ISO 27001 Foundation training

ISO/IEC 27001 Foundation training allows you to learn the basic elements to implement and manage an Information Security Management System as specified in ISO/IEC 27001. During this training course, you will be able to understand the different modules of ISMS, including ISMS policy, procedures, performance measurements, management commitment, internal audit, management review and continual improvement.

 

After completing this course, you can sit for the exam and apply for the “PECB Certified ISO/IEC 27001 Foundation” credential. A PECB Foundation Certificate shows that you have understood the fundamental methodologies, requirements, framework and management approach.

ISO 27001 Lead Implementer training

ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001. During this training course, you will also gain a thorough understanding of the best practices of Information Security Management Systems to secure the organization`s sensitive information and improve the overall performance and effectiveness.

After mastering all the necessary concepts of Information Security Management Systems, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Implementer” credential. By holding a PECB Lead Implementer Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to implement ISO/IEC 27001 in an organization.

ITIL Foundation / ISO 20000 Foundation training

ISO/IEC 20000 Foundation training enables you to learn the basic elements to implement and manage an IT Service Management System (ITSMS) as specified in ISO/IEC 20000. During this training course, you will be able to understand the different modules of an ITSMS, including ITSMS policy, procedures, performance measurements, management commitment, internal audit, management review and continual improvement.

Duration of course: 3 days

Course gives insight of ITIL v2011 edition for different groups of listeners.

Target group is: IT managers, Service Desk managers, IT professionals, IT Service management involved personnel.

Course program

  1. Intro to IT Service Management (ITSM)

  2. Service Strategy​

  3. Service Design

  4. Service Transition

  5. Service Operation

  6. Service Improvement

  7. ITIL Qualification Scheme

Certified Professional Ethical Hacker (CPEH) training

The Certified Professional Ethical Hacker course is the introductory training of penetration testing courses and certifications. The course training helps students gain a valuable skillset in penetration testing by understand the importance of vulnerability assessments and ethical hacking through:

1. Learning the knowledge and skills behind a vulnerability assessment.

2. Preparation to apply this knowledge and exercise these skills in the interest of others.

3. Understand the importance of a Vulnerability Assessment and how it can help you prevent serious break-ins to your organization.

 

This is accomplished by:

∙ Performing in-depth labs with industry standard tools.

∙ Learning the penetration testing methodology through conceptual theories and real-world practices.

∙ Equipping you with the knowledge about what hackers look for when trying to hack into your network.

∙ Assessing for the cause of testing your company’s security posture to help better secure the infrastructure against intrusion.

 

Duration of course: 5 days

Certified Information Systems Security Officer (CISSO) training

This cyber security certification training series covers everything you need to know about becoming a Certified Information Systems Security Officer. Students will learn about risk management, security management, authentication, access control, security models, operations security, symmetric cryptography and hashing, asymmetric cryptography and PKI, network connections, network protocols and devices, telephony, VPNs and wireless, security architecture, software development security, database security and system development, business continuity, disaster recovery, incident management, law, and ethics, and physical security.

 

Being a Certified Information Systems Security Officer will provide you with the advanced skillset necessary to manage and consult businesses on information security. You will possess the knowledge and skills expected of a security leader. Through the use of a risk- based approach, a C)ISSO is able to implement and maintain cost-effective security controls that are aligned with business requirements. Becoming a C)ISSO is the ideal way to increase your knowledge, expertise, skill, and credibility.

 

Duration of course: 5 days

Certified Information Systems Security Professional (CISSP) training

This course is the most comprehensive review of information security concepts and industry best practices, and covers the eight domains of the official CISSP CBK (Common Body of Knowledge). You will gain knowledge in information security that will increase your ability to successfully implement and manage security programs in any organization or government entity.

