
Online or onsite, instructor-led live Security Management training courses demonstrate through interactive discussion and hands-on practice how to carry out Security Management.
Security Management training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live Security Management training can be carried out locally on customer premises in the UK or in NobleProg corporate training centres in the UK.
NobleProg -- Your Local Training Provider
Testimonials
I genuinely was benefit from the communication skills of the trainer.
Flavio Guerrieri
Course: CISM - Certified Information Security Manager
It was quite informal.
Capita Business Services Ltd
Course: Understanding Modern Information Communication Technology
Trainer covered a lot of ground over a relatively short period.
Capita Business Services Ltd
Course: Understanding Modern Information Communication Technology
I found it very interesting to learn all about what happens behind the scenes when it comes to IT systems. I also enjoyed learning about security and what hackers do as ethical hacking is an avenue I'm very keen in pursuing.
Knowledge Pool/ DVLA
Course: Understanding Modern Information Communication Technology
Richard was very knowledgeable in his field.
Knowledge Pool/ DVLA
Course: Understanding Modern Information Communication Technology
It was pitched at the right level - challenging but understandable & informative.
Louise Voisey - Capita Business Services Ltd
Course: Understanding Modern Information Communication Technology
The pace of training delivery.
Ian McInally - KnowledgePool
Course: Business Continuity Practitioner
the exercises and group discussions.
KnowledgePool
Course: Business Continuity Practitioner
The trainer was very knowledgeable and was happy to go at the pace of the attendees. He was polite and respectful to all those in attendance. I felt I learnt a lot from the course as the trainer was very succinct in his delivery when going through the PP slides. A really good, worth while course from my personal point of view.
Julie Price - KnowledgePool
Course: Business Continuity Practitioner
The environment was really relaxed and open so everyone could ask questions or put across points of view or experience. David the trainer was a SME on the subject and his style was very good.
KnowledgePool
Course: Business Continuity Practitioner
The second day, scenarios exercises.
Christina Hutchings - KnowledgePool
Course: Business Continuity Practitioner
I liked the trainer's introduction and anecdotes to make the learning more real
KnowledgePool
Course: Business Continuity Practitioner
David's in depth knowledge. His relationship building skills with the audience. I really enjoyed the way he managed to make us (as a collective audience) enjoy the quite dry and uninteresing subject matter. He had anecdotes and knowledge of specific examples of security failings - hacker attacks - BCP 'breakdowns' etc which put flesh on the bones to the piece of legislation or 'best practice' for BCP that he was trying to teach us about. A really engaging, down to earth and personable man: A very good listener and a fabulous, charismatic trainer.
Cris Bollin - KnowledgePool
Course: Business Continuity Practitioner
He took his time to make sure everyone understood and were on the same wave length
Tina Hopkins - Capita Business Services Ltd
Course: Understanding Modern Information Communication Technology
I found the training too in depth for IT beginners. There was too many high level subjects that i felt were too advanced for a beginner level.
Capita Business Services Ltd
Course: Understanding Modern Information Communication Technology
Ann is very knowledgeable on the subject. She is constantly varying pace according to the feedback. There is a lot of room for discussing attendee's own experiences. It was a great joy !.
Sjoerd Hulzinga - KPN p/a Bloomville
Course: IoT Security Architecture
Hacking
Mohalmald Salim - PSO
Course: Ethical Hacker
Level of expertise from the trainer Use case examples
Pierre Maillot - Bosch
Course: IoT Security Architecture
His deep knowledge of the IoT topic.
Bosch
Course: IoT Security Architecture
Ron's experience on how to successfully implement IoT projects and the deep technical subjects covered.
Bosch
Course: IoT Security Architecture
relevance of content to our I4.0 business environment
Bosch
Course: IoT Security Architecture
Very knowledgeable trainer, was able to adjust to audience knowledge, excellent industry experience and ability to relate to audience needs Excellent content preparation , tailored to needs discussed beforehand. Good supplement reading materials prepared by trainer
Oliver Steinig - Bosch
Course: IoT Security Architecture
Ron was very mindful of his audience and addressed everyone's questions. He checked his audience for clarity and was willing to spend the time to review a topic until everyone understood the topic. He gauged the audience for energy levels and suggested a break when he saw that the energy from the group was waning. This was much appreciated.
Bosch
Course: IoT Security Architecture
Tutorials
ICAO
Course: Web Security with the OWASP Testing Framework
The example and exercise
ICAO
Course: Web Security with the OWASP Testing Framework
I got more information regarding the web applications' security issues, the different tools that could be used to cope with these issues, and more advice from the trainer to handle all these issues.
ICAO
Course: Web Security with the OWASP Testing Framework
the list of tools
ICAO
Course: Web Security with the OWASP Testing Framework
how it was broken into the technical and security mindset aspects.
