Information Security Manager

The information security manager is responsible for implementing the company’s information security program, covering multiple domains (organizational, physical, logical security, etc.).

The manager coordinates the application of designed strategies and policies. They employ methodologies and practices to reduce risks and ensure the organization’s compliance with laws and industry standards (ISO, PCI-DSS, etc.). They may also be involved in more technical aspects during the identification of organizational vulnerabilities.

The following training programs aim to:

  • Familiarize with best practices to reduce risks;
  • Introduce the possibilities and methods of deploying policies, procedures, standards, etc., throughout the organization;
  • Verify organizational compliance;
  • Conduct technical audits of the company’s network security;
  • Recognize possible cyber defense countermeasures.

Possible certifications upon completing your training include:

  • CISSP, CISSP-ISSAP;
  • CISA;
  • CompTIA PenTest+;
  • CompTIA CASP+.

This course complements your broad knowledge and experience in information security. It expands your knowledge by covering the eight domains defined by the Common Body of Knowledge (CBK) for information security professionals. The training offers an approach based on implementing a security process within an enterprise, while also serving as a preparation tool for the CISSP certification.

The CISSP certification is highly regarded in the world of technology and security today. This reputation is maintained because the organization (ISC)² continually improves the content through the engagement of industry experts, ensuring that the material and questions remain relevant despite the ongoing changes and challenges in the security field. By defining the eight CBK domains, an industry standard has been established, and the CISSP training thoroughly covers all of them. The skills and knowledge you will gain from this course will give you a deep understanding of these eight domains, establishing credibility and success for every professional in the field of information security.

Expand
Price: 1400 EUR
Duration: 5 days / 35 hours

The Certified Cloud Security Professional (CCSP) course is a comprehensive and highly sought-after certification program designed to equip professionals with the knowledge and skills needed to excel in the ever-evolving field of cloud security. In today’s rapidly changing digital landscape, where organizations are increasingly adopting cloud technologies to drive innovation and efficiency, the need for qualified experts capable of protecting and securing cloud environments is paramount.

Throughout the training, participants will explore a wide range of cloud security domains, gaining an in-depth understanding of the fundamental principles and best practices for securing cloud-based applications, services, and data. The course content is carefully organized to cover the latest industry standards, guidelines, and frameworks, ensuring that students are well-prepared to address the unique security challenges of cloud computing.

The CCSP course includes case studies and real-world exercises, allowing participants to apply their knowledge to solve complex cloud security issues. Throughout the program, participants will be prepared for the official CCSP certification exam, validating their expertise and making them valuable assets in the job market. Professionals will be equipped to make informed decisions and implement robust security measures to protect cloud-based systems, earn the trust of organizations, and advance their careers in the dynamic world of cloud security.

Expand
Price: 1400 EUR
Duration: 5 days / 35 hours

This exam preparation course covers the five CISA domains. You will start by becoming familiar with the practical aspects of an information systems audit. The course then shows you how to govern and manage IT before introducing you to information systems acquisition. You will gain knowledge on information systems operations and understand how to maintain business resilience, helping to solve various real-world problems. Finally, you will learn how to protect your organization and effectively control information systems with IT audit standards.

By the end of this course, you will not only have covered the essential concepts and techniques you need to know to pass the CISA certification exam, but you will also have the opportunity to apply them in the real world.

Expand
Duration: 5 days / 35 hours

Gain the skills to use Microsoft Purview to improve your data security in Microsoft 365. In this training, you learn how to create sensitive information types, create sensitivity labels, and use auto-labeling policies based on these labels. You also learn how to set up DLP (Data Loss Prevention) policies to safeguard your organization’s data.

Expand
Duration: 1 day / 7 hours

The SC-5007 training prepares professionals to protect identities, data, and applications in the cloud. It covers identity management, access security, and information protection. Ideal for those who wish to master Microsoft Security, it provides key skills for securing hybrid cloud environments. Gain expertise in compliance and monitoring to anticipate and manage threats.

Expand
Duration: 1 day / 7 hours

The SecurityX course, formerly known as CompTIA Advanced Security Practitioner (CASP+), is an advanced-level certification program designed to equip cybersecurity professionals with the essential skills and knowledge needed to secure complex enterprise environments. This comprehensive course offers hands-on training and real-world scenarios to prepare learners for the CASP+ certification exam.

Throughout the course, students will delve into a wide range of advanced security concepts and practices, covering topics such as risk management, enterprise security, integration of advanced authentication and authorization mechanisms, and more. They will gain expertise in identifying and resolving security vulnerabilities, implementing solutions to mitigate risks, and ensuring the confidentiality, integrity, and availability of critical systems and data.

