• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

46 Certified Information Security Manager (CISM) courses

Certified Information Security Manager (CISM) - Complete Video Course

4.3(43)

By John Academy

DESCRIPTION: The CISM certification program is developed specifically for experienced information security managers and those who have information security management responsibilities. CISM is globally recognized as the leading credential for information security managers. This Certified Information Security Manager (CISM) - Complete Video Course is designed to provide you with the knowledge and proficiency to prepare for the globally recognized CISM certification exam. The CISM certification combines the achievement of passing a comprehensive exam with recognition of work, management and educational experience, providing you with greater credibility in the marketplace. This course will immerse you into the subject, with in-depth coverage of the information covering the four domains that make up the 'Body of Knowledge' for the CISM exam and will provide you the tools to build your technical skills to manage, design, oversee and assess an enterprise's information security. ASSESSMENT: * At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. * Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. CERTIFICATION: * After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. * Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. WHO IS THIS COURSE FOR? Certified Information Security Manager (CISM) - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. REQUIREMENTS Our Certified Information Security Manager (CISM) - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. CAREER PATH After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Information Security Governance Information Security Governance Overview FREE 00:25:00 Effective Information Security Governance 00:24:00 Information Security Concepts and Technologies 00:20:00 Information Security Manager 00:09:00 Scope and Charter of Information Security Governance 00:10:00 Information Security Governance Metrics 00:23:00 Information Security Strategy Overview 00:02:00 Creating Information Security Strategy 00:36:00 Determining Current State Of Security 00:06:00 Information Security Strategy Development 00:10:00 Strategy Resources 00:40:00 Strategy Constraints 00:07:00 Action Plan to Implement Strategy 00:20:00 Information Risk Management Risk Management Overview 00:16:00 Good Information Security Risk Management 00:15:00 Information Security Risk Management Concepts 00:13:00 Implementing Risk Management 00:17:00 Risk Assessment 00:39:00 Controls Countermeasures 00:23:00 Recovery Time Objectives 00:18:00 Risk Monitoring and Communication 00:04:00 Information Security Program Development Development of Information Security Program 00:11:00 Information Security Program Objectives 00:09:00 Information Security Program Development Concepts 00:14:00 Scope and Charter of Information Security Program Development 00:22:00 Information Security Management Framework 00:16:00 Information Security Framework Components 00:12:00 Information Security Program Resources 01:04:00 Implementing an Information Security Program 00:27:00 Information Infrastructure and Architecture 00:14:00 Information Security Program 00:14:00 Security Program Services and Operational Activities 00:45:00 Information Security Incident Management Incident Management Overview 00:28:00 Incident Response Procedures 00:29:00 Incident Management Organization 00:19:00 Incident Management Resources 00:36:00 Incident Management Objectives 00:14:00 Incident Management Metrics and Indicators 00:17:00 Current State of Incident Response Capability 00:11:00 Developing an Incident Response Plan 00:32:00 BCP DRP 00:36:00 Testing Response and Recovery Plans 00:10:00 Executing the Plan 00:27:00 Mock Exam Mock Exam- Certified Information Security Manager (CISM) - Complete Video Course 00:20:00 Final Exam Final Exam- Certified Information Security Manager (CISM) - Complete Video Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Information Security Manager (CISM) - Complete Video Course
Delivered Online On Demand
£24

Certified Information Security Manager (CISM)

4.8(8)

By Skill Up

Enter the CISM arena, where governance meets risk, and incident management becomes art. Pave your path to cybersecurity supremacy today!

Certified Information Security Manager (CISM)
Delivered Online On Demand
£25

Certified Information Systems Auditor (CISA)

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THE INTENDED AUDIENCE FOR THIS COURSE IS INFORMATION SYSTEMS SECURITY PROFESSIONALS, INTERNAL REVIEW AUDITORS, AND OTHER INDIVIDUALS WHO HAVE AN INTEREST IN ASPECTS OF INFORMATION SYSTEMS AUDIT, CONTROLS, AND SECURITY. OVERVIEW UPON SUCCESSFUL COMPLETION OF THIS COURSE, STUDENTS WILL BE ABLE TO: - IMPLEMENT INFORMATION SYSTEMS AUDIT SERVICES IN ACCORDANCE WITH INFORMATION SYSTEMS AUDIT STANDARDS, GUIDELINES, AND BEST PRACTICES. - EVALUATE AN ORGANIZATIONS STRUCTURE, POLICIES, ACCOUNTABILITY, MECHANISMS, AND MONITORING PRACTICES. - EVALUATE INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT, AND IMPLEMENTATION. - EVALUATE THE INFORMATION SYSTEMS OPERATIONS, MAINTENANCE, AND SUPPORT OF AN ORGANIZATION; AND EVALUATE THE BUSINESS CONTINUITY AND DISASTER RECOVERY PROCESSES USED TO PROVIDE ASSURANCE THAT IN THE EVENT OF A DISRUPTION, IT SERVICES ARE MAINTAINED. - DEFINE THE PROTECTION POLICIES USED TO PROMOTE THE CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY OF INFORMATION ASSETS. DESCRIPTION IN THIS COURSE, STUDENTS WILL EVALUATE ORGANIZATIONAL POLICIES, PROCEDURES, AND PROCESSES TO ENSURE THAT AN ORGANIZATIONS INFORMATION SYSTEMS ALIGN WITH ITS OVERALL BUSINESS GOALS AND OBJECTIVES. 1 - THE PROCESS OF AUDITING INFORMATION SYSTEMS * ISACA Information Systems Auditing Standards and Guidelines * Fundamental Business Processes * Develop and Implement an Information Systems Audit Strategy * Plan an Audit * Conduct an Audit * The Evidence Life Cycle * Communicate Issues, Risks, and Audit Results * Support the Implementation of Risk Management and Control Practices 2 - IT GOVERNANCE AND MANAGEMENT * Evaluate the Effectiveness of IT Governance * Evaluate the IT Organizational Structure and HR Management * Evaluate the IT Strategy and Direction * Evaluate IT Policies, Standards, and Procedures * Evaluate the Effectiveness of Quality Management Systems * Evaluate IT Management and Monitoring of Controls * IT Resource Investment, Use, and Allocation Practices * Evaluate IT Contracting Strategies and Policies * Evaluate Risk Management Practices * Performance Monitoring and Assurance Practices * Evaluate the Organizations Business Continuity Plan 3 - INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT, AND IMPLEMENTATION * Evaluate the Business Case for Change * Evaluate Project Management Frameworks and Governance Practices * Development Life Cycle Management * Perform Periodic Project Reviews * Evaluate Control Mechanisms for Systems * Evaluate Development and Testing Processes * Evaluate Implementation Readiness * Evaluate a System Migration * Perform a Post-Implementation System Review 4 - INFORMATION SYSTEMS OPERATIONS, MAINTENANCE, AND SUPPORT * Perform Periodic System Reviews * Evaluate Service Level Management Practices * Evaluate Third-Party Management Practices * Evaluate Operations and End User Management Practices * Evaluate the Maintenance Process * Evaluate Data Administration Practices * Evaluate the Use of Capacity and Performance Monitoring Methods * Evaluate Change, Configuration, and Release Management Practices * Evaluate Problem and Incident Management Practices * Evaluate the Adequacy of Backup and Restore Provisions 5 - PROTECTION OF INFORMATION ASSETS * Information Security Design * Encryption Basics * Evaluate the Functionality of the IT Infrastructure * Evaluate Network Infrastructure Security * Evaluate the Design, Implementation, and Monitoring of Logical Access Controls * Risks and Controls of Virtualization * Evaluate the Design, Implementation, and Monitoring of Data Classification Process * Evaluate the Design, Implementation, and Monitoring of Physical Access Controls * Evaluate the Design, Implementation, and Monitoring of Environmental Controls

