Szkolenia Information Security Risk

Szkolenia Information Security Risk

Information Security Risk courses

Opinie uczestników

Plany Szkoleń Information Security Risk

Kod Nazwa Czas trwania Charakterystyka kursu
ethhack Ethical Hacker 35 godz. This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. The purpose of the Ethical Hacking Training is to: Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures. Inform the public that credentialed individuals meet or exceed the minimum standards. Reinforce ethical hacking as a unique and self-regulating profession. Audience: The Course is ideal for those working in positions such as, but not limited to: Security Engineers Security Consultants Security Managers IT Director/Managers Security Auditors IT Systems Administrators IT Network Administrators Network Architects Developers
iso27005 Building up information security according to ISO 27005 21 godz. This course will give you the skills to build up information security according to ISO 27005, which is dedicated to information security risk management based on ISO 27001.
pcbc PCBC - Practitioner Certificate in Business Continuity Management 35 godz. Description: This is a 'Practitioner' course and leans heavily on practical exercises designed to reinforce the concepts being taught and to build the delegates confidence in implementing business continuity management. The course is also designed to encourage debate, and the sharing of knowledge and experience between students. Delegates will benefit from the practical and extensive experiences of ours trainers who are practicing business continuity management and ISO 22301:2012 specialists. Delegates will learn how to: Explain the need for business continuity management (BCM) in all organisations Define the business continuity lifecycle Conducting business continuity programme management Understand their organisation sufficiently to identify mission-critical impact areas Determine their organisation's business continuity strategy Establish a business continuity response Exercise, maintain and review plans Embed business continuity in an organisation Define terms and definitions appropriate to business continuity By the end of the course, delegates will have a detailed understanding of all the key components of business continuity management and be able to return to their work, making a significant contribution to the business continuity management process.
crisc CRISC - Certified in Risk and Information Systems Control 21 godz. Description: This class is intended as intense and hard core exam preparation for ISACA’s Certified Information Systems Auditor (CRISC) Examination. The five (5) domains of ISACA’s CRISC syllabus will be covered with a big focus on the Examination. The Official ISACA CIRSC Review Manual and Question, Answer and Explanation, (Q,A&E), supplements will ALSO be provided when attending. The Q,A&E is exceptional in helping delegates understand the ISACA style of questions, the type of answers ISACA are looking for and it helps rapid memory assimilation of the material. The technical skills and practices that ISACA promotes and evaluates within the CRISC certification are the building blocks of success in the field. Possessing the CRISC certification demonstrates your skill within the profession. With a growing demand for professionals holding risk and control expertise, ISACA’s CRISC has positioned itself to be the preferred certification program by individuals and enterprises around the world. The CRISC certification signifies commitment to serving an enterprise and the chosen profession with distinction. Objectives: To help you pass the CRISC examination first time possessing this certification will signify your commitment to serving an enterprise with distinction the growing demand for professionals with risk and control skills will allow holders of this certification to command better positions and salary You will learn: To help enterprises accomplish business objectives by designing, implementing, monitoring and maintaining risk-based, efficient and effective IS controls. The technical skills and practices that CRISC promotes, these are the building blocks of success in the field
pcirm PCIRM - Practitioner Certificate in Information Risk Management 35 godz. Description: The Practitioner Certificate in Information Risk Management (PCIRM) provides security practitioners with a comprehensive and highly practical course enabling them to develop a business focused information security and governance risk strategy. It closely follows the approaches recommended in the ISO 27001 and ISO 27005 standards. The five-day course prepares delegates to confidently sit the BCS/ISEB Practitioner Certificate in Information Risk Management examination. Target Audience: Information security and governance practitioners Internal IT auditors Staff from within compliance and operational risk functions IT managers and senior staff Project managers and others responsible for designing security in to information systems. Objectives: On completion of this course delegates will be able to: develop an information risk management strategy conduct threat vulnerability and likelihood assessments, business impact analyses and risk assessments explain how the management of information risk will bring about significant business benefits explain and make full use of information risk management terminology explain the principles of controls and risk treatment present results of the risk assessment in a format which will form the basis of a risk treatment plan explain and produce information classification schemes confidently sit the ISEB examination
gdpr RODO / GDPR - zmiany prawne, wprowadzenie teoretyczne, praktyczne aspekty 14 godz. Dwudniowy kurs wprowadzający do GDPR (General Data Protection Regulation) czy jej polskiego odpowiednika RODO (Rozporządzenie o Ochronie Danych Osobowych)  – najpoważniejszej od dwudziestu lat zmiany w ochronie danych osobowych. Szkolenie obejmie wszystkie zmiany wprowadzane przez GDPR, podstawy teoretyczne oraz omówienie praktycznego wymiaru zmian. Pozycja obowiązkowa dla kadry kierowniczej oraz osób odpowiedzialnych za bezpieczeństwo informacji w projektach informatycznych.

