C1. Courses & Seminars


rious IT Management related seminars are organised on a regular basis by ICT Controland its partners.

Visit the Events section to find out about recent and up-coming seminars.


 

 


ISACA Cybersecurity training and certification are now available in Europe and Asia!

As part of a global initiative to help meet the increasing demand for skilled cyber security professionals, Cybersecurity Nexus™ (CSX) from ISACA®—the global leader in information systems certification and knowledge—has created three new globally accepted cyber security certifications.

More...

CERTIFIED ISO 20000 LEAD AUDITOR (5-DAY COURSE)

Mastering the Audit of an Information Technology Service Management System (ITSMS) based on ISO 20000

More...

CERTIFIED ISO 20000 LEAD IMPLEMENTER (5-DAY COURSE)

Mastering the implementation and management of an Information Technology Service Management System (ITSMS) based on ISO 20000

More...

CERTIFIED ISO 22301 LEAD AUDITOR (5-DAY COURSE)

Mastering the Audit of a Business Continuity Management System (BCMS) based on ISO 22301

More...

 

CERTIFIED ISO 27001 IMPLEMENTER

This five-day intensive course enables participants to develop the necessary expertise to support an organization in implementing and managing an Information Security Management System (ISMS) based on ISO/IEC 27001:2013.

More...

CERTIFIED ISO 27005 RISK MANAGER (3-DAY COURSE)

In this three-day intensive course participants develop the competence to master the basic risk management elements related to all assets of relevance for information security using the ISO/IEC 27005:2011 standard as a reference framework. Based on practical exercises and case studies, participants acquire the necessary knowledge and skills to perform an optimal information security risk assessment and manage risks in time by being familiar with their life cycle.

More... 

CERTIFIED ISO 27034 IMPLEMENTER (5-DAY COURSE)

Mastering the implementation of management in IT - Security Techniques - Application security based on ISO 27034 Summary. This five-day intensive course enables participants to develop, acquire, implement and use trustworthy applications, at an acceptable (or tolerable) security cost. More specifically, these components, processes and frameworks provide...

More...