Information System Security Training Courses

Information System Security Training

ISS, Information System Security courses

Client Testimonials

Certified Information System Security Professional (CISSP) CBK Review

in-depth knowledge about the subject of the trainer, good explanation, highlighting important things!

Andreas Rhein - Globality SA

Information System Security Course Outlines

Code Name Duration Overview
bappint Bezpieczeństwo aplikacji internetowych 14 hours
cissprev Certified Information System Security Professional (CISSP) CBK Review 35 hours A CISSP is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. The vast breadth of knowledge and the experience it takes to pass the exam is what sets a CISSP apart. The credential demonstrates a globally recognized level of competence provided by the (ISC)2® CBK®, which covers critical topics in security today, including cloud computing, mobile security, application development security, risk management and more. This course helps you review the 10 domains of the information security practices. It also serves as a strong learning tool for mastering concepts and topics related to all aspects of information systems security. Objectives: To review of the main topics of CISSP CBK (Common Body of Knowledge). To prepare for a CISSP examination Access Control Security architecture that protects the assets of your systems: Concepts, methodologies and techniques Effectiveness Attacks Telecommunications & Network Security Network structures, transmission methods, transport formats and security measures that provide availability, integrity and confidentiality: Network architecture and design Communication channels Network components Network attacks Information Security Governance & Risk Management Identifying an organisation’s information assets, and the development, documentation and implementation of policies, standards, procedures and guidelines: Security governance and policy Information classification and ownership Contractual agreements and procurement processes Risk management concepts Personnel security Security education, training and awareness Certification and accreditation Software Development Security The controls found in systems and applications software, and their development: Systems Development Life Cycle (SDLC) Application environment and security controls Effectiveness of application security Cryptography The principles, means and methods of disguising information; to ensure its integrity, confidentiality and authenticity: Encryption concepts Digital signatures Cryptanalytic attacks Public Key Infrastructure (PKI) Information hiding alternatives Security Architecture & Design The concepts, principles, structures and standards used to design, implement, monitor, and secure, operating systems, equipment, networks and applications: Fundamental concepts of security models Capabilities of information systems (e.g. memory protection, virtualization) Countermeasure principles Vulnerabilities and threats (e.g. cloud computing, aggregation, data flow control) Security Operations (formerly 'Operations Security') Controls over hardware, media and operators with access privileges: Resource protection Incident response Attack prevention and response Patch and vulnerability management Business Continuity & Disaster Recovery Planning How to maintain business in the face of major disruptions: Business impact analysis Recovery strategy Disaster recovery process Provide training Legal, Regulations, Investigations and Compliance Computer crime laws, investigation and how to gather evidence: Legal issues Investigations Forensic procedures Compliance requirements/procedures Physical (Environmental) Security How to protect your business's resources and sensitive information: Site / facility design considerations Perimeter security Internal security Facilities security
gdpr General Data Protection Regulation - zmiany prawne, wprowadzenie teoretyczne, praktyczne aspekty 14 hours
iso27005 Building up information security according to ISO 27005 21 hours This course will give you the skills to build up information security according to ISO 27005, which is dedicated to information security risk management based on ISO 27001.1. Introduction to risk management 2. Risk assessment methodologies 3. The ISO 27005 information security risk management framework and process model 4. Classification and identification of information assets 5. Definition of threats to information assets 6. Identification of the vulnerabilities these threats might exploit 7. Risk analysis: risk scoring using scales and simple calculations 8. An introduction to risk analysis tools 9. Risk evaluation and acceptance strategies 10. Risk treatment and the selection of mitigating control measures 11. Review and continual improvement of risk assessment and management 12. Risk communications and consultation 13. Integrating the ISO 27005 information security risk management framework into an ISO 27001 ISMS

Upcoming Courses

CourseCourse DateCourse Price [Remote / Classroom]
Bezpieczeństwo aplikacji internetowych - Zakopane ul. Jagiellońska 30 Wed, 2017-06-07 09:007600PLN / 3003PLN
General Data Protection Regulation - zmiany prawne, wprowadzenie teoretyczne, praktyczne aspekty - Rzeszów, Plac Wolności 13Wed, 2017-06-07 09:007200PLN / 2582PLN
Building up information security according to ISO 27005 - Częstochowa, ul. Wały Dwernickiego 117/121Wed, 2017-06-07 09:0017980PLN / 6498PLN
Bezpieczeństwo aplikacji internetowych - Poznań, Garbary 100/63Thu, 2017-06-08 09:007600PLN / 2703PLN
Certified Information System Security Professional (CISSP) CBK Review - Gdynia, ul. Ejsmonda 2Mon, 2017-06-12 09:0024820PLN / 8771PLN

Other regions

Weekend Information System Security courses, Evening Information System Security training, Information System Security boot camp, Information System Security instructor-led , Information System Security trainer , Information System Security one on one training , Information System Security coaching,Weekend Information System Security training, Information System Security training courses, Information System Security instructor, Information System Security on-site, Evening Information System Security courses, Information System Security classes

Course Discounts

Course Venue Course Date Course Price [Remote / Classroom]
Six thinking hats by Edward de Bono Gdańsk, ul. Powstańców Warszawskich 45 Thu, 2017-05-25 09:00 5148PLN / 1726PLN
Facebook in advertising and marketing Poznan, Garbary 100/63 Fri, 2017-05-26 09:00 1881PLN / 952PLN
Python Programming Szczecin, ul. Sienna 9 Mon, 2017-05-29 09:00 10000PLN / 4448PLN
Facebook in advertising and marketing Lublin, ul. Spadochroniarzy 9 Fri, 2017-06-02 09:00 1881PLN / 1002PLN
Oracle 11g - Programming with PL / SQL I - Workshops Wroclaw, ul.Ludwika Rydygiera 2a/22 Tue, 2017-06-06 09:00 5990PLN / 2939PLN
MongoDB for Administrators Kraków, ul. Rzemieślnicza 1 Tue, 2017-06-06 09:00 3861PLN / 2087PLN
Adobe Photoshop Elements Gdańsk, ul. Powstańców Warszawskich 45 Wed, 2017-06-07 09:00 1881PLN / 1127PLN
Adobe Photoshop Elements Gdynia, ul. Ejsmonda 2 Wed, 2017-06-07 09:00 1881PLN / 1127PLN
Microsoft Office Excel - moduł Business Intelligence Gdynia, ul. Ejsmonda 2 Wed, 2017-06-07 09:00 2673PLN / 1391PLN
Adobe InDesign Poznan, Garbary 100/63 Thu, 2017-06-08 09:00 1881PLN / 1027PLN
Design Patterns in C# Poznan, Garbary 100/63 Thu, 2017-06-08 09:00 3861PLN / 1830PLN
SQL Fundamentals Gdańsk, ul. Powstańców Warszawskich 45 Thu, 2017-06-08 09:00 3663PLN / 1610PLN
Visual Basic for Applications (VBA) in Excel - Advanced Warszawa, ul. Złota 3/11 Mon, 2017-06-12 09:00 3069PLN / 1623PLN
Visual Basic for Applications (VBA) in Excel - Introduction to programming Gdynia, ul. Ejsmonda 2 Mon, 2017-06-12 09:00 3564PLN / 1891PLN
DTP (InDesign, Photoshop, Illustrator, Acrobat) Opole, Wladyslawa Reymonta 29 Mon, 2017-06-12 09:00 5940PLN / 4230PLN
Spring and Hibernate in Java Applications Poznan, Garbary 100/63 Tue, 2017-06-13 09:00 7722PLN / 3358PLN
Drools Rules Administration Wroclaw, ul.Ludwika Rydygiera 2a/22 Wed, 2017-06-14 09:00 21196PLN / 7023PLN
Front End Developer Rzeszów, Plac Wolności 13 Mon, 2017-06-19 09:00 23000PLN / 7970PLN
Build applications with Oracle Application Express (APEX) Katowice ul. Opolska 22 Mon, 2017-06-19 09:00 9801PLN / 4720PLN
Creating and managing Web sites Poznan, Garbary 100/63 Mon, 2017-06-19 09:00 5841PLN / 2298PLN
Introduction to Selenium Warszawa, ul. Złota 3/11 Thu, 2017-06-22 09:00 1871PLN / 824PLN
Javascript And Ajax Rzeszów, Plac Wolności 13 Mon, 2017-06-26 09:00 5841PLN / 3655PLN
Introduction to Programming Gdańsk, ul. Powstańców Warszawskich 45 Mon, 2017-06-26 09:00 5742PLN / 4121PLN
Implementation and Administration of Elasticsearch Wroclaw, ul.Ludwika Rydygiera 2a/22 Wed, 2017-06-28 09:00 20800PLN / 6903PLN
Effective interpersonal communication with elements of assertiveness Wroclaw, ul.Ludwika Rydygiera 2a/22 Thu, 2017-06-29 09:00 5148PLN / 1430PLN
Elasticsearch Advanced Administration, Monitoring and Maintenance Gdańsk, ul. Powstańców Warszawskich 45 Tue, 2017-07-04 09:00 17741PLN / 5876PLN
Nginx Setup, Configuration and Administration Bydgoszcz, ul. Dworcowa 94 Wed, 2017-07-05 09:00 6930PLN / 2850PLN
SQL Fundamentals Warszawa, ul. Złota 3/11 Mon, 2017-07-10 09:00 3663PLN / 1510PLN
SIP protocol in VoIP Poznan, Garbary 100/63 Mon, 2017-07-17 09:00 15929PLN / 5427PLN
Creating and managing Web sites Poznan, Garbary 100/63 Mon, 2017-09-25 09:00 5841PLN / 2298PLN

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients