ISACA Certified Information Security Manager (CISM)

Course Description

Gain the CISM. Enhance your competitive advantage. Demonstrate your information security management expertise.

CISM, or Certified Information Systems Manager, This CISM certification displays an individual’s detailed knowledge and extensive experience of security management, hence is a valuable qualification to hold.

ISACA’s Certified Information Security Manager® (CISM) is a globally acknowledged certification that concerns the development, construction, and management of Information Security programs. The CISM covers the core competencies and standards of performance that information security managers are expected to master. In addition to technical competence, holders of the CISM demonstrate a deep understanding of the relationship between information security programs and broader business goals and objectives.

This 3-day instructor-led CISM course provides an intense environment in which participants can acquire, thoroughly and properly, the skills and knowledge expected of a world-class information security manager. It covers all of the body of knowledge that makes up the CISM . At the same, it provides outstanding preparation for the CISM exam including multiple practice question sessions and a practice exam.

Certified Cloud Security Professional (CCSP)

Course Description

(ISC)² and the Cloud Security Alliance (CSA) developed the Certified Cloud Security Professional (CCSP) credential to ensure that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks. A CCSP applies information security expertise to a cloud computing environment and demonstrates competence in cloud security architecture, design, operations, and service orchestration. This professional competence is measured against a globally recognized body of knowledge.

The CCSP is a standalone credential that complements and builds upon existing credentials and educational programs, including (ISC)²’s Certified Information Systems Security Professional (CISSP) and CSA’s Certificate of Cloud Security
Knowledge (CCSK).

 

Security Incident Response Workshop

Course Description

In today’s complex world, an appropriate and usable incident response plan to deal with inevitable incidents and unforeseeable events and an agile, incident response capability are essential.  How you prepare for and respond can minimise the impact of a damaging security incident.  One of the most important ways to prepare is to ensure you have an effective information security incident response strategy.  Being prepared will be even more important once mandatory data breach notification obligations are introduced into the Privacy Act.


This 1-day hands-on workshop will help you improve your organizations’ security posture by learning:

  • What you mandatory data breach notification requirements involved
  • What goes into an effective information security incident response plan for your organisation;
  • Systems for classifying events and identifying incidents;
  • The importance of clear, timely and consistent internal and external communications;
  • Why it is important for first-responders to have the authority to act and make decisions;
  • The benefits of testing your plan. 

The workshop will incorporate role-playing as a tool to simulate the tension of a real-time crisis situation.   Hands-on exercises will provide the opportunity to gain experience with the type of decisions an organisation might face in an information security emergency.

ISO/IEC 27001 Lead Auditor Course

Course Description

The ISO/IEC 27001 Lead Auditor Course five-day intensive course enables participants to develop the necessary expertise to audit an Information Security Management System (ISMS) and to manage a team of auditors by applying widely recognized audit principles, procedures and techniques.

During this training, the participant will acquire the necessary knowledge and skills to proficiently plan and perform internal and external audits in compliance with ISO 19011 the certification process according to ISO 17011. Based on practical exercises, the participant will develop the skills (mastering audit techniques) and competencies (managing audit teams and audit program, communicating with customers, conflict resolution, etc.) necessary to efficiently conduct an audit.
 

 

Data Breach Notification in Australia

Course Description

This 2 hour on-line session provides an overview of the Australian data breach notification obligations, introduced by the Privacy Amendment (Notifiable Data Breaches) Bill , and which became effective in February 2018.  The new data breach laws will be reviewed in detail as will other obligations to notify of unauthorised access to or disclosure of information, applicable to Australian organisations. The session includes practical suggestions on establishing capability to comply with the mandatory data breach notification requirements which are now part of Australia’s privacy laws.

Certified Information Systems Security Professional (CISSP) Review Seminar

Course Description

Led by an (ISC)² authorized instructor, this training seminar provides a comprehensive review of information security concepts and industry best practices, covering the 8 domains  of the CISSP CBK:

  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communications and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

Several types of activities are used throughout the course to reinforce topics and increase knowledge retention. These activities include open ended questions from the instructor to the students, matching and poll questions, group activities, open/closed questions, and group discussions. This interactive learning technique is based on sound adult learning theories.

Secure Systems Certified Professional (SSCP®) Review Seminar

Course Description

The SSCP® Certification is an internationally recognised qualification especially designed for network and systems administrators who implement policies, standards, and procedures on the various hardware and software programs for which they are responsible.

The content of the SSCP has been refreshed to reflect the most pertinent issues that security practitioners currently face, along with the best practices for mitigating those issues. Some topics have been expanded (e.g., cloud security, virtual environments), while others have been realigned. The result is an exam that most accurately reflects the technical and practical security knowledge that is required for the daily job functions of today’s frontline information security practitioner.

As a result of the content refresh, we have updated some of the domain names to describe the topics accurately.
 (ISC)² is the creator of the SSCP® Exam, so why would you get your education anywhere else? The Official SSCP® CBK Training Seminar is the key to success in pursuing the SSCP certification.

Prepared by SSCP® credential holders and conducted by only (ISC)² Authorized Instructors, each of whom is up-to-date on the latest information security-related developments and is an expert in the SSCP® CBK, the (ISC)² SSCP® CBK Training Seminar is the most comprehensive, complete review of the information systems security concepts and industry best practices covered by the SSCP domains (link is external), and the only training endorsed by (ISC)².

As this is the ONLY Official (ISC)² SSCP® CBK Review Seminar offered in Australia, it:
Guarantees the highest quality of education and customer satisfaction – Candidates are able to contact (ISC)² directly for program quality assurance.

ISO 27003 ISMS Implementation

Course Description

In this one-day seminar, IT Security Training Australia introduces the ISMS based on ISO 27001 ( which used to be AS 7799.2), the International Standard for Information Security Management  It also covers the associated international standard, ISO 27002 and related State Government standards.

 

The ISMS is a comprehensive risk identification, assessment and management system, comprising technology, policy and practice-based solutions. The course provides a good introduction to implementing an ISMS compliant with ISO 27001 in any organisation.

 

This course is based on the 2013 version of ISO 27001 the international standard for information security management systems.

 

Introduction to ISO 27001

Course Description

For those wanting a high-level understanding of an Information Security Management System (ISMS) based on IEC/ISO 27001:2013, this is a good place to start.

The ISMS is a comprehensive risk identification, assessment and management system, comprising technology, policy and practice-based solutions, and directed at ensuring the security of all types of information. This 2-hour on-line course provides a good introduction to the concepts underlying the ISO 27001 ISMS, an overview of its main components and some tips on implementing an ISMS compliant with ISO 27001 in any organisation.

One of our experienced ISO 27001 trainers and consultants will:

• Explain the major components of the ISO 27001 Information Security Management System
• Review the benefits of implementing an ISO 27001 ISMS
• Consider the value of ISO 27001 certification to third parties
• Discuss an implementation approach including risk assessment and Annex A controls

Subscribe to RSS - Security