
Online or onsite, instructor-led live Information System Security (ISS) training courses demonstrate through interactive discussion and hands-on practice the fundamentals and advanced topics of Information System Security.
Information System Security training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live Information System Security training can be carried out locally on customer premises in the UK or in NobleProg corporate training centres in the UK.
NobleProg -- Your Local Training Provider
Testimonials
Martin was very knowledgeable and gave really good tips; he allowed plenty of time for discussion and allowing us to ask questions. It was really well delivered, even virtually which sometimes is a difficult medium to work with.
Kewal Rai - Knowledgepool Group Ltd
Course: Introduction to ISO27001
Knowledge of the trainer was excellent and delivered in an engaging manner
Richard Brown - KPMG LLP
Course: BCS Foundation Certificate in Information Security Management Principles (CISMP)
Not very much, it felt like the course was crammed into 3 days. This is not the trainers fault, but this course should have been over 4 or 5 days. Too much information to take in and to understand prior to taking an exam in the subject
KPMG LLP
Course: BCS Foundation Certificate in Information Security Management Principles (CISMP)
Great to have qualification as gives me the recognition of my work
KPMG LLP
Course: BCS Foundation Certificate in Information Security Management Principles (CISMP)
Trainer Knowledge - Thought his general knowledge on the subject was impressive.
Khadija Ukadia, KPMG LLP
Course: BCS Foundation Certificate in Information Security Management Principles (CISMP) 4 day
Nigel was very engaging with our group. The examples he used to make the material more relatable was extremely helpful
Erica McBride - Khadija Ukadia, KPMG LLP
Course: BCS Foundation Certificate in Information Security Management Principles (CISMP) 4 day
Nigel's mastery of the subject and his anecdotes (where they fitted into the subject matter) were great
Kevin Lazell - Khadija Ukadia, KPMG LLP
Course: BCS Foundation Certificate in Information Security Management Principles (CISMP) 4 day
The way examples were linked to the relevant sections. Good broad knowledge from trainer in ISO.
Andrew Bell - Khadija Ukadia, KPMG LLP
Course: ISO/IEC 27001 Foundation
The trainer style and engagement (and the slides and notes).
Khadija Ukadia, KPMG LLP
Course: ISO/IEC 27001 Foundation
John is very knowledgeable on the course subject.
Khadija Ukadia, KPMG LLP
Course: ISO/IEC 27001 Foundation
Trainer delivery and pace
Rachel Simmons - Khadija Ukadia, KPMG LLP
Course: ISO27001: 2013 Lead Auditor (certification course)
The training ran at exactly the right pace. I was concerned about it being virtual but I feel that it went really well. I particularly liked the structure of breaks etc which supported the learning experience. The instructor was clearly well informed and able to put learning in to context with real life experience
Sue Brocken - Khadija Ukadia, KPMG LLP
Course: ISO27001: 2013 Lead Auditor (certification course)
Subject content and instructor
Jas Paul Farmahan - Capita Business Services Ltd
Course: ISO27001: 2013 Lead Auditor (certification course)
The training was excellent, than you Ditmar.
Maria Gagliardi - EY Global Services (Poland) Sp. z o.o.
Course: CISSP - Certified Information Systems Security Professional
The overall training was beneficial and contain good topics to learn
ADNAR Group
Course: CISSP - Certified Information Systems Security Professional
Instructor was well versed in the subject matter and was able to explain the content in detail.
Crunchyroll
Course: Certified Information System Security Professional (CISSP) CBK Review
Complementary knowledge
Crunchyroll
Course: Certified Information System Security Professional (CISSP) CBK Review
in-depth knowledge about the subject of the trainer, good explanation, highlighting important things!
Andreas Rhein
Course: Certified Information System Security Professional (CISSP) CBK Review
Lap Qradar
Sutthikan Noisombat - Sutthikan Noisombat, NTT
Course: IBM Qradar SIEM: Beginner to Advanced
Huge expertise. The trainer definitely moves freely in the area in which he trains. A practical approach to training that suits me better than a purely theoretical one.
Course: CISA - Certified Information Systems Auditor - Exam Preparation
Machine Translated
Practical examples and going beyond the training framework (additional information that we will be able to use at work)
Course: CISA - Certified Information Systems Auditor - Exam Preparation
Machine Translated
Examples. The trainer explained IT & audit issues using examples
Course: CISA - Certified Information Systems Auditor - Exam Preparation
Machine Translated
Openness, exchange of experiences
Piotr Nenkin, Santander
Course:
Machine Translated
Huge expertise. The trainer definitely moves freely in the area in which he trains. A practical approach to training that suits me better than a purely theoretical one.
