INFOC & CYBER SOC INSTITUTE

DJ-Image Slider

  • Welcome
    Welcome
     

Training

IT Governance & Cyber Security Institute (ITGCSI) is composed of security consultants who hold and maintain many of the leading industry certifications, to include, CISSP, CISM, CISA, and GIAC. In addition to these certifications, our specialists possess proven experience in the execution of all of our engagements.

A strong IT security program cannot be put in place without significant attention given to training IT users on security policy, procedures, and techniques, as well as the various management, operational, and technical controls necessary and available to secure IT resources. In addition, those who manage the IT infrastructure need to have the necessary skills to carry out their assigned duties effectively. Failure to give attention to the area of security training puts an enterprise at great risk because security of agency resources is as much a human issue as it is a technology issue.

Enterprises of all sizes face many challenges as they seek to minimize information security risk. The protection of critical information assets is sometimes perceived as ineffective and costly. Demonstrating compliance with multiple global regulations can still be a frustrating, repetitive and manual process. These factors contribute to a prevailing opinion that security can often be a business inhibitor, rather than the business enabler it needs to be. What is needed is an information-centric perspective that aligns security with business objectives by ‘following the information’ to determine what’s worth protecting, where the risks are and how to best prioritize security investments to accelerate your business forward.

ITGCSI can help by using an information-centric approach to risk management that holistically focuses on your information security challenges in the critical areas of Business, Operations, and Technology. This approach aligns information security to business objectives, helps protect information assets and eases the burden of regulatory compliance. The result is a highly effective information security infrastructure that responds quickly to business changes with optimized policies, procedures, metrics and controls. By utilizing a proven framework that leverages best practices, methodologies and industry standards, ITGCSI help you identify, remediate and manage information security risks while increasing the efficiency and effectiveness of your overall security program. Contact us ITGCSI offers short to long term training

  • As Continued Education
  • Professional Development
  • New Candidates wishing to join the industry
  • Industry Recognized certifications (CISSP,CISM, CISA, CGEIT [Boot camps/crash courses before sitting for your certification])

The “must-have” certification for any security professional and we offer training for all of them

The International Information Systems Security Certification Consortium's (ISC)2 Programmes

We offer training for the following programs

  • Certified Secured Software Lifecycle Professional (CSSLP) – professionals who develops the application security program (reducing production costs, application vulnerabilities and delivery delays)
  • Certified Information Systems Security Professional (CISSP) - professionals who define the architecture, design, management and/or controls that assure the security of business environments
  • Systems Security Certified Practitioner (SSCP) - ability to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability
  • Certified Authorization Professional (CAP) - personnel involved in the process of authorizing and maintaining information systems. Specifically, this credential applies to those responsible for formalizing processes used to assess risk and establish security requirements and documentation.
  • Certified Cyber Forensics Professional (CCFP) - expertise in forensics techniques and procedures, standards of practice, and legal and ethical principles to assure accurate, complete, and reliable digital evidence admissible in a court of law
  • HealthCare Information Security and Privacy Practitioner (HCISPP) - practitioner's core knowledge and experience in security and privacy controls for personal health information
Information Systems Audit and Control Association (ISACA)Programmes

We offer training for the following programs

  • Certified Information Systems Auditor (CISA) qualification - for those who audit, control, monitor and assess an organization's information technology and business systems
  • Certified Information Security Manager (CISM) - who design, build and manage enterprise information security programs
  • Certified in the Governance of Enterprise IT (CGEIT) - critical issues around governance and strategic alignment
  • Certified in Risk and Information Systems Control (CRISC) - linking IT risk management to enterprise risk management
Electronic Commerce Council (EC-Council)Programmes

We offer training for the following programs

  • Penetration testing endorsements, which include E-Council Consultant's
  • Certified Ethical Hacker (CEH)
  • Computer Hacking Forensic Investigator (CHFI)
  • Licensed Penetration Tester (LPT)
  • Certified Security Analyst (CSA)
  • Certified Chief Information Security Officer (CCISO)
  • Certified Network Security Administrator (CNSA)
  • Certified Incident Handler (CIH)
  • Disaster Recovery Professional (CDRP)
  • Certified Security Specialist (CSS)
  • Certified Secure Programmer (CSP)

 

You are here: Home Training