* All fees are exclusive of vat ** PREMIUM - Customize your learning experience
The vulnerabilities and the lack of necessary security skills applicable to today’s technology environments have reached a crisis point. Information Security training from Averest teaches you how to integrate truly effective security best practices and standards to your existing processes, technology assets, and management. With the information presented in our courses, Information Security can be a cohesive strategy and security leadership skills will encourage efficiency and productivity. Our courses will teach you effective monitoring tools with pre-planned incident response solutions as well as trigger actions that minimize both immediate and long-term impacts of security incidents. As a result, Organizations can be prepared and protected.
What Do Participants Learn?
Who Should Attend?
Information security managers
IT and corporate security managers
Corporate governance managers
Risk and compliance managers
Information security consultants
What Will the Learning Experience Include?
Comprehensive pre-program activities include:
Web-based information forms & surveys completed by attendee.
Direct consultation with the attendee about the expectations.
During the training, participants engage in data, activities, and conversations that lead to insight and knowledge.
Participants learn from expert trainers who have both academic and business experiences.
Highly applicable training content & instructive activities for adding depth to training topics.
**A half-day site visit for integrating the experience & plan next steps. Opportunities to provide connections, ideas & support.
Explore & Practice
Apply & sustain the learning experience by using this ongoing support:
To ensure participant has new skills or behavior progress.
Optional, fee-based mentoring & coaching with the trainer.
Training materials & additional documents (e-books, pdf files, presentations and articles)
Evaluate your training experience by giving us feedbacks and help us to reach our organizational goals.
Information Security Governance
Key information security concepts and components
Outcomes, objectives, & goals
COBIT 5 enablers
Key drivers affecting the enterprise and the impact they have on security
Information security strategy development
Relevant information security policies, standards, frameworks, & issuing bodies