Course: CISA - Certified Information Systems Auditor - Exam Preparation
Machine Translated
Practical examples and going beyond the training framework (additional information that we will be able to use at work)
Course: CISA - Certified Information Systems Auditor - Exam Preparation
Machine Translated
Examples. The trainer explained IT & audit issues using examples
Course: CISA - Certified Information Systems Auditor - Exam Preparation
Machine Translated
Information System Security Subcategories
Information System Security Course Outlines
- Use the knowledge gained in a practical manner beneficial to your organisation
- Provide audit services in accordance with IT audit standards
- Provide assurance on leadership and organizational structure and processes
- Provide assurance on acquisition/ development, testing and implementation of IT assets
- Provide assurance on IT operations including service operations and third party
- Provide assurance on organization’s security policies, standards, procedures, and controls to ensure confidentiality, integrity, and availability of information assets.
- Understand the fundamental concepts of software licensing.
- Manage core components and operation systems of FlexNet.
- Create various license models and types, generate license keys, and activate software licenses for end-users.
- Add, manage, and allocate licenses to end-users, monitor license usage, and ensure compliance.
- System Administrators who wish to become security architects
- Technical architects looking to move into the field of security architecture
- Describe the business environment and the information risks that apply to the systems.
- Describe and apply security design principles.
- Identify information risks that arise from potential solution architectures.
- Design alternate architectures or countermeasures to mitigate identified information risks.
- Ensure that proposed architectures and countermeasures adequately mitigate identified information risks.
- Apply ‘standard’ security techniques and architectures to mitigate security risks.
- Develop new architectures that mitigate the risks posed by new technologies and business practices.
- Provide consultancy and advice to explain Information Assurance and architectural problems.
- Security configure ICT systems in compliance with their approved security architectures.
- Knowledge of the concepts relating to information security management.
- Understanding of current national legislation and regulations which impact upon information security management.
- Awareness of current national and international standards, frameworks and organisations which facilitate the management of information security.
- Understanding of the current business and common technical environments in which information security management must operate.
- Knowledge of the categorisation, operation and effectiveness of controls of different types and characteristics.
- Knowledge of the concepts relating to information security management.
- Understanding of current national legislation and regulations which impact upon information security management.
- Awareness of current national and international standards, frameworks and organisations which facilitate the management of information security.
- Understanding of the current business and common technical environments in which information security management must operate.
- Knowledge of the categorisation, operation and effectiveness of controls of different types and characteristics.
- Use the knowledge gained in a practical manner beneficial to your organisation
- Protect your organisational assets using access control techniques and strengthen confidentiality and integrity controls from the world of cryptography
- Secure your network architecture and design (implement Cyber security)
- Achieve your organisational objectives such as legal & compliance, Information assurance, security and data governance
- Enhance IT services secure delivery via Security operations, architecture and design principles
- Implement business resiliency via Business Continuity Plan
- You will gain a thorough understanding of the 8 domains as prescribed by (ISC)2®.
- To pass your CISSP examination first time.
- To review of the main topics of CISSP CBK (Common Body of Knowledge).
- To prepare for a CISSP examination
- Understand, evaluate and adopt different approaches to managing usernames and passwords.
- Setup a single login system that works across all applications used in a telecom environment.
- Use identity technology to get a clear understanding of their customers and their needs.
- Implement an authentication system that works across different platforms (laptop, mobile, etc.).
- Use the knowledge gained to benefit your organisation
- Provide audit services in accordance with IT audit standards
- Provide assurance on leadership and organizational structure and processes
- Provide assurance on acquisition/ development, testing and implementation of IT assets
- Provide assurance on IT operations including service operations and third party
- Provide assurance on organization’s security policies, standards, procedures, and controls to ensure confidentiality, integrity, and availability of information assets.
- Understand information security at both the computer level, as well as the communications level.
- Prevent physical and digital access to private information systems.
- Prevent the modification of information that is stored, being processed, or being transmitted.
- Protect against denial of service to authorized users.
- Take the necessary measures to detect, document, and counter security threats.
- Ensure that organizational information is kept confidential.
