• Governance, Risk, & Compliance

  • Course: ICSI | CIL Certified ISO 27001 Lead Implementer

    5 Days
    The ISO 27001 is the most acknowledged and globally recognized standard for implementing an Information Security Management System (ISMS) within any organization. The value of information assets and the importance of thoroughly securing them against today’s ever increasing threats, highlight the significance of developing and implementing effective and holistic security management systems.
    £625.00
  • Certified Information Security Auditor (CISA)

    4 Days
    Certified Information Security Auditor (CISA) is a globally acknowledged certification, which builds upon the previous experience of IS professionals, to produce valuable employees who possess exceptional knowledge of Information Systems Auditing, Control, and Security. During this CISA training course, delegates will be exposed to the Five Domains of Information Security Auditing.
    Submit an Inquiry
  • Certified Information Systems Security Professional (CISSP®)

    5 Days
    This course will expand upon your knowledge by addressing the essential elements of the eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process, while providing a framework to prepare for CISSP certification. CISSP is the premier certification for today’s information systems security professional.
    Submit an Inquiry
  • Certified Information Security Manager (CISM)

    4 Days
    This Certified Information Security Manager (CISM) training course focuses on the construction, development, and governance of information security operations. Possession of this certification displays precise knowledge, practice, and copious amounts of experience in the realm of information security management. This CISM training course takes into account practical issues, like the creation of information security programs, and incident management, whilst promoting security practices used globally.
    Submit an Inquiry
  • Certified in Risk and Information Systems Control (CRISC)

    3 Days
    The Certified Risk Information Systems Control training course provides delegates with valuable technical skills, which ensure success and prosperity in the realm of IT security. The CRISC certification is a powerful manifestation of proficiency and expertise regarding various areas of risk. As well as this, CRISC demonstrates a commitment to IT security operations and enterprises, and a willingness to deliver quality within their profession.
    Submit an Inquiry
  • Certified ISO/IEC 27001 Lead Auditor

    5 Days
    During this training course, you will acquire the knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process. Based on practical exercises, you will be able to master audit techniques and become competent to manage an audit program, audit team, communication with customers, and conflict resolution.
    Submit an Inquiry
  • Certified ISO/IEC 22301 Lead Implementer

    5 Days
    No two disasters in the world cause equal damage. Between the unpredictability of natural disasters, information security breaches, and incidents of different nature, preparedness can make you stand out in the crowd and predict the future of your business. In light of this, proper planning is essential to mitigating risks, avoiding consequences, coping with the negative effects of disasters and incidents, but at the same time, continuing your daily operations so that customer needs do not remain unfulfilled
    Submit an Inquiry
  • Certified Data Protection Officer (DPO)

    5 Days
    As data protection is becoming more and more valuable, the need for organizations to protect these data is also constantly increasing. Besides violating the fundamental rights and freedoms of persons, not complying with the data protection regulations can lead to risky situations that could harm an organization’s credibility, reputation, and financial status. This is where your skills as a data protection officers come to place.
    Submit an Inquiry

Subscribe to Newsletter

Enter your email address to register to our newsletter subscription delivered on regular basis! 

CONTACT US     ABOUT     PRIVACY   BLOG

© Copyright ICSI, Limited
(International CyberSecurity Institute) 2023