CSX Fundamentals Workshop
|
|
- Caroline Barker
- 5 years ago
- Views:
Transcription
1 CSX Fundamentals Workshop December 2017 Final registration 1 December 2017 Offered by In association with ISACA Athens Chapter has been awarded four times as Best Large Chapter in Europe/Africa (2009, 2012, 2013, 2014)
2 Contents 1. Introduction 1. Introduction 1 2. Scope 1 3. Who should attend? 1 4. Why attend 2 5. Where? When? Who will be the Trainer? 2 6. What will you learn? 2 7. Course Summary 3 8. Registration Process 4 9. Frequently Asked Questions Travelling Information 6 Cybersecurity is a growing and rapidly changing field, and it is crucial that the central concepts that frame and define this increasingly pervasive field are understood by professionals who are involved and concerned with the security implications of Information Technologies (IT). Cybersecurity Nexus (CSX) is a new platform for security knowledge and a professional development and certification program in cybersecurity. Launched by ISACA, CSX provides IT security and cybersecurity professionals with the knowledge and technical skills to defend their organization from security breaches and cyber-attacks. A key part of Cybersecurity Nexus is its training workshops and innovative certification tracks. ISACA International notes that while other cyber security certifications assess knowledge in a question-and-answer format, CSX training and exams are conducted in a live, virtual cyber lab environment and test on whether an individual has the skills and technical savvy to do the job. The Certification Tracks CSX certifications are designed to test a candidate s ability to perform tasks of various degrees of complexity within 5 cybersecurity areas: identify protect detect respond recover. This new cybersecurity path begins with the CSX Fundamentals Certificate, which offers a knowledge-based credential on the introductory concepts that frame and define the standards, guidelines and practices of the industry. It also provides insight into the importance of cybersecurity and the integral role of cybersecurity professionals. The next 4 levels of CSX Certifications are based on the knowledge and concepts covered in the CSX Fundamentals Certificate but test competencies in scenarios that become more complex and sophisticated the higher the level. The CSX Fundamentals workshop is offered for the second time in Greece, after the quick sold out of the first course which was held, last November. The course is offered exclusively in Greece by ISACA Athens Chapter with the support of the Hellenic American Union. 2. Scope of the course This workshop is geared toward IT security professionals new to cyber security, recent graduates in IT-relevant fields, and IT professionals looking for a career change to cybersecurity. It prepares you for the CSX Fundamentals Exam covering the foundational areas of cyber security: Cybersecurity objectives and roles The difference between cybersecurity and information security The Principles of Cybersecurity Information Security within Lifecycle management Risks and Vulnerabilities Incident Response 2 ISACA Athens Chapter CSX Fundamentals Workshops
3 3. Who should attend? IT security professionals new to cybersecurity, IT oriented graduates and those IT professionals looking for a career change to cybersecurity. 4. Why attend? By the end of the course you will: Understand basic cybersecurity concepts and definitions Define network security architecture concepts Recognize malware analysis concepts and methodology Identify computer network defense (CND) and vulnerability assessment tools, including open source tools and their capabilities Explain network systems management principles, models, methods, and tools Distinguish system and application security threats and vulnerabilities Classify types of incidents (categories, responses, and timelines for responses) Outline disaster recovery and business continuity planning Comprehend incident response and handling methodologies Understand security event correlation tools, and how different file types can be used for a typical behavior Be aware of the basic concepts, practices, tools, tactics, techniques, and procedures for processing digital forensic data Recognize new and emerging information technology and information security technologies 5. Where? When? Who will be the Trainer? The course will be held at the Hellenic American Union Conference Center, Massalias 22, Athens, on 8-9 December 2017 (Friday, Saturday), from 9.00 to Course leader: Iro Hatzopoulou, CISA, HISP, CCSK, ISEB BCM, CSA STAR Auditor, P2, CSX (F) Iro has graduated from the Aristotle University of Thessaloniki where she participated in projects, at both under- and post- graduate level, of molecular modeling of materials using computer programs. Holds two Master s Degrees the first one in Physics of Materials and the second in Informatics with specialization on Evaluation of Security in Cloud Computing. During her professional carrier she has been employed by some IT oriented companies as IT professional member of the IT Dpt, as Network Responsible, as Security officer and others. Apart from the above, since 2001 she has been an Instructor of various IT related courses. From 2004 till today, she has been a member of the International Certification Body TUV AUSTRIA HELLAS, subsidiary of the TUV AUSTRIA group. She is an active Senior auditor for Management Audits in the fields of Information Security, IT Service Management, Business Continuity, Quality and Quality in Education and an instructor in various specialized topics. ISACA Athens Chapter CSX Fundamentals Workshops 3
4 6. What will you learn? Cybersecurity introduction and overview Cybersecurity architecture principles Cybersecurity definition Objectives of cybersecurity Key business and technology factors Cybersecurity roles and governance Domains of cybersecurity Cybersecurity concepts Risk management terms, concepts and frameworks Common attack types and vectors General process and attributes of cyber attacks Malware Framework and guidance for policies and procedures Cybersecurity control processes Security architecture Perimeter security concepts Security architectures and frameworks The OSI model and TCP/IP communication protocol Defense in depth Firewall concepts and implementations Isolation and segmentation Intrusion detection and prevention systems Antivirus and anti-malware Encryption fundamentals, techniques and applications Security of networks, systems, applications and data Risk analysis, risk assessments and risk mitigation strategies Scanning, assessment and management of vulnerabilities Penetration testing Network management and configuration Port numbers and protocols Risk and controls for remote and wireless access System hardening and virtualization Specialized systems Command line knowledge and tools System development life cycle (SDLC) OWASP top ten application security risk Data classification process and requirements Incident response Distinctions between events and incidents Incident categories and types Security event management Key elements of incident response plans Legal requirements of investigation and evidence preservation Requirements for forensic investigations Business continuity planning and disaster recovery The security implications of the adoption of emerging technologies Trends in the current threat landscape Characteristics and targets of advanced persistent threats (APTs) Mobile device vulnerabilities, threats and risk BYOD and consumerization of IT and mobile devices Risk and benefits of cloud and digital collaboration 4 ISACA Athens Chapter CSX Fundamentals Workshops
5 7. Course Summary Prerequisites Fundamental concepts of IT Security, IT academic background CPEs 16 Languages Greek Planning 8-9 December 2017 (Friday, Saturday), Cost STANDARD RATE 350 per participant for ISACA member 450 per participant for non-isaca member Unemployed ISACA members: 200 per participant Special price sponsored by Isaca Athens Chapter Cost includes course material Cost does not include exam fees This program is subsidized by LAEK/OAED 0,24% (for participants from Greek companies only) Registration fees to be paid until 1 December ISACA Athens Chapter CSX Fundamentals Workshops 5
6 8. Registration Process Step 1 Step 2 Step 3 Fill in the registration form at the end of this document and send it to Hellenic American Union by following the respective guidelines below the registration form. Hellenic American Union will send a registration confirmation receipt via . Send payment amount to Hellenic American Union by following the payment details on the registration form at the end of this document. For bank transfer information please contact the Hellenic American Union. We will send you bank transfer information once we receive your registration form. Please always quote the invoice number which you will receive once you have registered, or alternatively please quote your company s name or the delegates name in the transfer instructions. Step 4 The amount to be credited should be net of commissions. Any commissions/fees for bank deposits or transfers are payable by participants. You will receive a course registration invoice from Hellenic American Union after we receive your payment. Payments: All registrations & payments must be received by the Hellenic American Union the latest by 1 December Invoices are issued by the Hellenic American Union. Cancellations/Substitutions must be made via and sent to training@hau.gr. A full refund can be given for cancellation requests received in writing 10 working days before the course commencement. No refund will be given for cancellation requests after this deadline. A replacement is always welcome at no extra cost! 6 ISACA Athens Chapter CSX Fundamentals Workshops
7 9. Frequently Asked Questions When is the CSX Fundamentals exam? Is there one combined registration process for the CSX exam and the ISACA Athens Chapter s CSX Fundamentals Course? Is attending this ISACA CSX Fundamentals sufficient enough for me to pass this exam successfully The Cybersecurity Fundamentals Certificate exam is available online, at your convenience. Simply schedule the date and time that works best for you and your exam will be remotely proctored. No, there are two separate registration processes because the exam is administered by ISACA International. One registration combining both CSX exam fees and CSX Fundamentals course fees is not possible. Yes What is the date of the next CSX Fundamentals course? Are there any special fees for unemployed members of ISACA Athens Chapter for this course? ISACA Athens Chapter will only run 2 CSX Fundamental Courses each year. Next course dates will be announced after the successful completion of this course. Yes, please refer to the registration form. ISACA Athens Chapter CSX Fundamentals Workshops 7
