Identity & Access
Open Source Security
- Liam Tung
- David Braue
The ISACA® Certified Information Security Manager is the fastest growing and arguably the most prestigious qualification available for Information Security managers today. CISM properly recognises that security is first and foremost a management rather than a technical issue. CISM defines the core competencies and international standards of performance that information security managers are expected to master. The course provides an intense environment in which participants can acquire, thoroughly and properly, the skills and knowledge expected of a world-class information security manager. In the process the course provides outstanding preparation for the CISM exam.
When: 17/06/2013 - 18/11/2013
The ISC(2) CISSP® (Certified Information Systems Security Professional) Certification is one of the most sought-after security certifications available today. It is based on the CBK (Common Body of Knowledge) which comprises ten subject domains that the (ISC)2 compiles and maintains through ongoing peer review by subject matter experts. The goal of this 5-day accelerated course is to provide information security professionals with a fully-immersed, minimum-distraction CISSP CBK training and certification experience. The course will broaden and deepen your understanding of all ten CBK domains as required for the (ISC)2 CISSP accreditation examination.
When: 08/07/2013 - 11/11/2013
SABSA is the world’s leading open security architecture framework and methodology. SABSA is a to-to-bottom framework and methodology to conceive, conceptualise, design, implement and manage security in a business-driven model. The term ‘business-driven’ is the key to SABSA’s power, and its acceptance. SABSA is all about empowering the organisation to do business as it needs and wants to do, while ensuring that it is secured and fully enabled. SABSA is an open and inclusive standard that readily integrates with other frameworks and tools such as ITIL, 17799/27000 series, COBIT and the like. It can be used as a compliance and governance framework for complex sets of standards. SABSA is used commonly as the security parallel and tool set for organisations using the world’s leading IT Architecture Framework – Zachman.
Course Overview There are dozens of classes designed to help people in the career of penetration testing, but there has not been any course that focuses on teaching you the skills, mindset and tools needed to be a social engineering penetration tester... until NOW the skill set needed to be a professional social engineer blends a person's mental skills of influence, persuasion and psychological tactics with technical skills such as mastering elicitation and pretexting. The Social-Engineer.com Social Engineering Penetration Testers course is a week-long immersion into the world of a professional social engineer.
When: 17/05/2012 - 08/10/2012
The CCSK Plus training course enables the proactive management of the threats associates with Cloud Computing adoption
This handbook shines a light on the dark corners of advanced malware, both to educate as ...
The transformation of computing through mobility, consumerisation, bring-your-own device (BYOD) and flex-work offers powerful benefits for ...
This report by Tolly tests the system resource requirements of competing vendor solutions when performing on-demand ...
- Play video
- Play video
- Play video
- Play video
Sign up now »
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.