ISO 27001 Foundation - APMG (2.5 days)

The course supplies candidates and organisations with a comprehensive set of learning outcomes in a globally accepted framework. Discover best practice Information Security Management and how to scope and implement ISMS within organisations. 27001 Foundation develops the candidate’s appreciation for information security and is suitable for delegates working in any capacity with InfoSec or organisations wishing to gain a better understanding of standards and best practices.
[ Register, dates and fees, full details > ]

ISO 27001 Practitioner - APMG (2.5 Days)

This two-day and a half, APMG ISO/IEC 27001 Practitioner course, prepares the participants to achieve a sufficient understanding of ISO/IEC 27001 and its application in a given situation. A successful Practitioner candidate should, with suitable direction be able to start applying the International Standard to enable the management of information security (depending on the real situations).
[ Register, dates and fees, full details > ]

Information Security Foundation based on ISO 27001 / 27002 - EXIN (2 Days)

This EXIN foundation-level certification is suitable for all IT professionals who deal with information, especially confidential information. It creates a solid basis to pursue a higher level certification on the subject of Information Security. Entrepreneurs or small business owners who need a basic understanding of the subject also benefit from Information Security Foundation.
[ Register, dates and fees, full details > ]

ISO 27001 Lead Implementer - PECB (5 Days)

This five-day ISO 27001 Lead Implementer training course enables participants to develop the necessary expertise to support an organization in implementing and managing an Information Security Management System (ISMS) as specified in ISO/IEC 27001:2013. Participants will also gain a thorough understanding of best practices used to implement the ISMS through organizational context and incorporation of interested parties.
[ Coming soon. ]

ISO 27001 Lead Auditor - PECB (5 Days)

This five-day intensive course enables participants to develop the necessary expertise to audit an Information Security Management System (ISMS) as specified in ISO/IEC 27001:2013 and to manage a team of auditors by applying widely recognized audit principles, procedures and techniques. Based on practical exercises, the participant will develop the skills (mastering audit techniques) and competencies (managing audit teams and audit program, communicating with customers, conflict resolution, etc.) necessary to efficiently conduct an audit.
[ Coming soon. ]

Certified Information Security Manager (CISM) Training (4 days)

CISM is one of the most important infosec qualifications in the world today. CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that CISM holders have the experience and knowledge to offer effective security management and advice. This course provides an intense environment in which participants can acquire the skills and knowledge expected of a world-class information security manager.
[ Register, dates and fees, full details > ]

Certified Information System Auditor (CISA) Training (5 days)

Since 1978, the ISACA® Certified Information Systems Auditor (CISA) program, has been the globally accepted standard of achievement among information systems (IS) audit, control and security professionals. The technical skills and practices that CISA promotes and evaluates are the building blocks of success in the field. This course provides an intense environment in which participants can acquire the skills and knowledge expected of a world-class information systems audit, control and security professional.
[ Register, dates and fees, full details > ]

ISACA Cybersecurity Audit - 2 Days

ISACA’s new Cybersecurity Audit Certificate Program provides audit/assurance professionals with the knowledge needed to excel in cybersecurity audits. It provides security professionals with an understanding of the audit process, and IT risk professionals with an understanding of cyber-related risk and mitigating controls.
[ Register, dates and fees, full details > ]