Information Security Training
The course covers IT Governance, certification, and accreditation, public key infrastructures, configuration management, intrusion detection and incident response.
This four day intermediate level Information Systems Security Officer (ISSO) course expands upon the principles and concepts learned in the ISSO Orientation course by delving deeper into detail regarding the people, process and technology aspects of an ISSO’s role.
This course reflects the most recent updates and changes to the CISSP exam and the Official (ISC2) Guide to the CISSP CBK (published Nov. 2006).
This course will provide participants a solid understanding of software reliability engineering techniques enabling them to evaluate the effectiveness of reliability techniques when applied to other systems. Drawing upon industry standards and best practices the course is intended to provide engineering staff with a solid understanding of the software development approaches used by various vendors.
This course introduces the student to the threats, vulnerabilities and countermeasures that can be utilised to administratively, logically, and physically-protect resources and sensitive information.
Step Up or Fall Down? How do you, as a functional mid-level manager or below, regard the risk of capably surviving a catastrophic event in your organization based on knowledge of what you need to do?