Online or onsite, instructor-led live Security Management training courses demonstrate through interactive discussion and hands-on practice how to carry out Security Management.
Security Management training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live Security Management training can be carried out locally on customer premises in Varna or in NobleProg corporate training centers in Varna.
The "Central Point" complex offers quick access to main roads leading to the airport, the northern and southern resorts and the Varna - Sofia and Varna - Burgas highways.
This instructor-led, live training in Varna (online or onsite) is aimed at intermediate-level IT auditors who wish to effectively incorporate AI tools in their audit practices.
By the end of this training, participants will be able to:
Grasp the core concepts of artificial intelligence and how it is applied in the context of IT auditing.
Utilize AI technologies such as machine learning, NLP, and RPA to improve audit efficiency, accuracy, and scope.
Perform risk assessments using AI tools, enabling continuous monitoring and proactive risk management.
Integrate AI into audit planning, execution, and reporting, enhancing the overall effectiveness of IT audits.
This instructor-led, live training in Varna (online or onsite) is aimed at advanced-level security analysts who wish to elevate their skills in utilizing advanced Micro Focus ArcSight ESM content to improve an organization's ability to detect, respond, and mitigate cyber threats with greater precision and speed.
By the end of this training, participants will be able to:
Optimize the use of Micro Focus ArcSight ESM to enhance monitoring and threat detection capabilities.
Construct and manage advanced ArcSight variables to refine event streams for more precise analysis.
Develop and implement ArcSight lists and rules for effective event correlation and alerting.
Apply advanced correlation techniques to identify complex threat patterns and reduce false positives.
This instructor-led, live training in Varna (online or onsite) is aimed at beginner-level law enforcement officers who wish to gain a deeper understanding of human behavior, enhancing their skills in communication, empathy, conflict resolution, and overall effectiveness in their roles.
By the end of this training, participants will be able to:
Have a deeper understanding of human psychology.
Develop advanced communication and conflict resolution skills for more effective interaction with the public, colleagues, and in negotiation scenarios.
Promote awareness and understanding of diverse cultural backgrounds, improving community policing and relations with various demographic groups.
This instructor-led, live training in Varna (online or onsite) is aimed at beginner-level security professionals who wish to gain the knowledge and skills necessary to adapt to the rapidly evolving digital landscape in the security industry.
By the end of this training, participants will be able to:
Understanding Digital Transformation in security.
Learn how digital solutions can improve security operations, efficiency, and effectiveness.
Manage security-related data for informed decision-making.
This instructor-led, live training in Varna (online or onsite) is aimed at beginner-level security managers who wish to effectively embrace and utilize technology in their field.
By the end of this training, participants will be able to:
Understand the evolution of technology in security.
Learn how to effectively blend traditional security methods with modern technological solutions.
Understand the basics of cybersecurity, risks associated with digital systems, and how to protect against cyber threats in the security industry.
This instructor-led, live training in Varna (online or onsite) is aimed at beginner-level security managers and designers who wish to effectively plan, design, and implement security strategies that are integrated, technologically advanced, and compliant with legal and ethical standards.
By the end of this training, participants will be able to:
Learn how to integrate security considerations into architectural and facility design.
Assess threats and vulnerabilities to inform security planning.
Develop comprehensive security plans that address a range of threats.
Create effective emergency response and crisis management plans.
This instructor-led, live training in Varna (online or onsite) is aimed at beginner-level security administrators who wish to deepen their understanding of security practices within an organization.
By the end of this training, participants will be able to:
Understand the fundamentals of security operations and administration.
Identify and mitigate various security threats and vulnerabilities.
Implement and manage security solutions.
Understand legal and ethical considerations in security operations.
Prepare for incident response and disaster recovery.
This instructor-led, live training in Varna (online or onsite) is aimed at advanced-level professionals who wish to gain a comprehensive understanding of fraud examination concepts and prepare for the Certified Fraud Examiner (CFE) exam.
By the end of this training, participants will be able to:
Gain comprehensive knowledge of fraud examination principles and the fraud examination process.
Learn to identify, investigate, and prevent various types of financial fraud schemes.
Understand the legal environment related to fraud, including the legal elements of fraud, relevant laws, and regulations.
Acquire practical skills in conducting fraud investigations, including evidence collection, interviewing techniques, and data analysis.
Learn to design and implement effective fraud prevention and deterrence programs within organizations.
Gain confidence and knowledge to successfully pass the Certified Fraud Examiner (CFE) exam.
This instructor-led, live training in Varna (online or onsite) is aimed at advanced-level security managers who wish to be well-equipped with the knowledge and skills needed to excel in the exam and their roles as security management professionals.
By the end of this training, participants will be able to:
Understand the five domains of ISSMP.
Develop skills to manage an information security program.
Learn to establish and maintain security governance.
Gain insights into risk management, incident response, and continuity planning.
Prepare effectively for the ISSMP certification exam.
This instructor-led, live training in Varna (online or onsite) is aimed at beginner-level security professionals who wish to thoroughly understand how to protect physical assets, people, and facilities.
By the end of this training, participants will be able to:
Understand the fundamentals of physical security.
Learn about risk assessment and management in physical security.
Explore various physical security measures and technologies.
Understand the integration of physical security with other security domains.
Develop skills in designing and implementing effective physical security plans.
This instructor-led, live training in Varna (online or onsite) is aimed at IT professionals who wish to understand how to use the CipherTrust Solution suite.
By the end of this training, participants will be able to:
Understand the CipherTrust Solution and its basic functions.
This instructor-led, live training in Varna (online or onsite) is aimed at security managers who wish to learn basic to intermediate-level CCTV security surveillance and management skills.
By the end of this training, participants will be able to:
Familiarize the types of CCTV systems and know their benefits and features.
Understand cabling and CCTV systems setup requirements.
Description:
Disclaimer: Please be advised that this updated CISM exam content outline is applicable to exams starting 1 June 2022.
CISM® is the most prestigious and demanding qualification for Information Security Managers around the globe today. This qualification provides you with a platform to become part of an elite peer network who have the ability to constantly learn and relearn the growing opportunities/ challenges in Information Security Management.
Our CISM training methodology provides an in-depth coverage of contents across the Four CISM domains with a clear focus on building concepts and solving ISACA released CISM exam questions. The course is an intense training and hard-core exam preparation for ISACA’s Certified Information Security Manager (CISM®) Examination.
Our instructors encourage all attending delegates to go through the ISACA released CISM QA&E (Questions, Answers and Explanations) as exam preparation. The QA&E is exceptional in helping delegates understand the ISACA style of questions, approach to solving these questions and it helps rapid memory assimilation of the CISM concepts during live classroom sessions. All our trainers have extensive experience in delivering CISM training. We will thoroughly prepare you for the CISM examination.
Goal:
The ultimate goal is to pass your CISM examination first time.
Objectives:
Use the knowledge gained in a practical manner beneficial to your organisation
Establish and maintain an Information security governance framework to achieve your organization goals and objectives
Manage Information risk to an acceptable level to meet the business and compliance requirements
Establish and maintain information security architectures (people, process, technology)
Integrate information security requirements into contracts and activities of third parties/ suppliers
Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact
Target Audience:
Security professionals with 3-5 years of front-line experience
Information security managers or those with management responsibilities
Information security staff, information security assurance providers who require an in-depth understanding of information security management including: CISO’s, CIO’s, CSO’s, privacy officers, risk managers, security auditors and compliance personnel, BCP / DR personnel, executive and operational managers responsible for assurance functions
This instructor-led, live training in Varna (online or onsite) is aimed at security professionals who wish to learn and improve how to handle security threats and perform security risk assessments.
By the end of this training, participants will be able to:
Manage security systems and handle any hostile environment.
This instructor-led, live training in Varna (online or onsite) is aimed at intermediate-level cybersecurity professionals who wish to enhance their understanding of GRC frameworks and apply them to secure and compliant business operations.
By the end of this training, participants will be able to:
Understand the key components of cybersecurity governance, risk, and compliance.
Conduct risk assessments and develop risk mitigation strategies.
Implement compliance measures and manage regulatory requirements.
Develop and enforce security policies and procedures.
This instructor-led, live training in Varna (online or onsite) is aimed at developers and anyone who wishes to learn and use OAuth to provide applications with secure delegated access.
By the end of this training, participants will be able to:
Learn the fundamentals of OAuth.
Understand the native applications and their unique security issues when using OAuth.
Learn and understand the common extensions to the OAuth protocols.
This instructor-led, live training in Varna (online or onsite) is aimed at intermediate-level system administrators who wish to learn how to use Siteminder to implement various authentication methods.
By the end of this training, participants will be able to:
Understand the core concepts of Siteminder and its role in authentication and access management.
Configure and manage user authentication with Siteminder.
Implement various authentication methods supported by Siteminder.
Troubleshoot common issues related to Siteminder authentication.
Integrate Siteminder with other identity providers for federated authentication.
Description:
Basel III is a global regulatory standard on bank capital adequacy, stress testing and market liquidity risk. Having initially been agreed upon by the Basel Committee on Banking Supervision in 2010–11, changes to The Accord have extended implementation to 31st March 2019. Basel III strengthens bank capital requirements by increasing bank liquidity and decreasing bank leverage.
Basel III differs from Basel I & II in that it requires different levels of reserves for different forms of deposits and other types of borrowings, so it does not supersede them so much as it does work alongside Basel I and Basel II.
This complex and constantly changing landscape can be hard to keep up with, our course and training will help you manage likely changes and their impact on your institution. We are accredited with and a training partner to the Basel Certification Institute and as such the quality and suitability of our training and material is guaranteed to be up to date and effective
Objectives:
Preparation for the Certified Basel Professional Examination.
Define hands-on strategies and techniques for the definition, measurement, analysis, improvement, and control of operational risk within a banking organization.
Target Audience:
Board members with risk responsibilities
CROs and Heads of Risk Management
Members of the Risk Management team
Compliance, legal and IT support staff
Equity and Credit Analysts
Portfolio Managers
Rating Agency Analysts
Overview:
Introduction to Basel norms and amendments to the Basel Accord (III)
Regulations for market, credit, counterparty and liquidity risk
Stress testing for various risk measures including how to formulate and deliver stress tests
The likely effects of Basel III on the international banking industry, including demonstrations of its practical application
Description:
This four day event (CGEIT training) is the ultimate preparation for exam time and is designed to ensure that you pass the challenging CGEIT exam on your first attempt.
The CGEIT qualification is an internationally recognised symbol of excellence in IT governance awarded by ISACA. It is designed for professionals responsible for managing IT governance or with significant advisory or assurance responsibility for IT governance.
Achieving CGEIT status will provide you with wider recognition in the marketplace, as well as increased influence at executive level.
Objectives:
This seminar has been designed to prepare Delegates for the CGEIT examination by enabling them to supplement their existing knowledge and understanding to be better prepared to pass the exam, as defined by ISACA.
Target Audience:
Our training course is for IT and business professionals, with significant IT governance experience who are undertaking the CGEIT exam.
A thorough, practical, 3 day course designed to provide the knowledge and skills required to manage information security, information assurance or information risk based processes. The CISMP course is aligned with the latest national information assurance frameworks (IAMM), as well as ISO/IEC 27002 & 27001; the code of practice and standard for information security. This course is a CESG Certified Training (CCT) course.
The course follows the latest BCS syllabus and prepares delegates for the 2 hour multiple choice BCS examination.
This qualification provides delegates with detailed knowledge of the concepts relating to information security; (confidentiality, integrity, availability, vulnerability, threats, risks and countermeasures), along with an understanding of current legislation and regulations which impact information security management. Award holders will be able to apply the practical principles covered throughout the course ensuring normal business processes become robust and more secure.
This instructor-led, live training in Varna (online or onsite) is aimed at payment services compliance professionals who wish to create, implement, and enforce a compliance program within an organization.
By the end of this training, participants will be able to:
Understand the rules set forth by government regulators for payment service providers.
Create the internal policies and procedures needed to satisfy government regulations.
Implement a compliance program that adheres to relevant laws.
Ensures that all corporate processes and procedures comply with the compliance program.
Uphold the business's reputation while protecting it from lawsuits.
Network security begins at the physical level. In this instructor-led, live training in Varna, participants will learn the security risks related to computer server rooms and how to tighten security through smart practices, planning and technology implementation.
By the end of this training, participants will be able to:
Assess their organization's security risk, as it relates to computer server rooms.
Set up control and monitoring systems to restrict physical access to infrastructure.
Design access policies for different members.
Effectively communicate security policies with team members.
Description:
Cybersecurity skills are in high demand, as threats continue to plague enterprises around the world. An overwhelming majority of professionals surveyed by ISACA recognise this and plan to work in a position that requires cybersecurity knowledge. To fill this gap, ISACA has developed the Cybersecurity Fundamentals Certificate, which provides education and verification of skills in this area.
Objectives:
With cybersecurity threats continuing to rise and the shortage of appropriately-equipped security professionals growing worldwide, ISACA's Cybersecurity Fundamentals Certificate programme is the perfect way to quickly train entry-level employees and ensure they have the skills and knowledge they need to successfully operate in the Cyber arena.
Target Audience:
The certificate program is also one of the best ways to gain foundational knowledge in cybersecurity and begin to build your skills and knowledge in this crucial area.
In this instructor-led, live course in Varna, participants will learn how to formulate the proper security strategy to face the DevOps security challenge.
Course goal:
To ensure that an individual has the core understanding of GRC processes and capabilities, and the skills to integrate governance, performance management, risk management, internal control, and compliance activities.
Overview:
HIPAA (Health Insurance Portability and Accountability Act of 1996) is a legislation in the United States that provides provisions for data privacy and security for handling and storing medical information. These guidelines are a good standard to follow in developing health applications, regardless of territory. HIPAA compliant applications are recognized and more trusted globally.
In this instructor-led, live training (remote), participants will learn the fundamentals of HIPAA as they step through a series of hands-on live-lab exercises.
By the end of this training, participants will be able to:
Understand the basics of HIPAA
Develop health applications that are compliant with HIPAA
Use developer tools for HIPAA compliance
Audience
Developers
Product Managers
Data Privacy Officers
Format of the Course
Part lecture, part discussion, exercises and heavy hands-on practice.
Note
To request a customized training for this course, please contact us to arrange.
This instructor-led, live training in Varna (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
Understand the key concepts of the HiTrust CSF (Common Security Framework).
Identify the HITRUST CSF administrative and security control domains.
Learn about the different types of HiTrust assessments and scoring.
Understand the certification process and requirements for HiTrust compliance.
Know the best practices and tips for adopting the HiTrust approach.
Why should you attend?
ISO/IEC 27001 Foundation training allows you to learn the basic elements to implement and manage an Information Security Management System as specified in ISO/IEC 27001. During this training course, you will be able to understand the different modules of ISMS, including ISMS policy, procedures, performance measurements, management commitment, internal audit, management review and continual improvement.
After completing this course, you can sit for the exam and apply for the “PECB Certified ISO/IEC 27001 Foundation” credential. A PECB Foundation Certificate shows that you have understood the fundamental methodologies, requirements, framework and management approach.
Who should attend?
Individuals involved in Information Security Management
Individuals seeking to gain knowledge about the main processes of Information Security Management Systems (ISMS)
Individuals interested to pursue a career in Information Security Management
Educational approach
Lecture sessions are illustrated with practical questions and examples
Practical exercises include examples and discussions
Practice tests are similar to the Certification Exam
ISO/IEC 27001 Lead Auditor
ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.
Why should you attend?
During this training course, you will acquire the knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process.
Based on practical exercises, you will be able to master audit techniques and become competent to manage an audit program, audit team, communication with customers, and conflict resolution.
After acquiring the necessary expertise to perform this audit, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Auditor” credential. By holding a PECB Lead Auditor Certificate, you will demonstrate that you have the capabilities and competencies to audit organizations based on best practices.
Who should attend?
Auditors seeking to perform and lead Information Security Management System (ISMS) certification audits
Managers or consultants seeking to master an Information Security Management System audit process
Individuals responsible for maintaining conformance with Information Security Management System requirements
Technical experts seeking to prepare for an Information Security Management System audit
Expert advisors in Information Security Management
Learning objectives
Understand the operations of an Information Security Management System based on ISO/IEC 27001
Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks
Understand an auditor’s role to: plan, lead and follow-up on a management system audit in accordance with ISO 19011
Learn how to lead an audit and audit team
Learn how to interpret the requirements of ISO/IEC 27001 in the context of an ISMS audit
Acquire the competencies of an auditor to: plan an audit, lead an audit, draft reports, and follow-up on an audit in compliance with ISO 19011
Educational approach
This training is based on both theory and best practices used in ISMS audits
Lecture sessions are illustrated with examples based on case studies
Practical exercises are based on a case study which includes role playing and discussions
Practice tests are similar to the Certification Exam
This course will give you the skills to build up information security according to ISO 27005, which is dedicated to information security risk management based on ISO 27001.
Information security threats and attacks increase and improve constantly. The best form of defense against them is the proper implementation and management of information security controls and best practices. Information security is also a key expectation and requirement of customers, legislators, and other interested parties.
This training course is designed to prepare participants in implementing an information security management system (ISMS) based on ISO/IEC 27001. It aims to provide a comprehensive understanding of the best practices of an ISMS and a framework for its continual management and improvement.
After attending the training course, you can take the exam. If you successfully pass it, you can apply for a “PECB Certified ISO/IEC 27001 Lead Implementer” credential, which demonstrates your ability and practical knowledge to implement an ISMS based on the requirements of ISO/IEC 27001.
Who Can Attend?
Project managers and consultants involved in and concerned with the implementation of an ISMS
Expert advisors seeking to master the implementation of an ISMS
Individuals responsible for ensuring conformity to information security requirements within an organization
Members of an ISMS implementation team
General information
Certification fees are included in the exam price
Training material containing over 450 pages of information and practical examples will be distributed
A participation certificate of 31 CPD (Continuing Professional Development) credits will be issued
In case of exam failure, you can retake the exam within 12 months free of charge
Educational approach
This training course contains essay-type exercises, multiple-choice quizzes, examples, and best practices used in the implementation of an ISMS.
The participants are encouraged to communicate with each other and engage in discussions when completing quizzes and exercises.
The exercises are based on a case study.
The structure of the quizzes is similar to that of the certification exam.
Learning objectives
This training course will help you:
Gain a comprehensive understanding of the concepts, approaches, methods, and techniques used for the implementation and effective management of an ISMS
Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
Understand the operation of an information security management system and its processes based on ISO/IEC 27001
Learn how to interpret and implement the requirements of ISO/IEC 27001 in the specific context of an organization
Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an ISMS
Audiance
All staff who need a working knowledge of Compliance and the Management of Risk
Format of the course
A combination of:
Facilitated Discussions
Slide Presentations
Case Studies
Examples
Course Objectives
By the end of this course, delegates will be able to:
Understand the major facets of Compliance and the national and international efforts being made to manage the risk related to it
Define the ways in which a company and its staff might set up a Compliance Risk Management Framework
Detail the roles of Compliance Officer and Money Laundering Reporting Officer and how they should be integrated into a business
Understand some other “hot spots” in Financial Crime – especially as they relate to International Business, Offshore Centres and High-Net-Worth Clients
This instructor-led, live training in Varna (online or onsite) focuses on analyzing the risks of Open Data while reducing vulnerability to disaster or data loss.
By the end of this training, participants will be able to:
Understand the concepts and benefits of Open Data.
Identify the different types of data.
Understand the risks of Open Data and how to mitigate them.
Learn how to manage Open Data risks and create a contingency plan.
Implement Open Data risk mitigation strategies to reduce disaster risk.
This instructor-led, live Payment Card Industry Professional training in Varna (online or onsite) provides an individual qualification for industry practitioners who wish to demonstrate their professional expertise and understanding of the PCI Data Security Standard (PCI DSS).
By the end of this training, participants will be able to:
Understand the payment process and the PCI standards designed to protect it.
Understand the roles and responsibilities for entities involved in the payment industry.
Have deep insight into, and understanding of, the 12 PCI DSS requirements.
Demonstrate knowledge of PCI DSS and how it applies to organizations that are involved in the transaction process.
This instructor-led, live training in Varna (online or onsite) is aimed at IT administrators, security coordinators, and compliance managers who wish to identify, evaluate, and implement security policy management methods for their organization.
By the end of this training, participants will be able to develop, manage, and monitor security policies to protect their organization's information, network, and physical and software assets.
Read more...
Last Updated:
Testimonials (7)
The report and rules setup.
Jack - CFNOC- DND
Course - Micro Focus ArcSight ESM Advanced
The fact that there were practical examples with the content
Smita Hanuman - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Speed of response and communication
Bader Bin rubayan - Lean Business Services
Course - ISO/IEC 27001 Lead Implementer
The trainer was extremely clear and concise. Very easy to understand and absorb the information.
Paul Clancy - Rowan Dartington
Course - CGEIT – Certified in the Governance of Enterprise IT
The trainer was very motivated and knowledgeable. The trainer was not only capable of information transfer, she also brought it with humor to lighten the dry theoretical training subject.
Marco van den Berg - ZiuZ Medical B.V.
Course - HIPAA Compliance for Developers
I genuinely was benefit from the communication skills of the trainer.
Flavio Guerrieri
Course - CISM - Certified Information Security Manager
I genuinely enjoyed the real examples of the trainer.
Joana Gomes
Course - Compliance and the Management of Compliance Risk
Online Security Management training in Varna, Security Management training courses in Varna, Weekend Security Management courses in Varna, Evening Security Management training in Varna, Security Management instructor-led in Varna, Security Management trainer in Varna, Weekend Security Management training in Varna, Security Management one on one training in Varna, Security Management coaching in Varna, Security Management instructor-led in Varna, Online Security Management training in Varna, Security Management boot camp in Varna, Security Management on-site in Varna, Security Management instructor in Varna, Evening Security Management courses in Varna, Security Management classes in Varna, Security Management private courses in Varna