ICAO
Course: Web Security with the OWASP Testing Framework
Excercises.
ICAO
Course: Web Security with the OWASP Testing Framework
he is very knowledgeable and comprehensive.
ICAO
Course: Web Security with the OWASP Testing Framework
Matthew was very knowledge and has lot experience to share with us. it was very pleasant, as he take the time to listen to us and answer to our questions. Thank you Matthew, it was awesome.
ICAO
Course: Web Security with the OWASP Testing Framework
The real life examples Ron gave.
Bosch
Course: IoT Security Architecture
All is excellent
Manar Abu Talib - Dubai Electronic Security Center
Course: MITRE ATT&CK
- Understanding that ATT&CK creates a map that makes it easy to see, where an organisation is protected and where the vulnerable areas are. Then to identify the security gaps that are most significant from a risk perspective. - Learn that each technique comes with a list of mitigations and detections that incident response teams can employ to detect and defend. - Learn about the various sources and communities for deriving Defensive Recommendations.
CHU YAN LEE - PacificLight Power Pte Ltd
Course: MITRE ATT&CK
Loose way of driving
Course: NB-IoT for Developers
Machine Translated
Loose way of driving
Course: NB-IoT for Developers
Machine Translated
Security Management Course Outlines
Disclaimer: Please be advised that this updated CISM exam content outline is applicable to exams starting 1 June 2022.
CISM® is the most prestigious and demanding qualification for Information Security Managers around the globe today. This qualification provides you with a platform to become part of an elite peer network who have the ability to constantly learn and relearn the growing opportunities/ challenges in Information Security Management.
Our CISM training methodology provides an in-depth coverage of contents across the Four CISM domains with a clear focus on building concepts and solving ISACA released CISM exam questions. The course is an intense training and hard-core exam preparation for ISACA’s Certified Information Security Manager (CISM®) Examination.
Our instructors encourage all attending delegates to go through the ISACA released CISM QA&E (Questions, Answers and Explanations) as exam preparation - you get this FREE as part of our course. The QA&E is exceptional in helping delegates understand the ISACA style of questions, approach to solving these questions and it helps rapid memory assimilation of the CISM concepts during live classroom sessions.
All our trainers have extensive experience in delivering CISM training. We will thoroughly prepare you for the CISM examination.
Goal:
The ultimate goal is to pass your CISM examination first time.
Objectives:
- Use the knowledge gained in a practical manner beneficial to your organisation
- Establish and maintain an Information security governance framework to achieve your organization goals and objectives
- Manage Information risk to an acceptable level to meet the business and compliance requirements
- Establish and maintain information security architectures (people, process, technology)
- Integrate information security requirements into contracts and activities of third parties/ suppliers
- Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact
Target Audience:
- Security professionals with 3-5 years of front-line experience
- Information security managers or those with management responsibilities
- Information security staff, information security assurance providers who require an in-depth understanding of information security management including: CISO’s, CIO’s, CSO’s, privacy officers, risk managers, security auditors and compliance personnel, BCP / DR personnel, executive and operational managers responsible for assurance functions
CISA® is the world-renowned and most popular certification for professionals working in the field of IS audit and IT risk consulting.
Our CISA course is an intense, very competitive and exam focused training course. With experience of delivering more than 150+ CISA trainings in Europe and around the world and training more than 1200+ CISA delegates, the Net Security CISA training material has been developed in house with the top priority of ensuring CISA delegates pass the ISACA CISA® Exam. The training methodology focuses on understanding the CISA IS auditing concepts and practicing large number of ISACA released question banks from the last three years. Over a period, CISA holders have been in huge demand with renowned accountings firms, global banks, advisory, assurance, and internal audit departments.
Delegates may have years of experience in IT auditing but perspective towards solving CISA questionnaires will solely depend on their understanding to globally accepted IT assurance practices. CISA exam is very challenging because the chance of a very tight clash between two possible answers exists and that is where ISACA tests you on your understanding in global IT auditing practices. To address these exam challenges, we always provide the best trainers who have extensive experience in delivering CISA training around the world.
The Net Security CISA manual covers all exam-relevant concepts, case studies, Q&A's across CISA five domains. Further, the Trainer shares the key CISA supporting material like relevant CISA notes, question banks, CISA glossary, videos, revision documents, exam tips, and CISA mind maps during the course.
Goal:
The ultimate goal is to pass your CISA examination first time.
Objectives:
- Use the knowledge gained in a practical manner beneficial to your organisation
- Provide audit services in accordance with IT audit standards
- Provide assurance on leadership and organizational structure and processes
- Provide assurance on acquisition/ development, testing and implementation of IT assets
- Provide assurance on IT operations including service operations and third party
- Provide assurance on organization’s security policies, standards, procedures, and controls to ensure confidentiality, integrity, and availability of information assets.
