Online or onsite, instructor-led live Security Management training courses demonstrate through interactive discussion and hands-on practice how to carry out Security Management.
Security Management training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live Security Management training can be carried out locally on customer premises in Edinburgh or in NobleProg corporate training centers in Edinburgh.
NobleProg -- Your Local Training Provider
Edinburgh
83 Princes Street , Edinburgh, united kingdom, EH2 2ER
The training rooms is located under a 10 minute walk from Edinburgh Rail Station
This centre's location on Edinburgh's world-famous Princes Street takes some beating. Right in the centre of Scotland's capital city, these prestigious business premises are spread across six floors with fantastic views over Princes Street Gardens towards the Royal Mile and Edinburgh Castle. As well as having all the usual amenities of a major city on its doorstep, the building also has a car park. Prosperous Edinburgh is a global centre for business, science, education and the arts and is said to have the strongest economy of any UK city outside London. Banking has been a part of the economic life of Edinburgh for over 300 years and today it is the UK's second financial centre after London and Europe's fourth by equity assets. Tourism, financial services and banking are particularly important employers as well as education, the public sector and hi-tech research and development.
See all locations in Edinburgh
This instructor-led, live training in Edinburgh (online or onsite) is aimed at intermediate-level IT auditors who wish to effectively incorporate AI tools in their audit practices.
By the end of this training, participants will be able to:
Grasp the core concepts of artificial intelligence and how it is applied in the context of IT auditing.
Utilize AI technologies such as machine learning, NLP, and RPA to improve audit efficiency, accuracy, and scope.
Perform risk assessments using AI tools, enabling continuous monitoring and proactive risk management.
Integrate AI into audit planning, execution, and reporting, enhancing the overall effectiveness of IT audits.
This instructor-led, live training in Edinburgh (online or onsite) is aimed at advanced-level security analysts who wish to elevate their skills in utilizing advanced Micro Focus ArcSight ESM content to improve an organization's ability to detect, respond, and mitigate cyber threats with greater precision and speed.
By the end of this training, participants will be able to:
Optimize the use of Micro Focus ArcSight ESM to enhance monitoring and threat detection capabilities.
Construct and manage advanced ArcSight variables to refine event streams for more precise analysis.
Develop and implement ArcSight lists and rules for effective event correlation and alerting.
Apply advanced correlation techniques to identify complex threat patterns and reduce false positives.
This instructor-led, live training in Edinburgh (online or onsite) is aimed at beginner-level security professionals who wish to gain the knowledge and skills necessary to adapt to the rapidly evolving digital landscape in the security industry.
By the end of this training, participants will be able to:
Understanding Digital Transformation in security.
Learn how digital solutions can improve security operations, efficiency, and effectiveness.
Manage security-related data for informed decision-making.
This instructor-led, live training in Edinburgh (online or onsite) is aimed at beginner-level security managers who wish to effectively embrace and utilize technology in their field.
By the end of this training, participants will be able to:
Understand the evolution of technology in security.
Learn how to effectively blend traditional security methods with modern technological solutions.
Understand the basics of cybersecurity, risks associated with digital systems, and how to protect against cyber threats in the security industry.
This instructor-led, live training in Edinburgh (online or onsite) is aimed at beginner-level security managers and designers who wish to effectively plan, design, and implement security strategies that are integrated, technologically advanced, and compliant with legal and ethical standards.
By the end of this training, participants will be able to:
Learn how to integrate security considerations into architectural and facility design.
Assess threats and vulnerabilities to inform security planning.
Develop comprehensive security plans that address a range of threats.
Create effective emergency response and crisis management plans.
This instructor-led, live training in Edinburgh (online or onsite) is aimed at beginner-level security administrators who wish to deepen their understanding of security practices within an organization.
By the end of this training, participants will be able to:
Understand the fundamentals of security operations and administration.
Identify and mitigate various security threats and vulnerabilities.
Implement and manage security solutions.
Understand legal and ethical considerations in security operations.
Prepare for incident response and disaster recovery.
This instructor-led, live training in Edinburgh (online or onsite) is aimed at advanced-level professionals who wish to gain a comprehensive understanding of fraud examination concepts and prepare for the Certified Fraud Examiner (CFE) exam.
By the end of this training, participants will be able to:
Gain comprehensive knowledge of fraud examination principles and the fraud examination process.
Learn to identify, investigate, and prevent various types of financial fraud schemes.
Understand the legal environment related to fraud, including the legal elements of fraud, relevant laws, and regulations.
Acquire practical skills in conducting fraud investigations, including evidence collection, interviewing techniques, and data analysis.
Learn to design and implement effective fraud prevention and deterrence programs within organizations.
Gain confidence and knowledge to successfully pass the Certified Fraud Examiner (CFE) exam.
This instructor-led, live training in Edinburgh (online or onsite) is aimed at advanced-level security managers who wish to be well-equipped with the knowledge and skills needed to excel in the exam and their roles as security management professionals.
By the end of this training, participants will be able to:
Understand the five domains of ISSMP.
Develop skills to manage an information security program.
Learn to establish and maintain security governance.
Gain insights into risk management, incident response, and continuity planning.
Prepare effectively for the ISSMP certification exam.
This instructor-led, live training in Edinburgh (online or onsite) is aimed at IT professionals who wish to understand how to use the CipherTrust Solution suite.
By the end of this training, participants will be able to:
Understand the CipherTrust Solution and its basic functions.
Description:
Disclaimer: Please be advised that this updated CISM exam content outline is applicable to exams starting 1 June 2022.
CISM® is the most prestigious and demanding qualification for Information Security Managers around the globe today. This qualification provides you with a platform to become part of an elite peer network who have the ability to constantly learn and relearn the growing opportunities/ challenges in Information Security Management.
Our CISM training methodology provides an in-depth coverage of contents across the Four CISM domains with a clear focus on building concepts and solving ISACA released CISM exam questions. The course is an intense training and hard-core exam preparation for ISACA’s Certified Information Security Manager (CISM®) Examination.
Our instructors encourage all attending delegates to go through the ISACA released CISM QA&E (Questions, Answers and Explanations) as exam preparation. The QA&E is exceptional in helping delegates understand the ISACA style of questions, approach to solving these questions and it helps rapid memory assimilation of the CISM concepts during live classroom sessions. All our trainers have extensive experience in delivering CISM training. We will thoroughly prepare you for the CISM examination.
Goal:
The ultimate goal is to pass your CISM examination first time.
Objectives:
Use the knowledge gained in a practical manner beneficial to your organisation
Establish and maintain an Information security governance framework to achieve your organization goals and objectives
Manage Information risk to an acceptable level to meet the business and compliance requirements
Establish and maintain information security architectures (people, process, technology)
Integrate information security requirements into contracts and activities of third parties/ suppliers
Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact
Target Audience:
Security professionals with 3-5 years of front-line experience
Information security managers or those with management responsibilities
Information security staff, information security assurance providers who require an in-depth understanding of information security management including: CISO’s, CIO’s, CSO’s, privacy officers, risk managers, security auditors and compliance personnel, BCP / DR personnel, executive and operational managers responsible for assurance functions
This instructor-led, live training in Edinburgh (online or onsite) is aimed at security professionals who wish to learn and improve how to handle security threats and perform security risk assessments.
By the end of this training, participants will be able to:
Manage security systems and handle any hostile environment.
This instructor-led, live training in Edinburgh (online or onsite) is aimed at beginner-level professionals who wish to gain an understanding of ISO 27001 and its role in enhancing information security within an organization.By the end of this training, participants will be able to:
Understand the purpose and benefits of an ISMS.
Familiarize themselves with key ISO 27001 concepts, terms, and principles.
Recognize the role of an auditor in ensuring compliance.
Gain insight into the audit process and continual improvement within ISO 27001.
This instructor-led, live training in Edinburgh (online or onsite) is aimed at intermediate-level cybersecurity professionals who wish to enhance their understanding of GRC frameworks and apply them to secure and compliant business operations.
By the end of this training, participants will be able to:
Understand the key components of cybersecurity governance, risk, and compliance.
