensive training course enables participants to develop the necessary expertise

More information

Master the implementation and management of a Cybersecurity Program based on ISO/IEC 27032

Master the implementation and management of a Cybersecurity Program based on ISO/IEC 27032 Master the implementation and management of a Program based on ISO/IEC 27032 Why should you attend? Manager training enables you to acquire the expertise and competence needed to support an organization

More information

Master the Audit of Information Security Management Systems (ISMS) based on ISO/IEC 27001

Master the Audit of Information Security Management Systems (ISMS) based on ISO/IEC 27001 Master the Audit of Systems (ISMS) based on ISO/IEC 27001 Why should you attend? Auditor training enables you to develop the necessary expertise to perform an System (ISMS) audit by applying widely recognized

More information

Training Catalog. Decker Consulting GmbH Birkenstrasse 49 CH 6343 Rotkreuz. Revision public. Authorized Training Partner

Training Catalog. Decker Consulting GmbH Birkenstrasse 49 CH 6343 Rotkreuz. Revision public. Authorized Training Partner Management and Information Technology Solutions Decker Consulting GmbH Training Catalog Decker Consulting GmbH Birkenstrasse 49 CH 6343 Rotkreuz Revision 9.1 05.12.2018 public Authorized Training Partner

More information

ISO9001:2015 LEAD IMPLEMENTER & LEAD AUDITOR

ISO9001:2015 LEAD IMPLEMENTER & LEAD AUDITOR ISO9001:2015 LEAD IMPLEMENTER & LEAD AUDITOR JPCANN ASSOCIATES LTD #58 NSAWAM ROAD, AVENOR JUNCTION, KOKOMLEMLE-ACCRA Office lines: +233 302 242 573 / +233 302 974 302 Mobile: +233 501 335 818 20 www.corptrainghana.com

More information

PECB Certified ISO Lead Implementer

PECB Certified ISO Lead Implementer PECB Certified ISO 22301 Lead Implementer PECB Certified ISO 22301 Lead Implementer 5 Days with Examination Course Description This five day intensive course enables the participants to develop the necessary

More information

Master the Audit of Information Security Management Systems (ISMS) based on ISO/IEC 27001

Master the Audit of Information Security Management Systems (ISMS) based on ISO/IEC 27001 Lead Auditor Master te Audit of Systems (ISMS) based on Wy sould you attend? Lead Auditor training enables you to develop te necessary expertise to perform an System (ISMS) audit by applying widely recognized

More information

Certified ISO Lead Auditor

Certified ISO Lead Auditor Certified ISO 22301 Lead Auditor 5 Days with Examination Course Description This five day intensive course enables the participants to develop the expertise to audit a Business Continuity Management System

More information

ISO LEAD AUDITOR TRAINING

ISO LEAD AUDITOR TRAINING FINAL CERTIFICATION AWARDED BY PECB CANADA ISO 22301 LEAD AUDITOR TRAINING & CERTIFICATION (Business Continuity Management) Master the Audit of Business Continuity Management System (BCMS) based on ISO

More information

Effective COBIT Learning Solutions Information package Corporate customers

Effective COBIT Learning Solutions Information package Corporate customers Effective COBIT Learning Solutions Information package Corporate customers Thank you f o r y o u r interest Thank you for showing interest in COBIT learning solutions from ITpreneurs. This document provides

More information

PECB Certified ISO Lead Auditor. Master the Audit of Occupational Health and Safety Management System (OHSMS) based on ISO 45001

PECB Certified ISO Lead Auditor. Master the Audit of Occupational Health and Safety Management System (OHSMS) based on ISO 45001 Certified Lead Auditor Master the Audit of Occupational Health and Safety Management System (OHSMS) based on Why should you attend? is the first global Occupational Health and Safety Management System

More information

BUILD YOUR CYBERSECURITY SKILLS WITH TRASYS INTERNATIONAL

BUILD YOUR CYBERSECURITY SKILLS WITH TRASYS INTERNATIONAL BUILD YOUR CYBERSECURITY SKILLS WITH TRASYS INTERNATIONAL BECOME A PECB CERTIFIED ISO 27001 AUDITOR OR INSTRUCTOR Trasys International established a partnership with the Professional Evaluation and Certification

More information

ISO Lead Auditor Program Risk Management System (RMS) Training Program

ISO Lead Auditor Program Risk Management System (RMS) Training Program FINAL CERTIFICATION AWARDED BY PECB CANADA ISO 31000 Lead Auditor Program Risk Management System (RMS) Training Program ISO 31000 Lead Auditor Risk Manager training enables you to gain comprehensive and

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO/IEC 38500 Lead IT Corporate Governance Manager The objective of the PECB Certified ISO/IEC 38500 Lead IT Corporate Governance Manager examination is to ensure

More information

BHConsulting. Your trusted cybersecurity partner

BHConsulting. Your trusted cybersecurity partner Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO/IEC 27005 Risk Manager The objective of the Certified ISO/IEC 27005 Risk Manager examination is to ensure that the candidate has the knowledge and the skills to

More information

Course Fees: 850 euro

Course Fees: 850 euro In conjuction with: Prishtinë: 19.02.2015. Offer: 2M Consulting & PECB, ISO 27001:2013 Lead Auditor Training Lecturer: Msc. CMC, Lekë Zogaj, Master ISO/IEC ISO 27001:2013 Convenient ISMS Lead Auditor Training

More information

ICT Mentors e-learning portfolio provides our delegates with materials for study at the comfort of their homes, work place etc.

ICT Mentors e-learning portfolio provides our delegates with materials for study at the comfort of their homes, work place etc. ICT Mentors e-learning portfolio provides our delegates with materials for study at the comfort of their homes, work place etc. We provide white labelled training packages and courses in: ITIL COBIT 5

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO/IEC 27005 Risk Manager www.pecb.com The objective of the PECB Certified ISO/IEC 27005 Risk Manager examination is to ensure that the candidate

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

Professional Evaluation and Certification Board Frequently Asked Questions

Professional Evaluation and Certification Board Frequently Asked Questions Professional Evaluation and Certification Board Frequently Asked Questions 1. About PECB... 2 2. General... 2 3. PECB Official Training Courses... 4 4. Course Registration... 5 5. Certification... 5 6.

More information

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation

More information

Ingram Micro Cyber Security Portfolio

Ingram Micro Cyber Security Portfolio Ingram Micro Cyber Security Portfolio Ingram Micro Inc. 1 Ingram Micro Cyber Security Portfolio Services Trainings Vendors Technical Assessment General Training Consultancy Service Certification Training

More information

When Recognition Matters WHITEPAPER ISO SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS.

When Recognition Matters WHITEPAPER ISO SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS. When Recognition Matters WHITEPAPER ISO 28000 SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS www.pecb.com CONTENT 3 4 4 4 4 5 6 6 7 7 7 8 9 10 11 12 Introduction An overview of ISO 28000:2007 Key clauses of

More information

ISO 9000:2015 LEAD AUDITOR

ISO 9000:2015 LEAD AUDITOR FINAL CERTIFICATION AWARDED BY PECB CANADA ISO 9000:2015 LEAD AUDITOR Training Program This course is based on the ISO quality management system (QMS) standard ISO 9001:2015 Lead Auditor, the guideline

More information

Certified Information Security Manager (CISM) Course Overview

Certified Information Security Manager (CISM) Course Overview Certified Information Security Manager (CISM) Course Overview This course teaches students about information security governance, information risk management, information security program development,

More information

PECB Certified ISO/IEC Lead Auditor

PECB Certified ISO/IEC Lead Auditor When Recognition Matters Lead Auditor 25-29 March 2018 Master the Audit of Rainbow Towers Hotel, Harare Systems (ISMS) based on $1250.00 Who should attend? - Auditors seeking to perform and lead System

More information

What is ISO/IEC 27001?

