-
All
-
Online
-
Filters
-
Location
-
Online
-
Type of studies
-
+ Filters
Risk security management courses
-
I have gained massive knowledge that I use on my day-to-day risk assessment activities in my internal audit function. I have sharpened my risk analysis skills with proper risk mitigations recommendations. This has helped me to be the person to go to in our company for risk assessment and evaluation. I have been recognized and promoted to a senior internal auditor from assistant internal auditor in two months time. This come s with a lot of responsibility but with also good renumeration package.
← | →
- Course
- Online
- Different dates available
- 1 Year
... that your employees are following the given rules and learn to evaluate and forecast the risks with the Compliance and Risk Management Course. Both Compliance and Risk Management are vital for the growth of your company. In the course, you will learn to utilize these two methods in your business firms... Learn about: Compliance Manager, Compliance and Auditing, Risk Management...
... that your employees are following the given rules and learn to evaluate and forecast the risks with the Compliance and Risk Management Course. Both Compliance and Risk Management are vital for the growth of your company. In the course, you will learn to utilize these two methods in your business firms... Learn about: Compliance Manager, Compliance and Auditing, Risk Management...
-
I have gained massive knowledge that I use on my day-to-day risk assessment activities in my internal audit function. I have sharpened my risk analysis skills with proper risk mitigations recommendations. This has helped me to be the person to go to in our company for risk assessment and evaluation. I have been recognized and promoted to a senior internal auditor from assistant internal auditor in two months time. This come s with a lot of responsibility but with also good renumeration package.
← | →
- Course
- Distance Learning
- Advanced
- November
... your lifestyle, with no deadlines or time restrictions to worry about. Course content covers emergency preparedness, the responsibilities of the securitymanager, workplace bullying and harassment, the art of effective conflict resolution, how to develop an effective security plan and more. Whether... Learn about: Security management course, IT risk, Risk Management...
- Course
- Online
- Intermediate
- Different dates available
... this Certified Information Security Manager (CISM) Professional Training Diploma course. In this course, you’ll equip yourself with the knowledge and proficiency to prepare for the globally recognized CISM certification exam. Overall, this intensive course recognizes the individual who controls, designs... Learn about: Security risk management, Security Manager, Security Awareness...
- Master
- Canberra (Australia)
- Different dates available
... and risk management. - An opportunity to deepen knowledge in areas including computing and national security policy, among others. - Professional development for leaders and practitioners. - The opportunity to undertake research of professional relevance. The program will be taught in intensive blended... Learn about: Risk Management, IT risk, Part Time...
- Course
- Online
- Different dates available
...Cybersecurity refers to the approach of protecting networks, computers, programs and data from attack, damage or unauthorised access. It is essential for any company for assigning a cyber-security expert if they embrace the digitalisation for the growth of their business. The Cyber Security... Learn about: IT risk, Risk Management, Information Systems...
- Vocational qualification
- Online
- Different dates available
... Management, the Cloud Architectural Framework and Business Continuity/Disaster Recovery.The course is of particular interest to: IT infrastructure managers who need to understand and plan for Cloud adoption. IT professionals who need to better understand Cloud technologies. IT systems engineers who... Learn about: Data security, Computer Systems, Data Protection...
- Course
- Online
- Intermediate
- Different dates available
.... The course provides the necessary skills needed to protect networks, secure electronic assets, prevent attacks, ensure privacy, and build secure infrastructures. The course includes information security, ethical and legal practices, and mitigating cyber vulnerabilities. You will also learn the procedures for incident... Learn about: IT risk, Network Training, IT Security...
- Course
- Online
- Intermediate
- Different dates available
- 12 Months
... Management Concepts 4 Apply Risk Management Concepts Activity 5 Understand Compliance and the Cloud 6 Understand Compliance and the Cloud Activity 7 Manage... Learn about: Network Training, Risk Management, IT risk...
- Course
- Online
- Different dates available
... is essential for non-technical managers. In this course you will explore the nature of cyber risk and learn how it can be found anywhere within an organisation, plan to meet and respond to threats and thoroughly prepare for potential incidents... Learn about: Cyber Risk, Risk Mgmt, Risk Management...