Certified Information Systems Auditor (CISA)
Delivered Online6 days, May 13th, 13:00 + 2 more
£3250

Certified Information Security Manager (CISM)

By Nexus Human

DURATION 3 DAYS 18 CPD HOURS THIS COURSE IS INTENDED FOR THE INTENDED AUDIENCE FOR THIS COURSE IS INFORMATION SECURITY AND IT PROFESSIONALS, SUCH AS NETWORK ADMINISTRATORS AND ENGINEERS, IT MANAGERS, AND IT AUDITORS, AND OTHER INDIVIDUALS WHO WANT TO LEARN MORE ABOUT INFORMATION SECURITY, WHO ARE INTERESTED IN LEARNING IN-DEPTH INFORMATION ABOUT INFORMATION SECURITY MANAGEMENT, WHO ARE LOOKING FOR CAREER ADVANCEMENT IN IT SECURITY, OR WHO ARE INTERESTED IN EARNING THE CISM CERTIFICATION. OVERVIEW ESTABLISH AND MAINTAIN A FRAMEWORK TO PROVIDE ASSURANCE THAT INFORMATION SECURITY STRATEGIES ARE ALIGNED WITH BUSINESS OBJECTIVES AND CONSISTENT WITH APPLICABLE LAWS AND REGULATIONS. IDENTIFY AND MANAGE INFORMATION SECURITY RISKS TO ACHIEVE BUSINESS OBJECTIVES. CREATE A PROGRAM TO IMPLEMENT THE INFORMATION SECURITY STRATEGY. IMPLEMENT AN INFORMATION SECURITY PROGRAM. OVERSEE AND DIRECT INFORMATION SECURITY ACTIVITIES TO EXECUTE THE INFORMATION SECURITY PROGRAM. PLAN, DEVELOP, AND MANAGE CAPABILITIES TO DETECT, RESPOND TO, AND RECOVER FROM INFORMATION SECURITY INCIDENTS. DESCRIPTION IN THIS COURSE, STUDENTS WILL ESTABLISH PROCESSES TO ENSURE THAT INFORMATION SECURITY MEASURES ALIGN WITH ESTABLISHED BUSINESS NEEDS. PREREQUISITES INFORMATION SECURITY GOVERNANCE INFORMATION RISK MANAGEMENT INFORMATION SECURITY PROGRAM DEVELOPMENT INFORMATION SECURITY PROGRAM MANAGEMENT INCIDENT MANAGEMENT AND RESPONSE 1 - INFORMATION SECURITY GOVERNANCE * Develop an Information Security Strategy * Align Information Security Strategy with Corporate Governance * Identify Legal and Regulatory Requirements * Justify Investment in Information Security * Identify Drivers Affecting the Organization * Obtain Senior Management Commitment to Information Security * Define Roles and Responsibilities for Information Security * Establish Reporting and Communication Channels 2 - INFORMATION RISK MANAGEMENT * Implement an Information Risk Assessment Process * Determine Information Asset Classification and Ownership * Conduct Ongoing Threat and Vulnerability Evaluations * Conduct Periodic BIAs * Identify and Evaluate Risk Mitigation Strategies * Integrate Risk Management into Business Life Cycle Processes * Report Changes in Information Risk 3 - INFORMATION SECURITY PROGRAM DEVELOPMENT * Develop Plans to Implement an Information Security Strategy * Security Technologies and Controls * Specify Information Security Program Activities * Coordinate Information Security Programs with Business Assurance Functions * Identify Resources Needed for Information Security Program Implementation * Develop Information Security Architectures * Develop Information Security Policies * Develop Information Security Awareness, Training, and Education Programs * Develop Supporting Documentation for Information Security Policies 4 - INFORMATION SECURITY PROGRAM IMPLEMENTATION * Integrate Information Security Requirements into Organizational Processes * Integrate Information Security Controls into Contracts * Create Information Security Program Evaluation Metrics 5 - INFORMATION SECURITY PROGRAM MANAGEMENT * Manage Information Security Program Resources * Enforce Policy and Standards Compliance * Enforce Contractual Information Security Controls * Enforce Information Security During Systems Development * Maintain Information Security Within an Organization * Provide Information Security Advice and Guidance * Provide Information Security Awareness and Training * Analyze the Effectiveness of Information Security Controls * Resolve Noncompliance Issues 6 - INCIDENT MANAGEMENT AND RESPONSE * Develop an Information Security Incident Response Plan * Establish an Escalation Process * Develop a Communication Process * Integrate an IRP * Develop IRTs * Test an IRP * Manage Responses to Information Security Incidents * Perform an Information Security Incident Investigation * Conduct Post-Incident Reviews

