Online or onsite, instructor-led live Information Security Risk training courses demonstrate through interactive discussion and hands-on practice the fundamentals and advanced topics of Information Security Risk.
Information Security Risk training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Cape Town onsite live Information Security Risk trainings can be carried out locally on customer premises or in NobleProg corporate training centers.
NobleProg -- Your Local Training Provider
Cape Town - City Lodge Hotel Victoria and Alfred Waterfront
Corner Dock Road and Alfred Street, Cape Town, South Africa, 8001
City Lodge V & A Waterfront is conveniently located close to Cape Town International Airport. The business centre has free WIFI and NobleProg has use of their modern meeting rooms which can accommodate a maximum of 10 delegates, providing a comfortable training environment.
This instructor-led, live training in Cape Town (online or onsite) is aimed at intermediate-level to advanced-level IT professionals and business leaders who wish to develop a structured approach to handling data breaches.
By the end of this training, participants will be able to:
Understand the causes and consequences of data breaches.
Develop and implement data breach prevention strategies.
Establish an incident response plan to contain and mitigate breaches.
Conduct forensic investigations and assess the impact of breaches.
Comply with legal and regulatory requirements for breach notification.
Recover from data breaches and strengthen security postures.
This instructor-led, live training in Cape Town (online or onsite) is aimed at developers who wish to integrate Snyk into their development tools to find and fix security issues in their code.
By the end of this training, participants will be able to:
Understand the features and structure of Snyk.
Use Snyk to find and fix code security issues.
Integrate Snyk in a software development lifecycle.
This instructor-led, live training in Cape Town (online or onsite) is aimed at beginner to intermediate-level system administrators and security professionals who wish to learn how to implement Cloudflare for content delivery and cloud security, as well as mitigate DDoS attacks.
By the end of this training, participants will be able to:
Configure Cloudflare for their websites.
Set up DNS records and SSL certificates.
Implement Cloudflare for content delivery and caching.
Protect their websites from DDoS attacks.
Implement firewall rules to restrict traffic to their websites.
EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as trainers. Each segment of the program was developed with the aspiring CISO in mind and looks to transfer the knowledge of seasoned professionals to the next generation in the areas that are most critical in the development and maintenance of a successful information security program.
The Certified CISO (CCISO) program is the first of its kind training and certification program aimed at producing top-level information security executives. The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The program was developed by sitting CISOs for current and aspiring CISOs.
This instructor-led, live training in Cape Town (online or onsite) is aimed at supply chain professionals who wish to establish effective control and oversight of their supply chain, especially as it relates to cybersecurity.
By the end of this training, participants will be able to:
Understand the security oversights that can bring about significant damage and disruption to a supply chain.
Break down a complex security problem into manageable and actionable parts.
Address common supply chain vulnerabilities by analyzing high risk areas and engaging with stakeholders.
Adopt best practices in securing a supply chain.
Noticeably reduce or eliminate the biggest risks to an organization's supply chain.
This instructor-led, live training in Cape Town (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
Understand the key concepts of the HiTrust CSF (Common Security Framework).
Identify the HITRUST CSF administrative and security control domains.
Learn about the different types of HiTrust assessments and scoring.
Understand the certification process and requirements for HiTrust compliance.
Know the best practices and tips for adopting the HiTrust approach.
This course covers the basic concepts of security and IT Security, with an emphasis on defending against network attacks. Participants will gain an understanding of essential security protocols and security concepts of web services. Recent attacks against cryptosystems and some recent related vulnerabilities will be referrenced
Online Information Security Risk training in Cape Town, Information Security Risk training courses in Cape Town, Weekend Information Security Risk courses in Cape Town, Evening Information Security Risk training in Cape Town, Information Security Risk instructor-led in Cape Town, Information Security Risk instructor in Cape Town, Evening Information Security Risk courses in Cape Town, Information Security Risk boot camp in Cape Town, Information Security Risk private courses in Cape Town, Information Security Risk on-site in Cape Town, Information Security Risk classes in Cape Town, Information Security Risk one on one training in Cape Town, Online Information Security Risk training in Cape Town, Weekend Information Security Risk training in Cape Town, Information Security Risk trainer in Cape Town, Information Security Risk coaching in Cape Town, Information Security Risk instructor-led in Cape Town