Expand
Duration: 5 days / 35 hours

The ISO/IEC 27001 Foundation training provides participants with essential knowledge to understand and support Information Security Management System (ISMS) concepts and requirements. This entry-level course introduces fundamental principles of information security management, covering the ISO/IEC 27001 framework, basic ISMS concepts, and the importance of systematic security management in organizations.

Designed for professionals new to information security management, this 2-day training prepares participants for the PECB Certificate Holder in ISO/IEC 27001 Foundation credential. The course covers ISMS fundamentals, risk management principles, and the Plan-Do-Check-Act cycle, providing a solid foundation for those looking to advance their careers in information security or pursue higher-level ISO/IEC 27001 certifications.

Upon successful completion of the certification exam, participants will demonstrate their understanding of fundamental ISMS methodologies and be equipped to support organizations in their information security management initiatives. This certification serves as an excellent stepping stone toward more advanced roles in cybersecurity, compliance, and risk management.

Expand
Duration: 5 days / 35 hours

During this training, you will acquire the knowledge and skills necessary to plan and conduct internal and external audits in compliance with ISO 19011 and the ISO/IEC 17021-1 certification process.

Through comprehensive practical exercises, you will master audit techniques and develop the competencies to effectively manage an audit program, audit team, client communication, and conflict resolution.

After acquiring the necessary expertise to perform these audits, you can take the certification exam and apply for the “PECB Certified ISO/IEC 27001 Lead Auditor” credential. By holding a PECB Lead Auditor Certificate, you will demonstrate that you possess the capabilities and competencies to audit organizations according to best practices.

Expand
Duration: 5 days / 35 hours

Information security threats and attacks are constantly evolving and becoming increasingly sophisticated. The most effective defense consists of properly implementing and managing information security measures and best practices. Information security also constitutes a fundamental expectation and critical requirement from clients, legislators, and other stakeholders.

This training is specifically designed to prepare participants for implementing an information security management system (ISMS) based on the ISO/IEC 27001 standard. It aims to provide comprehensive understanding of ISMS best practices and a structured framework for its continuous management and improvement.

After completing the training course, you can take the certification exam. Upon successful completion, you can obtain the prestigious “PECB Certified ISO/IEC 27001 Lead Implementer” credential, which demonstrates your capability and practical knowledge to implement an ISMS compliant with ISO/IEC 27001 requirements.

Expand
Duration: 5 days / 35 hours

The ISO/IEC 27002 Foundation training enables participants to learn the fundamental concepts related to the implementation and management of information security controls based on ISO/IEC 27002 guidelines. Through this comprehensive training, participants will be able to identify the information security controls of ISO/IEC 27002 that are categorized into four main themes: organizational, people, physical, and technological. The training also provides information on how ISO/IEC 27002 relates to other standards, such as ISO/IEC 27001 and ISO/IEC 27003.

The training is followed by a certification exam. Upon successful completion, you can apply for the “PECB Certificate Holder in ISO/IEC 27002 Foundation” certificate. This certificate demonstrates that you possess general knowledge of ISO/IEC 27002 information security controls.

Expand
Duration: 2 days / 14 hours

The ISO/IEC 27005 Foundation is a two-day training course that focuses on the information security risk management process introduced by ISO/IEC 27005 and the structure of the standard. It provides an overview of the ISO/IEC 27005 guidelines for managing information security risks, including context establishment, risk assessment, risk treatment, communication and consultation, recording and reporting, and monitoring and review.

After attending the training course, you can take the certification exam. Upon successful completion, you can apply for the “PECB Certificate Holder in ISO/IEC 27005 Foundation” designation. This certificate demonstrates that you have general knowledge of ISO/IEC 27005 guidelines for information security risk management.

Expand
Duration: 2 days / 14 hours

Our five-day Information Systems Security Architecture Professional (ISSAP) training is a unique program designed to equip you with the knowledge to design large-scale security architectures. It complements the topics covered in the general CISSP training (recommended prerequisite) and is specifically aimed at system architects, business analysts, security directors, technology directors, and network and system designers.

The six domains covered in the training provide a comprehensive plan for enhancing the organization’s current security posture and enable you to understand defensive cybersecurity strategies, ensuring the confidentiality, integrity, and availability of information resources.

Expand
Duration: 5 days / 35 hours

The CISM (Certified Information Security Manager) course trains professionals to manage, develop, and oversee enterprise-level information security programs while ensuring alignment with business objectives. It covers four key areas: Information Security Governance, Risk Management, Program Development and Management, and Incident Response. This certification is ideal for IT managers, consultants, and compliance officers looking to deepen their expertise in security management.

Expand
Duration: 5 days / 35 hours

Our website uses cookies to personalize your browsing experience. By clicking ‘I accept,’ you consent to the use of cookies.