Certified Information Security Manager (CISM)
Delivered Online4 days, May 21st, 13:00 + 6 more
£1995

CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019

By Packt

Get 3.5 hours of videos and downloadable lecture slides for Certified Information Security Manager (CISM) Domain 1

CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019
Delivered Online On Demand
£37.99

Certified Information Security Systems Professional (CISSP)

By Nexus Human

DURATION 5 DAYS 30 CPD HOURS THIS COURSE IS INTENDED FOR THIS COURSE IS INTENDED FOR EXPERIENCED IT SECURITY-RELATED PRACTITIONERS, AUDITORS, CONSULTANTS, INVESTIGATORS, OR INSTRUCTORS, INCLUDING NETWORK OR SECURITY ANALYSTS AND ENGINEERS, NETWORK ADMINISTRATORS, INFORMATION SECURITY SPECIALISTS, AND RISK MANAGEMENT PROFESSIONALS, WHO ARE PURSUING CISSP TRAINING AND CERTIFICATION TO ACQUIRE THE CREDIBILITY AND MOBILITY TO ADVANCE WITHIN THEIR CURRENT COMPUTER SECURITY CAREERS OR TO MIGRATE TO A RELATED CAREER. THROUGH THE STUDY OF ALL EIGHT CISSP COMMON BODY OF KNOWLEDGE (CBK) DOMAINS, STUDENTS WILL VALIDATE THEIR KNOWLEDGE BY MEETING THE NECESSARY PREPARATION REQUIREMENTS TO QUALIFY TO SIT FOR THE CISSP CERTIFICATION EXAM. ADDITIONAL CISSP CERTIFICATION REQUIREMENTS INCLUDE A MINIMUM OF FIVE YEARS OF DIRECT PROFESSIONAL WORK EXPERIENCE IN TWO OR MORE FIELDS RELATED TO THE EIGHT CBK SECURITY DOMAINS, OR A COLLEGE DEGREE AND FOUR YEARS OF EXPERIENCE. OVERVIEW #NAME? DESCRIPTION IN THIS COURSE, STUDENTS WILL EXPAND UPON THEIR KNOWLEDGE BY ADDRESSING THE ESSENTIAL ELEMENTS OF THE 8 DOMAINS THAT COMPRISE A COMMON BODY OF KNOWLEDGE (CBK)© FOR INFORMATION SYSTEMS SECURITY PROFESSIONALS. PREREQUISITES * COMPTIA NETWORK+ CERTIFICATION 1 - SECURITY AND RISK MANAGEMENT * Security Governance Principles * Compliance * Professional Ethics * Security Documentation * Risk Management * Threat Modeling * Business Continuity Plan Fundamentals * Acquisition Strategy and Practice * Personnel Security Policies * Security Awareness and Training 2 - ASSET SECURITY * Asset Classification * Privacy Protection * Asset Retention * Data Security Controls * Secure Data Handling 3 - SECURITY ENGINEERING * Security in the Engineering Lifecycle * System Component Security * Security Models * Controls and Countermeasures in Enterprise Security * Information System Security Capabilities * Design and Architecture Vulnerability Mitigation * Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems * Cryptography Concepts * Cryptography Techniques * Site and Facility Design for Physical Security * Physical Security Implementation in Sites and Facilities 4 - INFORMATION SECURITY MANAGEMENT GOALS * Organizational Security * The Application of Security Concepts 5 - INFORMATION SECURITY CLASSIFICATION AND PROGRAM DEVELOPMENT * Information Classification * Security Program Development 6 - RISK MANAGEMENT AND ETHICS * Risk Management * Ethics 7 - SOFTWARE DEVELOPMENT SECURITY * Software Configuration Management * Software Controls * Database System Security 8 - CRYPTOGRAPHY * Ciphers and Cryptography * Symmetric-Key Cryptography * Asymmetric-Key Cryptography * Hashing and Message Digests * Email, Internet, and Wireless Security * Cryptographic Weaknesses 9 - PHYSICAL SECURITY * Physical Access Control * Physical Access Monitoring * Physical Security Methods * Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered Online6 days, May 20th, 13:00 + 9 more
£3395

CISM Certification Domain 2: Information Risk Management Video Boot Camp 2019

By Packt

Get 7.5 hours of videos and downloadable lecture slides for Certified Information Security Manager (CISM) Domain 2

CISM Certification Domain 2: Information Risk Management Video Boot Camp 2019
Delivered Online On Demand
£137.99

Cyber Security Specialist - Complete Video Course

4.3(43)

By John Academy

DESCRIPTION: Cybersecurity refers to the approach of protecting networks, computers, programs and data from attack, damage or unauthorised access. It is essential for any company for assigning a cyber-security expert if they embrace the digitalisation for the growth of their business. The Cyber Security Specialist - Complete Video Course covers a detailed and complete instruction for becoming a cybersecurity expert and also prepares you for the different exams of cyber security so that you can able to obtain a world-class certification for carrying out your job. Any cybersecurity system starts with the task of identifying threats. In the first part of the video lesson, you will know to detect threats and learn how to respond to the threats. Then, you will learn the proper ways of securing your WLAN network. In the section Certified Information Security Manager (CISM), you will train to be a good security manager. Here, you will know how to manage, design, oversee and assess an enterprise's information security. Next, you will learn the procedures of protecting data and personal information of the patients in the Healthcare Information Systems Security Practitioner (CHISSP) section. After that, the course presents the information related to IT recovery strategy if any disaster happens to your company. Similarly, you will also learn about computer forensic incidents for investing cybercrime. You will know how to handle any incidents in the next section. Besides, the course guides you to be a security leadership officer so that you can lead the team for cybersecurity by the knowledge of risk management, encryption, and information security. Finally, the last section helps you to be a certified Security Sentinel so that you can keep your companies information safe and secure. ASSESSMENT: * At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. * Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. CERTIFICATION: * After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. * Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. WHO IS THIS COURSE FOR? Cyber Security Specialist - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. REQUIREMENTS Our Cyber Security Specialist - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. CAREER PATH After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market.

Cyber Security Specialist - Complete Video Course
Delivered Online On Demand
£12

Cyber Security Programming MasterClass- CPD Certified

By Academy for Health and Fitness

***24 Hour Limited Time Flash Sale*** Cyber Security Programming MasterClass Admission Gifts FREE PDF & Hard Copy Certificate| PDF Transcripts| FREE Student ID| Assessment| Lifetime Access| Enrolment Letter Are you a professional feeling stuck in your career, struggling to keep up with the ever-changing demands of the industry? Or perhaps you're a beginner, unsure of where to start or how to break into your desired field. Whichever stage you're in, our exclusive Cyber Security Programming MasterClass Bundle provides unique insights and tools that can help you achieve your goals. Designed to cater to the needs of both seasoned professionals and aspiring newcomers, our Cyber Security Programming MasterClass bundle is a comprehensive program that will equip you with the essential skills and knowledge you need to succeed. Whether you're looking to advance in your current role or embark on a new career journey, this bundle has everything you need to take your professional life to the next level. But that's not all. When you enrol in Cyber Security Programming MasterClass Online Training, you'll receive 25 CPD-Accredited PDF Certificates, Hard Copy Certificates, and our exclusive student ID card, all absolutely free. Courses Are Included In this Bundle: * Course 01: Cyber Security Advanced Training * Course 02: CompTIA Security+ (SY0-601) * Course 03: CEH - Certified Ethical Hacker * Course 04: Cyber Security Incident Handling and Incident Response * Course 05: Computer Networks Security * Course 06: Certified Information Systems Security Professional (CISSP) * Course 07: Cyber Security Level 3 * Course 08: Digital Forensics for Cyber Professionals * Course 09: Cyber Intelligence Officer * Course 10: AWS Certified Solutions Architect Associate * Course 11: Cloud Computing / CompTIA Cloud+ (CV0-002) * Course 12: Cyber Law Online Course * Course 13: GDPR * Course 14: Security Analyst * Course 15: Certified Information Security Manager (CISM) * Course 16: SQL Programming Masterclass * Course 17: Python Programming for Everybody * Course 18: CompTIA PenTest+ (Ethical Hacking) * Course 19: Secure Programming of Web Applications * Course 20: IT Support Technician * Course 21: C# Programming - Beginner to Advanced * Course 22: Machine Learning Basics * Course 23: Web Application Penetration Testing Course * Course 24: Data Center Training Essentials: General Introduction * Course 25: CompTIA CySA+ Cybersecurity Analyst (CS0-002) With Cyber Security Programming MasterClass, you'll embark on an immersive learning experience that combines interactive lessons with voice-over audio, ensuring that you can learn from anywhere in the world, at your own pace. And with 24/7 tutor support, you'll never feel alone in your journey, whether you're a seasoned professional or a beginner. Don't let this opportunity pass you by. Enrol in Cyber Security Programming MasterClass today and take the first step towards achieving your goals and dreams. Why buy this Cyber Security Programming MasterClass? * Free CPD Accredited Certificate upon completion of Cyber Security Programming MasterClass * Get a free student ID card with Cyber Security Programming MasterClass * Lifetime access to the Cyber Security Programming MasterClass course materials * Get instant access to this Cyber Security Programming MasterClass course * Learn Cyber Security Programming MasterClass from anywhere in the world * 24/7 tutor support with the Cyber Security Programming MasterClass course. Start your learning journey straightaway! The Cyber Security Programming MasterClass premium bundle consists of 25 precisely chosen courses on a wide range of topics essential for anyone looking to excel in this field. Each segment of Cyber Security Programming MasterClass is meticulously designed to maximise learning and engagement, blending interactive content and audio-visual modules for a truly immersive experience. Certification You have to complete the assignment given at the end of the Cyber Security Programming MasterClass course. After passing the Cyber Security Programming MasterClass exam You will be entitled to claim a PDF & Hardcopy certificate accredited by CPD Quality standards completely free. CPD 250 CPD hours / points Accredited by CPD Quality Standards WHO IS THIS COURSE FOR? This bundle is ideal for: * Students seeking mastery in this field * Professionals seeking to enhance their skills * Anyone who is passionate about this topic REQUIREMENTS This Cyber Security Programming MasterClass doesn't require prior experience and is suitable for diverse learners. CAREER PATH This Cyber Security Programming MasterClass bundle will allow you to kickstart or take your career in the related sector to the next stage. CERTIFICATES CPD ACCREDITED DIGITAL CERTIFICATE Digital certificate - Included CPD ACCREDITED HARD COPY CERTIFICATE Hard copy certificate - Included If you are an international student, then you have to pay an additional 10 GBP for each certificate as an international delivery charge.