Conduct risk assessments and develop risk mitigation strategies.
Implement compliance measures and manage regulatory requirements.
Develop and enforce security policies and procedures.
This instructor-led, live training in Edinburgh (online or onsite) is aimed at developers and anyone who wishes to learn and use OAuth to provide applications with secure delegated access.
By the end of this training, participants will be able to:
Learn the fundamentals of OAuth.
Understand the native applications and their unique security issues when using OAuth.
Learn and understand the common extensions to the OAuth protocols.
This instructor-led, live training in Edinburgh (online or onsite) is aimed at intermediate to expert-level IT professionals who wish to enhance their skills and qualifications in information security or related fields.
By the end of this training, participants will be able to:
Understand the differences between ISO/IEC 27001:2013 and ISO/IEC 27001:2022.
Gain the knowledge and skills to plan and implement the transition from the 2013 to the 2022 version of the standard efficiently.
Apply the knowledge in real-world scenarios, facilitating a smooth transition in their respective organizations.
This instructor-led, live training in Edinburgh (online or onsite) is aimed at intermediate-level system administrators who wish to learn how to use Siteminder to implement various authentication methods.
By the end of this training, participants will be able to:
Understand the core concepts of Siteminder and its role in authentication and access management.
Configure and manage user authentication with Siteminder.
Implement various authentication methods supported by Siteminder.
Troubleshoot common issues related to Siteminder authentication.
Integrate Siteminder with other identity providers for federated authentication.
ISO/IEC 27002 Lead Manager training enables you to develop the necessary expertise and knowledge to support an organization in implementing and managing Information Security controls as specified in ISO/IEC 27002.
After completing this course, you can sit for the exam and apply for the “PECB Certified ISO/IEC 27002 Lead Manager” credential. A PECB Lead Manager Certification, proves that you have mastered the principles and techniques for the implementation and management of Information Security Controls based on ISO/IEC 27002.
Who should attend?
Managers or consultants seeking to implement an Information Security Management System (ISMS) based on ISO/IEC 27001 and ISO/IEC 27002
Project managers or consultants seeking to master the Information Security Management System implementation process
Individuals responsible for the information security, compliance, risk, and governance, in an organization
Members of information security teams
Expert advisors in information technology
Information Security officers
Privacy officers
IT professionals
CTOs, CIOs and CISOs
Learning objectives
Master the implementation of Information Security controls by adhering to the framework and principles of ISO/IEC 27002
Gain a comprehensive understanding of the concepts, approaches, standards, methods and techniques required for the effective implementation and management of Information Security controls
Comprehend the relationship between the components of Information Security controls, including responsibility, strategy, acquisition, performance, conformance, and human behavior
Understand the importance of information security for the strategy of the organization
Master the implementation of information security management processes
Master the formulation and implementation of security requirements and objectives
Educational approach
This training is based on both theory and practice
Sessions of lectures illustrated with examples based on real cases
Practical exercises based on case studies
Review exercises to assist the exam preparation
Practice test similar to the certification exam
General Information
Certification fees are included on the exam price
Training material containing over 500 pages of information and practical examples will be distributed to the participants
A participation certificate of 31 CPD (Continuing Professional Development) credits will be issued to the participants
In case of exam failure, you can retake the exam within 12 months for free
Course Description
A comprehensive course focused on AI security, governance, compliance, and risk management for enterprise implementations. Designed for security professionals, compliance officers, and technology leaders responsible for secure AI deployment and governance frameworks.
Description:
Basel III is a global regulatory standard on bank capital adequacy, stress testing and market liquidity risk. Having initially been agreed upon by the Basel Committee on Banking Supervision in 2010–11, changes to The Accord have extended implementation to 31st March 2019. Basel III strengthens bank capital requirements by increasing bank liquidity and decreasing bank leverage.
Basel III differs from Basel I & II in that it requires different levels of reserves for different forms of deposits and other types of borrowings, so it does not supersede them so much as it does work alongside Basel I and Basel II.
This complex and constantly changing landscape can be hard to keep up with, our course and training will help you manage likely changes and their impact on your institution. We are accredited with and a training partner to the Basel Certification Institute and as such the quality and suitability of our training and material is guaranteed to be up to date and effective
Objectives:
Preparation for the Certified Basel Professional Examination.
Define hands-on strategies and techniques for the definition, measurement, analysis, improvement, and control of operational risk within a banking organization.
Target Audience:
Board members with risk responsibilities
CROs and Heads of Risk Management
Members of the Risk Management team
Compliance, legal and IT support staff
Equity and Credit Analysts
Portfolio Managers
Rating Agency Analysts
Overview:
Introduction to Basel norms and amendments to the Basel Accord (III)
Regulations for market, credit, counterparty and liquidity risk
Stress testing for various risk measures including how to formulate and deliver stress tests
The likely effects of Basel III on the international banking industry, including demonstrations of its practical application
Who is it for:
Anyone with an interest in information security, whether as a career or for general business knowledge.
This certificate is relevant to anyone requiring an understanding of Information Security Management Principles as well as those with an interest in information security either as a potential career or as an additional part of their general business knowledge. It is very much a firm foundation on which other qualifications can be built or which provides a thorough general understanding to enable organisations to begin to ensure their information is protected appropriately.
What will I learn:
Candidates should be able to demonstrate:
Knowledge of the concepts relating to information security management.
Understanding of current national legislation and regulations which impact upon information security management.
Awareness of current national and international standards, frameworks and organisations which facilitate the management of information security.
Understanding of the current business and common technical environments in which information security management must operate.
Knowledge of the categorisation, operation and effectiveness of controls of different types and characteristics.
Who is it for:
Anyone with an interest in information security, whether as a career or for general business knowledge.
This certificate is relevant to anyone requiring an understanding of Information Security Management Principles as well as those with an interest in information security either as a potential career or as an additional part of their general business knowledge. It is very much a firm foundation on which other qualifications can be built or which provides a thorough general understanding to enable organisations to begin to ensure their information is protected appropriately.
What will I learn:
Candidates should be able to demonstrate:
Knowledge of the concepts relating to information security management.
Understanding of current national legislation and regulations which impact upon information security management.
Awareness of current national and international standards, frameworks and organisations which facilitate the management of information security.
Understanding of the current business and common technical environments in which information security management must operate.
Knowledge of the categorisation, operation and effectiveness of controls of different types and characteristics.
Note: This is the four day course which adds one additional day to the standard delivery to provide more time for exam preparation and practice exercises.
Who is it for:
Anyone who is involved in the areas of information security and information assurance.
What will I learn:
Candidates should be able to demonstrate:
How the management of information risk will bring about significant business benefits.
How to explain and make full use of information risk management terminology.
How to conduct threat and vulnerability assessments, business impact analyses and risk assessments.
The principles of controls and risk treatment.
How to present the results in a format which will form the basis of a risk treatment plan.
Description:
This four day event (CGEIT training) is the ultimate preparation for exam time and is designed to ensure that you pass the challenging CGEIT exam on your first attempt.
The CGEIT qualification is an internationally recognised symbol of excellence in IT governance awarded by ISACA. It is designed for professionals responsible for managing IT governance or with significant advisory or assurance responsibility for IT governance.
Achieving CGEIT status will provide you with wider recognition in the marketplace, as well as increased influence at executive level.
Objectives:
This seminar has been designed to prepare Delegates for the CGEIT examination by enabling them to supplement their existing knowledge and understanding to be better prepared to pass the exam, as defined by ISACA.
Target Audience:
Our training course is for IT and business professionals, with significant IT governance experience who are undertaking the CGEIT exam.
This instructor-led, live training in Edinburgh (online or onsite) is aimed at payment services compliance professionals who wish to create, implement, and enforce a compliance program within an organization.
By the end of this training, participants will be able to:
Understand the rules set forth by government regulators for payment service providers.
Create the internal policies and procedures needed to satisfy government regulations.
Implement a compliance program that adheres to relevant laws.
Ensures that all corporate processes and procedures comply with the compliance program.
Uphold the business's reputation while protecting it from lawsuits.
Network security begins at the physical level. In this instructor-led, live training in Edinburgh, participants will learn the security risks related to computer server rooms and how to tighten security through smart practices, planning and technology implementation.
By the end of this training, participants will be able to:
Assess their organization's security risk, as it relates to computer server rooms.
Set up control and monitoring systems to restrict physical access to infrastructure.
Design access policies for different members.
Effectively communicate security policies with team members.
Description:
Cybersecurity skills are in high demand, as threats continue to plague enterprises around the world. An overwhelming majority of professionals surveyed by ISACA recognise this and plan to work in a position that requires cybersecurity knowledge. To fill this gap, ISACA has developed the Cybersecurity Fundamentals Certificate, which provides education and verification of skills in this area.
Objectives:
With cybersecurity threats continuing to rise and the shortage of appropriately-equipped security professionals growing worldwide, ISACA's Cybersecurity Fundamentals Certificate programme is the perfect way to quickly train entry-level employees and ensure they have the skills and knowledge they need to successfully operate in the Cyber arena.
Target Audience:
The certificate program is also one of the best ways to gain foundational knowledge in cybersecurity and begin to build your skills and knowledge in this crucial area.
In this instructor-led, live course in Edinburgh, participants will learn how to formulate the proper security strategy to face the DevOps security challenge.
Course goal:
To ensure that an individual has the core understanding of GRC processes and capabilities, and the skills to integrate governance, performance management, risk management, internal control, and compliance activities.
Overview:
This instructor-led, live training in Edinburgh (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
Understand the key concepts of the HiTrust CSF (Common Security Framework).
Identify the HITRUST CSF administrative and security control domains.
Learn about the different types of HiTrust assessments and scoring.
Understand the certification process and requirements for HiTrust compliance.
Know the best practices and tips for adopting the HiTrust approach.
Why should you attend?
ISO/IEC 27001 Foundation training allows you to learn the basic elements to implement and manage an Information Security Management System as specified in ISO/IEC 27001. During this training course, you will be able to understand the different modules of ISMS, including ISMS policy, procedures, performance measurements, management commitment, internal audit, management review and continual improvement.
After completing this course, you can sit for the exam and apply for the “PECB Certified ISO/IEC 27001 Foundation” credential. A PECB Foundation Certificate shows that you have understood the fundamental methodologies, requirements, framework and management approach.
Who should attend?
Individuals involved in Information Security Management
Individuals seeking to gain knowledge about the main processes of Information Security Management Systems (ISMS)
Individuals interested to pursue a career in Information Security Management
Educational approach
Lecture sessions are illustrated with practical questions and examples
Practical exercises include examples and discussions
Practice tests are similar to the Certification Exam
ISO/IEC 27001 Lead Auditor
ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.
Why should you attend?
During this training course, you will acquire the knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process.
Based on practical exercises, you will be able to master audit techniques and become competent to manage an audit program, audit team, communication with customers, and conflict resolution.
After acquiring the necessary expertise to perform this audit, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Auditor” credential. By holding a PECB Lead Auditor Certificate, you will demonstrate that you have the capabilities and competencies to audit organizations based on best practices.
Who should attend?
Auditors seeking to perform and lead Information Security Management System (ISMS) certification audits
Managers or consultants seeking to master an Information Security Management System audit process
Individuals responsible for maintaining conformance with Information Security Management System requirements
Technical experts seeking to prepare for an Information Security Management System audit
Expert advisors in Information Security Management
Learning objectives
Understand the operations of an Information Security Management System based on ISO/IEC 27001
Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks
Understand an auditor’s role to: plan, lead and follow-up on a management system audit in accordance with ISO 19011
Learn how to lead an audit and audit team
Learn how to interpret the requirements of ISO/IEC 27001 in the context of an ISMS audit
Acquire the competencies of an auditor to: plan an audit, lead an audit, draft reports, and follow-up on an audit in compliance with ISO 19011
Educational approach
This training is based on both theory and best practices used in ISMS audits
Lecture sessions are illustrated with examples based on case studies
Practical exercises are based on a case study which includes role playing and discussions
Practice tests are similar to the Certification Exam
This course will give you the skills to build up information security according to ISO 27005, which is dedicated to information security risk management based on ISO 27001.
ISO/IEC 27005 Lead Risk Manager training enables you to acquire the necessary expertise to support an organization in the risk management process related to all assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework. During this training course, you will gain a comprehensive knowledge of a process model for designing and developing an Information Security Risk Management program. The training will also contain a thorough understanding of best practices of risk assessment methods such as OCTAVE, EBIOS, MEHARI and harmonized TRA. This training course supports the implementation process of the ISMS framework presented in the ISO/IEC 27001 standard.
After mastering all the necessary concepts of Information Security Risk Management based on ISO/IEC 27005, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27005 Lead Risk Manager” credential. By holding a PECB Lead Risk Manager Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to support and lead a team in managing Information Security Risks.
Who should attend?
Information Security risk managers
Information Security team members
Individuals responsible for Information Security, compliance, and risk within an organization
Individuals implementing ISO/IEC 27001, seeking to comply with ISO/IEC 27001 or individuals who are involved in a risk management program
IT consultants
IT professionals
Information Security officers
Privacy officers
Examination - Duration: 3 hours
The “PECB Certified ISO/IEC 27005 Lead Risk Manager” exam fully meets the requirements of the PECB Examination and Certification Programme (ECP). The exam covers the following competency domains:
Domain 1 Fundamental principles and concepts of Information Security Risk Management
Domain 2 Implementation of an Information Security Risk Management program
Domain 3 Information security risk assessment
Domain 4 Information security risk treatment
Domain 5 Information security risk communication, monitoring and improvement
Domain 6 Information security risk assessment methodologies
General Information
Certification fees are included on the exam price
Training material containing over 350 pages of information and practical examples will be distributed
A participation certificate of 21 CPD (Continuing Professional Development) credits will be issued
In case of exam failure, you can retake the exam within 12 months for free
Information security threats and attacks increase and improve constantly. The best form of defense against them is the proper implementation and management of information security controls and best practices. Information security is also a key expectation and requirement of customers, legislators, and other interested parties.
This training course is designed to prepare participants in implementing an information security management system (ISMS) based on ISO/IEC 27001. It aims to provide a comprehensive understanding of the best practices of an ISMS and a framework for its continual management and improvement.
After attending the training course, you can take the exam. If you successfully pass it, you can apply for a “PECB Certified ISO/IEC 27001 Lead Implementer” credential, which demonstrates your ability and practical knowledge to implement an ISMS based on the requirements of ISO/IEC 27001.
Who Can Attend?
Project managers and consultants involved in and concerned with the implementation of an ISMS
Expert advisors seeking to master the implementation of an ISMS
Individuals responsible for ensuring conformity to information security requirements within an organization
Members of an ISMS implementation team
General information
Certification fees are included in the exam price
Training material containing over 450 pages of information and practical examples will be distributed
A participation certificate of 31 CPD (Continuing Professional Development) credits will be issued
In case of exam failure, you can retake the exam within 12 months free of charge
Educational approach
This training course contains essay-type exercises, multiple-choice quizzes, examples, and best practices used in the implementation of an ISMS.
The participants are encouraged to communicate with each other and engage in discussions when completing quizzes and exercises.
The exercises are based on a case study.
The structure of the quizzes is similar to that of the certification exam.
