-
Incident Response for Business Professionals (IRBIZ)
This course covers incident response methods and procedures are taught in alignment with industry frameworks such as US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with managing compliance with state legislation and other regulatory requirements regarding incident response, and for executing standardized responses to such incidents. The course introduces procedures.
Submit an Inquiry
-
Intune and Mobile Device Management
Submit an Inquiry
-
ISA/IEC 62443 Lead Implementer
This 3-day course provides a comprehensive introduction to the ISA/IEC 62443 standards, focusing on the management perspective for securing industrial automation and control systems (IACS). Participants will gain a solid understanding of the key concepts, structures, and applicability of the standard, and learn how to establish and implement an effective IACS security programme. Covering both foundational knowledge and practical application.
Submit an Inquiry
-
ISACA CISM Exam Prep
This official ISACA Certified Information Security Manager (CISM) self-study e-learning course is designed to develop expertise in information security governance, risk management, program development, and incident management. Recognised globally, CISM certification demonstrates a deep understanding of security operations, compliance, and enterprise-wide security strategy.
Learners must book onto the QA ISACA CISM Exam Prep event to receive access to the e-learning materials.
Submit an Inquiry
-
ISC2 Certified Cloud Security Professional
ISC2 developed the Certified Cloud Security Professional (CCSP) credential to ensure that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks. A CCSP applies information security expertise to a cloud computing environment and demonstrates competence in cloud security architecture, design, operations, and service orchestration.
Submit an Inquiry
-
ISC2 Certified in Cybersecurity
Official ISC2 Entry-Level Cybersecurity Certification Training Official ISC2 entry-level cybersecurity certification training will review the content covered in the exam. It prepares candidates by building a solid foundation of knowledge they need to pass the exam and ultimately land an entry-or junior-level cybersecurity role. About Certification From the global leader in cybersecurity credentials, the ISC2 entry-level cybersecurity certification breaks down traditional barriers to entry.
Submit an Inquiry
-
ISC2 Certified in Governance Risk and Compliance
This official ISC2® Certified in Governance, Risk and Compliance (CGRC) Training prepares you for the CGRC exam.
The Certified in Governance, Risk and Compliance (CGRC®) is an information security practitioner who advocates for security risk management in pursuit of information system authorisation to support an organisation’s mission and operations in accordance with legal and regulatory requirements.
Submit an Inquiry
-
ISC2 Certified Secure Software Lifecycle Professional
The Official ISC2 ® Certified Secure Software Lifecycle Professional (CSSLP®) training provides a comprehensive review of the knowledge required to incorporate security practices, including authentication, authorization and auditing, into each phase of the Software Development Lifecycle (SDLC), from software design and implementation to testing and deployment. This training course will help learners review and refresh their knowledge and identify areas they need to study for the CSSLP exam.
Submit an Inquiry
-
ISC2 Systems Security Certified Practitioner
The official ISC2 Systems Security Certified Practitioner (SSCP) is the ideal certification for those with proven technical skills and practical, hands-on security knowledge in operational IT roles. It provides confirmation of a practitioner’s ability to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability
Submit an Inquiry
-
ISO 27001 Transition
The new version of ISO/IEC 27001 has been recently published and is now aligned with the new version of ISO/IEC 27002, which was published in February, 2022. The major changes between ISO/IEC 27001:2022 and ISO/IEC 27001:2013 are noticed in the information security controls of Annex A, whereas a few other minor changes are present in the clauses of the standard too. Furthermore, the title of ISO/IEC 27001:2022 differs from the title of ISO/IEC 27001:2013.
Submit an Inquiry