Cyber Security Programming MasterClass- CPD Certified
Delivered Online On Demand
£149

Information Security Consultant (ISC) - CPD Certified

5.0(2)

By Studyhub UK

24 Hour Flash Deal **25-in-1 Information Security Consultant (ISC) Mega Bundle** Information Security Consultant (ISC) Enrolment Gifts **FREE PDF Certificate**FREE PDF Transcript ** FREE Exam** FREE Student ID ** Lifetime Access **FREE Enrolment Letter ** Take the initial steps toward a successful long-term career by studying the Information Security Consultant (ISC) package online with Studyhub through our online learning platform. The Information Security Consultant (ISC) bundle can help you improve your CV, wow potential employers, and differentiate yourself from the mass. This Information Security Consultant (ISC) course provides complete 360-degree training on Information Security Consultant (ISC). You'll get not one, not two, not three, but twenty-five Information Security Consultant (ISC) courses included in this course. Plus Studyhub's signature Forever Access is given as always, meaning these Information Security Consultant (ISC) courses are yours for as long as you want them once you enrol in this course This Information Security Consultant (ISC) Bundle consists the following career oriented courses: * Course 01: CompTIA Security+ * Course 02: CompTIA CySA+ Cybersecurity Analyst Course * Course 03: Web Application Penetration Testing * Course 04: CompTIA PenTest+ (Ethical Hacking) course * Course 05: CEH: Learn Ethical Hacking From A-Z: Beginner To Expert * Course 06: Cyber Security Incident Handling and Incident Response * Course 07: CompTIA Cloud+ (CV0-002) * Course 08: Computer Networks Security from Scratch to Advanced * Course 09: GDPR Training * Course 10: Data Protection and Data Security (GDPR) Training Certification * Course 11: Cyber Security Law * Course 12: Cyber Security Awareness Training * Course 13: Information Governance and Data Management Training * Course 14: Foundations of IT Security: Protecting Digital Assets * Course 15: Security Management and Fraud Prevention Training * Course 16: Security Analyst * Course 17: Fraud Detection & Prevention: Safeguarding Against Deception * Course 18: Computer Workstation Safety Training * Course 19: Diploma in CompTIA A+ * Course 20: SQL for Data Science, Data Analytics and Data Visualization * Course 21: Python Basic Programming for Absolute Beginners * Course 22: Machine Learning Basics * Course 23: Network Security and Risk Management * Course 24: IT Administration and Networking * Course 25: Touch Typing Complete Training Diploma The Information Security Consultant (ISC) course has been prepared by focusing largely on Information Security Consultant (ISC) career readiness. It has been designed by our Information Security Consultant (ISC) specialists in a manner that you will be likely to find yourself head and shoulders above the others. For better learning, one to one assistance will also be provided if it's required by any learners. The Information Security Consultant (ISC) Bundle is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This Information Security Consultant (ISC) bundle course has been created with twenty-five premium courses to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Information Security Consultant (ISC) Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into Information Security Consultant (ISC) Elementary modules, allowing our students to grasp each lesson quickly. The Information Security Consultant (ISC) course is self-paced and can be taken from the comfort of your home, office, or on the go! With our Student ID card you will get discounts on things like music, food, travel and clothes etc. In this exclusive Information Security Consultant (ISC) bundle, you really hit the jackpot. Here's what you get: * Step by step Information Security Consultant (ISC) lessons * One to one assistance from Information Security Consultant (ISC)professionals if you need it * Innovative exams to test your knowledge after the Information Security Consultant (ISC)course * 24/7 customer support should you encounter any hiccups * Top-class learning portal * Unlimited lifetime access to all twenty-five Information Security Consultant (ISC) courses * Digital Certificate, Transcript and student ID are all included in the price * PDF certificate immediately after passing * Original copies of your Information Security Consultant (ISC) certificate and transcript on the next working day * Easily learn the Information Security Consultant (ISC) skills and knowledge you want from the comfort of your home CPD 250 CPD hours / points Accredited by CPD Quality Standards WHO IS THIS COURSE FOR? This Information Security Consultant (ISC) training is suitable for - * Students * Recent graduates * Job Seekers * Individuals who are already employed in the relevant sectors and wish to enhance their knowledge and expertise in Information Security Consultant (ISC) * Certified Information Security Manager (CISM) * Certified Information Security Management Principles (CISMP) * Certified Information Systems Security Professional (CISSP) REQUIREMENTS To participate in this Information Security Consultant (ISC) course, all you need is - * A smart device * A secure internet connection * And a keen interest in Information Security Consultant (ISC) CAREER PATH You will be able to kickstart your Information Security Consultant (ISC) career because this course includes various courses as a bonus. This Information Security Consultant (ISC) is an excellent opportunity for you to learn multiple skills from the convenience of your own home and explore Information Security Consultant (ISC) career opportunities. CERTIFICATES CPD ACCREDITED CERTIFICATE Digital certificate - Included * CPD Accredited e-Certificate - Free * CPD Accredited Hardcopy Certificate - Free * Enrolment Letter - Free * Student ID Card - Free

