
Online or onsite, instructor-led live Information Security Risk training courses demonstrate through interactive discussion and hands-on practice the fundamentals and advanced topics of Information Security Risk.
Information Security Risk training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live Information Security Risk training can be carried out locally on customer premises in Malta or in NobleProg corporate training centers in Malta.
NobleProg -- Your Local Training Provider
Testimonials
The trainer's extensive knowledge of IRM and other infosec matters that feed into or are fed by IRM, which added great value.
Crispin Jeffries, KPMG
Course: BCS Practitioner Certificate in Information Risk Management (CIRM)
The interactive learning of getting us to do exercises to cover the subject and then using the slides as a sense check everything covered rather than go through slides throughout the session was refreshing and meant you had to think on your feet which was very effective.
Michelle Watson - Khadija Ukadia, KPMG LLP
Course: BCS Practitioner Certificate in Information Risk Management (CIRM)
Abhi was very engaging and I liked the way he got us all involved. I particularly liked the exercises and how each of us lead on one.
Khadija Ukadia, KPMG LLP
Course: BCS Practitioner Certificate in Information Risk Management (CIRM)
Trainer used industry experience which brought the programme to live
Christian Eduwa - Khadija Ukadia, KPMG LLP
Course: BCS Practitioner Certificate in Information Risk Management (CIRM)
Trainer's interaction to each individual, using whiteboard instead of going through slides, interactive team session, well-structured, adequate breaks, very much enjoyed going through exam question results and overall updates at end of each day with open forum discussion.
Maureen Barker - Khadija Ukadia, KPMG LLP
Course: BCS Practitioner Certificate in Information Risk Management (CIRM)
Abhi is a great trainer and his experience adds to the delivery. If any other of my colleagues are to attend the course, I would want the trainer to be Abhi. The workshops to help those on the course that Abhi added off his own back, helped to solidify the learning.
Yusuf Bhayat - Khadija Ukadia, KPMG LLP
Course: BCS Practitioner Certificate in Information Risk Management (CIRM)
Questions, that helps me a lot to understand the characteristics of CRISC examination.
Masakazu Yoshijima - Masakazu Yoshijima, Bank of Yokohama, Ltd.
Course: CRISC - Certified in Risk and Information Systems Control
deep knowledge, real examples, the fact that trainer is also a practicioner
18 Wojskowy Oddział Gospodarczy
Course: CRISC - Certified in Risk and Information Systems Control
Information Security Risk Subcategories in Malta
Information Security Risk Course Outlines in Malta
- Understand the features and structure of Snyk.
- Use Snyk to find and fix code security issues.
- Integrate Snyk in a software development lifecycle.
- Use the knowledge gained in a practical manner beneficial to your organisation
- Provide audit services in accordance with IT audit standards
- Provide assurance on leadership and organizational structure and processes
- Provide assurance on acquisition/ development, testing and implementation of IT assets
- Provide assurance on IT operations including service operations and third party
- Provide assurance on organization’s security policies, standards, procedures, and controls to ensure confidentiality, integrity, and availability of information assets.
Delegates will benefit from the practical and extensive experiences of ours trainers who are practicing business continuity management and ISO 22301:2019 specialists. Delegates will learn how to:
- Explain the need for business continuity management (BCM) in all organisations
- Define the business continuity lifecycle
- Conducting business continuity programme management
- Understand their organisation sufficiently to identify mission-critical impact areas
- Determine their organisation's business continuity strategy
- Establish a business continuity response
- Exercise, maintain and review plans
- Embed business continuity in an organisation
- Define terms and definitions appropriate to business continuity
- System Administrators who wish to become security architects
- Technical architects looking to move into the field of security architecture
- Describe the business environment and the information risks that apply to the systems.
- Describe and apply security design principles.
- Identify information risks that arise from potential solution architectures.
- Design alternate architectures or countermeasures to mitigate identified information risks.
- Ensure that proposed architectures and countermeasures adequately mitigate identified information risks.
- Apply ‘standard’ security techniques and architectures to mitigate security risks.
- Develop new architectures that mitigate the risks posed by new technologies and business practices.
- Provide consultancy and advice to explain Information Assurance and architectural problems.
- Security configure ICT systems in compliance with their approved security architectures.
- How the management of information risk will bring about significant business benefits.
- How to explain and make full use of information risk management terminology.
- How to conduct threat and vulnerability assessments, business impact analyses and risk assessments.
- The principles of controls and risk treatment.
- How to present the results in a format which will form the basis of a risk treatment plan.
- The use of information classification schemes.
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
- Understand the concepts and benefits of Open Data.
- Identify the different types of data.
- Understand the risks of Open Data and how to mitigate them.
- Learn how to manage Open Data risks and create a contingency plan.
- Implement Open Data risk mitigation strategies to reduce disaster risk.
- To help you pass the CRISC examination first time.
- Possessing this certification will signify your commitment to serving an enterprise with distinction.
- The growing demand for professionals with risk and control skills will allow holders of this certification to command better positions and salary.
- To help enterprises accomplish business objectives by designing, implementing, monitoring and maintaining risk-based, efficient and effective IS controls.
- The technical skills and practices that CRISC promotes, which are the building blocks of success in the field.
Last Updated: