Cyber Offense & Defense Courses
-
Certified Information Security Manager
4 Days
This Official ISACA Certified Information Security Manager (CISM) training course focuses on the construction, development, and governance of information security operations. Possession of this certification displays precise knowledge, practice, and copious amounts of experience in the realm of information security management. This CISM training course takes into account practical issues, like the creation of information security programs, and incident management.
Submit an Inquiry
-
Certified Information Systems Auditor
4 Days
Certified Information Systems Auditor (CISA) is a globally acknowledged certification, which builds upon the previous experience of IS professionals, to produce valuable employees who possess exceptional knowledge of Information Systems Auditing, Control, and Security.
This certification is a DoD Approved 8570 Baseline Certification and meets DoD 8140/8570 training requirements.
During this CISA training course, delegates will be exposed to the Five Domains of Information Security Auditing.
Submit an Inquiry
-
Certified Security Risk Manager
3 Days
Master the fundamental principles and concepts of Security Risk Assessment and Optimal Security Risk Management in Information Security based on ISO/IEC 27005. ISO/IEC 27005 Security Risk Manager training enables you to develop the competence to master the risk management process related to all assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework. During this training course, you will also gain a thorough understanding of best practices of risk assessment me
Submit an Inquiry
-
CompTIA Cybersecurity Analyst - CySA+
5 days
After completion of the course, students will be able to:
Assess information security risk in computing and network environments
Analyze the cybersecurity threat landscape
Analyze reconnaissance threats to computing and network environments
Analyze attacks on computing and network environments
Analyze post-attack techniques on computing and network environments
Implement a vulnerability management program
Evaluate the organization's security through penetration testing
Submit an Inquiry
-
CompTIA Security+
5 days
Objectives can be separated into these domains:
Threats, Attacks and Vulnerabilities
Technologies and Tools
Architecture and Design
Identity and Access Management
Risk Management
Cryptography and PKI
Inside of these domains, you can find these topics:
Compare and Contrast Information Security Roles
Compare and Contrast Security Control and Framework Types
Explain Threat Actor Types and Attack Vectors
Explain Threat Intelligence Sources
Submit an Inquiry
-
CompTIA SecurityX
5 days
The course is designed to give participants practical skills and theoretical knowledge necessary to succeed in the CompTIA Advanced Security Practitioner (CASP+) certification exam. Exam voucher CompTIA CASP+ CAS-003 is included.
Submit an Inquiry
-
CREST CPSA Exam Preparation
5 Days
The CPSA course leads to the CREST Practitioner Security Analyst (CPSA) examination, which is an entry level qualification that tests a candidate’s knowledge in assessing operating systems and common network services at a basic level below that; of the main CRT and CCT qualifications
€750.00
-
CREST CRT Exam Preparation
5 Days
This course is designed to help students prepare for the CREST CRT Exam. The CREST Registered Penetration Tester (CRT) exam is recognised by Governments and regulators around the globe and is accepted by the UK National Cyber Security Centre (NCSC) for its CHECK scheme.
Submit an Inquiry
-
Cyber Security Audit Certificate
2 Days
ISACA’s Cybersecurity Audit Certificate Program provides audit/assurance professionals with the knowledge needed to excel in cybersecurity audits. It provides security professionals with an understanding of the audit process, and IT risk professionals with an understanding of cyber-related risk and mitigating controls.
The Cybersecurity Audit Certificate is a comprehensive course designed to help individuals prepare for the Cybersecurity Audit Certificate exam and to understand risk and implement controls
Submit an Inquiry
-
DevSecOps
2 Days
Hands-on training to automate security into a fast-paced DevOps environment using various open-source tools and scripts.
Modern enterprises are implementing the technical and cultural changes required to embrace DevOps methodology by introducing practices such Continuous Integration (CI), Continuous Delivery (CD), Continuous Monitoring (CM) and Infrastructure as Code (IaC).
Submit an Inquiry