• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

94 Auditor courses delivered Live Online

Internal Audit Skills Diploma

By NextGen Learning

Internal Audit Skills Diploma Course Overview The "Internal Audit Skills Diploma" offers an in-depth exploration of internal audit processes and procedures, providing essential knowledge for individuals seeking to excel in auditing roles. The course covers auditing as a form of assurance, the technology used in audits, internal control, risk management, and UK-specific audit standards. Upon completion, learners will have a solid understanding of internal audit processes, report generation, and the skills necessary to pursue a career as an auditor. Course Description This comprehensive diploma course equips learners with the key skills required for a successful career in internal auditing. Topics include auditing as a form of assurance, internal audit procedures, the integration of technology in audits, and methods for evaluating internal controls and risk. In addition, the course explores how to conduct audit interviews, report findings, and understand UK internal audit standards. Learners will also gain insights into the various career paths within auditing, making this course valuable for those looking to enter or advance in the industry. Internal Audit Skills Diploma Curriculum Module 01: Auditing as a Form of Assurance Module 02: Internal Audit Procedures Module 03: Technology-based Internal Audit Module 04: Internal Control and Control Risk Module 05: Audit Interviews Module 06: Reporting Audit Outcome Module 07: UK Internal Audit Standards Module 08: Career as an Auditor (See full curriculum) Who is this course for? Individuals seeking to enter the field of internal auditing. Professionals aiming to enhance their audit knowledge and career development. Beginners with an interest in auditing or risk management. Those pursuing a career in compliance, risk, or financial sectors. Career Path Internal Auditor Risk and Compliance Officer Audit Manager Financial Auditor Internal Controls Specialist Business Consultant

Internal Audit Skills Diploma
Delivered OnlineFlexible Dates
£7.99

Certified Business Analysis Professional (CBAP) Boot Camp: In-House Training

By IIL Europe Ltd

Certified Business Analysis Professional™ (CBAP®) Boot Camp: In-House Training The course provides targeted exam preparation support for IIBA® Level 3 - CBAP® exam candidates, including both a BABOK® Guide Version 3.0 content review and exam preparation tutorial. The class is interactive, combining discussion, application of concepts, study tips, and a practice exam. Knowledge Check quizzes and self-assessments allow candidates to identify areas of weakness and create a custom study plan tailored to their individual needs as well as study aids to support their exam preparation after the course. The course materials include a copy of A Guide to the Business Analysis Body of Knowledge® (BABOK® Guide) Version 3.0. What you will Learn Upon completion, participants will be able to: Demonstrate familiarity with the structure and content of the IIBA® BABOK® Guide Improve their probability of passing the Level 3 - CBAP® Exam Identify their knowledge gaps through the use of module Knowledge Check quizzes Gauge their readiness for taking the exam by IIBA® BABOK® Guide Knowledge Are Foundation Concepts for IIBA® CBAP® Prep IIBA® - the Organization Business Analysis - the Profession Knowledge Check Terminology and Key Concepts IIBA®'s BABOK® Guide - the Standard Underlying Competencies BA Techniques Business Analysis Planning and Monitoring Knowledge Check Overview BAP&M Tasks BAP&M Techniques Elicitation and Collaboration Knowledge Check Overview E&C Tasks E&C Techniques Requirements Life Cycle Management Knowledge Check Overview RLCM Tasks RLCM Techniques Strategy Analysis Knowledge Check Overview SA Tasks SA Techniques Requirements Analysis and Design Definition Knowledge Check Overview RA&DD Tasks RA&DD Techniques Solution Evaluation Knowledge Check Overview SE Tasks SE Techniques Exam Preparation Practice Exam and debrief Exam Preparation Study Tips Manage Study Plan Exam Process Exam day

Certified Business Analysis Professional (CBAP) Boot Camp: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£2,495

BRCGS Sécurité des Denrées Alimentaires Issue 9 | Auditeur Principal (5 jours)

5.0(15)

By ASK SONIA LTD

Formation officielle Auditeur Principal (Lead Auditor) BRCGS Food v9 (Norme Mondiale pour la Sécurité des Denrées Alimentaires version 9) en français. Dispensée en ligne (Zoom) en direct par un partenaire de formation agréé BRCGS. Frais d'examen et de certificat inclus dans le prix.

BRCGS Sécurité des Denrées Alimentaires Issue 9 | Auditeur Principal (5 jours)
Delivered Online
£1,043

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

Certificate in Company Law (CCL)

By EMG Associates UK Limited

Certificate in Company Law (CCL) Why Attend This course is designed for professionals seeking a comprehensive understanding of legal matters affecting companies in the GCC. The course covers the fundamental principles of company law, including the strategic selection and establishment of different types of companies, as well as the management and dissolution of companies throughout their life cycle. Additionally, participants gain valuable insights into legal issues specific to family businesses in the GCC and learn how to effectively address them in practice. Course Methodology In this interactive training course participants will frequently work in pairs as well as in larger groups to complete exercises as well as regional and international case studies. Course Objectives By the end of the course, participants will be able to: Apply legal rules and principles to specific commercial situations through consideration of relevant company law Increase profitability within their organization by selecting the best company type and by adopting the best legal practices in management Recognize the rules that govern family businesses and how they affect the continuation and success of the business Understand the reasons for company termination and dissolution and the legal issues in this regard Target Audience This course is suitable for lawyers, company managers, management teams, business and law students and those who are interested to know more about company law and its implications. It also benefits directors and executives who have direct responsibility for legal decisions within the organization. In addition, in-house council new to the region, and those working within a legal department, find this course highly beneficial. Target Competencies General principles of company law Company management Corporate governance Problem solving Note The Dubai Government Legal Affairs Department has introduced a Continuing Legal Professional Development (CLPD) programme to legal consultants authorised to practise through a licensed firm in the Emirate of Dubai. We are proud to announce that the Dubai Government Legal Affairs Department has accredited EMG Associates as a CLPD provider. In addition, all our legal programmes have been approved. This PLUS Specialty Training legal course qualifies for 4 elective CLPD points. Types of companies and company formation Types of companies Memorandum of Association (MoA) and the Articles of Association (AoA) related principles Alteration of clauses of the MoA and AoA Partnership and its formation Limited Liability Company (LLC) and its formation Public Shareholding Company and its formation Overview of other types of companies Choosing between various types of companies Company management and shareholders rights and duties Roles and types of directors Powers, duties and liabilities of directors Appointment and retirement Resignation and vacation of office Independent director Meeting of board of directors Auditors: appointment, removal, powers and duties Corporate governance Family businesses in the GCC and shareholders' liability issues UAE law of family companies The provisions related to family businesses in the new Saudi company law Legal organization of family businesses in the GCC Strategies for survival and growth within family businesses Company management and shareholders' liability General principles of corporate liability Liability of directors and Key Managerial Persons (KMP) Liability of shareholders Termination and dissolution of companies Winding up of companies Liquidator Authorities Striking off name Insolvency and bankruptcy Restructuring and re-organization Mergers and amalgamation Acquisition and take-over

Certificate in Company Law (CCL)
Delivered OnlineFlexible Dates
£4,212

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites CompTIA Network+ Certification 1 - Security and Risk Management Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training 2 - Asset Security Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling 3 - Security Engineering Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities 4 - Information Security Management Goals Organizational Security The Application of Security Concepts 5 - Information Security Classification and Program Development Information Classification Security Program Development 6 - Risk Management and Ethics Risk Management Ethics 7 - Software Development Security Software Configuration Management Software Controls Database System Security 8 - Cryptography Ciphers and Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Hashing and Message Digests Email, Internet, and Wireless Security Cryptographic Weaknesses 9 - Physical Security Physical Access Control Physical Access Monitoring Physical Security Methods Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered OnlineFlexible Dates
£3,395

ISO : International Organization for Standardization 9001:2015

By NextGen Learning

ISO : International Organization for Standardization 9001:2015 Course Overview: This ISO 9001:2015 course provides an in-depth introduction to the internationally recognised standard for quality management systems. Learners will gain a clear understanding of the principles behind ISO 9001:2015 and its application across various industries. The course explores the requirements for establishing, maintaining, and improving quality management processes, with a focus on driving continual improvement within organisations. Upon completion, learners will be equipped to implement ISO 9001:2015 standards within their own workplace, enhancing their organisation's operational efficiency and customer satisfaction. Course Description: The ISO 9001:2015 course covers a comprehensive range of topics crucial for quality management in any organisation. It begins with an overview of the ISO 9001:2015 standard, followed by an in-depth analysis of each clause. Learners will explore the context of the organisation, leadership requirements, planning and support processes, operational execution, performance evaluation, and strategies for continual improvement. The course combines theoretical insights with the application of concepts, providing a holistic learning experience that equips individuals with the knowledge to enhance their organisation's quality management system. Learners will develop the skills needed to identify and address quality-related challenges, ensuring they contribute to organisational success. ISO : International Organization for Standardization 9001:2015 Curriculum Module 01: Introduction To ISO 9001:2015 Module 02: Clause 4 - Context Of The Organisation Module 03: Clause 5 - Leadership Module 04: Clause 6 - Planning Module 05: Clause 7 - Support Module 06: Clause 8 - Operation Module 07: Clause 9 - Performance Evaluation Module 08: Clause 10 - Improvement (See full curriculum) Who is this course for? Individuals seeking to improve their knowledge of quality management systems. Professionals aiming to implement or oversee ISO 9001:2015 standards in their organisations. Beginners with an interest in ISO certifications and quality assurance processes. Organisations striving for quality management improvements. Career Path: Quality Manager ISO Auditor Quality Assurance Specialist Compliance Officer Operations Manager Quality Control Coordinator ISO Consultant

ISO : International Organization for Standardization 9001:2015
Delivered OnlineFlexible Dates
£9.99

NCSP ISO 27001 Specialist

By IIL Europe Ltd

The NCSP® ISO 27001 Specialist accredited (APMG International), certified (NCSC/GCHQ-UK), and recognized (DHS-CISA-USA) certification course teaches Digital Business, Operational Stakeholders, Auditors, and Risk Practitioners a Fast-Track approach to adopting and adapting the ISO 27001 controls in the context of a NIST Cybersecurity Framework program.This course looks at the impact of adapting a principled approach to an enterprise risk management framework to better support cybersecurity decisions within the context of the selected informative reference. It guides participants on the best approach to adapt, implement, and operate (AIO) a comprehensive cybersecurity program that integrates into existing organizational capabilities and incorporates the selected Informative Reference. NCSP® ISO 27001 Specialist introduces the integration of typical enterprise capabilities with cybersecurity from the perspective of the selected cybersecurity informative reference. The overall approach places these activities into systems thinking context by introducing the Service Value Management System composed of three aspects, governance, assurance, and the Z-X Model. With this in place, the course presents the approach to adapt, implement, operate, and improve the organizational cybersecurity posture that builds on the application of the FastTrack™ presented in the NCSP Practitioner. The NIST Cybersecurity Professional (NCSP®) program is the industry's first accredited certification training program that teaches organizations how to build a Digital Value Management Overlay System capable of leveraging the NIST Cybersecurity Framework to deliver the secure, digital business outcomes expected by executives, government regulators, and legal advisors.

NCSP ISO 27001 Specialist
Delivered OnlineFlexible Dates
£2,995

NCSP 800-171 Specialist

By IIL Europe Ltd

The NCSP® 800-171 Specialist accredited (APMG International), certified (NCSC/GCHQ-UK), and recognized (DHS-CISA-USA) certification course teaches Digital Business, Operational Stakeholders, Auditors, and Risk Practitioners a Fast-Track approach to adopting and adapting the 800-171 controls in the context of a NIST Cybersecurity Framework program. This course looks at the impact of adapting a principled approach to the enterprise risk management (ERM) framework to better support cybersecurity decisions, establishing the context for the selected informative reference (IR). It guides participants on the best approach to adapting, implementing, and operating (AIO) a comprehensive cybersecurity program that can be integrated into the existing organizational capabilities and incorporates the selected IR. NCSP® 800-171 Specialist introduces the integration of typical enterprise capabilities with cybersecurity from the selected cybersecurity IR perspective. The overall approach places these activities into a systems-thinking context by introducing the service value management system (SVMS), including governance, assurance, and the Z-X model. With this in place, the course presents the approach to adapt, implement, operate, and improve the organizational cybersecurity posture that builds on the application of the FastTrack™ concept presented in the NCSP Practitioner course. The NIST Cybersecurity Professional (NCSP®) program is the industry's first accredited certification training program that teaches organizations how to build a Digital Value Management Overlay System capable of leveraging the NIST Cybersecurity Framework to deliver the secure, digital business outcomes expected by executives, government regulators, and legal advisors.

NCSP 800-171 Specialist
Delivered OnlineFlexible Dates
£2,995
1...45678...10