 

This course program is comprised of a total of eight domains and includes:

  • Official (ISC)2 Guide to the CISSP Common Body of Knowledge® (CBK) (electronic format)

  • Official (ISC)2 CISSP Training Handbook

  • Official (ISC)2 CISSP Flash Cards

  • CISSP Practice Test Questions

  • CISSP Certification Exam Voucher

In-depth coverage of the eight domains required to pass the CISSP exam:

  1. Security and Risk Management

  2. Asset Security

  3. Security Engineering

  4. Communications and Network Security

  5. Identity and Access Management

  6. Security Assessment and Testing

  7. Security Operations

  8. Software Development Security

 

Duration of course: 5 days

Planning and managing ICT solutions

Course goals

To acquire and to improve knowledge about planning and management of ICT solutions, basic principles of business proceses and solution architecture, in order to achieve the improvement of ICT competencies of state administration specialists and professional development in the field of state administration information and communication technologies.

 

Target audience

ICT project planners and implementers in public administration. Project managers and team members.

 

Content of the course:

1. Management of ICT projects

2. Context analysis

3. Analysis of the involved parties, participants

4. Basics of business process management

5. Business Requirements Management

6. ICT Solution Points and Modeling

7. Planning an ICT solution

8. Assessment of the ICT solution

Duration of course: 3 days

Implementation and development of ICT solutions

Course goals

Obtain and enhance knowledge of the specifics of ICT projects and various ICT project implementation methodologies (e.g. MSF - Microsoft Solutions Framework, RUP - Rational Unified Process, others) and approaches (agile) that are used to implement and develop ICT solutions. Obtain competencies in the life-cycle specifics of project implementation in each methodology and impact on the design and implementation of the project.

 

Target audience

ICT project planners and implementers in public administration. Project managers and team members.

 

Content of the course

1. Methods and approaches used to implement and develop ICT solutions

2. Project planning

3. Project Business Requirements Management and Project Scope

4. Project implementation and development monitoring, control tools and methods

5. Solution architecture and its components

6. Project deliverables and documentation

Duration of course: 3 days

IT Audit training

Course goals

Modern IT technologies have the potential to significantly improve the organization's processes - making them more efficient, more transparent, and safer. One of the most important tasks of ICT auditors is to make sure that it takes place in a controlled and managed manner, without risk the business or institution.

The main objective of the course is to provide knowledge about the role of information management, the audit of ICT management, its use and role in the organization's activities. Practical lessons will discuss the most typical bottlenecks, their detection mechanisms and paths for dealing with them, and prepare certification for the ISACA Exam Certified Information System (CISA).

 

Target audience

  • Internal Auditors of institutions or companies that organize the ICT audit process

  • IT managers to successfully address the issues of information processing efficiency and security

  • For those who are planning to take CISA certification exams

 

Prerequisites

Basic knowledge of information system development processes is recommended.

 

Content of the course

1. Basic concept : What is information, information systems, information resource?

  • Information security, standards used for it

  • Regulatory framework for the processing of information in Latvia

  • Information resource classification issues

2. ICT audit frameworks

3. Audit guidelines

4. Audit process

5. ICT management processes in the life cycle of information systems

  • Development of ICT development projects:

  • Planning and launching,

  • Requirements and User Needs

  • Development

  • Acceptance

  • Productive use, maintenance processes

7. Security aspects of software management

8. Issues of IT legal regulation

9. Risk management

10. Resource management

11. Audit planning using knowledge of the most typical bottlenecks in IT management

Duration of course: 5 days

Planning and management of Data center IT infrastructure

Content of course

1. Introduction of course

2. Data center standards

3. Analysis requirements

4.  Data center infrastructure components

  • Physical

  • Logical

  • Virtual

5. Environments and suppliers management

6. Networks and networking

7. Data storage systems

8. IT security and risk management

9. Best practice of PLanning

10. Data center management

11. Data center tools and prospects

12. End of course - Knowledge Testing

Duration of course: 2 days

Please reload

© 2006 - 2019 by analytica.lv