Target Audience:
Finance/CPA professionals, I.T. professionals, Internal & External auditors, Information security, and risk consulting professionals.
Cybersecurity skills are in high demand, as threats continue to plague enterprises around the world. An overwhelming majority of professionals surveyed by ISACA recognise this and plan to work in a position that requires cybersecurity knowledge.
To fill this gap, ISACA has developed the Cybersecurity Fundamentals Certificate, which provides education and verification of skills in this area.
Objectives:
With cybersecurity threats continuing to rise and the shortage of appropriately-equipped security professionals growing worldwide, ISACA's Cybersecurity Fundamentals Certificate programme is the perfect way to quickly train entry-level employees and ensure they have the skills and knowledge they need to successfully operate in the Cyber arena.
Target Audience:
The certificate program is also one of the best ways to gain foundational knowledge in cybersecurity and begin to build your skills and knowledge in this crucial area.
The participants will learn about the basic issues related to the implementation of public key infrastructure, and also with the idea of applying the latest cryptographic solutions for securing information systems.
On the basis of MS Windows Server 2012 R2 are discussed possibilities of using certification services for the enterprise.During the training in a virtual environment is installed complete certification center and discuss the most important issues related to the management and administration of public key infrastructure in an Active Directory domain.
The training includes theoretical and practical knowledge on the use of electronic signatures issued by certification centers in Poland under the "Act on Electronic Signatures." These are legal issues, legal requirements, as well as examples of the use of certificates of electronic signatures in Poland.
The participants will gain the knowledge needed to create electronic correspondence relating to communication with the public authorities and other services that allow or require the use of a type of ID.
By the end of this training, participants will be able to:
- Identify the different components of NB-IoT and how to fit together to form an ecosystem.
- Understand and explain the security features built into NB-IoT devices.
- Develop a simple application to track NB-IoT devices.
By the end of this training, participants will be able to:
- Assess their organization's security risk, as it relates to computer server rooms.
- Set up control and monitoring systems to restrict physical access to infrastructure.
- Design access policies for different members.
- Effectively communicate security policies with team members.
By the end of this training, participants will be able to develop, manage, and monitor security policies to protect their organization's information, network, and physical and software assets.
Anyone with an interest in information security, whether as a career or for general business knowledge.
This certificate is relevant to anyone requiring an understanding of Information Security Management Principles as well as those with an interest in information security either as a potential career or as an additional part of their general business knowledge. It is very much a firm foundation on which other qualifications can be built or which provides a thorough general understanding to enable organisations to begin to ensure their information is protected appropriately.
What will I learn:
Candidates should be able to demonstrate:
- Knowledge of the concepts relating to information security management.
- Understanding of current national legislation and regulations which impact upon information security management.
- Awareness of current national and international standards, frameworks and organisations which facilitate the management of information security.
- Understanding of the current business and common technical environments in which information security management must operate.
- Knowledge of the categorisation, operation and effectiveness of controls of different types and characteristics.
Note: This is the four day course which adds one additional day to the standard delivery to provide more time for exam preparation and practice exercises.
Anyone with an interest in information security, whether as a career or for general business knowledge.
This certificate is relevant to anyone requiring an understanding of Information Security Management Principles as well as those with an interest in information security either as a potential career or as an additional part of their general business knowledge. It is very much a firm foundation on which other qualifications can be built or which provides a thorough general understanding to enable organisations to begin to ensure their information is protected appropriately.
What will I learn:
Candidates should be able to demonstrate:
- Knowledge of the concepts relating to information security management.
- Understanding of current national legislation and regulations which impact upon information security management.
- Awareness of current national and international standards, frameworks and organisations which facilitate the management of information security.
- Understanding of the current business and common technical environments in which information security management must operate.
- Knowledge of the categorisation, operation and effectiveness of controls of different types and characteristics.
Anyone who is involved in the areas of information security and information assurance.
What will I learn:
Candidates should be able to demonstrate:
- How the management of information risk will bring about significant business benefits.
- How to explain and make full use of information risk management terminology.
- How to conduct threat and vulnerability assessments, business impact analyses and risk assessments.
- The principles of controls and risk treatment.
- How to present the results in a format which will form the basis of a risk treatment plan.
- The use of information classification schemes.
By the end of this training, participants will be able to:
- Understand the concepts and benefits of Open Data.
- Identify the different types of data.
- Understand the risks of Open Data and how to mitigate them.
- Learn how to manage Open Data risks and create a contingency plan.
- Implement Open Data risk mitigation strategies to reduce disaster risk.
Last Updated: