Sicherung des Informationssystems Schulungen | Information System Security Schulungen

Sicherung des Informationssystems Schulungen

Dozentengeführte Sicherung des Informationssystems Präsenzschulungen in Deutschland.



Sicherung des Informationssystems Unterkategorien

Sicherung des Informationssystems Kurspläne

Name des Kurses
Name des Kurses
35 Stunden
A CISSP is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. The vast breadth of knowledge and the experience it takes to pass the exam is what sets a CISSP apart. The credential demonstrates a globally recognized level of competence provided by the (ISC)2® CBK®, which covers critical topics in security today, including cloud computing, mobile security, application development security, risk management and more.

This course helps you review the 10 domains of the information security practices. It also serves as a strong learning tool for mastering concepts and topics related to all aspects of information systems security.


- To review of the main topics of CISSP CBK (Common Body of Knowledge).
- To prepare for a CISSP examination
35 Stunden

Certified Information Systems Security Professional certification is recognised as a key qualification for developing a senior career in information security, audit and IT governance management. Held by over 30,000 qualified professionals worldwide, the Certified Information Systems Security Professional qualification shows proven knowledge and is the key to a higher earning potential in roles that include CISO, CSO and senior security manager.

You will learn to:

- Use the knowledge gained in a practical manner beneficial to your organisation
- Protect your organisational assets using access control techniques and strengthen confidentiality and integrity controls from the world of cryptography
- Secure your network architecture and design (implement Cyber security)
- Achieve your organisational objectives such as legal & compliance, Information assurance, security and data governance
- Enhance IT services secure delivery via Security operations, architecture and design principles
- Implement business resiliency via Business Continuity Plan
- You will gain a thorough understanding of the 8 domains as prescribed by (ISC)2®.

The Main Goal:

- To pass your CISSP examination first time.

Target Audience:

This training is intended for individuals preparing for the CISSP certification exam.
21 Stunden
A thorough, practical, 3 day course designed to provide the knowledge and skills required to manage information security, information assurance or information risk based processes. The CISMP course is aligned with the latest national information assurance frameworks (IAMM), as well as ISO/IEC 27002 & 27001; the code of practice and standard for information security. This course is a CESG Certified Training (CCT) course.

The course follows the latest BCS syllabus and prepares delegates for the 2 hour multiple choice BCS examination.

This qualification provides delegates with detailed knowledge of the concepts relating to information security; (confidentiality, integrity, availability, vulnerability, threats, risks and countermeasures), along with an understanding of current legislation and regulations which impact information security management. Award holders will be able to apply the practical principles covered throughout the course ensuring normal business processes become robust and more secure.
28 Stunden

CISA® is the world-renowned and most popular certification for professionals working in the field of IS audit and IT risk consulting.

Our CISA course is an intense, very competitive and exam focused training course. With experience of delivering more than 150+ CISA trainings in Europe and around the world and training more than 1200+ CISA delegates, the Net Security CISA training material has been developed in house with the top priority of ensuring CISA delegates pass the ISACA CISA® Exam. The training methodology focuses on understanding the CISA IS auditing concepts and practicing large number of ISACA released question banks from the last three years. Over a period, CISA holders have been in huge demand with renowned accountings firms, global banks, advisory, assurance, and internal audit departments.

Delegates may have years of experience in IT auditing but perspective towards solving CISA questionnaires will solely depend on their understanding to globally accepted IT assurance practices. CISA exam is very challenging because the chance of a very tight clash between two possible answers exists and that is where ISACA tests you on your understanding in global IT auditing practices. To address these exam challenges, we always provide the best trainers who have extensive experience in delivering CISA training around the world.

The Net Security CISA manual covers all exam-relevant concepts, case studies, Q&A's across CISA five domains. Further, the Trainer shares the key CISA supporting material like relevant CISA notes, question banks, CISA glossary, videos, revision documents, exam tips, and CISA mind maps during the course.


The ultimate goal is to pass your CISA examination first time.


- Use the knowledge gained in a practical manner beneficial to your organisation
- Provide audit services in accordance with IT audit standards
- Provide assurance on leadership and organizational structure and processes
- Provide assurance on acquisition/ development, testing and implementation of IT assets
- Provide assurance on IT operations including service operations and third party
- Provide assurance on organization’s security policies, standards, procedures, and controls to ensure confidentiality, integrity, and availability of information assets.

Target Audience:

Finance/CPA professionals, I.T. professionals, Internal & External auditors, Information security, and risk consulting professionals.
21 Stunden
The training is directed to all operating systems administrators, who plan to implement a public key infrastructure based on MS Windows Server 2012 R2 and plan to use qualified electronic signature certificates.

The participants will learn about the basic issues related to the implementation of public key infrastructure, and also with the idea of ​​applying the latest cryptographic solutions for securing information systems.

On the basis of MS Windows Server 2012 R2 are discussed possibilities of using certification services for the enterprise.During the training in a virtual environment is installed complete certification center and discuss the most important issues related to the management and administration of public key infrastructure in an Active Directory domain.

The training includes theoretical and practical knowledge on the use of electronic signatures issued by certification centers in Poland under the "Act on Electronic Signatures." These are legal issues, legal requirements, as well as examples of the use of certificates of electronic signatures in Poland.

The participants will gain the knowledge needed to create electronic correspondence relating to communication with the public authorities and other services that allow or require the use of a type of ID.
21 Stunden
This course will give you the skills to build up information security according to ISO 27005, which is dedicated to information security risk management based on ISO 27001.
35 Stunden
This class will help the attendees to scan, test, hack and secure their own systems. To gain an in-depth knowledge and practical experience with the current essential security systems. The attendees will get to know how perimeter defences work and then be led into scanning and attacking their own networks, no real network is harmed. The attendees then will learn how intruders escalate privileges and what steps can be taken to secure a system, Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
7 Stunden
This is a one day Introduction to ISO27001
21 Stunden
This instructor-led, live training in Deutschland is aimed at engineers in telecommunication companies who wish to set up an end-to-end digital identity management system.

By the end of this training, participants will be able to:

- Understand, evaluate and adopt different approaches to managing usernames and passwords.
- Setup a single login system that works across all applications used in a telecom environment.
- Use identity technology to get a clear understanding of their customers and their needs.
- Implement an authentication system that works across different platforms (laptop, mobile, etc.).
21 Stunden
This instructor-led, live training in Deutschland (online or onsite) is aimed at engineers who wish to learn the methods and tools needed to protect their organization's information systems against attack.

By the end of this training, participants will be able to:

- Understand information security at both the computer level, as well as the communications level.
- Prevent physical and digital access to private information systems.
- Prevent the modification of information that is stored, being processed, or being transmitted.
- Protect against denial of service to authorized users.
- Take the necessary measures to detect, document, and counter security threats.
- Ensure that organizational information is kept confidential.
28 Stunden
The training takes the form of a workshop supplemented with substantive knowledge. Classes are based on the official CISA certificate framework. During the workshop, case studies will be discussed in discussing specific issues. Classes will be conducted in English (on request in Polish) based on the ISACA handbook in English.
An exam voucher of US $ 760 is included in the training. (ISACA Member: US $575).

CISA Exam Material Scope:

- Information System Auditing Process (21%)
- Governance and Management of IT (17%)
- Information Systems Acquisition, Development and implementation (12%)
- Information Systems Operation and Business Resilience (23%)
- Protection of Information Assets (27%)

Duration of the exam: 4 hours
Type: multiple choice test
Volume: 200 questions

List of the requirements that you must meet in order to be able to claim the CISA qualification:

- Pass the CISA exam. The CISA passing score is a mark of 450 or higher on the exam.
- Abide by the ISACA Code of Professional Ethics
- Promise to obey the CISA Continuing Professional Education Policy
- Gain at least 5 years of professional information systems auditing, control or security work experience.
- Comply with Information Systems Auditing Standards

If you’ve passed the exam and believe that you meet those requirements, then you can begin the application for certification: [here](
There is a fee of $50 for this application.

There’s also a yearly fee that you must pay to maintain this certification after you’ve been granted it. The fee is $40 per annum for ISACA members, and $75 for non-members.
14 Stunden
This instructor-led, live training in Deutschland (online or onsite) is aimed at security engineers who wish to use IBM Qradar SIEM to address pressing security use cases.

By the end of this training, participants will be able to:

- Gain visibility into enterprise data across on-premise and cloud environments.
- Automate security intelligence to hunt threats and to contain risks.
- Detect, identify, and prioritize threats.

Last Updated:

Zukünftige Sicherung des Informationssystems Kurse

Sicherung des Informationssystems Schulung, Sicherung des Informationssystems boot camp, Sicherung des Informationssystems Abendkurse, Sicherung des Informationssystems Wochenendkurse, Sicherung des Informationssystems Kurs, Sicherung des Informationssystems Training, Sicherung des Informationssystems Seminar, Sicherung des Informationssystems Seminare, Sicherung des Informationssystems Privatkurs, Sicherung des Informationssystems Coaching, Sicherung des Informationssystems LehrerInformation System Security Schulung, Information System Security boot camp, Information System Security Abendkurse, Information System Security Wochenendkurse, Information System Security Kurs, Information System Security Training, Information System Security Seminar, Information System Security Seminare, Information System Security Privatkurs, Information System Security Coaching, Information System Security Lehrer


Sonderangebote Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.


is growing fast!

We are looking for a good mixture of IT and soft skills in Germany!

As a NobleProg Trainer you will be responsible for:

  • delivering training and consultancy Worldwide
  • preparing training materials
  • creating new courses outlines
  • delivering consultancy
  • quality management

At the moment we are focusing on the following areas:

  • Statistic, Forecasting, Big Data Analysis, Data Mining, Evolution Alogrithm, Natural Language Processing, Machine Learning (recommender system, neural networks .etc...)
  • Hibernate/Spring, Scala, Spark, jBPM, Drools
  • R, Python
  • Mobile Development (iOS, Android)
  • LAMP, Drupal, Mediawiki, Symfony, MEAN, jQuery
  • You need to have patience and ability to explain to non-technical people

To apply, please create your trainer-profile by going to the link below:

Apply now!

This site in other countries/regions