Online or onsite, instructor-led live Information Security Risk training courses demonstrate through interactive discussion and hands-on practice the fundamentals and advanced topics of Information Security Risk.
Information Security Risk training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live Information Security Risk training can be carried out locally on customer premises in Cardiff or in NobleProg corporate training centers in Cardiff.
NobleProg -- Your Local Training Provider
Cardiff
Radisson Blu Hotel, Meridian Gate - Bute Terrace, Cardiff, united kingdom, CF10 2FL
The Radisson Blu Hotel in Cardiff city centre is the perfect hub for your Welsh adventure
Close to several public transportation options, our hotel in Cardiff puts the city centre at your fingertips. Catch a train or a bus at one of the nearby stations, or take the M4 motorway and drive wherever you want to go in Wales and beyond. For those flying into the city, the Cardiff International Airport is just a 30-minute drive from the hotel. You’ll find parking around the hotel at the John Lewis, St David’s II and NCP Pellet Street car parks, plus some parking at the hotel. Enjoy shopping and dining within walking distance of the hotel, and explore the colourful history of this thriving capital city.
The hotel is located on Bute Terrace providing easy access to the M4 at junction 32 only 6 km away.
The central train and bus station is located within a five-minute walk from the hotel.
Cardiff International Airport is located 24 km from the hotel and can be reached by bus, train or taxi.
This instructor-led, live training in Cardiff (online or onsite) is aimed at intermediate-level to advanced-level IT professionals and business leaders who wish to develop a structured approach to handling data breaches.
By the end of this training, participants will be able to:
Understand the causes and consequences of data breaches.
Develop and implement data breach prevention strategies.
Establish an incident response plan to contain and mitigate breaches.
Conduct forensic investigations and assess the impact of breaches.
Comply with legal and regulatory requirements for breach notification.
Recover from data breaches and strengthen security postures.
This instructor-led, live training in Cardiff (online or onsite) is aimed at developers who wish to integrate Snyk into their development tools to find and fix security issues in their code.
By the end of this training, participants will be able to:
Understand the features and structure of Snyk.
Use Snyk to find and fix code security issues.
Integrate Snyk in a software development lifecycle.
This instructor-led, live training in Cardiff (online or onsite) is aimed at beginner to intermediate-level system administrators and security professionals who wish to learn how to implement Cloudflare for content delivery and cloud security, as well as mitigate DDoS attacks.
By the end of this training, participants will be able to:
Configure Cloudflare for their websites.
Set up DNS records and SSL certificates.
Implement Cloudflare for content delivery and caching.
Protect their websites from DDoS attacks.
Implement firewall rules to restrict traffic to their websites.
Course Description
A comprehensive course focused on AI security, governance, compliance, and risk management for enterprise implementations. Designed for security professionals, compliance officers, and technology leaders responsible for secure AI deployment and governance frameworks.
Who is it for:
Anyone who is involved in the areas of information security and information assurance.
What will I learn:
Candidates should be able to demonstrate:
How the management of information risk will bring about significant business benefits.
How to explain and make full use of information risk management terminology.
How to conduct threat and vulnerability assessments, business impact analyses and risk assessments.
The principles of controls and risk treatment.
How to present the results in a format which will form the basis of a risk treatment plan.
This instructor-led, live training in Cardiff (online or onsite) is aimed at supply chain professionals who wish to establish effective control and oversight of their supply chain, especially as it relates to cybersecurity.
By the end of this training, participants will be able to:
Understand the security oversights that can bring about significant damage and disruption to a supply chain.
Break down a complex security problem into manageable and actionable parts.
Address common supply chain vulnerabilities by analyzing high risk areas and engaging with stakeholders.
Adopt best practices in securing a supply chain.
Noticeably reduce or eliminate the biggest risks to an organization's supply chain.
This instructor-led, live training in Cardiff (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
Understand the key concepts of the HiTrust CSF (Common Security Framework).
Identify the HITRUST CSF administrative and security control domains.
Learn about the different types of HiTrust assessments and scoring.
Understand the certification process and requirements for HiTrust compliance.
Know the best practices and tips for adopting the HiTrust approach.
This training course teaches how risk assessment for information security is done by combining the information on ISO/IEC 27005:2022 and ISO/IEC 27001. In addition to theoretical knowledge, this training course is equipped with practical exercises, quizzes, case studies, all of which make it a very engaging training course.
Description:
This is a 'Practitioner' course and leans heavily on practical exercises designed to reinforce the concepts being taught and to build the delegates' confidence in implementing business continuity management. The course is also designed to encourage debate, and the sharing of knowledge and experience between students.
Delegates will benefit from the practical and extensive experiences of ours trainers who are practicing business continuity management and ISO 22301:2019 specialists.
Delegates will learn how to:
Explain the need for business continuity management (BCM) in all organisations
Define the business continuity lifecycle
Conducting business continuity programme management
Understand their organisation sufficiently to identify mission-critical impact areas
Determine their organisation's business continuity strategy
Establish a business continuity response
Exercise, maintain and review plans
Embed business continuity in an organisation
Define terms and definitions appropriate to business continuity
By the end of the course, delegates will have a detailed understanding of all the key components of business continuity management and be able to return to their work, making a significant contribution to the business continuity management process.
Read more...
Last Updated:
Provisional Upcoming Courses (Contact Us For More Information)
Online Information Security Risk training in Cardiff, Information Security Risk training courses in Cardiff, Weekend Information Security Risk courses in Cardiff, Evening Information Security Risk training in Cardiff, Information Security Risk instructor-led in Cardiff, Information Security Risk boot camp in Cardiff, Weekend Information Security Risk training in Cardiff, Evening Information Security Risk courses in Cardiff, Information Security Risk classes in Cardiff, Information Security Risk private courses in Cardiff, Information Security Risk instructor in Cardiff, Information Security Risk on-site in Cardiff, Information Security Risk coaching in Cardiff, Information Security Risk one on one training in Cardiff, Information Security Risk trainer in Cardiff, Information Security Risk instructor-led in Cardiff, Online Information Security Risk training in Cardiff