- Individuals involved in Information Security Management
- Individuals seeking to gain knowledge about the main processes of Information Security Management Systems (ISMS)
- Individuals interested to pursue a career in Information Security Management
- Lecture sessions are illustrated with practical questions and examples
- Practical exercises include examples and discussions
- Practice tests are similar to the Certification Exam
- Individuals interested in Information Security Risk Management
- Individuals seeking to gain knowledge about the main processes of Information Security Risk Management
- Individuals interested to pursue a career in Information Security Risk Management
- Training material containing over 200 pages of information and practical examples will be distributed
- A participation certificate of 14 CPD (Continuing Professional Development) credits will be issued
- In case of exam failure, you can retake the exam within 12 months for free
- Individuals interested in Information Security Risk Management
- Individuals seeking to gain knowledge about the main processes of Information Security Risk Management
- Information Security risk managers
- Information Security team members
- Individuals responsible for Information Security, compliance, and risk within an organization
- Individuals implementing ISO/IEC 27001, seeking to comply with ISO/IEC 27001 or individuals who are involved in a risk management program
- IT consultants
- IT professionals
- Information Security officers
- Privacy officers
- Domain 1 Fundamental principles and concepts of Information Security Risk Management
- Domain 2 Implementation of an Information Security Risk Management program
- Domain 3 Information security risk assessment
- Domain 4 Information security risk treatment
- Domain 5 Information security risk communication, monitoring and improvement
- Domain 6 Information security risk assessment methodologies
- Certification fees are included on the exam price
- Training material containing over 350 pages of information and practical examples will be distributed
- A participation certificate of 21 CPD (Continuing Professional Development) credits will be issued
- In case of exam failure, you can retake the exam within 12 months for free
- Information Security risk managers
- Information Security team members
- Individuals responsible for Information Security, compliance, and risk within an organization
- Individuals implementing ISO/IEC 27001, seeking to comply with ISO/IEC 27001 or involved in a risk management program
- IT consultants
- IT professionals
- Information Security officers
- Privacy officers
- Domain 1 Fundamental principles and concepts of Information Security Risk Management
- Domain 2 Implementation of an Information Security Risk Management program
- Domain 3 Information Security risk management framework and process based on ISO/IEC 27005
- Domain 4 Other Information Security risk assessment methods
- Certification fees are included on the exam price
- Training material containing over 350 pages of information and practical examples will be distributed
- A participation certificate of 21 CPD (Continuing Professional Development) credits will be issued
- In case of exam failure, you can retake the exam within 12 months for free
- Individuals interested in Information Security Incident Management process approaches
- Individuals seeking to gain knowledge about the main principles and concepts of Information Security Incident Management
- Individuals interested to pursue a career in Information Security Incident Management
- Understand the basic concepts of Information Security Incident Management
- Acknowledge the correlation between ISO/IEC 27035 and other standards and regulatory frameworks
- Understand the process approaches used to effectively manage Information Security Incidents
- Lecture sessions are illustrated with practical questions and examples
- Practical exercises include examples and discussions
- Practice tests are similar to the Certification Exam
- Certification fees are included on the exam price
- Training material containing over 200 pages of information and practical examples will be distributed
- A participation certificate of 14 CPD (Continuing Professional Development) credits will be issued
- In case of exam failure, you can retake the exam within 12 months for free
- Individuals interested in Information Security Incident Management
- Individuals seeking to gain knowledge about the main processes of Information Security Incident Management
- Understand the concepts, approaches, methods, and techniques used to manage Information Security Incidents
- Understand the Information Security Incident Management practices
- Training material containing over 100 pages of information and practical examples will be distributed
- A participation certificate of 7 CPD (Continuing Professional Development) credits will be issued
- Information Security Incident managers
- IT Managers
- IT Auditors
- Managers seeking to establish an Incident Response Team (IRT)
- Managers seeking to learn more about operating effective IRTs
- Information Security risk managers
- IT system administration professionals
- IT network administration professionals
- Members of Incident Response Teams
- Individuals responsible for Information Security within an organization
- Master the concepts, approaches, methods, tools and techniques that enable an effective Information Security Incident Management according to ISO/IEC 27035
- Acknowledge the correlation between ISO/IEC 27035 and other standards and regulatory frameworks
- Acquire the expertise to support an organization to effectively implement, manage and maintain an Information Security Incident Response plan
- Acquire the competence to effectively advise organizations on the best practices of Information Security Incident Management
- Understand the importance of establishing well-structured procedures and policies for Incident Management processes
- Develop the expertise to manage an effective Incident Response Team
- This training is based on both theory and best practices used in the implementation of an Information Security Incident Management plan
- Lecture sessions are illustrated with examples based on case studies
- Practical exercises are based on a case study which includes role playing and discussions
- Practice tests are similar to the Certification Exam
- Certification fees are included on the exam price
- Training material containing over 450 pages of information and practical examples will be distributed
- A participation certificate of 31 CPD (Continuing Professional Development) credits will be issued
- In case of exam failure, you can retake the exam within 12 months for free
- Individuals involved in information security and privacy management
- Individuals seeking to gain knowledge on the main processes of a privacy information management system
- Individuals interested in pursuing a career in privacy information management
- Individuals responsible for personally identifiable information (PII) within organizations
- Information security team members
- Understand the fundamental concepts and principles of a privacy information management system (PIMS) based on ISO/IEC 27701
- Identify the relationship between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
- Understand the approaches, standards, methods, and techniques used for the implementation and management of a PIMS
- Lecture sessions are complemented by discussions questions and examples
- The exercises include multiple-choice quizzes and essay-type exercises
- Exercise questions and quizzes are similar to the certification exam
- Participants will be provided with the training material containing over 200 pages of explanatory information, discussion topics, examples and exercises.
