IT Governance Courses


Certified Chief Information Security Officer (CCISO)

The Certified Chief Information Security Officer (CCISO) program is the first of its kind training and certification program aimed at producing top-level Information Security Executives. The program does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The CCISO aims to bridge the gap between the executive management knowledge that CISOs need and the technical knowledge that many aspiring CISOs have. This can be a crucial gap as a practitioner endeavours to move from mid-management to upper, executive management roles. Much of this is traditionally learned as on the job training, but the CCISO Training Program can be the key to a successful transition to the highest ranks of information security management.

Read More

Certified Information Security Manager (CISM)

This CISM exam preparation course is designed to prepare professionals for the exam. This certification is an audit professional certification sponsored by the Information Systems Audit and Control Association (ISACA®). A CISM Certification is offered to professionals who prove their exceptional skill and judgment in IS audit, control and security profession in the CISM Exam. The course focuses on the key points covered in the latest CISM Review Manual and includes class lectures, group discussions/activities, exam practice and answer debriefs. The course is intended for individuals with familiarity with and experience in information security management.

Read More

Certified Information Systems Auditor (CISA)

This exam preparation course is designed to prepare professionals for the Certified Information Systems Auditorâ„¢ (CISA) exam. The course focuses on the key points covered in the CISA Review Manual 26th Edition and includes class lectures, group discussions, exam practice and answer debriefs. The course is intended for individuals with familiarity with and experience in information systems auditing, control or security. The CISA designation is a globally recognized certification for IS audit control, assurance and security professionals. Being CISA certified showcases your audit experience, skills and knowledge, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within the enterprise.

Read More

ISO/IEC 27001 Lead Implementer

This course enables participants to develop the necessary expertise to support an organization in implementing and managing an Information Security Management System (ISMS) based on ISO/IEC 27001:2013. Participants will also gain a thorough understanding of best practices used to implement information security controls from all areas of ISO/IEC 27002. This training is consistent with the project management practices established in ISO 10006 (Quality Management Systems — Guidelines for Quality Management in Projects). This training is also fully compatible with ISO/IEC 27003 (Guidelines for the Implementation of an ISMS), ISO/IEC 27004 (Measurement of Information Security) and ISO/IEC 27005 (Risk Management in Information Security).

Read More

MS-101T02: Microsoft 365 Compliance Management

In this course, participants will learn about Microsoft® 365 Compliance Management, which includes topics such as data retention and data loss prevention solutions in Microsoft 365, archiving and retention in Microsoft 365, implementing and managing data governance, and managing search and investigations.

Read More

MS-201T02: Managing Messaging Security, Hygiene, and Compliance

In this course, participants will learn about the different messaging-related security and compliance service configurations and settings with Microsoft® Exchange Server and Exchange Online. They will begin by examining the fundamentals of message hygiene with Exchange Online Protection and Exchange Advanced Threat Protection, as well as connection and spam filtering with Exchange. They will then examine messaging compliance solutions, such as retention and data loss prevention policies, as well as audit log investigations and eDiscovery search mechanisms from the messaging compliance perspective. Then they will learn how to plan a proper deployment and how to perform the basic implementation process for each solution. Finally, participants will conclude the course by examining how to manage permissions that are assigned to user and admin roles.

Read More

MS-900T01: Microsoft 365 Fundamentals

This course provides foundational knowledge on the considerations and benefits of adopting cloud services and the Software as a Service (SaaS) cloud model, with a specific focus on Microsoft® 365 cloud service offerings. Participants will begin by learning about cloud fundamentals, including an overview of cloud computing and specifically Microsoft cloud services. They will be introduced to Microsoft Azure®, and they will examine the differences between Microsoft 365 and Office 365. Then they will perform an in-depth review of Microsoft 365, including a comparison of Microsoft on-premises services versus Microsoft 365 cloud services, a review of enterprise mobility in Microsoft 365, and an analysis of how Microsoft 365 services provide collaboration. The course then analyzes how security, compliance, privacy, and trust are handled in Microsoft 365, and it concludes with a review of Microsoft 365 subscriptions, licenses, billing, and support.

Read More