Information Security Consultant (ISC) - CPD Certified
Delivered Online On Demand
£279
123...5

Educators matching "Certified Information Security Manager (CISM)"

Show all 60
Net Security Training

net security training

3.7(6)

London

Net Security Training is an independent specialist Cyber Security training company whose total focus is the provision of specialised courses and appreticeships catering for Cyber Security and Information Assurance professionals. CyberSecurity, IT Security, Information Risk Management, Compliance and Governance training are the cornerstone of our course offerings. We have invested heavily in establishing our credentials by working with the very best certification and examination bodies. We are approved and/or endorsed by the leading players in the cyber security industry to deliver training to their exact standards. We have been pioneers in commissioning, developing and introducing high end material in to the market place for courses and apprenticeships Longest established Cyber Security Training specialist in the UK, since 2003 11000+ Trained Globally- including FTSE 250 Content developed by industry Professionals Classroom based small, highly interactive sessions – which encourages active learner participation The escalating complexity of Technology and Business needs will always result in companies being exposed to security threats, and most networks will be breached if faced with a sustained attack. The key to minimising the damage hackers do when they inevitably force their way on to corporate networks is to make sure your Cyber Security staff are knowledgeable enough to respond appropriately to minimise the harm Intruders can cause to the Organisation. Our History Net-Security Training is the first specialist Information Security training company in the United Kingdom. We have kept true to this niche market since our incorporation in 2003. In-fact we were the only independent training Partner that VeriSign ever approved in Europe. We have been pioneers in commissioning, developing and introducing high end course materials in to the market place. These include Penetration Testing, Securing Network Perimeter, Public Key Infrastructure, Firewalls, Virtual Private Networks, Computer Hacking, IT Security Principals, Security Awareness and many more. Our history is testament to why we have continued to stay ahead of the curve in our fast moving Industry.

IMF Academy

imf academy

Eindhoven

IMF Academy [https://www.imfacademy.com/] is part of International Management Forum (IMF), an independent publisher and training organisation focusing on business information for higher-educated managers and decision makers in large and middle-sized organisations. We are specialist in providing business information by means of distance learning courses (courses fully aimed at self-study, at will supported by online learning), master classes and hot topical (certifying) classroom training. During the past 25 years, we gained a solid reputation by providing to the point and valuable information about topics both critical and of current interest. Our customers derive from over 50 countries worldwide! The content of our courses is developed in close cooperation with acknowledged subject matter experts working at large international consultancy organisations or smaller, specialised consulting bureaus. Our trainers come from organisations such as: AIIM, Antwerp Management School, Atos Consulting, Capgemini, Centric, CGI Group, Conquaestor, Deloitte, Duthler Associates, Executive Mobility Group, G31000, IBM Business Consulting Services, Insite Security, Inter Access, KPMG, Microsoft, PwC, SABSA Institute, Sogeti, TIAS School for Business and Society, Transfer Pricing Associates (TPA), various universities and many, many other. IMF Academy is able to organize any (regular as well as customized) training as an incompany training or as personal coaching at your office or any other desired location. We know the (international) training market and always have the optimal solution for your specific training demand. Are you interested in any of our trainings? Visit our website: https://www.imfacademy.com/ [https://www.imfacademy.com/]