Najbliższe szkolenia

Other regions

Szkolenie Information Security Risk, Information Security Risk boot camp, Szkolenia Zdalne Information Security Risk, szkolenie wieczorowe Information Security Risk, szkolenie weekendowe Information Security Risk , edukacja zdalna Information Security Risk, kurs online Information Security Risk, Trener Information Security Risk, wykładowca Information Security Risk , nauczanie wirtualne Information Security Risk, nauka przez internet Information Security Risk, e-learning Information Security Risk, kurs zdalny Information Security Risk,Kurs Information Security Risk, lekcje UML,Kursy Information Security Risk

Kursy w promocyjnej cenie

Szkolenie Miejscowość Data Kursu Cena szkolenia [Zdalne / Stacjonarne]
Natural Language Processing with Python Warszawa, ul. Złota 3/11 wt., 2018-02-27 09:00 3950PLN / 5200PLN
WordPress Gdańsk, ul. Grodzka 19 śr., 2018-02-28 09:00 2960PLN / 3960PLN
Symfony 3 Lublin, ul. Spadochroniarzy 9 śr., 2018-02-28 09:00 2000PLN / 3000PLN
Introduction to AUTOSAR RTE for Automotive Software Professionals Kraków, ul. Rzemieślnicza 1 śr., 2018-02-28 09:00 1970PLN / 2720PLN
Enterprise Architecture Overview Warszawa, ul. Złota 3/11 czw., 2018-03-01 09:00 1970PLN / 2720PLN
Adobe Photoshop Katowice ul. Opolska 22 pon., 2018-03-05 09:00 850PLN / 1600PLN
Test Automation with Selenium and Jenkins Wrocław, ul.Ludwika Rydygiera 2a/22 pon., 2018-03-05 09:00 4940PLN / 5940PLN
Visual Basic for Applications (VBA) w Excel - wstęp do programowania Katowice ul. Opolska 22 pon., 2018-03-05 09:00 3560PLN / 4810PLN
Techniki DTP (InDesign, Photoshop, Illustrator, Acrobat) Katowice ul. Opolska 22 pon., 2018-03-05 09:00 2150PLN / 3650PLN
Microsoft SQL Server 2008/2012 (MSSQL) Gdańsk, ul. Grodzka 19 wt., 2018-03-06 09:00 1970PLN / 2720PLN
Microsoft Office Excel - poziom podstawowy Opole, Władysława Reymonta 29 wt., 2018-03-06 09:00 850PLN / 1600PLN
Adobe Illustrator Katowice ul. Opolska 22 śr., 2018-03-07 09:00 850PLN / 1600PLN
Techniki DTP (InDesign, Photoshop, Illustrator, Acrobat) Gdańsk, ul. Grodzka 19 czw., 2018-03-08 09:00 2130PLN / 3630PLN
Spring Cloud: Building Microservices with Spring Cloud Gdańsk, ul. Grodzka 19 czw., 2018-03-15 09:00 1970PLN / 2720PLN
Certified Agile Tester Katowice ul. Opolska 22 pon., 2018-04-02 09:00 8910PLN / 10410PLN
Comprehensive Git Gdańsk, ul. Grodzka 19 śr., 2018-04-04 09:00 2170PLN / 3170PLN
Perfect tester Szczecin, ul. Sienna 9 śr., 2018-04-04 09:00 1790PLN / 2540PLN
Kontrola jakości i ciągła integracja Katowice ul. Opolska 22 czw., 2018-04-12 09:00 2670PLN / 3420PLN
Protokół SIP w VoIP Rzeszów, Plac Wolności 13 wt., 2018-04-17 09:00 2960PLN / 3960PLN
UML for the IT Business Analyst Gdańsk, ul. Grodzka 19 śr., 2018-04-25 09:00 4940PLN / 5940PLN
Oracle 12c – wprowadzenie do języka SQL Łódź, ul. Tatrzańska 11 wt., 2018-06-12 09:00 3960PLN / 4710PLN

Newsletter z promocjami

Zapisz się na nasz newsletter i otrzymuj informacje o aktualnych zniżkach na kursy otwarte.
Szanujemy Twoją prywatność, dlatego Twój e-mail będzie wykorzystywany jedynie w celu wysyłki naszego newslettera, nie będzie udostępniony ani sprzedany osobom trzecim.
W dowolnej chwili możesz zmienić swoje preferencje co do otrzymywanego newslettera bądź całkowicie się z niego wypisać.

Zaufali nam