SEARCH RESULTS

ITIL® is the world’s leading framework for implementing IT service management best practices. Organizations use ITIL to plan, implement, support, and improve services and create value for their customers. In this course, you will learn the basic knowledge and skills to adopt and adapt IT service management (ITSM) best practices within your organization.

This training is designed for anyone who wants to gain a fundamental understanding of IT service management, its key principles and practices, and how it can help you deliver better value to your customers. It is suitable for all IT staff and management, as well as customers who work closely with IT to meet business needs.

This course is also designed for students who wish to obtain the ITIL 4 Foundation certification and prepare for the ITIL 4 Foundation exam.

This course is accredited by PeopleCert.

Expand
Duration: 2 days / 14 hours

The SecurityX course is an advanced-level certification program designed to equip cybersecurity professionals with the essential skills and knowledge needed to secure complex enterprise environments. This comprehensive course offers hands-on training and real-world scenarios to prepare learners for the SecurityX certification exam.

Throughout the course, students will delve into a wide range of advanced security concepts and practices, covering topics such as risk management, enterprise security, integration of advanced authentication and authorization mechanisms, and more. They will gain expertise in identifying and resolving security vulnerabilities, implementing solutions to mitigate risks, and ensuring the confidentiality, integrity, and availability of critical systems and data.

Expand
Duration: 5 days / 35 hours

This course complements your broad knowledge and experience in information security. It expands your knowledge by covering the eight domains defined by the Common Body of Knowledge (CBK) for information security professionals. The training offers an approach based on implementing a security process within an enterprise, while also serving as a preparation tool for the CISSP certification.

The CISSP certification is highly regarded in the world of technology and security today. This reputation is maintained because the organization (ISC)² continually improves the content through the engagement of industry experts, ensuring that the material and questions remain relevant despite the ongoing changes and challenges in the security field. By defining the eight CBK domains, an industry standard has been established, and the CISSP training thoroughly covers all of them. The skills and knowledge you will gain from this course will give you a deep understanding of these eight domains, establishing credibility and success for every professional in the field of information security.

Expand
Price: $3450
Duration: 5 days / 35 hours

This exam preparation course covers the five CISA domains. You will start by becoming familiar with the practical aspects of an information systems audit. The course then shows you how to govern and manage IT before introducing you to information systems acquisition. You will gain knowledge on information systems operations and understand how to maintain business resilience, helping to solve various real-world problems. Finally, you will learn how to protect your organization and effectively control information systems with IT audit standards.

By the end of this course, you will not only have covered the essential concepts and techniques you need to know to pass the CISA certification exam, but you will also have the opportunity to apply them in the real world.

Expand
Duration: 5 days / 35 hours

Our five-day Information Systems Security Architecture Professional (ISSAP) training is a unique program designed to equip you with the knowledge to design large-scale security architectures. It complements the topics covered in the general CISSP training (recommended prerequisite) and is specifically aimed at system architects, business analysts, security directors, technology directors, and network and system designers.

The six domains covered in the training provide a comprehensive plan for enhancing the organization’s current security posture and enable you to understand defensive cybersecurity strategies, ensuring the confidentiality, integrity, and availability of information resources.

Expand
Duration: 5 days / 35 hours

Our website uses cookies to personalize your browsing experience. By clicking ‘I accept,’ you consent to the use of cookies.