ICT advising and legal expertise to public administration, large enterprises and SMEs. The Mission is to deliver senior expertise for the governance of Business through mastering its technology, information security, risk and compliance management, leading through strategy planification and enterprise architecture.
Equip yourself to be a strategic partner in an enterprise as an individual with proven skills to understand and articulate business risk and implement appropriate information system controls.
Secure your place among the most in-demand information security management professionals with the ability to configure information security programs to advance broader enterprise goals and objectives.
For advancement in information systems auditing and many other information systems roles, ISACA®’s globally recognized CISA certification is recognized for the career-long value its holders enjoy. Since 2009, the CISA certification has receive [...]
Practitioner Boot Camp is a five-day, intensive cyber security training course focused on more complex, technical cyber skills and scenarios. CSXP Boot Camp is conducted in an adaptive, live cyber lab environment, enabling students to build cr [...]
This workshop is geared toward IT security professionals new to cyber security, recent graduates in IT-relevant fields, and IT professionals looking for a career change to cybersecurity. It prepares you for the CSX Fundamentals Exam covering t [...]
Build a specific security/Cybersecurity plan that includes all necessary actions for assessing risks, conceiving mitigation and developing a comprehensive Information Security Strategy plan on an individually-selected environment.
Overview of technology-related topics for Information Security. Alignment with major Information security certification schemes. Illustration through recently developed security implementation approaches.
Management practices for Senior Information Security functions including overviews of COBIT for Security, ISO 2700x series, and major frameworks and bodies of knowledge. Lectures and practical cases related to various Information Security and [...]