Information Security

CISA® is the world-renowned and most popular certification for professionals working in the field of IS audit and IT risk consulting. This is a tutor-led classroom course. Our CISA course is delivered in conjunction with NobleProg. This programme is an intense, very competitive and exam focused training course. With experience of delivering more than 150+ CISA trainings in Europe and around the world and training more than 1200+ CISA delegates, the Net Security CISA training material has been developed in house with the top priority of ensuring CISA delegates pass the ISACA CISA® examination first time.WHAT ARE THE BENEFITS? Delegates may have

READ MORE

ITIL®4 2019 is an evolution of IT best practices supporting service providers to remain relevant and indispensable for the businesses they serve through the co-creation of value.ITIL®4 provides an end-to-end framework through a holistic and balanced approach to service management while blending with other methodologies and approaches such as Agile, DevOps and Lean. This makes is a modern framework, in line with today’s requirements, in an era of digital transformation where IT is underpinning every other industry. ITIL®4 is vendor-independent and adds value anywhere IT is supporting a business irrespective of size or industry.WHO SHOULD ATTEND For: Individuals who require a basic understanding

READ MORE

This 2 day PECB ISO/IEC 27001 Foundation training allows you to learn the basic elements to implement and manage an Information Security Management System as specified in ISO/IEC 27001. During this training course, you will be able to understand the different modules of ISMS, including ISMS policy, procedures, performance measurements, management commitment, internal audit, management review and continual improvement. After completing this course, you can sit for the exam and apply for the “PECB Certified ISO/IEC 27001 Foundation” credential. A PECB Foundation Certificate shows that you have understood the fundamental methodologies, requirements, framework and management approach. Individuals involved in Information Security Management Individuals

READ MORE

ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001.During this training course, you will gain a thorough understanding of the best practices of Information Security Management Systems to secure the organisation`s sensitive information and improve the overall performance and effectiveness. After mastering all the necessary concepts of Information Security Management Systems, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Implementer” credential. By holding a PECB Lead Implementer Certificate, you will be able

READ MORE

ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques. During this training course, you will acquire the knowledge and skills to plan and carry out internal and external audits in compliance with the latest changes in ISO 19011:2018 and ISO/IEC 17021-1 certification process. Auditors seeking to perform and lead Information Security Management System (ISMS) certification audits Managers or consultants seeking to master an Information Security Management System audit process Individuals responsible for maintaining conformance with Information Security Management System

READ MORE

HOW SECURE IS YOUR INFORMATION AND DATA FROM CYBER ATTACKS? This course has been designed to communicate and convey a solid understanding of Information Security principles. More often than not, human behaviour is the weakest link in an organisation’s security framework. This is frequently the single most important weakness that attackers exploit to compromise an organisation’s systems.This course will go in depth about how to protect the data, your identity and how to detect suspicious activities. The course will also detail how good security practices can prevent the organisation from falling victim to cunning attacks.This course is ideal for anyone who

READ MORE