- Bachelor's degree
- Islington
... information security and risks at both executive and strategic levels; to ensure a reading familiarity with the entire domain of information security. The module will be delivered in block mode consisting of two blocks as follows: Thursday: 5pm - 9pm Friday: 9am-5pm Saturday: 9am-5pm The second block... Learn about: IT Management, IT risk, IT Security...
- Course
- Online
- Advanced
- Different dates available
- 1 Year
... this Certified Information Systems Security Professional (CISSP) and gain a firm understanding of CISSP... Learn about: Asset Security, Information Systems, Network security...
- Course
- Distance Learning
- Advanced
- December
... to study for an endorsed IT Security Course , this is it. Worldwide, the threat posed by cyber criminals at a variety of levels is accelerating like never before. For everyday citizens and businesses alike, each and every day brings the threat of being targeted by criminal entities. From financial fraud... Learn about: Security Systems Installation, CYBER SECURITY, Cyber Crime...
- Course
- Online
- Advanced
- Different dates available
... Professional Ethical Hacker (CPEH) – Video Training Diploma will introduce you to the hacker mindset through learning different hacking and security tools. Having security training can be a guarantee that you can protect yourself from any threatening attacks... Learn about: Security risk management, Security Operations, Security Awareness...
- Course
- Online
- Different dates available
... Frameworks, Compliance, Global Legal and Regulatory Issues, Computer Ethics, Business Continuity (BC) & Disaster Recovery (DR) Requirements, Risk Management Concepts, Threat Modeling and Security Education, Training, and Awareness.These questions have been carefully designed and crafted to replicate... Learn about: Risk Management, Business Continuity, IT risk...
- Course
- Online
- Different dates available
...This new book, which provides comprehensive guidance on risk management, in line with the requirements of ISO 27001, is essential reading... Learn about: IT risk, IT Management, IT Security...
- Course
- Online
- Advanced
- Different dates available
... Continuity and Disaster Recovery Planning. In short, the course helps you to acquire competency in network infrastructure, system security, organizational security and access control... Learn about: Access Control, IT risk, Network Training...
- Course
- Online
- Different dates available
... expert instructor-led training via our state of the art eLearning platform. By achieving the Certified Information Systems Security Professional (CISSP) certification, you will create more career opportunities and be better positioned when applying for work. Enrol today and prepare for a future... Learn about: Computer Systems, Data security, Computer Science...
- Course
- Online
- Intermediate
- Different dates available
- 1 Year
... Information Security Risk Management Risk Management Risk Reporting and Communication External and Internal Factors Strategic Risk Management Risk Analysis... Learn about: Risk reporting, Security Management, Risk Management...
- Course
- Online
- Different dates available
... environments, examining post-attack techniques and evaluating the organisation’s security posture. Finally, the course shows you how to analyse log data, collecting cyber security intelligence, performing active assets and network analysis, and the proper ways of responding and investing cyber security... Learn about: Risk Management, Network Training, IT risk...
- Course
- Online
- Advanced
- Different dates available
..., and monitoring security controls. This course is designed for them who are responsible for creating and implementing the processes used to evaluate risk and institute security baselines and requirements. These critical decisions will be essential in making sure that the security of the information systems... Learn about: Authorize Information, Security Controls, Information Systems...
- Master
- Southampton
...Introducing your degree Unlike other UK cyber security masters degrees, which have a computer science focus, this unique programme combines modules from a range of disciplines. It is therefore ideally placed to meet the demand for professionals with the necessary management skills, as... Learn about: IT risk, Risk Management...
- Course
- Utrecht (Netherlands)
- Advanced
- 29 May 2024
- 3 Days
... does not specify or recommend any specific risk analysis method, although it does specify a structured, systematic and rigorous process from analyzing risks to creating the risk treatment plan. The 3-day Certified ISO 27005 Risk Manager training offers you also knowledge of the concepts, models... Learn about: IT risk, Management of Risk, IT Security...
- Postgraduate
- Islington
... Manager, or Chief Security Officer.This Masters course is aimed at IT professionals with about 5 years experience and is intended to provide them with the skills that they need to progress to a management role in information security and risk. Hence it aims to prepare these professionals... Learn about: Team Training, Business Risk, Risk Management...