Local, instructor-led live Security Management training courses demonstrate through interactive discussion and hands-on practice how to carry out Security Management. Security Management training is available as "onsite live training" or "remote live training". Onsite live training can be carried out locally on customer premises in South Africa or in NobleProg corporate training centers in South Africa. Remote live training is carried out by way of an interactive, remote desktop. NobleProg -- Your Local Training Provider
|cissp||CISSP - Certified Information Systems Security Professional||35 hours|| |
Certified Information Systems Security Professional certification is recognised as a key qualification for developing a senior career in information security, audit and IT governance management. Held by over 30,000 qualified professionals worldwide, the Certified Information Systems Security Professional qualification shows proven knowledge and is the key to a higher earning potential in roles that include CISO, CSO and senior security manager.
You will learn to:
The Main Goal:
This training is intended for individuals preparing for the CISSP certification exam.
|cismp||CISMP - Certificate in Information Security Management Principles||35 hours|| |
A thorough, practical, 5 day course designed to provide the knowledge and skills required to manage information security, information assurance or information risk based processes. The CISMP course is aligned with the latest national information assurance frameworks (IAMM), as well as ISO/IEC 27002 & 27001; the code of practice and standard for information security. This course is a CESG Certified Training (CCT) course.
The course follows the latest BCS syllabus and prepares delegates for the 2 hour multiple choice BCS examination which is sat on the afternoon of the last day of the course.
This qualification provides delegates with detailed knowledge of the concepts relating to information security; (confidentiality, integrity, availability, vulnerability, threats, risks and countermeasures), along with an understanding of current legislation and regulations which impact information security management. Award holders will be able to apply the practical principles covered throughout the course ensuring normal business processes become robust and more secure.
|iso27005||Building up information security according to ISO 27005||21 hours|| |
This course will give you the skills to build up information security according to ISO 27005, which is dedicated to information security risk management based on ISO 27001.
|cism||CISM - Certified Information Security Manager||28 hours|| |
CISM® is the most prestigious and demanding qualification for Information Security Managers around the globe today. This qualification provides you with a platform to become part of an elite peer network who have the ability to constantly learn and relearn the growing opportunities/ challenges in Information Security Management.
Our CISM training methodology provides an in-depth coverage of contents across the Four CISM domains with a clear focus on building concepts and solving ISACA released CISM exam questions. The course is an intense training and hard-core exam preparation for ISACA’s Certified Information Security Manager (CISM®) Examination.
We have delivered more than 100+ CISM training events in the United Kingdom and Europe. Our instructors encourage all attending delegates to go through the ISACA released CISM QA&E (Questions, Answers and Explanations) as exam preparation - you get this FREE as part of our course. The QA&E is exceptional in helping delegates understand the ISACA style of questions, approach to solving these questions and it helps rapid memory assimilation of the CISM concepts during live classroom sessions.
The ultimate goal is to pass your CISM examination first time.
Security professionals with 3-5 years of front-line experience; Information security managers or those with management responsibilities; Information security staff, information security assurance providers who require an in-depth understanding of information security management including: CISO's, CIO's, CSO's, privacy officers, risk managers, security auditors and compliance personnel, BCP / DR personnel, executive and operational managers responsible for assurance functions.
|cisa||CISA - Certified Information Systems Auditor||28 hours|| |
CISA® is the world-renowned and most popular certification for professionals working in the field of IS audit and IT risk consulting.
Our CISA course is an intense, very competitive and exam focused training course. With experience of delivering more than 150+ CISA trainings in Europe and around the world and training more than 1200+ CISA delegates, the Net Security CISA training material has been developed in house with the top priority of ensuring CISA delegates pass the ISACA CISA® Exam. The training methodology focuses on understanding the CISA IS auditing concepts and practicing large number of ISACA released question banks from the last three years. Over a period, CISA holders have been in huge demand with renowned accountings firms, global banks, advisory, assurance, and internal audit departments.
