Certified Cloud Security Professional (CCSP) Review Seminar
Backed by the two leading non-profits focused on cloud and information security, the Cloud Security Alliance (CSA) and (ISC)², the CCSP credential denotes professionals with deep-seated knowledge and competency derived from hands-on experience with cyber, information, software and cloud computing infrastructure security.
Certified Information Systems Security Professional (CISSP) Review Seminar
Led by an (ISC)² authorized instructor, this training seminar provides a comprehensive review of information security concepts and industry best practices, covering the 8 domains of the CISSP CBK:
CSSLP - Certified Secure Software Lifecycle Professional
Too often there’s a “patch approach” to keeping software and applications safe — but not on your watch. You make sure security isn’t an after-thought.
Prove you’re an expert with the CSSLP: a global software security certification that recognizes those who have leading application security skills.
FREE - (ISC)2 Information Session
IT Security Training Australia is an official training partner of (ISC)², The World’s Leading Cybersecurity and IT Security Professional Organization
You face immense pressure to stay ahead of attacks and up-to-date in our ever-changing security profession. But you aren’t alone.
FREE - IAPP Information Session
The IAPP is the largest and most comprehensive global information privacy community and resource. Founded in 2000, the IAPP is a not-for-profit organization that helps define, support and improve the privacy profession globally. A globally recognised IAPP credential after your name will distinguish you from others in your field and advance your skills.
FREE - Introduction to the EU GDPR for Australian Businesses
The new EU data protection framework, the General Data Protection Regulation (GDPR), came into effect in May 2018. This FREE on-line course provides an overview of what has changed through the introduction of the GDPR and how those changes might affect Australian organisations.
GDPR - Data Processing Agreements
GDPR – Data Processing Agreements and EU Standard Contractual Clauses - Their Application and Contents
This 2 hour on-line session provides an overview of the EU GDPR requirements for agreements between data controllers and data processors (and others) concerning the processing of EU residents’ personal data.
IAPP Certified Information Privacy Manager (CIPM)
TWO DAYS TO A CAREER UPGRADE
Our two-day privacy training class is a robust, interactive way to learn the critical privacy concepts that are integral to the Certified Information Privacy Manager (CIPM) certification exam.
IAPP Certified Information Privacy Professional / Europe (CIPP/E)
PRIVACY’S PREMIER EUROPEAN DATA PROTECTION CERTIFICATION.
Developed in collaboration with the law firms, Bird and Bird, Field Fisher, Wilson/Sonsini and Covington and Burling, the CIPP/E encompasses pan-European and national data protection laws, key privacy terminology and practical concepts concerning the protection of personal data and trans-border data flows.
EU GDPR Compliance Obligations for Australian Businesses
The new EU data protection framework - the General Data Protection Regulation (GDPR) - came into effect in May 2018. The GDPR has increased the protection of personal data by introducing a range of strengthened provisions, affecting both data controllers and processors. Most importantly, the operation of the GDPR has been extended beyond EU territorial borders and now applies to many Australian businesses.
Data Breach Notification in Australia
This 2 hour on-line session provides an overview of the Australian data breach notification obligations, introduced by the Privacy Amendment (Notifiable Data Breaches) Bill , and which became effective in February 2018. The new data breach laws will be reviewed in detail as will other obligations to notify of unauthorised access to or disclosure of information, applicable to Australian organisations.
Technology Supply Chain Management: Contract Provisions
This course will give non-lawyers an overview of some of the legal issues typically raised by contracts with outsourced service providers and cloud computing companies for Australian organisations. It is designed specifically for information security practitioners to help them identify possible issues but will be of interest to procurement teams and others with any involvement with negotiating or assessing the risks involved with entering third party technology contracts.
Introduction to ISO 27001
For those wanting a high-level understanding of an Information Security Management System (ISMS) based on IEC/ISO 27001:2013, this is a good place to start.
Cloud Computing Contracts: Privacy Act Compliance
This course gives non-lawyers an overview of the privacy issues typically raised by Cloud Computing Contracts for Australian organisations.
Introduction to Australian Privacy Law
Want to know about privacy in Australia? This 2 hour on-line course provides a brief introduction to the main piece of privacy legislation in Australia, the Australian Privacy Act 1988, with a particular focus on aspects relevant to IT and information security professionals. It will outline the structure of the Act, go through all of the Australian Privacy Principles and cover the powers available to the Australian Privacy Commissioner.
Meta Data Retention Obligations In Australia
Are you interested in the Australian laws passed in 2015 which now require certain organisations to retain ‘meta-data’ for 2 years? This 2 hour on-line session provides an overview of the amendments to the Telecommunications (Interception and Access) Act and what they mean in practical terms for the compulsory retention of meta-data in Australia.
ISO 27003 ISMS Implementation
In this one-day seminar, IT Security Training Australia introduces the ISMS based on ISO 27001 ( which used to be AS 7799.2), the International Standard for Information Security Management It also covers the associated international standard, ISO 27002 and related State Government standards.
Privacy Impact Assessment Workshop
This 1/2 day hands-on workshop helps participants understand how to prepare for and carry out a privacy impact assessment (PIA) in their own organisations.
Privacy Management Framework
This 2 hour live on-line session focuses on the OAIC’s Privacy Management Framework and what it means for entities subject to the Privacy Act 1988 (Cth), (as updated in March 2014). In March 2015 the Office of the Australian Information Commissioner (OAIC) released guidance on an Privacy Management Framework which provides steps the OAIC expects regulated entities to take to meet their obligations under Australian Privacy Principle (APP) 1.
Cyber Threat Analysis
Advisors and analysts who understand well the national security, financial and political impacts of cybercrime, cyber-espionage, and cyber-terrorism but want a deeper understanding of the technology and activities behind topics such as the Dark Web, Bot-nets, Bitcoin, Cryptoware, Watering-holes, Man-in-the-Middle and the like will value Cyber Threat Analysis.
Defensive Cyber Operations
Defensive Cyber Operations is an essential course for technical staff in a Defence Cyber Operations (DCO) role. Over five days participants will learn about the technical environment, fundamental principles and tactics, techniques, tools and procedures involved with DCO. Completing the course participants will have the well-rounded knowledge and experience on which to build their abilities. Practical training is underpinned by theoretical education.
ISO/IEC 27001 Lead Auditor Course
The ISO/IEC 27001 Lead Auditor Course five-day intensive course enables participants to develop the necessary expertise to audit an Information Security Management System (ISMS) and to manage a team of auditors by applying widely recognized audit principles, procedures and techniques.
ISO/IEC 27001 Lead Auditor Course: Elearning
This is the on-line version of the 5-day instructor led class. Including 40 hours of content, the on-line course:
Offensive Cyber Operations
Offensive Cyber Operations is a course for operators interested in developing planning, management and technical skills. Over five days participants will learn the Offensive Cyber Tradecraft (OCT) Taxonomy. Completing the course participants will have the well-rounded knowledge, frameworks and experience on which to build future learning.
Register via IT Security Training Australia and receive a free copy of the (ISC)2 Official Guide to the CISSP.
Privacy & Confidentiality Law For Information Security Professionals
This course covers the law of privacy and confidentiality in Australia, with a particular focus on aspects relevant to information security professionals. It is also designed so that organisations understand the Privacy Act amendments effective 12th March 2014 and what those changes might mean for them.
Secure Systems Certified Professional (SSCP®) Review Seminar
The SSCP® Certification is an internationally recognised qualification especially designed for network and systems administrators who implement policies, standards, and procedures on the various hardware and software programs for which they are responsible.
Security Incident Response Workshop
In today’s complex world, an appropriate and usable incident response plan to deal with inevitable incidents and unforeseeable events and an agile, incident response capability are essential. How you prepare for and respond can minimise the impact of a damaging security incident. One of the most important ways to prepare is to ensure you have an effective information security incident response strategy. Being prepared will be even more important once mandatory data br