Information Security

Price

Course Delivery

Course Duration (Days)

  • <= 2(6)
  • 3 - 4(1)
  • 5 - 10(1)
  • > 10(8)
Duration -
2 Days
Course Delivery -
Classroom
$ 1,650.00
This two day advanced course develops the skills needed to perform effective internal/external audits against the ISO/IEC 27001:2022 Information Security Management Systems standard.
Duration -
1 Day
Course Delivery -
Classroom
$ 820.00
Duration -
3 Days
Course Delivery -
Classroom
$ 2,250.00
This 3 day advanced course provides an opportunity to learn the necessary skills to develop, implement and monitor an Information Security Management System within your organisation.
Duration -
2 Days
Course Delivery -
Classroom
$ 1,690.00
This 2 day advanced course provides an opportunity to learn the necessary skills to develop, implement and monitor an Information Security Management System within your organisation
Duration -
1 Day
Course Delivery -
Classroom
$ 825.00
This one-day foundation course provides an introduction to the ISO/IEC 27001 2022 standard and how it can be used to develop, implement, maintain and continually improve an information security management system. providing a sure foundation for your information security management system.
Duration -
1 Day
Course Delivery -
Classroom
$ 795.00
This one-day foundation course provides an overview of the concepts and principles of a Privacy Information Management System (PIMS) based on ISO/IEC 27701.
Duration -
1 Day
Course Delivery -
Classroom
$ 795.00
The course will equip participants with a high-level understanding of the ISO/IEC 42001:2023 standards, the key benefits of implementing an Artificial Intelligence Management System, and the need for governance and trust in the use of artificial intelligence (AI) systems. Gain the knowledge required to identify and manage risks related to the use of AI, and the integration of ISO/IEC 42001 with other standards such as ISO/IEC 27001.
Duration -
5 Days
Course Delivery -
Classroom
$ 3,425.00
Gain a practical understanding of the responsibilities of an information security auditor, and the techniques and methodologies required to effectively audit an ISMS.
8 list items
  • «
  • 1
  • »