What is ISO/IEC 27001? An Introduction to the International Information Security Management Standard By President INTERPROM July 2017 Copyright 2017 by InterProm USA. All Rights Reserved www.interpromusa.com Contents INTRODUCTION...

More information

ISO Lead Auditor Program Environmental Management System Training Program

ISO Lead Auditor Program Environmental Management System Training Program FINAL CERTIFICATION AWARDED BY PECB CANADA ISO 14001 Lead Auditor Program Environmental Management System Training Program Master the Audit of Environmental Management Systems (EMS) based on ISO/14001

More information

Spread your wings Professional qualifications and development at Deloitte. What impact will you make? careers.deloitte.com

Spread your wings Professional qualifications and development at Deloitte. What impact will you make? careers.deloitte.com Spread your wings Professional qualifications and development at Deloitte What impact will you make? careers.deloitte.com It s your future. How far will you take it? Do you want to make an impact in your

More information

CCISO Blueprint v1. EC-Council

CCISO Blueprint v1. EC-Council CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance

More information

Master the implementation and management of a Cybersecurity Program based on ISO/IEC 27032

Master the implementation and management of a Cybersecurity Program based on ISO/IEC 27032 ISO/IEC 27032 Lead Manager 23rd - 27th October 2017 Hilton Hotel, Sandton, Johannesburg Master the implementation and management of a Program based on ISO/IEC 27032 Why should you attend? Manager training

More information

Cyber Security Program

Cyber Security Program Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 31000 Risk Manager www.pecb.com The objective of the PECB Certified ISO 31000 Risk Manager examination is to ensure that the candidate

More information

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized. Val-EdTM Valiant Technologies Education & Training Services Workshop for CISM aspirants All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies. We are a specialty consulting

More information

Training Services TRAINING SERVICES. Translating Knowledge into Results

Training Services TRAINING SERVICES. Translating Knowledge into Results TRAINING SERVICES About Pink Elephant Pink Elephant is an international knowledge leader in the field of business innovation and business change. With advisory and IT services, Pink Elephant draws the

More information

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers 2017 PORT SECURITY SEMINAR & EXPO ISACA/CISM Information Security Management Training for Security Directors/Managers Agenda Introduction ISACA Information security vs. cybersecurity CISM certification

More information

CompTIA CASP (Advanced Security Practitioner)

CompTIA CASP (Advanced Security Practitioner) CompTIA CASP (Advanced Security Practitioner) Course Length: 5 days (virtual) Click here to view the current class schedule! Overview: The CompTIA Advanced Security Practitioner (CASP) Certification is

More information

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS Good IT governance is a key element of a well-performing enterprise. Enterprises need qualified information

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO/IEC 27002 Manager www.pecb.com The objective of the PECB Certified ISO/IEC 27002 Manager examination is to ensure that the candidate has

More information

COBIT 5 Implementation

COBIT 5 Implementation COBIT 5 Implementation Fifalde Consulting Inc. +1-613-699-3005 2017 Fifalde Consulting Inc. COBIT is a registered Trade Mark of ISACA and the IT Governance Institute. 2 1. Course Description: Get a practical

More information

ITIL 2011 Foundation Course

ITIL 2011 Foundation Course IT SERVICE MANAGEMENT ITIL 2011 Foundation Course CERTIFICATE: DURATION: COURSE DELIVERY: LANGUAGE: ITIL 2011 Foundation 2 or 3 Days Classroom, Live Virtual Classroom English Course Description: This course

More information

CompTIA Cybersecurity Analyst+

CompTIA Cybersecurity Analyst+ CompTIA Cybersecurity Analyst+ Course CT-04 Five days Instructor-Led, Hands-on Introduction This five-day, instructor-led course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity

More information

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH 1 SECURITY+ VS GIAC GSEC Where does GSEC fit? 3 CompTIA Security+ and GIAC Security Essentials (GSEC) Feature CompTIA Security+

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO/IEC 27002 Manager The objective of the PECB Certified ISO/IEC 27002 Manager examination is to ensure that the candidate has the knowledge for implementing information

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 14001 Lead Implementer www.pecb.com The objective of the PECB Certified ISO 14001 Lead Implementer examination is to ensure that the candidate

More information

BHConsulting. Your trusted cybersecurity partner

BHConsulting. Your trusted cybersecurity partner Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 14001 Lead Auditor www.pecb.com The objective of the PECB Certified ISO 14001 Lead Auditor examination is to ensure that the candidate

More information

Predstavenie štandardu ISO/IEC 27005

Predstavenie štandardu ISO/IEC 27005 PERFORMANCE & TECHNOLOGY - IT ADVISORY Predstavenie štandardu ISO/IEC 27005 ISMS Risk Management 16.02.2011 ADVISORY KPMG details KPMG is a global network of professional services firms providing audit,

More information

CAPM TRAINING EXAM PREPARATION TRAINING

CAPM TRAINING EXAM PREPARATION TRAINING CAPM TRAINING EXAM PREPARATION TRAINING WHAT IS CAPM? PMI s Certified Associate in Project Management (CAPM) is a valuable entry-level certification for the individual who aspire to become project manager.

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22301 Lead Implementer www.pecb.com The objective of the Certified ISO 22301 Lead Implementer examination is to ensure that the candidate

More information

ISO 27001:2013 certification

ISO 27001:2013 certification www.pwc.ch/cybersecurity ISO 27001:2013 certification Building confidence in your digital future Our approach to certification PwC offers a four-phase approach to help with your ISO 27001 project, using

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

"Charting the Course... ITIL 2011 Managing Across the Lifecycle ( MALC ) Course Summary

Charting the Course... ITIL 2011 Managing Across the Lifecycle ( MALC ) Course Summary Course Summary Description ITIL is a set of best practices guidance that has become a worldwide-adopted framework for IT Service Management by many Public & Private Organizations. Since early 1990, ITIL

More information

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager.

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. Course Outline CISM - Certified Information Security Manager 20 Nov 2017 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

IMPLEMENTATION COURSE (MODULE 1) (ISO 9001:2008 AVAILABLE ON REQUEST)

IMPLEMENTATION COURSE (MODULE 1) (ISO 9001:2008 AVAILABLE ON REQUEST) ISO 9001:2015 IMPLEMENTATION COURSE (MODULE 1) (ISO 9001:2008 AVAILABLE ON REQUEST) COURSE DURATION: 3 DAYS Course Summary: The implementation course provides the participant with an in-depth level of

More information

A guide to CompTIA training and certification DDLS Australia Pty Ltd

A guide to CompTIA training and certification DDLS Australia Pty Ltd A guide to CompTIA training and certification 1 DDLS DDLS is an accredited CompTIA training organisation, offering the courses needed to establish CompTIA A+, Linux+, Network+, and Security+. DDLS can

More information

What is BS 7799? BS 7799 is the most influential, globally recognised standard for information security management.

What is BS 7799? BS 7799 is the most influential, globally recognised standard for information security management. What is BS 7799? BS 7799 is the most influential, globally recognised standard for information security management. It is currently divided into two parts: Part 1. Contains guidance and explanatory information

More information

POSITION DESCRIPTION

POSITION DESCRIPTION UNCLASSIFIED IT Security Certification Assessor POSITION DESCRIPTION Unit, Directorate: Location: IT & Physical Security, Protective Security Wellington Salary range: H $77,711 - $116,567 Purpose of position:

More information

CompTIA IT Fundamentals:

CompTIA IT Fundamentals: CompTIA IT Fundamentals: The IT Fundamentals certification is ideal for you if you re considering a career in IT or if you work in an allied field that requires a broad understanding of IT, like in a sales

More information

Application for Certification

Application for Certification Application for Certification Requirements to Become a Certified Information Security Manager To become a Certified Information Security Manager (CISM), an applicant must: 1. Score a passing grade on the

More information

Practitioner Certificate in Business Continuity Management (PCBCM) Course Description. 10 th December, 2015 Version 2.0

Practitioner Certificate in Business Continuity Management (PCBCM) Course Description. 10 th December, 2015 Version 2.0 Practitioner Certificate in Business Continuity Management (PCBCM) Course Description 10 th December, 2015 Version 2.0 Course The Practitioner Certificate in Business Continuity Management (PCBCM) course

More information

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. 22 Mar

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. 22 Mar Course Outline CISM - Certified Information Security Manager 22 Mar 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 27006 Second edition 2011-12-01 Information technology Security techniques Requirements for bodies providing audit and certification of information security management systems

More information

COURSE BROCHURE. COBIT5 FOUNDATION Training & Certification

COURSE BROCHURE. COBIT5 FOUNDATION Training & Certification COURSE BROCHURE COBIT5 FOUNDATION Training & Certification What is COBIT5? COBIT 5 (Control Objectives for Information and Related Technology) is an international open standard that defines requirements

More information

THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER INFORMATION PACK

THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER INFORMATION PACK GAIN RECOGNITION AS AN APPROVED PROVIDER UNDER ISO/IEC 17024 AND JOIN OUR NETWORK OF TRUSTED PROVIDERS THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER

More information

EU General Data Protection Regulation (GDPR) Achieving compliance

EU General Data Protection Regulation (GDPR) Achieving compliance EU General Data Protection Regulation (GDPR) Achieving compliance GDPR enhancing data protection and privacy The new EU General Data Protection Regulation (GDPR) will apply across all EU member states,

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO/IEC 17025 Lead Auditor The objective of the PECB Certified ISO/IEC 17025 Lead Auditor examination is to ensure that the candidate possesses the needed expertise

More information

BRING EXPERT TRAINING TO YOUR WORKPLACE.

BRING EXPERT TRAINING TO YOUR WORKPLACE. BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

Security Management Models And Practices Feb 5, 2008

Security Management Models And Practices Feb 5, 2008 TEL2813/IS2820 Security Management Security Management Models And Practices Feb 5, 2008 Objectives Overview basic standards and best practices Overview of ISO 17799 Overview of NIST SP documents related

More information

With the successful completion of this course the participant will be able to:

With the successful completion of this course the participant will be able to: ISO 13485:2016 INTRODUCTION COURSE COURSE DURATION: 1 DAY Course Summary: The introduction course provides the participant with an oversight on the requirements of ISO 13485:2016 standard. Our course is

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified OHSAS 18001 Lead Auditor www.pecb.com The objective of the PECB Certified OHSAS 18001 Lead Auditor examination is to ensure that the candidate

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

Certified Cyber Security Specialist

Certified Cyber Security Specialist Certified Cyber Security Specialist Page 1 of 7 Why Attend This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cyber security to internal

More information

CERTIFICATION TRAINING - ISC2

CERTIFICATION TRAINING - ISC2 MERIT CLASSES The Michigan Cyber Range features a cybersecurity education experience based upon the National Institute of Standards and Technology National Initiative for Cybersecurity Education (NICE).

More information

TIPA Lead Assessor for ITIL

TIPA Lead Assessor for ITIL TIPA Lead Assessor for ITIL Course Syllabus Fifalde Consulting Inc. +1-613-699-3005 ITIL is a Registered Trade Mark of the Office of Government Commerce in the United Kingdom and other countries 2017 Fifalde

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22000 Lead Implementer www.pecb.com The objective of the Certified ISO 22000 Lead Implementer examination is to ensure that the candidate

More information

Position Description IT Auditor

Position Description IT Auditor Position Title IT Auditor Position Number Portfolio Performance and IT Audit Location Victoria Supervisor s Title IT Audit Director Travel Required Yes FOR OAG HR USE ONLY: Approved Classification or Leadership

