
Online or onsite, instructor-led live Security Management training courses demonstrate through interactive discussion and hands-on practice how to carry out Security Management.
Security Management training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live Security Management trainings in Kazakhstan can be carried out locally on customer premises or in NobleProg corporate training centers.
NobleProg -- Your Local Training Provider
Testimonials
See above
Sharon Woodcock - KPMG LLP
Course: CISMP - Certificate in Information Security Management Principles
Interaction between the trainer and other students. Size was about right.
Sajid Ibrahim - KPMG LLP
Course: CISMP - Certificate in Information Security Management Principles
Trainer had very good rapport with the attendees. He used practical examples and videos to better explain the more complicated/stodgy subjects. Good use of visual aids to better enable understanding for visual learners such as myself.
KPMG LLP
Course: CISMP - Certificate in Information Security Management Principles
The training was paced well and was very engaging. With some virtual training, it's very easy to 'switch off', however the content and presentation made the course enjoyable and interesting.
Victoria Orchard - KPMG LLP
Course: CISMP - Certificate in Information Security Management Principles
Trainer's vast knowledge
FUJITSU TECHNOLOGY SOLUTIONS SP. Z O.O.
Course: CISMP - Certificate in Information Security Management Principles
Examples provided
Department for Communities
Course: CISMP - Certificate in Information Security Management Principles
Depth and breadth of the course. Trainer was excellent also.
Department for Communities
Course: CISMP - Certificate in Information Security Management Principles
The delivery
Department for Communities
Course: CISMP - Certificate in Information Security Management Principles
Openess of trainer, his knowledge and especially real world examples/
Joanna Banaszewska, EY GLOBAL SERVICES (POLAND) SP Z O O
Course: CISM - Certified Information Security Manager
The trainer has a really good knowledge, clear English speech and explains everything in detail, draws schemes and provides documentation.
Rafal Kawalek - Joanna Banaszewska, EY GLOBAL SERVICES (POLAND) SP Z O O
Course: CISM - Certified Information Security Manager
He shared his experience in the industry and gave live examples and taught us even with a black board which was helpful.
Joanna Banaszewska, EY GLOBAL SERVICES (POLAND) SP Z O O
Course: CISM - Certified Information Security Manager
Real-life scenarios provided by trainer, like real-life implementations solutions etc.
Joanna Banaszewska, EY GLOBAL SERVICES (POLAND) SP Z O O
Course: CISM - Certified Information Security Manager
Materials, trainer attitude, tips and tricks shared.
Joanna Banaszewska, EY GLOBAL SERVICES (POLAND) SP Z O O
Course: CISM - Certified Information Security Manager
Knowledge of the trainer and the way he have delivered it. He was very interactive and kept the audience engaged.
Susmit Nath - Joanna Banaszewska, EY GLOBAL SERVICES (POLAND) SP Z O O
Course: CISM - Certified Information Security Manager
Sharing real world experience with the audience and real time drawing style.
Piotr Ponitka - Joanna Banaszewska, EY GLOBAL SERVICES (POLAND) SP Z O O
Course: CISM - Certified Information Security Manager
When Tony used examples or showed us kit or said things in his own words, he has lots to impart.
Khadija Ukadia, KPMG LLP
Course: CISM - Certified Information Security Manager
Trainers experience was evident and his examples from personal experience helped frame the context of the course.
Khadija Ukadia, KPMG LLP
Course: CISM - Certified Information Security Manager
It is well structured.
EY Global Services (Poland) Sp. z o.o.
Course: CISM - Certified Information Security Manager
Security Management Course Outlines in Kazakhstan
- Understand the CipherTrust Solution and its basic functions.
- Evaluate device architecture and usage schemes.
- Manage CipherTrust product suite.
- Familiarize the types of CCTV systems and know their benefits and features.
- Understand cabling and CCTV systems setup requirements.
- Install, configure, and manage CCTV systems.
- Manage security systems and handle any hostile environment.
- Manage any security risks or threats.
- Learn how to conduct security risk assessments.
- Learn the concepts of the Honeywell security systems and components.
- Properly install and maintain a Honeywell security system.
- Utilize the Honeywell maintenance tools and management suite to control a security system.
- Learn the fundamentals of OAuth.
- Understand the native applications and their unique security issues when using OAuth.
- Learn and understand the common extensions to the OAuth protocols.
- Integrate with any OAuth authorization server.
All our trainers have extensive experience in delivering CISM training. We will thoroughly prepare you for the CISM examination. Goal: The ultimate goal is to pass your CISM examination first time. Objectives:
- Use the knowledge gained in a practical manner beneficial to your organisation
- Establish and maintain an Information security governance framework to achieve your organization goals and objectives
- Manage Information risk to an acceptable level to meet the business and compliance requirements
- Establish and maintain information security architectures (people, process, technology)
- Integrate information security requirements into contracts and activities of third parties/ suppliers
- Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact
- Security professionals with 3-5 years of front-line experience
- Information security managers or those with management responsibilities
- Information security staff, information security assurance providers who require an in-depth understanding of information security management including: CISO’s, CIO’s, CSO’s, privacy officers, risk managers, security auditors and compliance personnel, BCP / DR personnel, executive and operational managers responsible for assurance functions
- Use the knowledge gained in a practical manner beneficial to your organisation
- Provide audit services in accordance with IT audit standards
- Provide assurance on leadership and organizational structure and processes
- Provide assurance on acquisition/ development, testing and implementation of IT assets
- Provide assurance on IT operations including service operations and third party
- Provide assurance on organization’s security policies, standards, procedures, and controls to ensure confidentiality, integrity, and availability of information assets.
To fill this gap, ISACA has developed the Cybersecurity Fundamentals Certificate, which provides education and verification of skills in this area. Objectives: With cybersecurity threats continuing to rise and the shortage of appropriately-equipped security professionals growing worldwide, ISACA's Cybersecurity Fundamentals Certificate programme is the perfect way to quickly train entry-level employees and ensure they have the skills and knowledge they need to successfully operate in the Cyber arena. Target Audience: The certificate program is also one of the best ways to gain foundational knowledge in cybersecurity and begin to build your skills and knowledge in this crucial area.
- Identify the different components of NB-IoT and how to fit together to form an ecosystem.
- Understand and explain the security features built into NB-IoT devices.
- Develop a simple application to track NB-IoT devices.
- Assess their organization's security risk, as it relates to computer server rooms.
- Set up control and monitoring systems to restrict physical access to infrastructure.
- Design access policies for different members.
- Effectively communicate security policies with team members.
- Understand the concepts and benefits of Open Data.
- Identify the different types of data.
- Understand the risks of Open Data and how to mitigate them.
- Learn how to manage Open Data risks and create a contingency plan.
- Implement Open Data risk mitigation strategies to reduce disaster risk.
Last Updated: