Certified Cloud Security Professional (CCSP) Review Seminar
Backed by the two leading non-profits focused on cloud and information security, the Cloud Security Alliance (CSA) and (ISC)², the CCSP credential denotes professionals with deep-seated knowledge and competency derived from hands-on experience with cyber, information, software and cloud computing infrastructure security.
Certified Information Systems Security Professional (CISSP) Review Seminar
Led by an (ISC)² authorized instructor, this training seminar provides a comprehensive review of information security concepts and industry best practices, covering the 8 domains of the CISSP CBK:
Cloud Computing Contracts: Privacy Act Compliance
This course gives non-lawyers an overview of the privacy issues typically raised by Cloud Computing Contracts for Australian organisations.
Cyber Threat Analysis
Advisors and analysts who understand well the national security, financial and political impacts of cybercrime, cyber-espionage, and cyber-terrorism but want a deeper understanding of the technology and activities behind topics such as the Dark Web, Bot-nets, Bitcoin, Cryptoware, Watering-holes, Man-in-the-Middle and the like will value Cyber Threat Analysis.
Data Breach Notification in Australia
This 2 hour on-line session provides an overview of the new data breach notification obligations, introduced by the Privacy Amendment (Notifiable Data Breaches) Bill and to become effective in February 2018. The new law will be reviewed in detail as will other obligations to notify of unauthorised access to or disclosure of information.
Defensive Cyber Operations
Defensive Cyber Operations is an essential course for technical staff in a Defence Cyber Operations (DCO) role. Over five days participants will learn about the technical environment, fundamental principles and tactics, techniques, tools and procedures involved with DCO. Completing the course participants will have the well-rounded knowledge and experience on which to build their abilities. Practical training is underpinned by theoretical education.
IAPP Certified Information Privacy Manager (CIPM)
TWO DAYS TO A CAREER UPGRADE
Our two-day privacy training class is a robust, interactive way to learn the critical privacy concepts that are integral to the Certified Information Privacy Manager (CIPM) certification exam.
Introduction to Australian Privacy Law
Want to know about privacy in Australia? This 2 hour on-line course provides a brief introduction to the main piece of privacy legislation in Australia, the Australian Privacy Act 1988, with a particular focus on aspects relevant to IT and information security professionals. It will outline the structure of the Act, go through all of the Australian Privacy Principles and cover the powers available to the Australian Privacy Commissioner.
ISO 27003 ISMS Implementation
In this one-day seminar, IT Security Training Australia introduces the ISMS based on ISO 27001 ( which used to be AS 7799.2), the International Standard for Information Security Management It also covers the associated international standard, ISO 27002 and related State Government standards.
ISO/IEC 27001 ISMS Introduction & Overview
For those wanting a high level understanding of an Information Security Management System (ISMS) based on IEC/ISO 27001:2013, this is a good place to start.
ISO/IEC 27001 Lead Auditor Course
The ISO/IEC 27001 Lead Auditor Course five-day intensive course enables participants to develop the necessary expertise to audit an Information Security Management System (ISMS) and to manage a team of auditors by applying widely recognized audit principles, procedures and techniques.
ISO/IEC 27001 Lead Auditor Course: Elearning
This is the on-line version of the 5-day instructor led class. Including 40 hours of content, the on-line course:
Meta Data Retention Obligations In Australia
Are you interested in the Australian laws passed in 2015 which now require certain organisations to retain ‘meta-data’ for 2 years? This 2 hour on-line session provides an overview of the amendments to the Telecommunications (Interception and Access) Act and what they mean in practical terms for the compulsory retention of meta-data in Australia.
Offensive Cyber Operations
Offensive Cyber Operations is a course for operators interested in developing planning, management and technical skills. Over five days participants will learn the Offensive Cyber Tradecraft (OCT) Taxonomy. Completing the course participants will have the well-rounded knowledge, frameworks and experience on which to build future learning.
Register via IT Security Training Australia and receive a free copy of the (ISC)2 Official Guide to the CISSP.
Privacy & Confidentiality Law For Information Security Professionals
This course covers the law of privacy and confidentiality in Australia, with a particular focus on aspects relevant to information security professionals. It is also designed so that organisations understand the Privacy Act amendments effective 12th March 2014 and what those changes might mean for them.
Privacy Impact Assessment Workshop
This 1/2 day hands-on workshop helps participants understand how to prepare for and carry out a privacy impact assessment (PIA) in their own organisations.
Privacy Management Framework
This 2 hour live on-line session focuses on the OAIC’s Privacy Management Framework and what it means for entities subject to the Privacy Act 1988 (Cth), (as updated in March 2014). In March 2015 the Office of the Australian Information Commissioner (OAIC) released guidance on an Privacy Management Framework which provides steps the OAIC expects regulated entities to take to meet their obligations under Australian Privacy Principle (APP) 1.
Secure Systems Certified Professional (SSCP®) Review Seminar
The SSCP® Certification is an internationally recognised qualification especially designed for network and systems administrators who implement policies, standards, and procedures on the various hardware and software programs for which they are responsible.
Security Incident Response Workshop
In today’s complex world, an appropriate and usable incident response plan to deal with inevitable incidents and unforeseeable events and an agile, incident response capability are essential. How you prepare for and respond can minimise the impact of a damaging security incident. One of the most important ways to prepare is to ensure you have an effective information security incident response strategy. Being prepared will be even more important once mandatory data br
Technology Supply Chain Management: Contract Provisions
This course will give non-lawyers an overview of some of the legal issues typically raised by contracts with outsourced service providers and cloud computing companies for Australian organisations. It is designed specifically for information security practitioners to help them identify possible issues but will be of interest to procurement teams and others with any involvement with negotiating or assessing the risks involved with entering third party technology contracts.
What the new EU Data Protection Regulation means for Australia
After over four years of discussion, the new EU data protection framework has finally been adopted. Taking the form of a Regulation, the General Data Protection Regulation (GDPR) will replace the current Directive and will be directly applicable in all EU Member States without the need for implementing national legislation. Although it does not apply until 25 May 2018, the GPDR contains some onerous obligations, many of which will take time to prepare for.