Delegates may have years of experience in IT auditing but perspective towards solving CISA questionnaires will solely depend on their understanding to globally accepted IT assurance practices. CISA exam is very challenging because the possibility of a very tight clash between two possible answers exists and that is where ISACA tests you on your understanding in global IT auditing practices. To address these exam challenges, we always provide the best trainers who have extensive experience in delivering CISA training around the world.
The Net Security CISA manual covers all exam-relevant concepts, case studies, Q&A's across CISA five domains. Further, the Trainer shares the key CISA supporting material like relevant CISA notes, question banks, CISA glossary, videos, revision documents, exam tips, and CISA mind maps during the course.
The ultimate goal is to pass your CISA examination first time.
Finance/CPA professionals, I.T. professionals, Internal & External auditors, Information security, and risk consulting professionals.
|cybersecfun||Cybersecurity Fundamentals||28 hours|| |
Cybersecurity skills are in high demand, as threats continue to plague enterprises around the world. An overwhelming majority of professionals surveyed by ISACA recognise this and plan to work in a position that requires cybersecurity knowledge.
With cybersecurity threats continuing to rise and the shortage of appropriately-equipped security professionals growing worldwide, ISACA's Cybersecurity Fundamentals Certificate programme is the perfect way to quickly train entry-level employees and ensure they have the skills and knowledge they need to successfully operate in the Cyber arena.
The certificate program is also one of the best ways to gain foundational knowledge in cybersecurity and begin to build your skills and knowledge in this crucial area.
|devopssecurity||DevOps Security: Creating a DevOps security strategy||7 hours|| |
DevOps is a software development approach that aligns application development with IT operations. Some of the tools that have emerged to support DevOps include: automation tools, containerization and orchestration platforms. Security has not kept up with these developments.
In this course, participants will learn how to formulate the proper security strategy to face the DevOps security challenge.
Format of the course
|nbiotfordev||NB-IoT for Developers||7 hours|| |
Most of today's IoT connections are industrial. Industrial IoT (IIoT) connections require Low Power Wide Area (LPWA) technologies to provide connectivity, coverage and subscription capabilities for low bandwidth applications. Although these requirements could be served by existing cellular networks, such networks may not be ideal. NB-IoT (Narrow Band IoT) technology offers a promising solution.
NB-IoT (also known as LTE Cat NB1) allows IoT devices to operate over carrier networks such as GSM and “guard bands” between LTE channels. NB-IoT needs only 200kHz of bandwidth and can efficiently connect large numbers of endpoint devices (up to 50,000 per NB-IoT network cell). Its low power requirements makes it ideal for use in small, uncomplicated IoT gadgets such as smart parking, utilities and wearables.
In this instructor-led, live training, participants will learn about the various aspects of NB-IoT as they develop and deploy a sample NB-IoT based application.
By the end of this training, participants will be able to:
Format of the course
|NPen||Network Penetration Testing||35 hours|| |
This class will help the attendees to scan, test, hack and secure their own systems. To gain an in-depth knowledge and practical experience with the current essential security systems. The attendees will get to know how perimeter defences work and then be led into scanning and attacking their own networks, no real network is harmed. The attendees then will learn how intruders escalate privileges and what steps can be taken to secure a system, Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
|computerroom||Computer Room Security and Maintenance||14 hours|| |
Network security begins at the physical level. In this instructor-led, live training, participants will learn the security risks related to computer server rooms and how to tighten security through smart practices, planning and technology implementation.
By the end of this training, participants will be able to:
Format of the Course
|Course||Venue||Course Date||Course Price [Remote / Classroom]|
|WebServices with SOAP and WSDL Basics||Johannesburg||Tue, 2018-07-24 09:30||2340USD / 4040USD|
|Xamarin: Build Native Mobile Applications for Android, iOS and Windows from a Single C# Code Base||Johannesburg||Tue, 2018-08-21 09:30||5198USD / 7248USD|