Master the advanced techniques required to protect network resources from external threat with the IT Cyber Security bundle. Built around industry best-practice guidelines, the IT Cyber Security bundle consists of three courses:
- The CISA Certified Information Systems Auditor course.
- The CISSP Certified Information Systems Security Professional course.
- The CISM Certified Information Security Manager course.
What’s the deal?
IT Cyber Security – R699 (valued at R10944)
Key Learning Points:
The CISA Certified Information Systems Auditor course takes students through:
The information systems audit process and how it is applied in a real-world environment.
The importance of applying information technology governance principles to maintain levels of security and availability.
Defining and managing the information systems and infrastructure lifecycle to better plan for upgrades and replacements.
Codifying IT service delivery and support mechanisms and levels to ensure that systems and users remain fully Productive and issues are properly prioritised.
Identifying critical information assets and designing systems to protect each from loss, theft or unauthorised access.
Building a business continuity and disaster recovery strategy that will help keep the organisation running in the event of a major system failure.
Focus then shifts to the CISSP Certified Information Systems Security Professional which covers:
The principles of access control and how they can be strengthened and applied to keep unauthorised users out of a system.
Telecommunications and network systems that need to be hardened to prevent data loss or theft.
The role that information governance and risk management play in raising security standards, and how they need to be applied to corporate information systems.
The importance of secure software architecture and design to help ensure that in-house systems protect data and resources.
Using cryptography to protect data in transit and prevent unauthorised access of files without the correct encryption keys.
Using security architecture and design principles to limit data access and potential angles of attack.
Monitoring, auditing and improving operations security to keep systems secure at the point of access.
Designing and implementing business continuity and disaster recovery plans to help re-establish operations as quickly as possible following a serious outage.
Legal obligations of data security and obligations that must be fulfilled in the event of a criminal investigation.
Physical and environmental security considerations, like preventing theft of computer hardware or potential fire risks.
Finally, students will begin study towards the CISM Certified Information Security Manager qualification, learning about:
How to establish and maintain an information security governance framework, and the processes required to support it.
How to manage information risks to an acceptable level to meet the business and compliance requirements of the organisation.
Build, implement and operate an information security program that perfectly aligns with the wider information security strategy.
Planning the correct response to information security incidents, including defining the investigation and recovery steps required to minimise business impact.
Units of Study
Certified Information Security Manager (CISM)
Certified Information Systems Auditor (CISA)
Valid until 31 December 2021.
Redeem online: www.vizualcoaching.com/redeem-voucher
Redeem course within 1 month from date of purchase.
No refunds on online courses.
No-shows forfeit Hyperli voucher.
Technical support available 24/5 via email, telephone and online chat.
Access to course material for 12 months.
Training runs on any Compatibility: Windows, Mac, iPhone, iPad, Android.
Training material available in English only.
Course log-in details and instructions will be emailed to you within three working days of redemption.
Course completion certificate included.
Browser settings need to be changed when using a Mac.
Software not included.
Information found https://www.vizualcoaching.com/faqs