• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

85 Certified Information Security Manager (CISM) courses

Cyber Security Fundamentals and Best Practices

5.0(10)

By Apex Learning

20-in-1 Cyber Security Bundle Give a compliment to your career and take it to the next level. This Cyber Security bundle will provide you with the essential knowledge to shine in your professional career. Whether you want to develop Cyber Security skills for your next job or elevate your skills for your next promotion, this Cyber Security bundle will help you stay ahead of the pack. Throughout the Cyber Security programme, it stresses how to improve your competency as a person in your chosen field while also outlining essential career insights in the relevant job sector. Along with this Cyber Security course, you will get 19 premium courses, an original hardcopy, 20 PDF certificates (Main Course + Additional Courses) Student ID card as gifts. This Cyber Security Bundle Consists of the following Premium courses: Course 01: Cyber Security Incident Handling and Incident Response Course 02: Computer Networks Security Course 03: Cyber Security Law Online Course Course 04: Cyber Intelligence Officer Course 05: CompTIA Security+ (SY0-401) New 2020 Course 06: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Course 07: Computer Hacking Forensic Investigator Course 08: Security Management Advanced Diploma Course 09: IT Administration and Networking Course 10: GDPR Training Course 11: Master JavaScript with Data Visualization Course 12: Computer Science With Python Course 13: R Programming for Data Science Course 14: WordPress Security Mastery Course 15: Mile2 Certified Network Forensics Examiner (CNFE) Course 16: Complete Web Application Penetration Testing & Security Course 17: Linux Security and Hardening Course 18: Excel Must know Formulas and Functions Course 19: Certified Information Systems Security Professional (CISSP) Course 20: Excel Spreadsheet for Beginner Enrol now in Cyber Security to advance your career, and use the premium study materials from Apex Learning. The Cyber Security bundle incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can strengthen your Cyber Security expertise and essential knowledge, which will assist you in reaching your goal. Moreover, you can learn Cyber Security from any place in your own time without travelling for classes. Certificate: PDF Certificate: Free (Previously it was £6*20 = £120) Hard Copy Certificate: Free (For The Cyber Security Incident Handling and Incident Response Course: Previously it was £10) CPD 285 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this Cyber Security bundle. Requirements This Cyber Security course has been designed to be fully compatible with tablets and smartphones. Career path Having this expertise will increase the value of your CV and open you up to multiple job sectors. Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included You will get the Hard Copy certificate for the title course Cyber Security Incident Handling and Incident Response absolutely Free! Other Hard Copy certificates are available for £10 each. Please Note: The delivery charge inside the UK is £3.99, and the international students must pay a £9.99 shipping cost.

Cyber Security Fundamentals and Best Practices
Delivered Online On Demand
£100

How to Study for CISSP®️ Certification - Tips, Materials, and Approach

By Packt

Preparing for the CISSP Certification Exam? Then this course is for you. In this course, you will learn more effective CISSP study techniques, exam hacks, formats, and strategies, as well as how to correctly respond to exam questions.

How to Study for CISSP®️ Certification - Tips, Materials, and Approach
Delivered Online On Demand2 hours 31 minutes
£56.99

CompTIA Security+ (SY0-501): Complete Course and Practice Exam

By Packt

CompTIA Security+ Bootcamp: Your preparation course for the most popular cyber security certification in the world!

CompTIA Security+ (SY0-501): Complete Course and Practice Exam
Delivered Online On Demand15 hours 10 minutes
£53.99

C)ISSA Certified Information Systems Security Auditor Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers IS Systems Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Information Systems Security Auditor students will be able to establish industry acceptable Cyber Security & IS management standards with current best practices and be prepared to competently take the C)ISSA exam. The Certified Information Systems Security Auditor, C)ISSA , course covers the skills and knowledge to assess vulnerabilities, report on compliance and implement controls for private and public enterprises. Many organizations require an Information System Auditor?s expert knowledge when it comes to identifying critical issues and providing effective auditing solutions. Through the use of a risk-based approach, the C)ISSA is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Course Outline The Process of Auditing Information Systems Risk-Based Auditing Audit Planning and Performance IS Systems Auditor reports IT Governance and Management Systems Acquisition, Development and Implementation Systems Development Models Types of Specialized Business Applications Application Controls Information Systems Operations, Maintenance, and Support System and Communications Hardware Additional course details: Nexus Humans C)ISSA Certified Information Systems Security Auditor Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSA Certified Information Systems Security Auditor Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)ISSA Certified Information Systems Security Auditor Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

ISM,ISPS,MLC Maritime Internal Auditor

By International Maritime Training

The course approaches the audit process in the context of international standards and therefore, it is equally suitable for sea-going and office-based staff and its benefits are as following: Individuals will have a good understanding of the ISM Code, its importance, and their role within it, including ISM, ISO and MLC auditing requirements Individuals will be actively involved in the ongoing evaluation and development of a Company Safety, Environmental and Quality Management System Providing the Company and its auditors with the ability to establish the effectiveness of a Company Management System ahead of external verification by Administrations or Port State Control Delivered by experts with International safety and security management, compliance and verification experience in an engaging interactive style with a variety of security and safety related scenario case study workshops exercises during the training course

ISM,ISPS,MLC Maritime Internal Auditor
Delivered Online & In-PersonFlexible Dates
£200

C)ISSM - Certified Information Systems Security Manager Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Penetration Testers Microsoft Administrators Security Administrators Active Directory Administrators Anyone looking to learn more about security Overview Upon completion, Certified IS Security Manager students will have a strong foundation in Cyber Security & IS management standards with current best practices and will be prepared to competently take the C)ISSM exam. Companies will lean on a Certified IS Security Manager, C)ISSM to create solutions for tomorrow?s problems, today. When it comes to identifying critical issues and providing effective IS management solutions.ÿ ÿThe knowledge and course content provided in the Certified Information Systems Security Manager ? C)ISSM will not only cover ISACA©?s CISM exam but will provide a measurable certification that demonstrates proficiency in the IS Management Field. The Certified Information Systems Security Manager covers the skills and knowledge to assess threat analysis and risks, Risk & incident management, Security programs and CISO roles, IS security strategy and frameworks, Audit and Risk management creation of policies, compliance and awareness, as well as DR and BCP development, deployment and maintenance. Course Outline Introduction Information Security Governance Information Risk Management and Compliance Information Security Program Development and Management Information Security Incident Management Additional course details: Nexus Humans C)ISSM - Certified Information Systems Security Manager Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSM - Certified Information Systems Security Manager Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)ISSM - Certified Information Systems Security Manager Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

C)ISRM - Certified Information System Risk Manager Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Information Systems Risk Manager students will be prepared to pass the CISRM exam.  Certified Information Systems Risk Manager, CISRM, course is made for IT and IS professionals who are involved with all aspects of risk management. Requests for this particular area of certification is growing fast in the employment sector. Recent high-profile breaches in both the public and private sectors have increased awareness for the need for Risk Management professionals. Mile2?s CISRM certification exam will test your knowledge in all areas of risk management. If you would like some training and test preparation before taking the Certified Information System Risk Manager Exam we offer the CISRM course as both a live class and a self-study combo. First, you will learn to assess a system, then implement risk controls. Finally, you will be able to monitor and maintain risk procedures. With this training, you will be able to identify risks associated with specific industries. After course completion, you will be able to design, implement, monitor and maintain risk-based, efficient and effective IS controls. Knowledge of all of these areas will be required to pass the CISRM exam. Course Outline The Big Picture Domain 1 ? Risk Identification Assessment and Evaluation Domain 2 ? Risk Response Domain 3 ? Risk Monitoring Domain 4 ? IS Control Design and Implementation

C)ISRM - Certified Information System Risk Manager Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

C)ISSO - Certified Information Security Systems Officer Mile 2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview The person who carries this certification should be able to acquire necessary resources, advise senior leadership, collaborate with stakeholders, evaluate effectiveness, identify cybersecurity problems, manage threats, oversee information security awareness programs, participate in risk assessments, support compliance activities, and define or implement policies and procedures to ensure protection of critical infrastructure within an information security environment. If you are looking for the ?gotta have it? cybersecurity course, then the Certified Information Systems Security Officer is for you.ÿ The C)ISSO will prepare you for multiple managerial roles inside the INFOSEC community by covering a broad range of topics. You will learn theories in security concepts, practices, monitoring and compliance in IS management. An Information Systems Security Officer is able to implement and maintain cost-effective security controls that are closely aligned with business and industry standards. The C)ISSO certification course is an idealÿway to increaseÿknowledge, expertise, and skill for managers, auditors, and INFOSEC professionals.ÿ At Mile2 we consider the C)ISSO to be one of our flagship courses.The things you learn in this course can be applied to management, prevention teams, and recovery professionals. Material learned in the Live Class or Self-Study options will apply directly to the certification exam. Course Outline Risk Management Security Management Identification and Authentication Access Control Security Models and Evaluation Operations Security Vulnerability Assessments Symmetric Cryptography and Hashing Network Connections Network Protocols and Devices Telephony, VPNs, and Wireless Security Architecture and Attacks Software Development Security Database Security Malware and Software Attacks Business Continuity Disaster Recovery Incident Management, Law, and Ethics Physical Security Additional course details: Nexus Humans C)ISSO - Certified Information Security Systems Officer Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSO - Certified Information Security Systems Officer Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)ISSO - Certified Information Security Systems Officer Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Information Privacy Professional (CIPP/CAN)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection OfficersData Protection ManagersAuditorsLegal Compliance OfficersSecurity ManagerInformation ManagersAnyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they?ve gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure their place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Common Principles and Approaches to Privacy This unit includes a brief discussion about the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles. Jurisdiction and Industries This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors. Information Security: Safeguarding Personal Information This unit presents introductions to information security, including definitions, elements, standards, and threats/ vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM). Online Privacy: Using Personal Information on Websites and with Other Internet-related Technologies This unit focuses on the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children?s online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices. Canadian Legal Framework This unit provides an introduction to the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Private-sector Privacy Laws This unit focuses on the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Public-sector Privacy Laws This unit highlights key concepts and practices related to the collection, retention, use, disclosure and disposal of personal information by federal, provincial and territorial governments. Health Information Privacy Laws This unit touches on the applicability and purpose of health information privacy laws. Private-sector Compliance Practices This unit delves into the components that make up compliance regulations, including Generally Accepted Privacy Principals and security breach notification, and also examines compliance track records and Federal Commissioner Findings. Public-sector Compliance Practices This unit presents the various methods that can be implemented for compliance in the public sector, such as privacy impact assessments and data sharing agreements. In addition, it discusses the challenges presented by digital information exchanges, as well as non-legislative considerations. Health-sector Compliance Practices This unit covers the issues presented with digital compliance in the health sector. Additional course details: Nexus Humans Certified Information Privacy Professional (CIPP/CAN) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Professional (CIPP/CAN) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Information Privacy Professional (CIPP/CAN)
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Information Privacy Manager (CIPM)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programmes Overview Principles of Privacy Program Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organization through process and technology?regardless of jurisdiction or industry. The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Manager (CIPM) certification program. Founded in 2000, the IAPP is the world?s largest and most comprehensive privacy resource with a mission to define, support and improve the Privacy profession globally. Every organization has data protection needs. Every day, we access, share and manage data across companies, continents and the globe. Knowing how to implement a privacy program is an invaluable skill that will help you protect your organization?s data?and take your career to the next level. Our Principles of Privacy Program Management training is the premier course on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a privacy team. Introduction to privacy program management Privacy program management responsibilities Accountability in privacy program management Privacy governance Considerations for developing and implementing a privacy program Position of the privacy function within an organization Role of the DPO Program scope and charter Privacy strategy Support and ongoing involvement of key functions and privacy frameworks Applicable laws and regulations The regulatory environment Common elements across jurisdictions Strategies for aligning compliance with organizational strategy Data assessments Practical processes for creating and using data inventories/maps Generating and applying gap analyses Privacy assessments Privacy impact assessments/data protection impact assessments Vendor assessments Policies Common types of privacy-related policies Policy components Strategies for implementation Data subject rights Operational considerations for communicating and ensuring data subject rights Privacy notice Choice and consent Access and rectification Data portability Erasure Training and awareness Developing privacy training and awareness programs Implementing privacy training and awareness programs Protecting personal information Holistic approach to protecting personal information Privacy by design Data breach incident plans Planning for a data security incident or breach Responding to a data security incident or breach Monitoring and auditing program performance Common practices for monitoring privacy program performance Measuring, analyzing and auditing privacy programs Additional course details: Nexus Humans Certified Information Privacy Manager (CIPM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Manager (CIPM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Information Privacy Manager (CIPM)
Delivered OnlineFlexible Dates
Price on Enquiry
1...34567...9