Information Security Risk Training Courses

Information Security Risk Training Courses

Local, instructor-led live Information Security Risk training courses demonstrate through interactive discussion and hands-on practice the fundamentals and advanced topics of Information Security Risk. Information Security Risk training is available as "onsite live training" or "remote live training". Onsite live training can be carried out locally on customer premises in Denmark or in NobleProg corporate training centers in Denmark. Remote live training is carried out by way of an interactive, remote desktop. NobleProg -- Your Local Training Provider

Testimonials

★★★★★
★★★★★

Information Security Risk Course Outlines

CodeNameDurationOverview
pcbcBusiness Continuity Management35 hoursDescription:

This is a 'Practitioner' course and leans heavily on practical exercises designed to reinforce the concepts being taught and to build the delegates' confidence in implementing business continuity management. The course is also designed to encourage debate, and the sharing of knowledge and experience between students.
Delegates will benefit from the practical and extensive experiences of ours trainers who are practicing business continuity management and ISO 22301:2012 specialists.

Delegates will learn how to:

- Explain the need for business continuity management (BCM) in all organisations
- Define the business continuity lifecycle
- Conducting business continuity programme management
- Understand their organisation sufficiently to identify mission-critical impact areas
- Determine their organisation's business continuity strategy
- Establish a business continuity response
- Exercise, maintain and review plans
- Embed business continuity in an organisation
- Define terms and definitions appropriate to business continuity

By the end of the course, delegates will have a detailed understanding of all the key components of business continuity management and be able to return to their work, making a significant contribution to the business continuity management process.
pcirmPCIRM - Practitioner Certificate in Information Risk Management35 hoursDescription:

The Practitioner Certificate in Information Risk Management (PCIRM) provides security practitioners with a comprehensive and highly practical course enabling them to develop a business focused information security and governance risk strategy. It closely follows the approaches recommended in the ISO 27001 and ISO 27005 standards. The five-day course prepares delegates to confidently sit the BCS/ISEB Practitioner Certificate in Information Risk Management examination.

Target Audience:

- Information security and governance practitioners
- Internal IT auditors
- Staff from within compliance and operational risk functions
- IT managers and senior staff
- Project managers and others responsible for designing security in to information systems.

Objectives:

On completion of this course delegates will be able to:

- develop an information risk management strategy
- conduct threat vulnerability and likelihood assessments, business impact analyses and risk assessments
- explain how the management of information risk will bring about significant business benefits
- explain and make full use of information risk management terminology
- explain the principles of controls and risk treatment
- present results of the risk assessment in a format which will form the basis of a risk treatment plan
- explain and produce information classification schemes
- confidently sit the ISEB examination
criscCRISC - Certified in Risk and Information Systems Control21 hoursDescription:

This class is intended as intense and hard core exam preparation for ISACA’s Certified Information Systems Auditor (CRISC) Examination. The five (5) domains of ISACA’s CRISC syllabus will be covered with a big focus on the Examination. The Official ISACA CIRSC Review Manual and Question, Answer and Explanation, (Q,A&E), supplements will ALSO be provided when attending. The Q,A&E is exceptional in helping delegates understand the ISACA style of questions, the type of answers ISACA are looking for and it helps rapid memory assimilation of the material.

The technical skills and practices that ISACA promotes and evaluates within the CRISC certification are the building blocks of success in the field. Possessing the CRISC certification demonstrates your skill within the profession. With a growing demand for professionals holding risk and control expertise, ISACA’s CRISC has positioned itself to be the preferred certification program by individuals and enterprises around the world. The CRISC certification signifies commitment to serving an enterprise and the chosen profession with distinction.

Objectives:

- To help you pass the CRISC examination first time
- possessing this certification will signify your commitment to serving an enterprise with distinction
- the growing demand for professionals with risk and control skills will allow holders of this certification to command better
positions and salary

You will learn:

- To help enterprises accomplish business objectives by designing, implementing, monitoring and maintaining risk-based,
efficient and effective IS controls.
- The technical skills and practices that CRISC promotes, these are the building blocks of success in the field
iso27005Building up information security according to ISO 27005 21 hoursThis course will give you the skills to build up information security according to ISO 27005, which is dedicated to information security risk management based on ISO 27001.
ethhackEthical Hacker35 hoursThis class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

The purpose of the Ethical Hacking Training is to:

- Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
- Inform the public that credentialed individuals meet or exceed the minimum standards.
- Reinforce ethical hacking as a unique and self-regulating profession.

Audience:

The Course is ideal for those working in positions such as, but not limited to:

- Security Engineers
- Security Consultants
- Security Managers
- IT Director/Managers
- Security Auditors
- IT Systems Administrators
- IT Network Administrators
- Network Architects
- Developers

Upcoming Information Security Risk Courses

CourseCourse DateCourse Price [Remote / Classroom]
CRISC - Certified in Risk and Information Systems Control - Roskilde, Town CenterTue, 2018-11-06 09:303300EUR / 4100EUR
Ethical Hacker - Odense, Congress CenterMon, 2018-11-12 09:305500EUR / 6700EUR
Business Continuity Management - Aarhus, MejlgadeMon, 2018-11-19 09:305500EUR / 6700EUR
PCIRM - Practitioner Certificate in Information Risk Management - Aalborg, MøllegadeMon, 2018-11-19 09:305500EUR / 6700EUR
Building up information security according to ISO 27005 - Copenhagen, City CenterMon, 2018-12-10 09:304500EUR / 5300EUR
Weekend Information Security Risk courses, Evening Information Security Risk training, Information Security Risk boot camp, Information Security Risk instructor-led, Weekend Information Security Risk training, Evening Information Security Risk courses, Information Security Risk coaching, Information Security Risk instructor, Information Security Risk trainer, Information Security Risk training courses, Information Security Risk classes, Information Security Risk on-site, Information Security Risk private courses, Information Security Risk one on one training

Course Discounts

Course Venue Course Date Course Price [Remote / Classroom]
OCEB2 OMG Certified Expert in BPM - Business Intermediate Exam Preparation Copenhagen, City Center Wed, 2018-10-31 09:30 4725EUR / 5525EUR
Business Rule Management (BRMS) with Drools Copenhagen, City Center Wed, 2018-12-05 09:30 1575EUR / 1975EUR
OCEB Certified Expert in BPM - Business Advanced Exam Preparation Copenhagen, City Center Mon, 2018-12-17 09:30 1575EUR / 1975EUR
MongoDB for Developers Copenhagen, City Center Thu, 2019-01-31 09:30 2700EUR / 3300EUR
R Copenhagen, City Center Mon, 2019-04-08 09:30 4725EUR / 5525EUR

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients

is growing fast!

We are looking to expand our presence in your region!

As a Business Development Manager you will:

  • expand business in the region
  • recruit local talent (sales, agents, trainers, consultants)
  • recruit local trainers and consultants

We offer:

  • Artificial Intelligence and Big Data systems to support your local operation
  • high-tech automation
  • continuously upgraded course catalogue and content
  • good fun in international team

If you are interested in running a high-tech, high-quality training and consulting business.

contact us right away!