Course Name |
Hours |
List Price |
Content |
Cyber Secure Coder (CSC) |
21.00 |
$1,497.00 |
|
Description: This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development.
# of Days:
Setting:
|
CyberSAFE |
4.00 |
$199.00 |
|
Description: In this course, you will cover what you can do to protect yourself and your organization from technology-related risks. This course will help you to:
Understand both security and compliance needs and requirements.
Recognize and avoid phishing and other social engineering attempts.
Recognize and avoid viruses, ransomware, and other malware.
Help ensure data security on computers, mobile devices, networks, the Internet, and in the cloud.
In this course, you will use discussions, case studies, and the experiences of your instructor and fellow students to explore the hazards and pitfalls of technology and learn how to use that technology safely and securely.
# of Days:
Setting:
|
C)HISSP: Healthcare IS Security Professional |
28.00 |
$3,500.00 |
|
Description: In this course, you will cover the skills and knowledge to implement the best IT healthcare practices, as well as regulatory compliance and standards in the healthcare industry. Because of growing industry regulations and privacy requirements in the healthcare industry, the C)HISSP was developed by Mile2. Graduates of this course have become vital in managing and protecting healthcare data and are tasked to protect patient information by implementing, managing, and assessing proper IT controls for patient health information integrity.
|
C)ISMS-LA: Certified ISMS Lead Auditor |
21.00 |
$3,000.00 |
|
Description: In this course, you will be prepared to conduct audits of information security management systems (ISMS) to ensure that they meet ISO/IEC 27001 standards in any organization.
ISMS ISO/IEC 27001 Audit Methodology:
Planning
Control Evaluation
Substantive Testing
Completion
The C)ISMS-LA is perfect for those looking to perform an internal or external ISMS 1S0/IEC 27001 audit.
|
C)ISMS-LI: Certified ISMS Lead Implementer |
21.00 |
$3,000.00 |
|
Description: In this course, you will be prepared to conduct audits of information security management systems (ISMS) to ensure that they meet ISO/IEC 27001 standards in any organization.
ISMS ISO/IEC 27001 Audit Methodology:
Planning
Control Evaluation
Substantive Testing
Completion
The C)ISMS-LI is perfect for those looking to implement a ISMS 1S0/IEC 27001 system.
|
C)ISSA: Information Systems Security Auditor |
28.00 |
$3,000.00 |
|
Description: In this course you will cover the skills and knowledge to assess vulnerabilities, report on compliance and implement controls for private and public enterprises. Many organizations require an Information System Auditors expert knowledge when it comes to identifying critical issues and providing effective auditing solutions. Through the use of a risk-based approach, the C)ISSA is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards.
|