Learning objectives
This training course will help you:
Gain a comprehensive understanding of the concepts, approaches, methods, and techniques used for the implementation and effective management of an ISMS
Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
Understand the operation of an information security management system and its processes based on ISO/IEC 27001
Learn how to interpret and implement the requirements of ISO/IEC 27001 in the specific context of an organization
Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an ISMS
Auditors seeking to perform and lead information security management system (ISMS) audits
Managers or consultants seeking to master the information security management system audit process
Individuals responsible to maintain conformity with the ISMS requirements in an organization
Technical experts seeking to prepare for the information security management system audit
Expert advisors in information security management
Learning objectives
By the end of this training course, the participants will be able to:
Explain the fundamental concepts and principles of an information security management system (ISMS) based on ISO/IEC 27001
Interpret the ISO/IEC 27001 requirements for an ISMS from the perspective of an auditor
Evaluate the ISMS conformity to ISO/IEC 27001 requirements, in accordance with the fundamental audit concepts and principles
Plan, conduct, and close an ISO/IEC 27001 compliance audit, in accordance with ISO/IEC 17021-1 requirements, ISO 19011 guidelines, and other best practices of auditing
Manage an ISO/IEC 27001 audit program
Educational approach
This training is based on both theory and best practices used in ISMS audits
Lecture sessions are illustrated with examples based on case studies
Practical exercises are based on a case study which includes role playing and discussions
Practice tests are similar to the Certification Exam
Audiance
All staff who need a working knowledge of Compliance and the Management of Risk
Format of the course
A combination of:
Facilitated Discussions
Slide Presentations
Case Studies
Examples
Course Objectives
By the end of this course, delegates will be able to:
Understand the major facets of Compliance and the national and international efforts being made to manage the risk related to it
Define the ways in which a company and its staff might set up a Compliance Risk Management Framework
Detail the roles of Compliance Officer and Money Laundering Reporting Officer and how they should be integrated into a business
Understand some other “hot spots” in Financial Crime – especially as they relate to International Business, Offshore Centres and High-Net-Worth Clients
This instructor-led, live training in Edinburgh (online or onsite) focuses on analyzing the risks of Open Data while reducing vulnerability to disaster or data loss.
By the end of this training, participants will be able to:
Understand the concepts and benefits of Open Data.
Identify the different types of data.
Understand the risks of Open Data and how to mitigate them.
Learn how to manage Open Data risks and create a contingency plan.
Implement Open Data risk mitigation strategies to reduce disaster risk.
This instructor-led, live Payment Card Industry Professional training in Edinburgh (online or onsite) provides an individual qualification for industry practitioners who wish to demonstrate their professional expertise and understanding of the PCI Data Security Standard (PCI DSS).
By the end of this training, participants will be able to:
Understand the payment process and the PCI standards designed to protect it.
Understand the roles and responsibilities for entities involved in the payment industry.
Have deep insight into, and understanding of, the 12 PCI DSS requirements.
Demonstrate knowledge of PCI DSS and how it applies to organizations that are involved in the transaction process.
This instructor-led, live training in Edinburgh (online or onsite) is aimed at IT administrators, security coordinators, and compliance managers who wish to identify, evaluate, and implement security policy management methods for their organization.
By the end of this training, participants will be able to develop, manage, and monitor security policies to protect their organization's information, network, and physical and software assets.
Read more...
Last Updated:
Testimonials (6)
The report and rules setup.
Jack - CFNOC- DND
Course - Micro Focus ArcSight ESM Advanced
The fact that there were practical examples with the content
Smita Hanuman - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Speed of response and communication
Bader Bin rubayan - Lean Business Services
Course - ISO/IEC 27001 Lead Implementer
The trainer was extremely clear and concise. Very easy to understand and absorb the information.
Paul Clancy - Rowan Dartington
Course - CGEIT – Certified in the Governance of Enterprise IT
I genuinely was benefit from the communication skills of the trainer.
Flavio Guerrieri
Course - CISM - Certified Information Security Manager
I genuinely enjoyed the real examples of the trainer.
Joana Gomes
Course - Compliance and the Management of Compliance Risk
Provisional Upcoming Courses (Contact Us For More Information)
Online Security Management training in Edinburgh, Security Management training courses in Edinburgh, Weekend Security Management courses in Edinburgh, Evening Security Management training in Edinburgh, Security Management instructor-led in Edinburgh, Security Management coaching in Edinburgh, Security Management trainer in Edinburgh, Online Security Management training in Edinburgh, Security Management on-site in Edinburgh, Weekend Security Management training in Edinburgh, Security Management classes in Edinburgh, Evening Security Management courses in Edinburgh, Security Management boot camp in Edinburgh, Security Management one on one training in Edinburgh, Security Management instructor in Edinburgh, Security Management instructor-led in Edinburgh, Security Management private courses in Edinburgh