8 10. Travel Information Accommodation - Recommended hotel For those travelling to Athens or from abroad and need accommodation, we recommend Titania hotel ( In order to take advantage of special rates, please contact Ms Vasiliki Zafiri ( , vzafiri@hau.gr) at the Hellenic American Union. Transportation arrangements We highly recommend using our excellent Athens public transportation (metro). You need to validate your paper ticket at the beginning of your journey. Intergrated tickets (as well as Metro airport tickets) are valid for 90 minutes so you don t need to validate it again if you use another mode of transportation anywhere in Athens within 90 minutes of the first validation. Ticket price is 8 (one way) or 14 (for 2 journeys return ticket). One way ticket for 2 persons is 14 and for 3 persons is 20. Getting to/from the Athens International Airport and the city center, located about 36 km east can be achieved via metro: Take the Blue line (line 3 direction Anthoupoli ) of the metro from Athens International Airport and get off at Syntagma station. Trains run every 30 minutes, 7 days a week from 6:30 a.m. to 11:30 p.m. The trip from/to the Airport to Syntagma metro station (Athens center) lasts 40 minutes. See the Metro timetable to the airport here and also an Athens airport railway station map. For ticket info see Athens Transport tickets and cards. 8 ISACA Athens Chapter CSX Fundamentals Workshops
9 From Syntagma metro station you can: a. either change and take the Red line (line 2 direction Anthoupoli) in order to get off at next stop, Panepistimio metro station (exit National Library) and walk approximately 4-5 minutes towards Omonia square to Titania Hotel (it is just on your right hand side). b. Walk from Syntagma Square to Titania Hotel through Panepistimiou street (it is approximately minutes walk) Red route: from metro Syntagma Station (circled A) and Panepistimio Station (circle) to Hotel (B) and venue (C) Blue route: alternative route from Hotel (B) to venue (C) On last evening at the end of the Exam Preparation Course (at 17:00), you can take the metro from Syntagma directly to the airport. Alternatives: a. By Bus (map: From the Airport take Bus Line X95 Syntagma Athens Airport Express (Orange Line). From Syntagma Square you can either take the Metro (see above) or walk to Titania Hotel. You can also take a bus (most of them are passing by in front of the hotel, while some stop right in front of the hotel). b. By Taxi (Flat fare: 35 Euros) c. By Car (36 km, minutes depending however on traffic) Via Attiki Odos, route 6/Ε94, 31,6 km, 35 min Via Mesogeion Avenue, 20,8 km, 34 min Via Route 64, 26 km, 34 min ISACA Athens Chapter CSX Fundamentals Workshops 9
10 Registration Form I wish to register for the CSX Fundamentals Workshop, 8-9 December Please send this registration form to Hellenic American Union fax nr. (30) , or at training@hau.gr. Registration Fees Isaca Members Non Members Unemployed ISACA members Special price sponsored by Isaca Athens Chapter 350 q 450 q 200 q q I wish to register the workshop for the 0,24 OAED-LAEK subsidy program In order to guarantee a place on the course and the exams, delegates are kindly requested to register until the 1st December PERSONAL DETAILS (Please print clearly) (*mandatory fields for individual registrations only) Family Name First Name Company Position/Title Home address* (individual/personal registrations only) City* Postal Code* Tel* Fax Ε-mail Tax ID Nr./Tax Registration Office* (for individual registrations only) INVOICE DETAILS (all fields are mandatory for company registrations) COMPANY NAME Area of Business Address City Postal Code Tel Fax Tax ID Nr. Tax Registration Office I/We understand and accept the registration and cancellation policies and procedures, and the protection of personal and credit card data policy. Signature/Company stamp Date PAYMENT DETAILS Payments are made to the Hellenic American Union immediately upon registration. Once the Hellenic American Union receives the registration form, we will send you confirmation and payment transfer information. PAYMENT METHOD q Please invoice my company ** For bank transfer information please contact the Hellenic American Union. We will send you bank transfer information Bank Transfer** q VISA q MASTERCARD q once we receive your registration form. Please always quote the invoice number which you will receive once you have registered, or alternatively please quote your company s name or the delegates name in the transfer instructions. An invoice will be sent upon receipt of payment. CANCELLATION POLICY A full refund will be given for cancellations requests received in writing up to 10 working days prior the course starts. Cancellations received within less than 10 working days before the course will not be refunded. A replacement is always welcome. Disclaimer: ISACA Athens Chapter and Hellenic American Union reserve the right to change or cancel any part of the published program due to unforeseen circumstances. In case the event is cancelled, registration fees will be returned in full to the delegates. The Hellenic American Union collects and uses personal information in order to communicate with the members of its public, to provide educational and cultural programs and services, and to improve the quality of services that it offers. The information we have requested in this form will be maintained in digital and/or physical form and used only for the purposes described above. You have the right to reasonable access to the personal information we have on you, to request a copy of this information, and to correct it if inaccurate. To find out more, contact the Hellenic American Union at privacy@hau.gr. In association with * * A recognized Center for Lifelong Learning (ΚεΔιΒιΜ2) that has been granted a license of operation by the National Organization for the Certification of Qualifications and Vocational Guidance (EOPPEP)
11 Information ISACA Athens Chapter For membership please contact: For certifications please contact: LinkedIn Group: ISACA Athens Chapter Twitter: isaca_gr Facebook: ISACA Athens Chapter For further information about the preparation course, please contact: Ηellenic American Union Tel: , Fax: , or ISACA Athens Chapter
CISM Prep Course 2015
CISM Prep Course 2015 20-22 April 2015 Early registration 23 March 2015 Final registration 6 April 2015 Offered by In association with ISACA Athens Chapter has been awarded four times as Best Large Chapter
More informationCISA Prep Course 2017
CISA Prep Course 2017 13-15 November 2017 Final registration 6 November 2017 Offered by In association with ISACA Athens Chapter has been awarded four times as Best Large Chapter in Europe/Africa (2009,
More informationCISM Prep Course 2018
CISM Prep Course 2018 31 May - 2 June 2018 Early registration 27 April 2018 Final registration 23 May 2018 Offered by In association with ISACA Athens Chapter has been awarded four times as Best Large
More informationCISA Prep Course 2016
CISA Prep Course 2016 11-13 April 2016 Early registration 30 March 2016 Final registration 4 April 2016 Offered by In association with ISACA Athens Chapter has been awarded four times as Best Large Chapter
More informationCYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD
CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD December 2014 KEVIN GROOM ISACA Involvement (Middle Tennessee Chapter) Treasurer (2009 2011) Vice President (2011 2013) President (2013 present)
More informationINFORMATION SYSTEMS AUDITOR EXAM PREPARATION COURSE NICOSIA LIVE ON-LINE. 1 P a g e
CERTIFIED INFORMATION SYSTEMS AUDITOR EXAM PREPARATION COURSE NICOSIA LIVE ON-LINE 1 P a g e COURSE DESCRIPTION The Certified Information Systems Auditor () is a world renowned accreditation awarded by
More informationEnglish for International Business Communication
English for International Business Communication Your survival kit for business interaction hellenic american union Massalias 22, 106 80 Athens, T.: 210 36 80 900, F.: 210 3633174 e-mail: hau@hau.gr, http://www.hau.gr
More informationWorkshop description
Workshop description COBIT5 for Assurance With information and technology at the heart of creating value for enterprises, it is more important than ever for organizations to optimize their IT assurance
More informationEnglish for International Business Communication. Your survival kit for business interaction
English for International Business Communication Your survival kit for business interaction This interactive, 60-hour program helps you develop confidence and sophistication in the use of English when
More informationCYBERSECURITY NEXUSTM (CSX) The Premier Source For Cyber Security Knowledge and Expertise
CYBERSECURITY NEXUSTM (CSX) The Premier Source For Cyber Security Knowledge and Expertise In enterprise IT, there is a single point where everything that matters in information, technology and business
More informationROJECT ANAGEMENT PROGRAM AND COURSE GUIDE
ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE PROJECT MANAGEMENT CERTIFICATE PROGRAM Further your career and gain an understanding of what it takes to lead a project to successful completion functional skills,
More informationISACA MOSCOW CHAPTER Chapter meeting 22 September 2016
ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,
More informationCISA Training.
CISA Training www.austech.edu.au WHAT IS CISA TRAINING? The CISA, Certified Information Systems Auditor, is a professional designation which provides great benefits and increased influence for an individual
More informationTraining Opportunities
July September 2014 Training Opportunities Meeting Your Training Needs and CPE Requirements Group-Live Course Group Internet-Based Course To learn more or register for any of these events, visit www.gfoa.org.
More informationBRING EXPERT TRAINING TO YOUR WORKPLACE.
BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique
More informationProgram Management Professionals (PgMP)
An ISO 9001:2015 & ISO 29990:2010 Certified Company PgMP and PMI are registered marks of the Project of the Project Management Institute Inc. Program Management Examination Preparatory Course 02-06 December
More informationRISK BASED INTERNAL AUDIT (16 CPE) COSO ERM Framework - Risk Assessment Process
RISK BASED INTERNAL AUDIT (16 CPE) COSO ERM Framework - Risk Assessment Process Date 24-25 September 2018 Time: 09:00 17:00 Location Hotel Grand, Tirana, Albania Course director: Mr. Konstantinos P. Triantafyllidis,
More informationMaster the implementation and management of a Cybersecurity Program based on ISO/IEC 27032
ISO/IEC 27032 Lead Manager 23rd - 27th October 2017 Hilton Hotel, Sandton, Johannesburg Master the implementation and management of a Program based on ISO/IEC 27032 Why should you attend? Manager training
More informationEffective COBIT Learning Solutions Information package Corporate customers
Effective COBIT Learning Solutions Information package Corporate customers Thank you f o r y o u r interest Thank you for showing interest in COBIT learning solutions from ITpreneurs. This document provides
More informationCOURSE BROCHURE CISA TRAINING
COURSE BROCHURE CISA TRAINING What is CISA? The CISA, Certified Information Systems Auditor, is a professional designation which provides great benefits and increased influence for an individual within
More informationISACA Enterprise. Solutions and Resources
ISACA Enterprise Solutions and Resources About ISACA Global association serving 140,000 members and certification holders Members in 180+ countries; 210+ chapters worldwide Developed and maintains the
More informationFOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY
FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY The Foundation Certificate in Information Security (FCIS) course is designed to provide
More informationCybersecurity Auditing in an Unsecure World
About This Course Cybersecurity Auditing in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that cybersecurity
More informationProgram Management Professionals (PgMP)
An ISO 9001:2015 & ISO 29990:2010 Certified Company Program Management 10-14 Dec 2017 Dubai, United Arab Emirates 27-JUN-17 Program Management Why Choose this Training Course? Program management is the
More informationTÜV Rheinland Functional Safety Program
IICA Functional Safety Engineer Training Safety Instrumented Systems TÜV Rheinland Functional Safety Program IICA Functional Safety Engineer SIS Training TÜV Rheinland Functional Safety Program The IICA
More informationCompTIA Cybersecurity Analyst+
CompTIA Cybersecurity Analyst+ Course CT-04 Five days Instructor-Led, Hands-on Introduction This five-day, instructor-led course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity
More informationISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard
Certification Exam Outline Effective Date: April 2013 About CISSP-ISSMP The Information Systems Security Management Professional (ISSMP) is a CISSP who specializes in establishing, presenting, and governing
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationCYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018
CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationEnglish for International Business Communication
Registration Procedures INDIVIDUAL PARTICIPATION On-line: You can enroll by clicking the Buy Online tab at the top of the course description page. You will be asked to login to proceed. You need a valid
More informationIT Audit Essentials. Date: 10 th 12 th March 2015 Time: 9 am to 5.30 pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur
IT Audit Essentials Date: 10 th 12 th March 2015 Time: 9 am to 5.30 pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur IT Audit Essentials Workshop Overview ISACA Malaysia Chapter is
More informationThe fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with RP6, is presenting the SANS VetSuccess CyberTalent Immersion
More informationNetwork Security
44-555 Network Security Instructor: Scott Bell Office: 2220 Colden Hall Email: sbell@nwmissouri.edu Phone: (660) 562-1699 Description: An introduction to the fundamentals of network security, including
More informationCOURSES LEADING TO THE BCS CERTIFICATE IN INFORMATION SECURITY MANAGEMENT PRINCIPLES (CISMP)
COURSES LEADING TO THE BCS CERTIFICATE IN INFORMATION SECURITY MANAGEMENT PRINCIPLES (CISMP) CISMP FROM AMBERHAWK TRAINING LIMITED MAY 2017 CERTIFICATE IN INFORMATION SECURITY MANAGEMENT PRINCIPLES (CISMP)
More informationThe fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in the DC Metro area. For transitioning
More informationraining Meeting your training needs and CPE requirements opportunities July-September Group-Live Course Group Internet- Based Course
Meeting your training needs and CPE requirements T raining opportunities July-September 2015 Group-Live Course Group Internet- Based Course To learn more or register for any of these events, visit www.gfoa.org
More informationTRAINING DAYS 2017 Using the ISA/IEC Standards to Secure Your Control Systems (IC32) Milan, July 3th 4th
TRAINING DAYS 2017 Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32) Milan, July 3th 4th DESCRIPTION The move to using open standards such as Ethernet, TCP/IP, and web technologies
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationOperations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ
Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016
More informationEC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led
EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,
More information"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary
Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business
More informationThe Project Management Professional (PMP) Examination Preparatory Course
An ISO 9001:2015 & ISO 29990:2010 Certified Company This course is registered with the Project Management Institute (PMI) R.E.P. Program* The Project Management Professional (PMP) 17-21 Sep 2017 Dubai,
More informationOctober 21-23, 2013 Holly Springs, NC
NEBB s Cleanroom Performance Testing Certified Professional Seminar and Exam October 21-23, 2013 Holly Springs, NC Introduction: NEBB, in continuance of its policy to enhance education and training within
More informationProfessional Evaluation and Certification Board Frequently Asked Questions
Professional Evaluation and Certification Board Frequently Asked Questions 1. About PECB... 2 2. General... 2 3. PECB Official Training Courses... 4 4. Course Registration... 5 5. Certification... 5 6.
More informationEC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1
EC-Council Certified Incident Handler v2 Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1 THE CRITICAL NATURE OF INCIDENT HANDLING READINESS An organized and
More informationraining Meeting your training needs and CPE requirements opportunities April-June Group-Live Course Group Internet- Based Course
Meeting your training needs and CPE requirements T raining opportunities April-June 2018 Group-Live Course Group Internet- Based Course To learn more or register for any of these events, visit www.gfoa.org
More informationPECB Certified ISO/IEC Lead Auditor
When Recognition Matters Lead Auditor 25-29 March 2018 Master the Audit of Rainbow Towers Hotel, Harare Systems (ISMS) based on $1250.00 Who should attend? - Auditors seeking to perform and lead System
More informationBECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW
BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME AN ISACA MEMBER TODAY. Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential
More informationAVIATION CYBER SECURITY TRAINING
AVIATION CYBER SECURITY TRAINING STANDARDS IN PRACTICE -DAY TRAINING COURSE ED-0 ED-0A ED-0 ED-04 ED-0 - Aeronautical Information System Security (AISS) Framework Guidance ED-0A - Airworthiness Security
More informationInformation Security Controls Policy
Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January
More informationCyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security
CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research
More informationCertified Cyber Security Specialist
Certified Cyber Security Specialist Page 1 of 7 Why Attend This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cyber security to internal
More informationInformation Security Officer (ISO) Education
Information Security Officer (ISO) Education October 16, 2018 TBA Barrett Training Center Nashville, Tenn. Information Security Officer (ISO) Education October 16, 2018 TBA Barrett Training Center Nashville,
More informationPMP Exam Preparation Training in Dubai. The Project Management Professional (PMP) September 2018 Dubai, United Arab Emirates
An ISO 9001:2015 & ISO 29990:2010 Certified Company 17-SEP-17 The PMI Registered Education Provider logo and PMP are registered marks of the Project Management Institute, Inc. PMP Exam Preparation The
More informationRadware. Training Policies V001.70
Radware Training Policies V001.70 TABLE OF CONTENTS SCOPE & DISCLAIMER...3 QUESTIONS?...3 TRAINING...4 OVERVIEW... 4 DELIVERY OPTIONS... 4 TRAINING ENROLLMENT & REGISTRATION... 5 COURSE EVALUATION... 5
More information1 st Annual Meeting for Abacus Latin America Members
1 st Annual Meeting for Abacus Latin America Members March 14-15, 2019 Hilton Garden Inn Montevideo, Uruguay The Meeting Abacus Worldwide brings firms together on a global scale but our Regional Meetings
More informationPMP Certification Preparatory Course
PMP Certification Preparatory Course Client Relation Officer Ewa Kazimierczuk Tel. 508 018 380 ewa.kazimierczuk@pl.ey.com Dates: Warszawa, 8-10 October 2018 5-6 November 2018 Price: 5000 PLN net or 1140
More informationCybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016
Cybersecurity: Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda Key Risks Incorporating Internal Audit Resources Questions 2 San Francisco
More information2 nd Annual Meeting for Abacus North America Members
2 nd Annual Meeting for Abacus North America Members April 30 May 1, 2019 The Ritz-Carlton Atlanta Atlanta, Georgia USA The Meeting Abacus Worldwide brings firms together on a global scale but our Regional
More informationPMP Certification Preparatory Course
PMP Certification Preparatory Course Why Project Management Professional (PMP ) Certification? In today's flexible organization, the boundaries between functions are becoming less defined. You are most
More information2018 CALENDAR OF ACTIVITIES
2018 CALENDAR OF ACTIVITIES WHO WE ARE AND WHAT WE OFFER Ý Public Trainings Technical Sessions Reviews GMM Other Chapter Activities Conferences Professionals Night ISACA was incorporated by individuals
More informationGreen Building/LEED AP Building Design & Construction Exam Preparation
Green Building/LEED AP Building Design & Construction Exam Preparation Be among the first to master the new green building principles in the region February 16 17 and May 11 12, 2011 American University
More informationThe fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in San Diego. For transitioning
More informationCENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN
CENTRAL REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN TAKE THE STAGE Members: Register by Feb. 29 to save US$100. Take the Stage The IIA and IIA Nashville Chapter are excited to host the 2016 Central
More informationCMI QUALIFICATIONS IN MANAGEMENT & LEADERSHIP (LEVEL 3, 5 AND 7)
CMI QUALIFICATIONS IN MANAGEMENT & LEADERSHIP (LEVEL 3, 5 AND 7) GLOBAL REACH The BIBF plays a vital role in the training and human capital development in the region. The BIBF qualifies over 20,000 learners
More informationNISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions
NISTCSF.COM NIST Cybersecurity Framework (NCSF) Workforce Development Solutions AGENDA The Cybersecurity Threat Landscape The Cybersecurity Challenge NIST Cybersecurity Framework NICE Cybersecurity Workforce
More informationConfiguration, Installation, Commissioning, Troubleshooting, Operation & Maintenance
ISO 9001:2008 Certified ISO 29990:2010 Certified (Certificate No:1007049195) ISO 29990 (Certificate No: 1078694951) Foundation Fieldbus Troubleshooting, Operation & Maintenance 29 May - 02 June 2016 Muscat
More informationCCNA Cybersecurity Operations. Program Overview
Table of Contents 1. Introduction 2. Target Audience 3. Prerequisites 4. Target Certification 5. Curriculum Description 6. Curriculum Objectives 7. Virtual Machine Requirements 8. Course Outline 9. System
More informationCCNA Cybersecurity Operations 1.1 Scope and Sequence
CCNA Cybersecurity Operations 1.1 Scope and Sequence Last updated June 18, 2018 Introduction Today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding
More informationBecome a Certified Association Executive through the CAE Program
How do the fees work Each course in the CAE Program has a CSAE member and non-member rate. There is also a one-time materials fee applicable when registering for your first course. Full details and the
More informationQuickBooks Online Security White Paper July 2017
QuickBooks Online Security White Paper July 2017 Page 1 of 6 Introduction At Intuit QuickBooks Online (QBO), we consider the security of your information as well as your customers and employees data a
More informationWELCOME TO ISACA Claudio CILLI, CISA, CISM, CRISC, CGEIT
WELCOME TO ISACA 2015 Claudio CILLI, CISA, CISM, CRISC, CGEIT cilli@di.uniroma1.it http://dsi.uniroma1.it/~cilli WHO IS ISACA? ABOUT ISACA The trusted source of guidance, networking and career development
More informationCybersecurity Risk Mitigation: Protect Your Member Data. Introduction
Cybersecurity Risk Mitigation: Protect Your Member Data Presented by Matt Mitchell, CISSP Knowledge Consulting Group Introduction Matt Mitchell- Director Risk Assurance 17 years information security experience
More informationThe fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with Augusta Warrior Project and Augusta University, is presenting
More informationACCREDITED HEALTH & SAFETY SHORT COURSES
ACCREDITED HEALTH & SAFETY 2018 ACCREDITED HEALTH & SAFETY INTRODUCTION Our services benefit any organization dedicated to the development and enhancement of skills and knowledge through training. Frontline
More information2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager
2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager NIST Cybersecurity Framework (CSF) Executive Order 13636 Improving Critical Infrastructure Cybersecurity tasked the National
More informationCompTIA Cybersecurity Analyst+ (CySA+) Course Outline. CompTIA Cybersecurity Analyst+ (CySA+) 17 Sep 2018
Course Outline CompTIA Cybersecurity Analyst+ (CySA+) 17 Sep 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led
More informationApplication for Certification
Application for Certification Requirements to Become a Certified Information Security Manager To become a Certified Information Security Manager (CISM), an applicant must: 1. Score a passing grade on the
More informationIT Auditing and IT Fraud Detection
IT Auditing and IT Fraud Detection Page 1 of 7 Why Attend In today s world, IT fraud prevention and investigation have become an everyday part of corporate life and auditors must gain expertise in this
More informationSecurity by Default: Enabling Transformation Through Cyber Resilience
Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,
More informationC T I A CERTIFIED THREAT INTELLIGENCE ANALYST. EC-Council PROGRAM BROCHURE. Certified Threat Intelligence Analyst 1. Certified
EC-Council C T Certified I A Threat Intelligence Analyst CERTIFIED THREAT INTELLIGENCE ANALYST PROGRAM BROCHURE 1 Predictive Capabilities for Proactive Defense! Cyber threat incidents have taken a drastic
More informationThe fast track to top skills and top jobs in cyber. Guaranteed.
The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women
More informationraining Meeting your training needs and CPE requirements opportunities July-September Group-Live Course Group Internet- Based Course
Meeting your training needs and CPE requirements T raining opportunities July-September 2018 Group-Live Course Group Internet- Based Course To learn more or register for any of these events, visit www.gfoa.org
More informationCATALOG 2017/2018 BINUS UNIVERSITY. Cyber Security. Introduction. Vision. Mission
Cyber Security Introduction Cyber attack is raising and threaten ubiquitous world on internet today. Industry and government need cyber security expert to counter and defend from this threaten. Cyber Security
More informationDFARS Compliance. SLAIT Consulting SECURITY SERVICES. Mike D Arezzo Director of Security Services. SLAITCONSULTING.com
DFARS Compliance SLAIT Consulting SECURITY SERVICES Mike D Arezzo Director of Security Services Introduction 18+ year career in Information Technology and Security General Electric (GE) as Software Governance
More informationPosition Description IT Auditor
Position Title IT Auditor Position Number Portfolio Performance and IT Audit Location Victoria Supervisor s Title IT Audit Director Travel Required Yes FOR OAG HR USE ONLY: Approved Classification or Leadership
More information30 September - 3 October 2018* Kempinski Hotel, Mall of the Emirates, Dubai, UAE
30 September - 3 October 2018* OFFER 32 FOR Save up to $1000 by booking early! www.institutelm.com Who Should Attend? This cutting-edge course has been tailor made for professionals in the Middle East
More informationTechnology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited
Technology Risk Management in Banking Industry Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited Change in Threat Landscape 2 Problem & Threats faced by Banking Industry
More informationCCISO Blueprint v1. EC-Council
CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance
More informationISACA s CSX Cybersecurity Practitioner Certification CPE Policy Table of Contents
1 Table of Contents MAINTAINING YOUR CSX CYBERSECURITY PRACTITIONER CERTIFICATION... 3 CERTIFICATION REQUIREMENTS... 3 AUDITS OF CPE HOURS... 4 RECORDKEEPING... 4 QUALIFYING LEARNING ACTIVITIES... 4 NOTIFICATION
More informationOil & Gas Industry Quality Management System Auditor/ Lead Auditor Training
An Intensive 2-Week Training Course Oil & Gas Industry Quality Management System Auditor/ Lead Auditor Training 27 Oct - 07 Nov 2019, Dubai 24-OCT-18 This course is Designed, Developed, and will be Delivered
More informationCertification Council of Medical Auditors, Inc. Recertification Handbook
Certification Council of Medical Auditors, Inc. Recertification Handbook No part of this publication may be reproduced, transmitted, or copied by any means without the written permission of the Certification
More informationNetworking Fundamentals Training
Networking Fundamentals Training INNOVATIVE ACADEMY s Best Computer Networking Training in Bangalore is designed so Innovative to help you clear the Comp-TIA s N+ Certification. You will gain excellent
More informationraining Meeting your training needs and CPE requirements opportunities April-June Group-Live Course Group Internet- Based Course
Meeting your training needs and CPE requirements T raining opportunities April-June 2015 Group-Live Course Group Internet- Based Course To learn more or register for any of these events, visit www.gfoa.org
More informationMY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.
MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. TIMO HEIKKINEN, CISA, CGEIT SENIOR AUDIT SPECIALIST, NORDEA HELSINKI, FINLAND ISACA MEMBER SINCE 1999 ABOUT US BE MORE INFORMED, VALUED
More informationA Level ICT Transition Pack
Sawtry Village Academy Extended Certificate Level 3 in IT- Single Award Diploma Level 3 in IT Double Award A Level ICT Transition Pack A Level ICT- Skills for the real business world In today s world,
More informationASH Group Information and FAQ's
TABLE OF CONTENTS 1. WHAT DO THE BADGES LOOK LIKE?... 2 2. REGISTRATION TYPE DEFINITION... 2 3. WHAT IS A GROUP ADMINISTRATOR?... 2 4. HOW DO I SUBMIT MY GROUP S REGISTRATIONS?... 3 5. WHAT ARE THE REGISTRATION
More informationNEBB Basic Building Systems Commissioning Certified Professional Seminar and Exams
NEBB Basic Building Systems Commissioning Certified Professional Seminar and Exams March 19-22, 2014 Atlanta, GA INTRODUCTION Enrollment is limited. Available openings will be filled on a first come-first
More informationCASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)
CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001) Gregg, Michael ISBN-13: 9781118083192 Table of Contents Foreword xxi Introduction xxvii Assessment Test xliv Chapter 1 Cryptographic
More information