More information

An Overview of ISO/IEC family of Information Security Management System Standards

An Overview of ISO/IEC family of Information Security Management System Standards What is ISO/IEC 27001? The ISO/IEC 27001 standard, published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), is known as Information

More information

Cyber, Information Security, and Data Protection

Cyber, Information Security, and Data Protection Cyber, Information Security, and Data Protection The past, the present, and th e future 15th, 16th & 17th October 2018 Muscat - Oman Intellectual Events And Conferences Private Limited For more information

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 9001 Lead Auditor www.pecb.com The objective of the PECB Certified ISO 9001 Lead Auditor examination is to ensure that the candidate possesses

More information

ROLE DESCRIPTION IT SPECIALIST

ROLE DESCRIPTION IT SPECIALIST ROLE DESCRIPTION IT SPECIALIST JOB IDENTIFICATION Job Title: Job Grade: Department: Location Reporting Line (This structure reports to?) Full-time/Part-time/Contract: IT Specialist D1 Finance INSETA Head

More information

ITIL Managing Across the Lifecycle Course

ITIL Managing Across the Lifecycle Course ITIL Managing Across the Lifecycle Course Duration: 5 Days Course Delivery: Classroom Language: English Course Overview ITIL 2011 edition is comprised of five core publications: Service Strategy, Service

More information

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1 EC-Council Certified Incident Handler v2 Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1 THE CRITICAL NATURE OF INCIDENT HANDLING READINESS An organized and

More information

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And

More information

Sage Data Security Services Directory

Sage Data Security Services Directory Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time

More information

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 ISO / IEC 27001:2005 A brief introduction Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 Information Information is an asset which, like other important business assets, has value

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO/IEC 20000 Lead Auditor www.pecb.com The objective of the Certified ISO/IEC 20000 Lead Auditor examination is to ensure that the candidate

More information

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT) DESIGNATION Reporting to Division Office Location IT MANAGER PERMANENT SALARY SCALE: P07 (R806 593.00) Ref:AgriS042/2019 Information Technology Manager CEO Information Technology (IT) Head office JOB PURPOSE

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

ITIL 2011 Overview - 1 Day (English and French)

ITIL 2011 Overview - 1 Day (English and French) ITIL 2011 Overview - 1 Day (English and French) Course Overview ITIL is a set of best practices guidance that has become a worldwide-adopted framework for IT Service Management (ITSM) by many Public &

More information

Securing Your Digital Transformation

Securing Your Digital Transformation Securing Your Digital Transformation Security Consulting Managed Security Leveraging experienced, senior experts to help define and communicate risk and security program strategy using real-world data,

More information

IT123: SABSA Foundation Training

IT123: SABSA Foundation Training IT123: SABSA Foundation Training IT123 Rev.002 CMCT COURSE OUTLINE Page 1 of 8 Training Description: SABSA is the world s leading open security architecture framework and methodology. SABSA is a top-tobottom

More information

COURSE BROCHURE. ITIL - Expert Managing Across Lifecycle Training & Certification

COURSE BROCHURE. ITIL - Expert Managing Across Lifecycle Training & Certification COURSE BROCHURE ITIL - Expert Managing Across Lifecycle Training & Certification What is ITIL MALC? This ITIL training course brings together the full essence of a Lifecycle approach to service management,

More information

FAQs- BCS delivery of ISQTB Advanced level exams and the withdrawal of ISEB Test Analysis Practitioner and ISEB Test Manager Practitioner (March 2011)

FAQs- BCS delivery of ISQTB Advanced level exams and the withdrawal of ISEB Test Analysis Practitioner and ISEB Test Manager Practitioner (March 2011) FAQs- BCS delivery of ISQTB Advanced level exams and the withdrawal of ISEB Test Analysis Practitioner and ISEB Test Manager Practitioner (March 2011) At BCS, The Chartered Institute for IT, we strive

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information