Identity & Access
Open Source Security
- Liam Tung
- David Braue
The ISACA® Certified Information Security Manager is the fastest growing and arguably the most prestigious qualification available for Information Security managers today. CISM properly recognises that security is first and foremost a management rather than a technical issue. CISM defines the core competencies and international standards of performance that information security managers are expected to master. The course provides an intense environment in which participants can acquire, thoroughly and properly, the skills and knowledge expected of a world-class information security manager. In the process the course provides outstanding preparation for the CISM exam.
When: 17/06/2013 - 18/11/2013
The ISC(2) CISSP® (Certified Information Systems Security Professional) Certification is one of the most sought-after security certifications available today. It is based on the CBK (Common Body of Knowledge) which comprises ten subject domains that the (ISC)2 compiles and maintains through ongoing peer review by subject matter experts. The goal of this 5-day accelerated course is to provide information security professionals with a fully-immersed, minimum-distraction CISSP CBK training and certification experience. The course will broaden and deepen your understanding of all ten CBK domains as required for the (ISC)2 CISSP accreditation examination.
When: 08/07/2013 - 11/11/2013
SABSA is the world’s leading open security architecture framework and methodology. SABSA is a to-to-bottom framework and methodology to conceive, conceptualise, design, implement and manage security in a business-driven model. The term ‘business-driven’ is the key to SABSA’s power, and its acceptance. SABSA is all about empowering the organisation to do business as it needs and wants to do, while ensuring that it is secured and fully enabled. SABSA is an open and inclusive standard that readily integrates with other frameworks and tools such as ITIL, 17799/27000 series, COBIT and the like. It can be used as a compliance and governance framework for complex sets of standards. SABSA is used commonly as the security parallel and tool set for organisations using the world’s leading IT Architecture Framework – Zachman.
Course Overview There are dozens of classes designed to help people in the career of penetration testing, but there has not been any course that focuses on teaching you the skills, mindset and tools needed to be a social engineering penetration tester... until NOW the skill set needed to be a professional social engineer blends a person's mental skills of influence, persuasion and psychological tactics with technical skills such as mastering elicitation and pretexting. The Social-Engineer.com Social Engineering Penetration Testers course is a week-long immersion into the world of a professional social engineer.
When: 17/05/2012 - 08/10/2012
The CCSK Plus training course enables the proactive management of the threats associates with Cloud Computing adoption
Make an informed decision on the right firewall for your business with The Firewall Buyers Guide. ...
Although government agencies invest large sums of money into their IT defenses, an unknowing user can ...
Security is an intrusive mechanism that is often seen to interfere with normal business operations. Nonetheless, ...
Sign up now »
Run your mission-critical applications in a secure and compliant virtual datacenter, or private cloud.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.