IT Security Training Australia is an Australian training company specialising in professional privacy and information security training courses, with certified products from a number of global partners that we are qualified to deliver to the Australian market.
Below is a list of all training. Use the filters on the side to refine your search.

(ISC)² and the Cloud Security Alliance (CSA) developed the Certified Cloud Security Professional (CCSP) credential to ensure that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks.

Led by an (ISC)² authorized instructor, this training seminar provides a comprehensive review of information security concepts and industry best practices, covering the 8 domains of the CISSP CBK:

This 2 hour on-line session is designed for people who’ve done their study and other preparation and want to check their readiness to take their exam. It’s intended to give people an opportunity to check their knowledge and practice answering multiple choice questions.

This 1.5 hour on-line session is designed for people who’ve done their study and other preparation and want to check their readiness to take their exam. It’s intended to give people an opportunity to check their knowledge and practice answering multiple choice questions.

The IAPP is the largest and most comprehensive global information privacy community and resource. Founded in 2000, the IAPP is a not-for-profit organization that helps define, support and improve the privacy profession globally. A globally recognised IAPP credential after your name will distinguish you from others in your field and advance your skills.

The new EU data protection framework, the General Data Protection Regulation (GDPR), came into effect in May 2018. This FREE on-line course provides an overview of what has changed through the introduction of the GDPR and how those changes might affect Australian organisations.

GDPR – Data Processing Agreements and EU Standard Contractual Clauses - Their Application and Contents
This 2 hour on-line session provides an overview of the EU GDPR requirements for agreements between data controllers and data processors (and others) concerning the processing of EU residents’ personal data.

$500 Discount when you register for both CIPM and CIPP/E together
TWO DAYS TO A CAREER UPGRADE
Our two-day privacy training class is a robust, interactive way to learn the critical privacy concepts that are integral to the Certified Information Privacy Manager (CIPM) certification exam.

$500 Discount when you register for both CIPM and CIPP/E together
SPECIAL DISCOUNT PRICE: $1,980 inc GST
OUR NEW ONLINE CIPM TRAINING COURSE - 6 x 3-hour instructor led on-line training sessions

$500 Discount when you register for both CIPP/E and CIPM together
PRIVACY’S PREMIER EUROPEAN DATA PROTECTION CERTIFICATION.

******* SPECIAL DISCOUNTED COVID PRICING *******
$500 Discount when you register for both CIPP/E and CIPM together

Our two-day privacy training class is a robust, interactive way to learn the critical privacy concepts that are integral to the Certified Information Privacy Technologist (CIPT) certification exam. Training is appropriate for professionals who plan to certify, as well for those who want to deepen their privacy knowledge. This training in not just a test prep course, nor does taking training guarantee you’ll pass your exam (hey, it’s not that easy).

Gain the CISM. Enhance your competitive advantage. Demonstrate your information security management expertise.
CISM, or Certified Information Systems Manager, This CISM certification displays an individual’s detailed knowledge and extensive experience of security management, hence is a valuable qualification to hold.

This 2 hour on-line session provides an overview of the Australian data breach notification obligations, introduced by the Privacy Amendment (Notifiable Data Breaches) Bill , and which became effective in February 2018. The new data breach laws will be reviewed in detail as will other obligations to notify of unauthorised access to or disclosure of information, applicable to Australian organisations.

For those wanting a high-level understanding of an Information Security Management System (ISMS) based on IEC/ISO 27001:2013, this is a good place to start.


This course gives non-lawyers an overview of the privacy issues typically raised by Cloud Computing Contracts for Australian organisations.

In this one-day seminar, IT Security Training Australia introduces the ISMS based on ISO 27001 ( which used to be AS 7799.2), the International Standard for Information Security Management It also covers the associated international standard, ISO 27002 and related State Government standards.

This 1/2 day hands-on workshop helps participants understand how to prepare for and carry out a privacy impact assessment (PIA) in their own organisations.

This 2 hour live on-line session focuses on the OAIC’s Privacy Management Framework and what it means for entities subject to the Privacy Act 1988 (Cth), (as updated in March 2014). In March 2015 the Office of the Australian Information Commissioner (OAIC) released guidance on an Privacy Management Framework which provides steps the OAIC expects regulated entities to take to meet their obligations under Australian Privacy Principle (APP) 1.

The ISO/IEC 27001 Lead Auditor Course five-day intensive course enables participants to develop the necessary expertise to audit an Information Security Management System (ISMS) and to manage a team of auditors by applying widely recognized audit principles, procedures and techniques.

This course covers the law of privacy and confidentiality in Australia, with a particular focus on aspects relevant to information security professionals. It is also designed so that organisations understand the Privacy Act amendments effective 12th March 2014 and what those changes might mean for them.

The SSCP® Certification is an internationally recognised qualification especially designed for network and systems administrators who implement policies, standards, and procedures on the various hardware and software programs for which they are responsible.

In today’s complex world, an appropriate and usable incident response plan to deal with inevitable incidents and unforeseeable events and an agile, incident response capability are essential. How you prepare for and respond can minimise the impact of a damaging security incident. One of the most important ways to prepare is to ensure you have an effective information security incident response strategy. Being prepared will be even more important once mandatory data br