- An attendance record certificate of 14 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course.
- Auditors seeking to perform and lead Privacy Information Management System (PIMS) certification audits
- Managers or consultants seeking to master a PIMS audit process
- Individuals responsible for maintaining conformance with PIMS requirements
- Technical experts seeking to prepare for a PIMS audit
- Expert advisors in the protection of Personally Identifiable Information (PII)
- Understand a Privacy Information Management System (PIMS) and its processes based on ISO/IEC 27701
- Identify the relationship between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
- Acquire the competences of the auditor’s role in planning, leading, and following up on a management system audit in accordance with ISO 19011.
- Learn how to interpret the requirements of ISO/IEC 27701 in the context of a PIMS audit
- This training is based on both theory and best practices used in PIMS audits
- Lecture sessions are illustrated with examples based on case studies
- Practical exercises are based on a case study which includes role-playing and discussions
- Practice tests are similar to the Certification Exam
- Participants will be provided with the training material containing over 400 pages of explanatory information, discussion topics, examples and exercises.
- An attendance record certificate of 31 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course.
- Managers and consultants involved in privacy and data management
- Expert advisors seeking to master the implementation of a Privacy Information Management System
- Individuals responsible and accountable for Personally Identifiable Information (PII) within organizations
- Individuals responsible for maintaining conformance with data privacy regimes requirements
- PIMS team members
- Master the concepts, approaches, methods and techniques used for the implementation and effective management of a PIMS.
- Learn about the correlation between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks.
- Understand the operation of a PIMS based on ISO/IEC 27701 and its principal processes.
- Learn how to interpret the requirements of ISO/IEC 27701 in the specific context of an organization.
- Develop the expertise to support an organization in effectively planning, implementing, managing, monitoring and maintaining a PIMS.
- This training course is based on both theory and best practices used in the implementation of PIMS.
- Lecture sessions are illustrated with examples based on case studies.
- Practical exercises are based on a case study which includes role playing and discussions.
- Practice tests are similar to the Certification Exam
- Certification fees are included on the exam price.
- Training materials and practical examples will be distributed.
- A participation certificate of 31 CPD (Continuing Professional Development) credits will be issued.
- In case of exam failure, you can retake the exam within 12 months for free.
- Understand the concepts and benefits of Open Data.
- Identify the different types of data.
- Understand the risks of Open Data and how to mitigate them.
- Learn how to manage Open Data risks and create a contingency plan.
- Implement Open Data risk mitigation strategies to reduce disaster risk.
- Gain visibility into enterprise data across on-premise and cloud environments.
- Automate security intelligence to hunt threats and to contain risks.
- Detect, identify, and prioritize threats.
CISA Exam Material Scope:
- Information System Auditing Process (21%)
- Governance and Management of IT (17%)
- Information Systems Acquisition, Development and implementation (12%)
- Information Systems Operation and Business Resilience (23%)
- Protection of Information Assets (27%)
Type: multiple choice test
Volume: 200 questions List of the requirements that you must meet in order to be able to claim the CISA qualification:
- Pass the CISA exam. The CISA passing score is a mark of 450 or higher on the exam.
- Abide by the ISACA Code of Professional Ethics
- Promise to obey the CISA Continuing Professional Education Policy
- Gain at least 5 years of professional information systems auditing, control or security work experience.
- Comply with Information Systems Auditing Standards
There is a fee of $50 for this application. There’s also a yearly fee that you must pay to maintain this certification after you’ve been granted it. The fee is $40 per annum for ISACA members, and $75 for non-members.
Last Updated: